Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1126 - 1150 of 2294

Speeding up the Wide-Pipe: Secure and Fast Hashing

December 12, 2010
Author(s)
Mridul Nandi, Souradyuti Paul
In this paper we propose a new sequential mode of operation – the Fast wide pipe or FWP for short - to hash messages of arbitrary length. The mode is shown to be (1) preimage-resistance preserving, (2) collision-resistance-preserving and, most importantly

k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks

December 10, 2010
Author(s)
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be chaotic

Toward Objective Global Privacy Standards

December 8, 2010
Author(s)
Ari M. Schwartz
Technical standards offer a new ability to support the important public policy goal of better protecting privacy. To do so most effectively, we must begin to move from the privacy standards based on subjective and procedural efforts to a series of

AN EFFICIENT SENSITIVITY ANALYSIS METHOD FOR NETWORK SIMULATION MODELS

December 7, 2010
Author(s)
Kevin L. Mills, James J. Filliben
Simulation models for data communications networks encompass numerous parameters that can each take on millions of values, presenting experimenters with a vast space of potential parameter combinations. To apply such simulation models experimenters face a

How to Model a TCP/IP Network Using Only 20 Parameters

December 5, 2010
Author(s)
Kevin L. Mills, Edward J. Schwartz, Jian Yuan
Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values. Such models are difficult to understand, parameterize and investigate. This paper explains how to model a modern data

Image Classification of Vascular Smooth Muscle Cells

November 11, 2010
Author(s)
Michael Grasso, Ronil Mokashi , Alden A. Dima, Antonio Cardone, Kiran Bhadriraju, Anne L. Plant, Mary C. Brady, Yaacov Yesha, Yelena Yesha
The traditional method of cell microscopy can be subjective, due to observer variability, a lack of standardization, and a limited feature set. To address this challenge, we developed an image classifier using a machine learning approach. Our system was

An Integrated PHY and MAC Layer Model for Half-Duplex IEEE 802.11 Networks

November 2, 2010
Author(s)
David W. Griffith, Michael R. Souryal, Camillo A. Gentile, Nada T. Golmie
This paper introduces an IEEE 802.11 analytical model that examines uplink and downlink communications between non-saturated stations and a non-saturated access point. The model integrates channel effects and collisions into a single expression for the

Dystopia

November 1, 2010
Author(s)
Isabel M. Beichl
This is an editorial for Computing in Science & Engineering on the subject of undergraduate education.

A New Call Admission Control Scheme for Heterogeneous Wireless Networks

October 31, 2010
Author(s)
Duk Kyung Kim, David W. Griffith, Nada T. Golmie
Call admission control between heterogeneous networks,such as an integrated 3GPP LTE and WLAN network, plays an important role to utilize the system resources in a more efficient way. In this paper, we propose that the preference to the WLAN is determined

An IEEE 1588 Time Synchronization Testbed for Assessing Power Distribution Requirements

October 25, 2010
Author(s)
Julien M. Amelot, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, Ya-Shian Li-Baboud, James Moyne
Wide-area monitoring applications for power distribution rely on accurate global time synchronization. Furthermore, there is interest in replacing current time synchronization methods such as IRIG, with distributed time synchronization protocols that

Maintainers Manual for Version 2.2.1 of the NIST DMIS Test Suite

October 25, 2010
Author(s)
Thomas R. Kramer, John A. Horst
This manual is a maintainers manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual is

System Builders Manual for Version 2.2.1 of the NIST DMIS Test Suite

October 25, 2010
Author(s)
Thomas R. Kramer, John A. Horst
This manual is a system builders manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The

Users Manual for Version 2.2.1 of the NIST DMIS Test Suite

October 25, 2010
Author(s)
Thomas R. Kramer, John A. Horst
This manual is a users manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual

Intrusion Detection and Prevention Systems

October 22, 2010
Author(s)
Karen A. Scarfone, Peter M. Mell
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents. An intrusion detection and prevention system (IDPS) is software that automates the intrusion detection

Data Sets for the Qualification of Volumetric CT as a Quantitative Imaging Biomarker in Lung Cancer

October 20, 2010
Author(s)
Charles D. Fenimore, Andrew Buckler, Lawrence H. Schwartz, Nicholas Petrick, Michael McNitt-Gray, Binsheng Zhao, Anthony P. Reeves, P. David Mozeley, Ricardo S. Avila
The drug development industry is faced with increasing costs and decreasing success rates. New ways to understand biology as well as the increasing interest in personalized treatments for smaller patient segments requires new capabilities for the rapid

Security Assurance Levels: A Vector Approach to Describing Security Requirements

October 20, 2010
Author(s)
James D. Gilsinn, Ragnar Schierholz
Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and safety of

A New Analysis of the False-Positive Rate of a Bloom Filter

October 15, 2010
Author(s)
Ken Christensen, Allen L. Roginsky, Miguel Jimeno
A Bloom filter is a space-efficient data structure used for probabilistic set membership testing. When testing an object for set membership, a Bloom filter may give a false positive. The analysis of the false positive rate is key to understanding the Bloom

In Trust we Trust

October 14, 2010
Author(s)
Keith Miller, Jeff Voas, Phillip Laplante
The term trust has had a well understood definition for centuries. However after e-trust came along, and then cloud, where e-trust is not sufficient due to the non-touchability of a public cloud, the need to reconsider what trust means for a public cloud

Reliability of Embedded and Cyber-Physical Systems

October 14, 2010
Author(s)
Ram Chillarege, Jeff Voas
Cyber-physical systems feature a tight combination of a system's computational and physical elements. Understanding how to assess and design trustworthiness into these complex systems of systems remains an unsolved problem. This issue offers insights into
Was this page helpful?