Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1451 - 1475 of 2294

Guide to Intrusion Detection and Prevention Systems (IDPS)

February 20, 2007
Author(s)
Karen A. Scarfone, Peter M. Mell
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Low-Noise PPLN-based Single-Photon Detector

February 13, 2007
Author(s)
Hai Xu, Lijun Ma, Oliver T. Slattery, Xiao Tang
This paper describes the detection of single photons, which have been transmitted through standard fiber at the telecom wavelength of 1310 nm. Following transmission, the 1310-nm photon is up-converted to 710 nm in a periodical-poled LiNbO3 (PPLN)

Scanning Advanced Automobile Technology

January 31, 2007
Author(s)
Hamid Gharavi, K V. Prasad, P. Ioannou
The progress of some of the key electrical, electronics, communications, controls and software technologies that enable in-vehicle, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) functions is presented, in historical, current & futuristic

A Comprehensive Evaluation of Indoor ranging using Ultra-Wideband Technology

January 15, 2007
Author(s)
Camillo Gentile, El Kik
Ultra-wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the baseband to penetrate walls. While a concerted effort has been conducted in the extensive

A Pel-Recursive Motion Estimation Algorithm

January 9, 2007
Author(s)
Hamid Gharavi, H Reza-alikhani
This paper presents a new pel recursive motion estimation algorithm for video coding applications. The derivation of the algorithm is based on Recursive Least-Squares (RLS) estimation that minimizes the mean square prediction error. A comparison with the

A Survey of Self-Organization in Wireless Networks

January 1, 2007
Author(s)
Kevin L. Mills
This paper surveys recent research on self-organizing techniques applied to design and control large wireless ad hoc and sensor networks. The survey divides that research into five functional categories: (1) resource sharing, (2) structure formation and

Nonparametric Analysis of Fingerprint Data on Large Data Sets

December 7, 2006
Author(s)
Jin Chu Wu, Charles Wilson
By executing different fingerprint-image matching algorithms on large data sets, it reveals that the match and non-match similarity scores have no specific underlying distribution function. Thus, it requires a nonparametric analysis for fingerprint-image

An Empirical Study of Sample Size in ROC-Curve Analysis of Fingerprint Data

December 4, 2006
Author(s)
Jin Chu Wu, Charles Wilson
The fingerprint datasets in many cases may exceed millions of samples. Thus, the needed size of a biometric evaluation test sample is an important issue in terms of both accuracy and efficiency. In this article, an empirical study, namely, using Chebyshev

Information Security Handbook: A Guide for Managers

December 1, 2006
Author(s)
Pauline Bowen, Joan Hash, Mark Wilson
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for

Adaptive Channel Scanning for IEEE 802.16e

October 23, 2006
Author(s)
Richard A. Rouil, Nada T. Golmie
In this article we propose an adaptive algorithm that determines the duration and frequency of channel scanning in order to facilitate the discovery of neighboring base stations and handovers across multiple IEEE 802.16 networks. The proposed algorithm

An Ontology of Identity Credentials Part 1: Background and Formulation

October 6, 2006
Author(s)
William I. MacGregor
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation s measurement and standards infrastructure. ITL develops

Programmable Active Services for SIP

October 1, 2006
Author(s)
Jean Deruelle, Mudumbai Ranganathan, Douglas C. Montgomery
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Study of BGP Peering Session Attacks and Their Impacts on Routing Performance

October 1, 2006
Author(s)
Kotikalapudi Sriram, Douglas C. Montgomery, Oliver Borchert, Okhee Kim, David R. Kuhn
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disruptions. We consider canonical grid as well as down-sampled realistic

Unsupervised Anomaly Detection System Using Next-Generation Router Architecture

October 1, 2006
Author(s)
Richard A. Rouil, Nicolas Chevrollier, Nada T. Golmie
Unlike many intrusion detection systems that rely mostly on labeled training data, we propose a novel technique for anomaly detection based on unsupervised learning and we apply it to counter denial-of-service attacks. Initial simulation results suggest

Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities

September 21, 2006
Author(s)
Timothy Grance, Tamara Nolan, Kristin Burke, Rich Dudley, Gregory White, Travis Good
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Guide to Computer Security Log Management

September 13, 2006
Author(s)
Karen A. Scarfone, Murugiah Souppaya
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist

Uncertainty Analysis for Virtual Cement Measurement

September 13, 2006
Author(s)
Blaza Toman, Adriana Hornikova, Robert C. Hagwood, Hung-Kung Liu, Nien F. Zhang, Edward J. Garboczi, Jeffrey W. Bullard
Virtual measurements are the outputs of well-defined mathematical models based on theoretical principles and simulation algorithms. The VCCTL (Virtual Cement and Concrete Testing Laboratory) is a software system built by the Material and Construction

Effective Link Triggers to Improve Handover Performance

September 11, 2006
Author(s)
Steve Woon, Nada T. Golmie, Y. A. Sekercioglu
Effective link layer triggering is key in order to enable fast and reliable handover across different access networks. In this paper, we investigate the use of signal strength as part of the trigger mechanism. We propose an analytical model to estimate the
Was this page helpful?