Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1101 - 1125 of 2294

Thoughts on Higher Education and Scientific Research

March 22, 2011
Author(s)
Jeffrey M. Voas, George Hurlburt, Keith Miller, Phillip Laplante, Bret Michael
The notion of a "tipping point" isn't new, al though the concept has relevance in differing ways. Academia seems to be at a tipping point, whereby the steady state of disciplinary specialization is about to give way to an interdisciplinary, collaborative

Efficient Motion Vector Interpolation for Error Concealment of H.264/AVC

March 1, 2011
Author(s)
Hamid Gharavi
In video communications the compressed video stream is very likely to be corrupted by channel errors. In order to combat these channel errors, many methods have been proposed. In this paper, a new method for motion vectors (MVs) interpolation with the help

Guide to Using Vulnerability Naming Schemes

February 25, 2011
Author(s)
David A. Waltermire, Karen Scarfone
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration Enumeration (CCE). Draft SP 800-51 Revision 1 gives an introduction to both naming schemes and makes

Glossary of Key Information Security Terms

February 17, 2011
Author(s)
Richard L. Kissel
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800 series, NIST Interagency Report (NIST IR) series, and the Committee for National Security Systems

Ontology Summit 2010 Creating the Ontologists of the Future

February 15, 2011
Author(s)
Fabian M. Neuhaus
The goal of the Ontology Summit 2010 was to address the current shortage of persons with ontology expertise by developing a strategy for the education of ontologists. To achieve this goal we studied how ontologists are currently trained, the requirements

Who is Who? Biometrics provides answers for public and private sectors

February 10, 2011
Author(s)
Fernando L. Podio
One of the critical issues related to secured Information Technology (IT) systems and applications is the verification of the users identity. Biometrics provides for secure transactions, positive identification and augmentation to human judgment. For

Minimum-Risk Layer 2 Trigger Levels for Proactive Media-Independent Handovers

February 1, 2011
Author(s)
David W. Griffith, Alexandre Delye, Nada T. Golmie
Anticipated handovers that use Link Going Down (LGD) and Link Down (LD) trigger events require the network operator to set the LGD trigger high enough that the handover completes before the LD trigger event. However, setting the LGD trigger too high can

Guide to Security for Full Virtualization Technologies

January 28, 2011
Author(s)
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. Full virtualization technologies run one or

Securing WiMAX Wireless Communications

December 27, 2010
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-127, Guide to Securing WiMAX Wireless Communications: Recommendations of the National Institute of Standards and Technology. The publication, which was written by Karen

A Benchmark for Best View Selection of 3D Objects

December 23, 2010
Author(s)
Helin Dutagaci, Chun Pan (Benny) Cheung, Afzal A. Godil
The best view selection corresponds to the task of automatically selecting the most representative view of a 3D model. In this paper, we describe a benchmark for evaluation of best view selection algorithms. The benchmark consists of the preferred views of

Benchmarks, Performance Evaluation and Contests for 3D Shape Retrieval

December 20, 2010
Author(s)
Afzal A. Godil, Zhouhui Lian, Helin Dutagaci
Benchmarking of 3D Shape retrieval allows developers and researchers to compare the strengths of different algorithms on a standard dataset. Here we discuss the different steps involved in developing a benchmark and some of the issues involved. We then

Free and Open Source Software

December 13, 2010
Author(s)
Keith Miller, Jeff Voas, Tom Costello
In this paper, free and open source software are discussed. Open source is an intellectual property destroyer. Nothing could be worse than this for the software business and the intellectual-property business. Microsoft has an official open source presence

Mobile Applications: the Fifth Cycle

December 13, 2010
Author(s)
George Hurlburt, Jeff Voas, Keith Miller
Using the analogy of an existing smart car, this paper explores Power to the Edge , where the edge is commercial mobile computing. The world is poised for a 5th Cycle of computer capability, this time focused on the burgeoning phenomena of mobile computing
Was this page helpful?