Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1476 - 1500 of 2269

Autonomous System (AS) Isolation under Randomized BGP Session Attacks with RFD Exploitation

April 1, 2006
Author(s)
Kotikalapudi Sriram, Douglas Montgomery, Oliver Borchert, Okhee Kim, D. Richard Kuhn
BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems (ASes) and destinations. We present a detailed study of the impact of BGP peering session attacks

High Speed Quantum Key Distribution System Supports One-Time Pad Encryption of Real-Time Video

April 1, 2006
Author(s)
Alan Mink, Xiao Tang, Lijun Ma, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark, Carl J. Williams
NIST has developed a high-speed quantum key distribution (QKD) test bed incorporating both free-space and fiber systems. These systems demonstrate a major increase in the attainable rate of QKD systems: over two orders of magnitude faster than other

Is Quantum Cryptography Provably Secure?

April 1, 2006
Author(s)
Anastase Nakassis, Joshua Bienfang, P. Johnson, Alan Mink, D. Rogers, Xiao Tang, Carl J. Williams
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current

Link Assessment in an Indoor 802.11 Network

April 1, 2006
Author(s)
Michael R. Souryal, Luke Klein-Berndt, Leonard E. Miller, Nader Moayeri
This paper presents the empirical results and analysis of a link variability study for an indoor, stationary 802.11 network subject to external interference. The objective is to characterize the relationships between the packet loss rate on a link and the

Prevailing Over Wires in Healthcare Environments: Benefits and Challenges

April 1, 2006
Author(s)
David E. Cypher, Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
The objectives of this article are to survey the benefits and challenges that poise the deployment and operation of wireless communications in support of healthcare networks. While the main advantages of wireless communications remain to provide ubiquitous

RFID-Assisted Indoor Localization and Communication for First Responders

March 7, 2006
Author(s)
Leonard E. Miller, Perry F. Wilson, Nelson P. Bryner, Michael H. Francis, Jeffrey R. Guerrieri, D W. Stroup, Luke Klein-Berndt
An indoor localization and communication project is described that proposes to use RFID tags, placed in the building beforehand, as navigation waypoints for an inertial navigation system carried by a first responder. The findings from the first year of the

Perceptual Study of the Impact of Varying Frame Rate on Motion Imagery Interpretability

March 1, 2006
Author(s)
Charles D. Fenimore, J Irvine, D Cannon, John W. Roberts, A Aviles, S Israel, Michelle Brennan, L Simon, J Miller, Donna Haverkamp, P F. Tighe, Michael Gross
The development of a motion imagery (MI) quality scale, akin to the National Image Interpretibility Rating Scale (NIIRS) for still imagery, would have great value to designers and users of surveillance and other MI systems. A multi-phase study has adopted

Guide for Developing Security Plans for Information Technology Systems

February 24, 2006
Author(s)
Marianne M. Swanson, Joan Hash, Pauline Bowen
The objective of system security planning is to improve protection of information system resources. All federal systems have some level of sensitivity and require protection as part of good management practice. The protection of a system must be documented

An Empirical Analysis of IPv6 Transition Mechanism

February 20, 2006
Author(s)
M K. Shin, Darrin J. Santay, Douglas Montgomery
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

TREC: An Overview

February 17, 2006
Author(s)
Donna K. Harman, Ellen M. Voorhees
The Text REtrieval Conference (TREC) is a workshop series designed to build the infrastructure necessary for large-scale evaluation of text retrieval technology. Participants in the workshops (over 100 groups in the latest TREC) have been drawn from the

Technical and Economic Assessment of Internet Protocol Version 6 (IPv6)

January 31, 2006
Author(s)
Gregory C. Tassey, Douglas C. Montgomery, Alfred Lee, Tim Sloan
The President’s National Strategy to Secure Cyberspace (National Strategy) directed the Secretary of Commerce to form a task force to examine the most recent iteration of the Internet Protocol, IP version 6 (IPv6). The President charged the task force with

Application of Beamforming in Wireless Location Estimation

January 1, 2006
Author(s)
Kamran Sayrafian, D Kaspar
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Joint Rate Adaptation and Channel-Adaptive Relaying in 802.11 Ad Hoc Networks

January 1, 2006
Author(s)
Michael R. Souryal, Nader Moayeri
Channel-adaptive relaying has recently been proposed as a means to exploit spatial and temporal diversity in multihop ad hoc networks with fading. In conjunction with appropriate routing protocols, adaptive relaying enables each forwarding node in a

Source-Assisted Direction Estimation Inside Buildings

January 1, 2006
Author(s)
Kamran Sayrafian, D Kaspar
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Toward Secure Routing Infrastructures

January 1, 2006
Author(s)
Douglas C. Montgomery, Sandra Murphy
Routing infrastructures are possibly the most vital, complex, and fragile components in the global information infrastructure. They are also the least protected from attack. In the public Internet, for example, the IP routing infrastructure comprises tens

The History of IDF and its Influences on IR and Other Fields

December 21, 2005
Author(s)
Donna K. Harman
The surprisingly simple IDF measure developed in 1972 by Karen Sparck Jones has continued to dominate the term weighting metrics used in information retrieval, despite several efforts to develop more complex measures of term distribution. It has been

The Role of Semantic Roles in Disambiguating Verb Senses

December 19, 2005
Author(s)
Hoa T. Dang, Martha S. Palmer
We describe an automatic Word Sense Disambiguation (WSD) system that disambiguates verb senses using syntactic and semantic features that encode information about predicate arguments and semantic classes. Our system performs better than the best published

Integrity Checking of DNS Zone File Data Using XSLT

December 1, 2005
Author(s)
Ramaswamy Chandramouli, Scott W. Rose
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

An Evaluation of Ultra Wideband Technology for Indoor Ranging

November 1, 2005
Author(s)
Camillo Gentile, El Kik
Ultra wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the baseband to penetrate walls. While a concerted effort has been conducted in the
Was this page helpful?