An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Imagine a computer that can exploit quantum mechanics to solve previously intractable problems in physics, mathematics and cryptography. Such a quantum computer would revolutionize computing technology while teaching us about fundamental physics and ways
This bulletin summarizes the information that was presented in NIST Interagency Report (NISTIR)7564, Directions in Security Metrics Research, by Wayne Jansen. The publication examines past efforts to develop security measurements that could help
We propose using an on-off fluid source model for queuing statistics under TCP. This model was originally introduced to model queuing statistics of ATM multiplexers by D.Anick, D.Mitra and M.M.Sondhi. A good approximation for packet loss probability is
Helin Dutagaci, Afzal A. Godil, Bulent Sankur, Yucel Yemez
View-based indexing schemes for 3D object retrieval is gaining popularity since they provide good retrieval results. These schemes are coherent with the theory that humans recognize objects based on their 2D appearances. The view-based techniques also
Common Logic (CL) is an ISO standard that specifies a family of knowledge representation languages. The function of modules within CL is to support local context with a local domains of discourse. Modules play a crucial role since they enable users to
This report summarizes the work of the Complex Systems Program within NIST s Information Technology Laboratory. The Overview presents some background material and a high-level overview of the Program s activities including significant technical
In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors, however most of the existing
This Editor In Chief's (EIC) message is expected to appear in the January, 2010 issue of the IEEE Transactions on CAS for Video Technology (TCSVT). The editorial team will be under the leadership of the new EIC for a period of two years.
Tanya L. Brewer, Annie W. Sokol, Sheldon A. Durrant
Privilege management is large and complex, often the source of heated debate and opinion, and fraught with widely-understood, yet ill-defined terminology and concepts. The National Institute of Standards and Technology (NIST) and the National Security
We consider a superconducting phase qubit consisting of a monocrystalline sapphire Josephson junction with symmetry axis perpendicular to the junction interfaces. Via the London gauge we present a theoretical model of Fe3+ magnetic impurities within the
Theresa O'Connell, John Stasko, John Dill, William Pike, Alan MacEachren
There is a growing recognition within the visual analytics community that interaction and inquiry are inextricable. It is through the interactive manipulation of a visual interface the analytic discourse that knowledge is constructed, tested, refined, and
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam
In this paper, efficient sensor deployment algorithms are proposed to improve the coverage area in the target field. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The
Understanding what construction strategy has a chance to be a good hash function is extremely important. Nowadays it is getting more importance due to current SHA3 competition which is intended to make a standard for hash functions. In TCC 04, Maurer et al
While original network coding is proposed over data link layer, recent work suggests that it can also be implemented on physical layer. In fact it is more natural for wireless networks because of its omnidirectional transmission. In this paper, we
Charles D. Fenimore, Charles R. Meyer, Samuel G. Armato, Geoffrey McLennan, Luc Bidaut, Daniel P. Barboriak, Marios A. Gavrielides, Nicholas Petrick, Edward F. Jackson, Michael McNitt-Gray, Paul E. Kinahan, Binsheng Zhao
Rationale and Objectives Early detection of tumor response to therapy is a key goal. Finding measurement algorithms capable of early detection of tumor response could individualize therapy treatment as well as reduce the cost of bringing new drugs to
The USG profile for IPv6 specifies requirements for host, router and network protection devices (NPD) and this document specifies the validation requirements for test methods and test specifications used to test these devices. It has become the practice
This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and military personnel arriving to an incident area, we developed and tested an automated
Accurate signal measurement in the spatial-temporal domain is critical, amongst other applications, to the commercial success of UWB-MIMO communication systems and UWB standalone location systems. Antenna arrays can measure the spatial dimension of a
Network coding is a promising technology that can effectively improve the efficiency and capacity of multi-hop wireless networks by exploiting the broadcast nature of the wireless medium. However, existing studies have demonstrated that the benefits of
OMB Memorandum M-05-22 directed the National Institute of Standards and Technology (NIST) to develop the technical infrastructure (standards and testing) necessary to support wide scale adoption of IPv6 in the US Government (USG). Upon detailed inspection
This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce router
This bulletin summarizes the information that was published in NIST Interagency Report (NISTIR) 7621, Small Business Information Security: The Fundamentals, by Richard Kissel. The publication presents three major areas that small businesses should address
Ultra Wide-Band (UWB) is a favorable technology for wearable medical sensors that monitor vital signs and other health-related information. Efficient transceiver design requires in-depth understanding of the propagation media which in this case is the