An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The nonparametric two-sample bootstrap is successfully applied to computing the measurement uncertainties in receiver operating characteristic (ROC) analysis on large datasets in areas such as biometrics, speaker recognition system, etc. To determine the
Timothy Godfrey, Mullen Sara, Roger C. Dugan, Craig Rodine, David W. Griffith, Nada T. Golmie
Analysis of complex Smart Grid applications require simulation of communications networks and the power system. Analytical models of the communication systems provide a tool for examining the aggregate behavior of the system. An event level analysis in the
Michael R. Souryal, Camillo A. Gentile, David W. Griffith, David E. Cypher, Nada T. Golmie
This paper presents a methodology for assessing the suitability of various wireless technologies for meeting the communication requirements of Smart Grid applications. It describes an approach for translating application requirements to link traffic
Michael R. Souryal, Fabien A. Valoit, Hui Guo, Nader Moayeri, Nicholas W. Damiano, David P. Snyder
Signals at the lower end of the medium frequency range (300 kHz to 3000 kHz) propagate with relatively low attenuation along existing metallic infrastructure in an underground mine, such as cables, pipes and rails. Exploiting this capability, low-bandwidth
Cloud computing is an idea that's rapidly evolving. Still, the amount of money and attention devoted to this topic makes it seems sensible to discuss how ethicists view the kinds of changes in computing that are being called "the cloud." This department is
A low complexity Parallel Interference Cancellation (PIC) technique that is applicable to body area networks is presented. Using Direct-Sequence Code Division Multiple Access (DS-CDMA), the technique aims at suppressing interference caused by rapid changes
The need for the development of performance requirements, metrics and test methods for evaluation of location and tracking systems is increasing as these systems begin to become commercially available for use by emergency responders. A working group was
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-117, Guide To Adopting and Using the Security Content Automation Protocol (SCAP), Version 1.0: Recommendations of the National Institute of Standards and Technology
Dhananjay Anand, Jeffrey Fletcher, Ya-Shian Li-Baboud, Julien M. Amelot, James Moyne
Practical implementations in distributed model based control face a fundamental trade-off between model complexity and the number of modeled nodes. For linear systems, higher order models better capture the behavior of the system at higher frequencies
The1IEEE 802.15.3 is an emerging technology for high data rate wireless multimedia applications in Wireless Personal Area Networks (WPAN). In this paper, a discrete event simulation model has been implemented using OPNET2 Modeler to simulate the essential
Image inpainting is a useful and powerful technique for automatically restoring or removing objects in films and damaged pictures. In the last ten years, many excellent inpainting algorithms have been proposed after Bertalmio et al. [1]. However, no paper
Camillo A. Gentile, Nada T. Golmie, Catherine A. Remley, Christopher L. Holloway, William F. Young
Conversion from analog television in the United States combined with the appeal for broadband public safety communications is generating a lot of interest in the so-called 700 MHz band between 698-806 MHz. To our knowledge, no channel propagation model for
This document describe a framework (with the acronym ERO-AA) for establishing an infrastructure for authentication and authorization of Emergency Response officials (ERO) who respond to various types of man-made and natural disasters. The population of
Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. The articles in this issue can help IT professionals who want to be intelligent providers or consumers of secure
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-53A, Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans. The revised
A widely used approach to image segmentation is to define corresponding segmentation energies and to compute shapes that are minimizers of these energies. In this work, we introduce a flexible and efficient numerical framework for minimization of such
Hamsi is one of the second round candidates of the SHA-3 competition. In this study, we present non-random differential properties for the compression function of Hamsi-256. Based on these properties, we first demonstrate a distinguishing attack that
This paper proposes a simple non-coherent amplify-and-forward receiver for the relay channel and evaluates its diversity performance for Rayleigh fading channels. We use the generalized likelihood ratio test to obtain the decision rule in closed form
Stephen D. Quinn, Karen A. Scarfone, Matthew P. Barrett, Christopher S. Johnson
The purpose of this document is to provide an overview of the Security Content Automation Protocol (SCAP). This document discusses SCAP at a conceptual level, focusing on how organizations can use SCAP-enabled tools to enhance their security posture. It
We present experimental measurements and analysis of RF interference between a passive RFID system and a generic frequency hopping communications system in the 902 928 MHz ISM radio band. Interference in both directions is considered, RFID to
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems. This publication updates federal contingency planning practices by integrating risk management
Chris Callison-Burch, Philipp Koehn, Christof Monz, Kay Peterson, Mark A. Przybocki, Omar F. Zaidan
This paper presents the results of the WMT10 and MetricsMATR10 shared tasks, which included a translation task, a system combination task, and an evaluation task. We conducted a large-scale manual evaluation of 104 machine translation systems and 41 system
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper reports on work in progress on developing a unified co-evolutionary/pricing framework for Mobile Sensor Networks (MSN) self-organization. MSN self-organization involves cooperative sensor positioning and formation of a multi-hop Mobile Ad-hoc
Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia
Today's computer systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately
This paper investigates the capabilities of the Bag-of-Words (BW) method in the 3D shape retrieval field. The contributions of this paper are: 1) the 3D shape retrieval task is categorized from different points of view: specific vs. generic, partial-to