Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1151 - 1175 of 2294

Further Studies of Bootstrap Variability for ROC Analysis on Large Datasets

October 11, 2010
Author(s)
Jin Chu Wu, Alvin F. Martin, Raghu N. Kacker
The nonparametric two-sample bootstrap is successfully applied to computing the measurement uncertainties in receiver operating characteristic (ROC) analysis on large datasets in areas such as biometrics, speaker recognition system, etc. To determine the

Modeling Smart Grid Applications with Co-Simulation

October 5, 2010
Author(s)
Timothy Godfrey, Mullen Sara, Roger C. Dugan, Craig Rodine, David W. Griffith, Nada T. Golmie
Analysis of complex Smart Grid applications require simulation of communications networks and the power system. Analytical models of the communication systems provide a tool for examining the aggregate behavior of the system. An event level analysis in the

A Methodology to Evaluate Wireless Technologies for the Smart Grid

October 4, 2010
Author(s)
Michael R. Souryal, Camillo A. Gentile, David W. Griffith, David E. Cypher, Nada T. Golmie
This paper presents a methodology for assessing the suitability of various wireless technologies for meeting the communication requirements of Smart Grid applications. It describes an approach for translating application requirements to link traffic

Simulation of a Medium Frequency Mesh Network for Communications in Underground Mines

October 3, 2010
Author(s)
Michael R. Souryal, Fabien A. Valoit, Hui Guo, Nader Moayeri, Nicholas W. Damiano, David P. Snyder
Signals at the lower end of the medium frequency range (300 kHz to 3000 kHz) propagate with relatively low attenuation along existing metallic infrastructure in an underground mine, such as cables, pipes and rails. Exploiting this capability, low-bandwidth

Ethics and the Cloud

September 30, 2010
Author(s)
Keith Miller, Jeff Voas
Cloud computing is an idea that's rapidly evolving. Still, the amount of money and attention devoted to this topic makes it seems sensible to discuss how ethicists view the kinds of changes in computing that are being called "the cloud." This department is

A DS-CDMA Interference Cancellation Technique for Body Area Networks

September 27, 2010
Author(s)
Wen-Bin Yang, Kamran Sayrafian
A low complexity Parallel Interference Cancellation (PIC) technique that is applicable to body area networks is presented. Using Direct-Sequence Code Division Multiple Access (DS-CDMA), the technique aims at suppressing interference caused by rapid changes

Simulation Model for the IEEE 802.15.3/3b WPAN Standard

September 15, 2010
Author(s)
Kamran Sayrafian
The1IEEE 802.15.3 is an emerging technology for high data rate wireless multimedia applications in Wireless Personal Area Networks (WPAN). In this paper, a discrete event simulation model has been implemented using OPNET2 Modeler to simulate the essential

PYRAMID MODEL BASED DOWN-SAMPLING FOR IMAGE INPAINTING

September 2, 2010
Author(s)
Hamid Gharavi
Image inpainting is a useful and powerful technique for automatically restoring or removing objects in films and damaged pictures. In the last ten years, many excellent inpainting algorithms have been proposed after Bertalmio et al. [1]. However, no paper

A Channel Propagation Model for the 700 MHz Band

September 1, 2010
Author(s)
Camillo A. Gentile, Nada T. Golmie, Catherine A. Remley, Christopher L. Holloway, William F. Young
Conversion from analog television in the United States combined with the appeal for broadband public safety communications is generating a lot of interest in the so-called 700 MHz band between 698-806 MHz. To our knowledge, no channel propagation model for

Introduction: Cybersecurity

August 31, 2010
Author(s)
David R. Kuhn
Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. The articles in this issue can help IT professionals who want to be intelligent providers or consumers of secure

Guide to Adopting and Using the Security Content Automation Protocol (SCAP), Version 1.0

July 27, 2010
Author(s)
Stephen D. Quinn, Karen A. Scarfone, Matthew P. Barrett, Christopher S. Johnson
The purpose of this document is to provide an overview of the Security Content Automation Protocol (SCAP). This document discusses SCAP at a conceptual level, focusing on how organizations can use SCAP-enabled tools to enhance their security posture. It

Towards Evolutionary-Pricing Framework for Mobile Sensor Network Self-organization

July 18, 2010
Author(s)
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper reports on work in progress on developing a unified co-evolutionary/pricing framework for Mobile Sensor Networks (MSN) self-organization. MSN self-organization involves cooperative sensor positioning and formation of a multi-hop Mobile Ad-hoc

Measuring Security Risk of Networks Using Attack Graphs

July 14, 2010
Author(s)
Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia
Today's computer systems face sophisticated attackers who combine multiple vulnerabilities to penetrate networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately

Investigating the Bag-of-Words Method for 3D Shape Retrieval

June 30, 2010
Author(s)
Afzal A. Godil, Xiaolan Li
This paper investigates the capabilities of the Bag-of-Words (BW) method in the 3D shape retrieval field. The contributions of this paper are: 1) the 3D shape retrieval task is categorized from different points of view: specific vs. generic, partial-to
Was this page helpful?