NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Lijun Ma, Tiejun Chang, Alan Mink, Oliver T. Slattery, Barry J. Hershman, Xiao Tang
Detection-time-bin-shift (DTBS) is a scheme that uses time division multiplexing of a single photon detector between two photon bases in a quantum key distribution (QKD) system. This scheme can simplify the structure of a QKD system, reduce its cost and
Communications with low input signal-to-noise ratio (SNR) is often called covert communications as the probability of detection and interception decreases with decreasing SNR . Direct-sequence spread-spectrum signaling works at low SNR because of the
Recognizing that the 32-bit addresses used by the current version of the Internet Protocol (IPv4) would soon be depleted, the Internet Engineering Task Force (IETF) has been developing its successor, Internet Protocol version 6 (IPv6). This has been a more
The throughput capacity of random wireless networks has been studied extensively in the literature. Nevertheless, most existing studies are based on the assumption that each transmission has one sender and one receiver. In our recent study, we have
P J. Phillips, Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi
We present a theory for constructing linear subspace approximations to face recognition algorithms and empirically demonstrate that a surprisingly diverse set of face recognition approaches can be approximated well using a linear model. A linear model
Vehicular ad hoc network (VANET) is recognized as an important component of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems, which target to increase safety of passengers by exchanging warning
Radio resources in the third generation (3G) wireless cellular networks (WCNs) such as the universal mobile telecommunications system (UMTS) network is limited in term of soft capacity. The quality of a signaling service transmission depends on various
At any point on a receiver operating characteristic (ROC) curve in combination with two distributions of genuine scores and impostor scores, there are three related variables: the true accept rate (TAR) of the genuine scores, the false accept rate (FAR) of
A detection-time-bin-shift scheme for polarization encoding QKD is proposed. This scheme can reduce cost and overcome the security loss caused by dead-time and the unbalanced characteristics of detectors. This scheme is experimentally demonstrated with the
This paper presents a directional routing approach for multihop ad-hoc networks, which has been applied to two on-demand routing protocols: namely Dynamic Source Routing (DRS) and Ad Hoc On-Demand Distance Vector Routing (AODV). Both DSR-based and AODV
Lijun Ma, Hai Xu, Tiejun Chang, Oliver T. Slattery, Xiao Tang
We have experimentally implemented a differential phase shift quantum-key distribution system with up-conversion detectors operating at 2.5 Gbps clock rate. A Michelson interferometer with Faraday mirrors is used to increase the system stability.
The rise of blogging as a new grassroots publishing medium and the many interesting peculiarities that characterize blogs compared to other genres of documents opened up several new interesting research areas in the information retrieval field. The Blog
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow physical and logical access to Federal government locations and systems. The Personal Identity
Mohamed T. Refaei, Nader Moayeri, Michael R. Souryal
A common strategy for responding to indoor emergency scenarios is to rapidly deploy a group of first responders inside the incident area and an incident command center outside of the incident area. First responders are equipped with radios that allow them
Market-based compute grids encompass service providers offering limited resources to potential users with varying demands and willingness to pay. Providers face difficult decisions about which jobs to admit and when to schedule admitted jobs. For this
In this paper, we propose a new spatial interpolation algorithm for Intra-Frame error concealment. The method aims at interpolating areas in the image, which have been affected by packet loss. We have proposed an edge detection technique to aid the
Temporal-Angular channel sounding measurements of an indoor millimeter wave channel (60 GHz) is analyzed to determine whether ray arrivals at the receiver form clusters in the two-dimensional time-angle space. The channel behavior for directional antennas
Effective and timely link-layer trigger mechanisms can significantly influence the handover performance. The handover process will not perform the correct decision and execution unless adequate and timely link-layer trigger information is delivered. In
Using cooperative transmission, two or more single-antenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol that achieves diversity, amplify-and-forward (AF), is striking in its simplicity, but
Rainer Stiefelhagen, Keni Bernardin, R Bowers, Richard T. Rose, Martial Michel, John S. Garofolo
This paper is a summary of the 2007 CLEAR Evaluation on the Classification of Events, Activities, and Relationships which took place in early 2007 and culminated with a two-day workshop held in May 2007. CLEAR is an international effort to evaluate systems
Traditional Cranfield test collections represent an abstraction of a retrieval task that Sparck Jones calls the core competency of retrieval: a task that is necessary, but not sufficient, for user retrieval tasks. The abstraction facilitates research by
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) has been developed and deployed on branches of the DNS to provide authentication and integrity protection
Patrick J. Grother, Wayne J. Salamon, Michael D. Indovina, Craig I. Watson
The MINEX II trial was conducted to evaluate the accuracy and speed of Match-on-Card verification algorithms. These run on ISO/IEC 7816 smart cards. They compare conformant reference and verification instances of the ISO/IEC 19794-2 COMPACT CARD
Alan Mink, Lijun Ma, Anastase Nakassis, Haolang Xu, Oliver T. Slattery, Barry J. Hershman, Xiao Tang
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one Alice switched between Bob1 and Bob2. To support such a quantum network, we