An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Kotikalapudi Sriram, Douglas Montgomery, Oliver Borchert, Okhee Kim, D. Richard Kuhn
BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems (ASes) and destinations. We present a detailed study of the impact of BGP peering session attacks
Alan Mink, Xiao Tang, Lijun Ma, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark, Carl J. Williams
NIST has developed a high-speed quantum key distribution (QKD) test bed incorporating both free-space and fiber systems. These systems demonstrate a major increase in the attainable rate of QKD systems: over two orders of magnitude faster than other
Anastase Nakassis, Joshua Bienfang, P. Johnson, Alan Mink, D. Rogers, Xiao Tang, Carl J. Williams
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current
Michael R. Souryal, Luke Klein-Berndt, Leonard E. Miller, Nader Moayeri
This paper presents the empirical results and analysis of a link variability study for an indoor, stationary 802.11 network subject to external interference. The objective is to characterize the relationships between the packet loss rate on a link and the
David E. Cypher, Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
The objectives of this article are to survey the benefits and challenges that poise the deployment and operation of wireless communications in support of healthcare networks. While the main advantages of wireless communications remain to provide ubiquitous
Vincent M. Stanford, C. Rochet, Martial Michel, John S. Garofolo
Properly designed reference data and performance metrics can offer crucial aid to developers of advanced statistical recognition technologies. We focus here on audio data acquisition from close-talk, near field, and far field sensors, and upon its
Leonard E. Miller, Perry F. Wilson, Nelson P. Bryner, Michael H. Francis, Jeffrey R. Guerrieri, D W. Stroup, Luke Klein-Berndt
An indoor localization and communication project is described that proposes to use RFID tags, placed in the building beforehand, as navigation waypoints for an inertial navigation system carried by a first responder. The findings from the first year of the
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Haolang Xu, Barry J. Hershman, Carl J. Williams, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark
Charles D. Fenimore, J Irvine, D Cannon, John W. Roberts, A Aviles, S Israel, Michelle Brennan, L Simon, J Miller, Donna Haverkamp, P F. Tighe, Michael Gross
The development of a motion imagery (MI) quality scale, akin to the National Image Interpretibility Rating Scale (NIIRS) for still imagery, would have great value to designers and users of surveillance and other MI systems. A multi-phase study has adopted
The objective of system security planning is to improve protection of information system resources. All federal systems have some level of sensitivity and require protection as part of good management practice. The protection of a system must be documented
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal
The Text REtrieval Conference (TREC) is a workshop series designed to build the infrastructure necessary for large-scale evaluation of text retrieval technology. Participants in the workshops (over 100 groups in the latest TREC) have been drawn from the
This work proposes a distributed fault protection mechanism called the Dynamic-Shared Segment Protection (DSSP) algorithm for WDM (Wavelength Division Multiplexing) mesh networks. The study explores the shared protection scheme in the network with
Gregory C. Tassey, Douglas C. Montgomery, Alfred Lee, Tim Sloan
The Presidents National Strategy to Secure Cyberspace (National Strategy) directed the Secretary of Commerce to form a task force to examine the most recent iteration of the Internet Protocol, IP version 6 (IPv6). The President charged the task force with
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Channel-adaptive relaying has recently been proposed as a means to exploit spatial and temporal diversity in multihop ad hoc networks with fading. In conjunction with appropriate routing protocols, adaptive relaying enables each forwarding node in a
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Routing infrastructures are possibly the most vital, complex, and fragile components in the global information infrastructure. They are also the least protected from attack. In the public Internet, for example, the IP routing infrastructure comprises tens
The surprisingly simple IDF measure developed in 1972 by Karen Sparck Jones has continued to dominate the term weighting metrics used in information retrieval, despite several efforts to develop more complex measures of term distribution. It has been
We describe an automatic Word Sense Disambiguation (WSD) system that disambiguates verb senses using syntactic and semantic features that encode information about predicate arguments and semantic classes. Our system performs better than the best published
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Ultra wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the baseband to penetrate walls. While a concerted effort has been conducted in the