NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Theresa O'Connell, John Stasko, John Dill, William Pike, Alan MacEachren
There is a growing recognition within the visual analytics community that interaction and inquiry are inextricable. It is through the interactive manipulation of a visual interface the analytic discourse that knowledge is constructed, tested, refined, and
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam
In this paper, efficient sensor deployment algorithms are proposed to improve the coverage area in the target field. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The
Understanding what construction strategy has a chance to be a good hash function is extremely important. Nowadays it is getting more importance due to current SHA3 competition which is intended to make a standard for hash functions. In TCC 04, Maurer et al
While original network coding is proposed over data link layer, recent work suggests that it can also be implemented on physical layer. In fact it is more natural for wireless networks because of its omnidirectional transmission. In this paper, we
Charles D. Fenimore, Charles R. Meyer, Samuel G. Armato, Geoffrey McLennan, Luc Bidaut, Daniel P. Barboriak, Marios A. Gavrielides, Nicholas Petrick, Edward F. Jackson, Michael McNitt-Gray, Paul E. Kinahan, Binsheng Zhao
Rationale and Objectives Early detection of tumor response to therapy is a key goal. Finding measurement algorithms capable of early detection of tumor response could individualize therapy treatment as well as reduce the cost of bringing new drugs to
The USG profile for IPv6 specifies requirements for host, router and network protection devices (NPD) and this document specifies the validation requirements for test methods and test specifications used to test these devices. It has become the practice
This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and military personnel arriving to an incident area, we developed and tested an automated
Accurate signal measurement in the spatial-temporal domain is critical, amongst other applications, to the commercial success of UWB-MIMO communication systems and UWB standalone location systems. Antenna arrays can measure the spatial dimension of a
Network coding is a promising technology that can effectively improve the efficiency and capacity of multi-hop wireless networks by exploiting the broadcast nature of the wireless medium. However, existing studies have demonstrated that the benefits of
OMB Memorandum M-05-22 directed the National Institute of Standards and Technology (NIST) to develop the technical infrastructure (standards and testing) necessary to support wide scale adoption of IPv6 in the US Government (USG). Upon detailed inspection
This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce router
This bulletin summarizes the information that was published in NIST Interagency Report (NISTIR) 7621, Small Business Information Security: The Fundamentals, by Richard Kissel. The publication presents three major areas that small businesses should address
Ultra Wide-Band (UWB) is a favorable technology for wearable medical sensors that monitor vital signs and other health-related information. Efficient transceiver design requires in-depth understanding of the propagation media which in this case is the
Stephen D. Quinn, David A. Waltermire, Christopher S. Johnson, Karen A. Scarfone, John F. Banghart
This document defines the technical specification for Version 1.0 of the Security Content Automation Protocol (SCAP). SCAP consists of a suite of specifications for standardizing the format and nomenclature by which security software communicates
Increasing demand for high quality multimedia services has been a driving factor in the technological evolution of high bandwidth wireless/mobile communications systems and standards. The most challenging aspect is the support of higher quality video
In mobile networks, authentication is a time-consuming operation that needs to be shortened in order to provide seamless handovers. Furthermore, the time required for negotiating security parameters and obtaining security policies increases the importance
Firewalls are essential devices or programs that help organizations protect their networks and systems, and help home users protect their computers, from hostile attacks, break-ins, viruses, and malicious software. Firewalls control the flow of network
Over the last thirty years, much research has been done on the development of failure event databases and fatigue modeling of crack growth in pressure vessels and piping. According to a USNRC report (NUREG/CR6674, 2000), results of a fatigue crack growth
This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important for
Provides some first-order techniques for analyzing matcher performance. A novel argument is used to derive the power-law as a kind of baseline for analyzing matcher performance. The power-law is then applied to two situations: a) CMC curves, and b) fusion
A compact scheme for high-speed frequency doubling and down-conversion on a single dual-element PPKTP waveguide is investigated. Optimal temperature selection for the entire waveguide is achieved and coincidence is observed. A pulsed pump scheme is used to
This paper describes some practical administrative issues and challenges in the deployment of DNSSEC - an IETF specified suite of security measures for securing the Domain Name System (DNS). The issues covered include: (a) Choice of Cryptographic