Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1376 - 1400 of 2294

Style Guide for Voting System Documentation

August 25, 2008
Author(s)
Dana E. Chisnell, Susan C. Becker, Sharon J. Laskowski, Svetlana Z. Lowry
The goal of this style guide is to provide specific guidance to improve the usability of documentation used by poll workers and election support staff. The Voting System Documentation Style Guide incorporates best practices for writing documentation as it

Map Quality Assessment

August 19, 2008
Author(s)
Asim Wagan, Afzal A. Godil, Xiaolan Li
The Maps captured by robots in real environment are usually incomplete, distorted, and noisy. To evaluate the quality of these kind of maps is an important problem in the field. In this paper we present an algorithm to assess the quality of the map

Architectural Considerations for Mapping Distribution Protocols

August 1, 2008
Author(s)
Kotikalapudi Sriram, Young-Tak Kim, Douglas C. Montgomery
In this paper, we present a discussion of some architectural ideas pertaining to the mapping distribution protocol. The efficiency of this protocol in terms of response time and the volume of traffic load it generates are important considerations. We

Guide to General Server Security

July 25, 2008
Author(s)
Karen A. Scarfone, Wayne Jansen, Miles C. Tracy
The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. The document

Performance Measurement Guide for Information Security

July 16, 2008
Author(s)
Elizabeth Chew, Marianne M. Swanson, Kevin M. Stine, N Bartol, Anthony Brown, W Robinson
This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security

The Keyed-Hash Message Authentication Code (HMAC)

July 16, 2008
Author(s)
National Institute of Standards and Technology (NIST), Quynh Dang
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared

A Profile for IPv6 in the U.S. Government - Version 1.0

July 1, 2008
Author(s)
Douglas C. Montgomery, J. S. Nightingale, Sheila E. Frankel, Mark E. Carson
This publication seeks to assist Federal agencies in formulating plans for the acquisition of IPv6 technologies. To achieve this, we define a standards profile for IPv6 in the USG that is intended to be applicable to all future uses of IPv6 in non-

Low Signal-to-noise Ratio Underwater Acoustic Communications

May 31, 2008
Author(s)
Wen-Bin Yang, T.C. Yang
Communications with low input signal-to-noise ratio (SNR) is often called covert communications as the probability of detection and interception decreases with decreasing SNR . Direct-sequence spread-spectrum signaling works at low SNR because of the

Internet Protocol Version 6 (IPv6)

May 30, 2008
Author(s)
Sheila E. Frankel, David Green
Recognizing that the 32-bit addresses used by the current version of the Internet Protocol (IPv4) would soon be depleted, the Internet Engineering Task Force (IETF) has been developing its successor, Internet Protocol version 6 (IPv6). This has been a more

Capacity of Random Wireless Networks: Impact of Cooperative Network Coding

May 19, 2008
Author(s)
Yi Qian, Kejie Lu, Shengli Fu
The throughput capacity of random wireless networks has been studied extensively in the literature. Nevertheless, most existing studies are based on the assumption that each transmission has one sender and one receiver. In our recent study, we have

Subspace Approximation of Face Recognition Algorithms: An Empirical Study

May 12, 2008
Author(s)
P J. Phillips, Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi
We present a theory for constructing linear subspace approximations to face recognition algorithms and empirically demonstrate that a surprisingly diverse set of face recognition approaches can be approximated well using a linear model. A linear model

Design Secure and Application-Oriented VANET

May 11, 2008
Author(s)
Yi Qian, Nader Moayeri
Vehicular ad hoc network (VANET) is recognized as an important component of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems, which target to increase safety of passengers by exchanging warning

Impact of Signaling Load on the UMTS Call Blocking/Dropping

May 11, 2008
Author(s)
Yi Qian, David Tipper, Saowaphak Sasanus
Radio resources in the third generation (3G) wireless cellular networks (WCNs) such as the universal mobile telecommunications system (UMTS) network is limited in term of soft capacity. The quality of a signaling service transmission depends on various

Detection-time-bin-shift Polarization Encoding Quantum Key Distribution System

May 6, 2008
Author(s)
Lijun Ma, Tiejun Chang, Xiao Tang
A detection-time-bin-shift scheme for polarization encoding QKD is proposed. This scheme can reduce cost and overcome the security loss caused by dead-time and the unbalanced characteristics of detectors. This scheme is experimentally demonstrated with the

Directional Routing Protocols for Ad Hoc Networks

May 6, 2008
Author(s)
Hamid Gharavi, Bin Hu
This paper presents a directional routing approach for multihop ad-hoc networks, which has been applied to two on-demand routing protocols: namely Dynamic Source Routing (DRS) and Ad Hoc On-Demand Distance Vector Routing (AODV). Both DSR-based and AODV

On The TREC Blog Track

April 30, 2008
Author(s)
Iadh Ounis, Craig Macdonald, Ian Soboroff
The rise of blogging as a new grassroots publishing medium and the many interesting peculiarities that characterize blogs compared to other genres of documents opened up several new interesting research areas in the information retrieval field. The Blog

Codes for the Identification of Federal and Federally-Assisted Organization

April 25, 2008
Author(s)
William C. Barker, Hildegard Ferraiolo
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow physical and logical access to Federal government locations and systems. The Personal Identity
Was this page helpful?