An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, integrity
Opportunistic Spectrum Access (OSA) is one of the models proposed for Dynamic Spectrum Access (DSA). In OSA systems, it is important to restrict the interference of Secondary Users (SUs) to the Primary Users (PUs), so that the performance degradation of PU
On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executive
National security depends on the reliable functioning of critical infrastructures. Security mechanisms and controls for critical infrastructure protection arent useful unless adopted, so NIST seeks, while fostering creation of effective cybersecurity
Ian M. Soboroff, Iadh Ounis, Jimmy Lin, Craig Macdonald
The Microblog track examines search tasks and evaluation meth- odologies for information seeking behaviours in microblogging en- vironments such as Twitter. It was first introduced in 2011, address- ing a real-time adhoc search task, whereby the user
Infrastructure as a Service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of resources such as computing (Virtual Machines or VMs), virtual network, storage and utility programs (DBMS). Any large
Polar coding is the most recent encoding scheme in the quest for error correction codes that approaches the Shannon limit, has a simple structure, and admits fast decoders. As such, it is an interesting candidate for the quantum key distribution (QKD)
The building industry uses numerous engineering standards, building codes, specifications and regulations and a diverse set of industry vocabularies to describe, assess, and deliver constructed facilities. As part of the expanding use of building
In this report, we present results of a physical layer performance study for all MCSs (from MCS0 to MCS28) in terms of block error rate (BLER) and spectral efficiency. The results are obtained by using the Steepest Ascent LTE toolbox for MATLAB which
Paul D. Over, Jonathan G. Fiscus, Gregory A. Sanders, David M. Joy, Martial Michel, George M. Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
TRECVID 2013 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last ten years this effort has yielded a better
Vladimir N. Dvornychenko, Stephen B. Meagher, Michael Garris
The term "lights-out" for AFIS ten-print fingerprint operations has been around for many years and is generally understood to mean "no human intervention is involved." But is this appropriate for AFIS latent print operations? Is it truly possible to
NIST SP 800-52, Revision 1 provides guidance to U.S. Government information system managers for the selection and configuration of TLS protocol implementations. U.S. Office of Management and Budget (OMB) Circular A-130, Management of Federal Information
This paper describes pitfalls, issues, and methodology for measuring software performance. Ideally, measurement should be performed and reported in such a way that others will be able to reproduce the results in order to confirm their validity. We aim to