An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Kamran Sayrafian, Vladimir V. Marbukh, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper is concerned with target tracking using a network of collaborative sensors. The objective is to compute (online) the desired sensing and communication radii of sensors as well as their location at each time instant, such that a set of prescribed
Daniel I. Genin, Vladimir Marbukh, Anastase Nakassis
This paper reports on work in progress on assessing and mitigating selfish routing vulnerability to strategic attacks. We explain mechanisms leading to this vulnerability, propose the corresponding game-theoretic model, solve this model for some particular
The purpose of this document is to describe the best practices that personnel from the National Institute of Standards and Technology (NIST) have developed and implemented to efficiently and effectively capture two-way, free-form speech-to-speech audio
Authentication assurance level taxonomies that have been specified in many real-world smart identity token deployments do not fully reflect all the security properties associated with their underlying authentication mechanisms. In this paper we describe
This document is a collection of twenty eight Complex Systems Image of the Month (IOM) illustrations. Each month as part of the Complex Systems Program in the Information Technology Laboratory an IOM is produced, posted to the Complex Systems web site and
Nathalie Yarkony, Kamran Sayrafian, Antonio Possolo
Energy Harvesting (EH) refers to the process of capturing and storing energy from external sources or ambient environment. Kinetic energy harvested from the human body motion seems to be one of the most convenient and attractive solution for wearable
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. However, the
Despite the potential for high-speed communications, stringent regulatory mandates on Ultra-Wideband (UWB) emission have hindered its commercial success. By combining resolvable UWB multipath from different directions, Multiple-Input Multiple-Output (MIMO)
Ian M. Soboroff, Craig Macdonald, Rodrygo Santos, Iadh Ounis
The TREC Blog track aims to explore information seeking behaviour in the blogosphere, by building reusable test collections for blog-related search tasks. Since, its advent in TREC 2006, the Blog track has led to much research in this growing field, and
The Media Independent Handover (MIH)architecture finalized by the IEEE 802.21 working group facilitates handovers between heterogeneous networks. The signaling messages exchanged between the network entities, namely Mobile Nodes (MNs) and Points of Service
A low complexity Parallel Interference Cancellation (PIC) technique is proposed to suppress Multi-Access Interference (MAI) and minimize near-far effect for multi-user communication using Direct-Sequence Code Division Multiple Access (DS-CDMA)
In this paper, we present a systematic design structure for high-density ad hoc networks aimed at achieving full cooperative diversity, based on which the PHY, MAC and Network layers of the system are specifically tailored. For the latter in particular, we
A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the non-linearity of a circuit - as measured by the number of non-linear gates it contains - is reduced. The second step reduces the
This report summarizes the work of the Complex Systems Program within NIST s Information Technology Laboratory. The Overview presents some background material and a high-level overview of the Program s activities including significant technical
Digital images are commonly used to represent scientific data. Typically, high resolution images with many square pixels are considered to be necessary under the assumption that the increased precision of such images yields increased accuracy to the viewer
Kevin L. Mills, James J. Filliben, Dong Y. Cho, Edward J. Schwartz, Daniel I. Genin
This study describes a coherent set of modeling and analysis methods to investigate the behavior of large distributed systems. The methods are applied to compare several proposed Internet congestion-control mechanisms operating under a wide range of
Statistical modeling of Ultra-Wideband (UWB) signals is undertaken to examine the existence of short term fading and shadowing. Based on the data collected from multiple locations and 4 different sites using a single transmitter and a 96-element receiving
In December, 2008, the FBI provided MITRE with an extract of submissions of deceased persons. The submissions contain face images of subjects with multiple encounters over time. The type 10 records (face and SMT) are mostly frontal or near frontal face
In this paper we describe a novel 3D shape retrieval method based on Multi-scale Integral Orientations. In our approach, a 3D model after normalization is represented by a set of depth images captured uniformly on a unit circle. Then the shape descriptor
In this paper we present the results of the Shape Retrieval Contest 10 (SHREC 10) of Generic 3D Warehouse. The aim of this track was to evaluate the performances of various 3D shape retrieval algorithms on a large Generic benchmark based on the Google 3D
Helin Dutagaci, Afzal A. Godil, Chun Pan (Benny) Cheung
The SHREC 10 Shape Retrieval Contest of Range Scans aims at comparing algorithms that match a range scan to complete 3D models in a target database. The queries are range scans of real objects, and the objective is to retrieve complete 3D models that are
In Orthogonal Frequency Division Multiplex (OFDM) wireless networks such as 3GPP LTE and IEEE 802.16 WiMAX, the scheduler should allocate more resources to users with lower channel quality, such as users near the edge of the Base Station (BS) coverage area