NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Distributed computing environments require strategies by which components can detect and recover from failures in remote, collaborating components. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder with
The recent establishment of the International Organization for Standardization/International Electrotechnical Commission Joint Technical Committee 1/Subcomittee 37 (ISO/IEC JTC 1/SC 37) on Biometrics is a major development in international standardization
This paper aims to improve current understanding of the correlation structure of traffic carried over large networks, such as the Internet. To achieve this aim we use simulation, adopting a methodology of homogenization to achieve a sufficiently large
This paper presents a master-slave cluster based mobile ad-hoc network architecture for multihop communications using the IEEE 802.11 system. The proposed architecture is a mixture of two different types of networks: managed (master-and-slave) and ad-hoc
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
As GMPLS and its supporting set of protocols develop into a viable control plane for optical networks, an important function that they will need to support will be the restoration and protection function that has been a major feature of legacy optical
Complex systems, such as manufacturing supply chains, are often modeled as a collection of interacting components with information flows between them. These components are frequently responsible for making a wide range of decisions that are implemented
This paper was inspired by preliminary discussions between NIST and members of the healthcare community who are impacted by the use of emerging information technology. Topics of discussion included the current state of standards work in the healthcare
Recently, we proposed an ad-hoc, cluster-based, multihop network architecture for video communications using IEEE 802.11 FHSS (Frequency Hopping Spread Spectrum) wireless LAN technology with 2GFSK (2-level Gaussian Frequency Shift Keying) modulation
We have previously developed a distributed routing algorithm which minimizes the number of overhead messages necessary to maintain the minimum-power multi-hop routes in a mobile ad-hoc network, assuming a piece-wise linear model for the motion of the nodes
Timothy Grance, Joan Hash, Steven Peck, Jonathan Smith, Karen Korow-Diks
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, & terminating interconnections between information technology (IT) systems that are owned & operated by different organizations
Today, much of our information-intensive work is carried out at desktop computer workstations; however, increasingly people work and live on the move. Very soon, scads of small information processing appliances will be carried along from place to place as
In All-Optical Transport Networks (AOTN), fault survivability issues are quite similar to those encountered in electro-optic networks that regenerate signals at the network node. On the other hand, attack survivability issues concerning physical fiber
Christopher E. Dabrowski, Kevin L. Mills, J R. Elder
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available software
Christopher E. Dabrowski, Kevin L. Mills, J R. Elder
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available software
As GMPLS and its supporting set of protocols develop into aviable control plane for optical networks, an important function that they will need to support will be the protection and restoration function that has been a major feature of legacy optical
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
Christopher E. Dabrowski, Kevin L. Mills, J R. Elder
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available software
A quantum computer, if built, will be to an ordinary computer as a hydrogen bomb is to gunpowder, at least for some types of computations. Today no quantum computer exists, beyond laboratory prototypes capable of solving only tiny problems, and many
The application of power-driven machinery to manufacturing and other areas of human endeavor characterized the Industrial Revolution in the 18th and 19th centuries. Measurement contributed in many ways to the increasing economic influence of these machines
Active-network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, application-specific processing can be applied to network traffic. To use such technology safely and
This paper presents the design and implementation of a mobile ad-hoc network for video communications. The network architecture is based on cluster-to-cluster operation using IEEE 802.11b FHSS (Frequency Hopping Spread Spectrum). FHSS is considered to
A distributed kinetic spanning tree algorithm is proposed for routing in wireless mobile ad hoc networks. Assuming a piecewise linear motion model for the nodes, the sequence of shortest-path spanning trees is determined, valid until the time of the next
We propose a neural network to answer a point query in Rn partitioned based on the Voronoi diagram. Our novel design offers the potential to reduce both the number of neurons and connection weights of previous designs, employing a cost function which