NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We investigate the inherent scalability problem of ad hoc networks originated from the nature of multi-hop networks. First, the expected packet traffic at the center of a network is analyzed. The result shows that the expected packet traffic at the center
As network transmission speeds increase, packet streams increasingly uncover fine details of the interior behavior of router hardware and software. This behavior reveals itself as a set of harmonic effects, as interior clocks periodically interrupt packet
This bulletin summarizes NIST Special Publication 800-36, "Guide to Selecting Information Technology Security Products." The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure
Analyzing spatial-temporal characteristics of traffic in large-scale networks requires both suitable analysis method and a means to reduce the amount of data that must be collected. Of particular interest would be techniques that reduce the amount of data
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness to occlusion can be increased by tracking the object as a set of parts such that not all of these are occluded at the same time. However, successful
A computer program was written to model the propagation of two-dimensional traveling cracks in a biaxially-stressed glass disk. This was accomplished by using a combination of known fractographic equations and empirical observations with generic algorithms
The ubiquitous computer now touches nearly every aspect of human life. The promise of information technology is improvement to the quality of life. Maintaining trust and confidence in information technology is central to keeping that promise. This is
This report presents the achievements and highlights of NIST's Information Technology Laboratory during FY 2003. Following the Director's Foreword and the ITL overview, technical projects in ITL's research program are described, followed by selected cross
The need to provide protection for federal information systems has been present since computers were first used. Including security early in the acquisition process for an information system will usually result in less expensive and more effective security
This document is a comprehensive review of procedures for the care and handling of optical disc media, providing both guidlines and introductory information for both the expert and the end user (librarians, archivists) of CDs and DVDs.
Timothy Grance, Joan Hash, Marc Stevens, K O'Neal, N Bartol
Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security
Timothy Grance, Joan Hash, Marc Stevens, Kristofor O'Neal, Nadya Bartol
Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security
The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure that ensures confidentiality, integrity, and availability of mission critical information. The guide seeks to assist in
David W. Griffith, Richard A. Rouil, Stephan Klink, Ram D. Sriram
The amount of resource provisioning prior to failure events to support optical path recovery has a significant impact on network performance, and so designing recovery mechanisms for any large network necessitates balancing multiple (in some cases
Kotikalapudi Sriram, David W. Griffith, San-Nan K. Lee, Nada T. Golmie
In resilient optical networks, there is a tradeoff between the amount of resources allocated for protection versus the probability that a failed working path cannot be covered, known as protection blocking probability. Often the network topology permits