An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
S. Strassle, Mark A. Przybocki, Kay Peterson, Zhiyi Song, Kazuaki Maeda
The NIST Automatic Content Extraction (ACE) Evaluation expands its focus in 2008 to encompass the challenge of cross-document and cross-language global integration and reconciliation of information. While past ACE evaluations were limited to local (within
Dana E. Chisnell, Susan C. Becker, Sharon J. Laskowski, Svetlana Z. Lowry
The goal of this style guide is to provide specific guidance to improve the usability of documentation used by poll workers and election support staff. The Voting System Documentation Style Guide incorporates best practices for writing documentation as it
The Maps captured by robots in real environment are usually incomplete, distorted, and noisy. To evaluate the quality of these kind of maps is an important problem in the field. In this paper we present an algorithm to assess the quality of the map
While the frequency dependence of the wireless channel may be negligible for narrow to wideband signals, it has been shown that modeling this dependence for bandwidths in excess of 2 GHz improves channel reconstruction up to 40%.Yet to our knowledge, only
Kotikalapudi Sriram, Young-Tak Kim, Douglas C. Montgomery
In this paper, we present a discussion of some architectural ideas pertaining to the mapping distribution protocol. The efficiency of this protocol in terms of response time and the volume of traffic load it generates are important considerations. We
Kevin M. Stine, Richard L. Kissel, William C. Barker, Annabelle Lee, J Fahlsing, Jessica Gulick
Title III of the E-Government Act, titled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST to develop (1) standards to be used by all Federal agencies to categorize information and information systems collected or maintained by
We investigate the behavior of a distributed server loss network with mobile users.While the Markov model provides an accurate ¿microscopic¿ model of the network behavior, the dimension of this model grows exponentially with the number of nodes precluding
The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. The document
Elizabeth Chew, Marianne M. Swanson, Kevin M. Stine, N Bartol, Anthony Brown, W Robinson
This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and procedures. It provides an approach to help management decide where to invest in additional security
National Institute of Standards and Technology (NIST), Quynh Dang
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared
Douglas C. Montgomery, J. S. Nightingale, Sheila E. Frankel, Mark E. Carson
This publication seeks to assist Federal agencies in formulating plans for the acquisition of IPv6 technologies. To achieve this, we define a standards profile for IPv6 in the USG that is intended to be applicable to all future uses of IPv6 in non-
The third PASCAL Recognizing Textual Entailment Challenge (RTE-3) contained an optional task that extended the main entailment task by requiring a system to make three-way entailment decisions (entails, contradicts, neither) and to justify its response
Lijun Ma, Tiejun Chang, Alan Mink, Oliver T. Slattery, Barry J. Hershman, Xiao Tang
Detection-time-bin-shift (DTBS) is a scheme that uses time division multiplexing of a single photon detector between two photon bases in a quantum key distribution (QKD) system. This scheme can simplify the structure of a QKD system, reduce its cost and
Communications with low input signal-to-noise ratio (SNR) is often called covert communications as the probability of detection and interception decreases with decreasing SNR . Direct-sequence spread-spectrum signaling works at low SNR because of the
Recognizing that the 32-bit addresses used by the current version of the Internet Protocol (IPv4) would soon be depleted, the Internet Engineering Task Force (IETF) has been developing its successor, Internet Protocol version 6 (IPv6). This has been a more
The throughput capacity of random wireless networks has been studied extensively in the literature. Nevertheless, most existing studies are based on the assumption that each transmission has one sender and one receiver. In our recent study, we have
P J. Phillips, Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi
We present a theory for constructing linear subspace approximations to face recognition algorithms and empirically demonstrate that a surprisingly diverse set of face recognition approaches can be approximated well using a linear model. A linear model
Vehicular ad hoc network (VANET) is recognized as an important component of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems, which target to increase safety of passengers by exchanging warning
Radio resources in the third generation (3G) wireless cellular networks (WCNs) such as the universal mobile telecommunications system (UMTS) network is limited in term of soft capacity. The quality of a signaling service transmission depends on various
At any point on a receiver operating characteristic (ROC) curve in combination with two distributions of genuine scores and impostor scores, there are three related variables: the true accept rate (TAR) of the genuine scores, the false accept rate (FAR) of
A detection-time-bin-shift scheme for polarization encoding QKD is proposed. This scheme can reduce cost and overcome the security loss caused by dead-time and the unbalanced characteristics of detectors. This scheme is experimentally demonstrated with the
This paper presents a directional routing approach for multihop ad-hoc networks, which has been applied to two on-demand routing protocols: namely Dynamic Source Routing (DRS) and Ad Hoc On-Demand Distance Vector Routing (AODV). Both DSR-based and AODV
Lijun Ma, Hai Xu, Tiejun Chang, Oliver T. Slattery, Xiao Tang
We have experimentally implemented a differential phase shift quantum-key distribution system with up-conversion detectors operating at 2.5 Gbps clock rate. A Michelson interferometer with Faraday mirrors is used to increase the system stability.
The rise of blogging as a new grassroots publishing medium and the many interesting peculiarities that characterize blogs compared to other genres of documents opened up several new interesting research areas in the information retrieval field. The Blog
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow physical and logical access to Federal government locations and systems. The Personal Identity