NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In a mobile ad hoc network (MANET) for military or emergency applications, it is required to give priority to certain messages or message sources. In this paper, mechanisms are considered for implementing priority treatment of packets in a MANET using the
V Galtier, Kevin L. Mills, Y Carlinet, S Bush, A Kulkarni
Recent research, such as the Active Virtual Network Management Prediction (AVNMP) system, aims to use simulation models running ahead of real time to predict resource demand among network nodes. If accurate, such predictions can be used to allocate network
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness can be increased by tracking a set of ¿parts¿, provided that a suitable set can be identified. In this paper we propose a novel segmentation, specifically
Underlying Technical Models for Information Technology Security provides a description of the technical foundations, termed models, that underlie secure information technology (IT). The intent is to provide, in a concise form, the models that should be
This paper presents a method of transmitting video over the cdma2000 mobile systems. In this method, the video bit-stream, after splitting, is transmitted via the supplemental channels of the cdma2000 reverse link. The method takes advantage of the direct
A noncoherent limiter-discriminator receiver is often considered for the Bluetooth system because of its simplicity and low cost. While its performance is more than adequate for some channels, the results are significantly degraded in either an
Nada T. Golmie, Nicolas Chevrollier, I El bakkouri
Bluetooth is a radio technology for Wireless Personal Area Networks operating in the 2.4 GHz ISM band. Since both Bluetooth and IEEE 802.11 devices use the same frequency band and may likely come together in a laptop or may be close together at a desktop
A noncoherent limiter-discriminator receiver is often considered for the Bluetooth system because of its simplicity and low cost. While its performance is more than adequate for some channels, the results are significantly degraded in either an
Bluetooth is a radio technology for Wireless Personal Area Networks operating in the 2.4 GHz ISM band. Since both Bluetooth and IEEE 802.11 devices use the same frequency band and may likely come together in a laptop or may be close together at a desktop
In this paper, we suggest a novel robust image coding and adaptive packetization algorithm suitable for very low bit rate transport. This algorithm can be applied to any zerotree-based encoder such as the embedded zerotree wavelet coder of Shapiro and set
In this brief paper, we propose a novel two-layer neural network to answer a point query in Rn which is partitioned into polyhedral regions. Such a task solves among others nearest neighbor clustering. As in previous approaches to the problem, our design
The advantages of using robotic systems will only be realized if non-experts in robotics are able to use the systems. This paper outlines some directions needed for research in human-robot interaction (HRI).
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
Measuring voice quality for telephony is not a new problem. However, packet-switched, best-effort networks such as the Internet present significant new challenges for the delivery of real-time voice traffic. Unlike the circuit-switched PSTN, Internet
This paper proposes a framework for performance evaluation md optimization of an emerging multimedia, packet Direct-Sequence Code Division Multiple Access (DS-CDMA) network with a wide range of Quality of Service (QoS) requirements on losses and delays
This paper presents the design and implementation of a simulation model for the cdma2000 reverse link. The model includes all the radio configurations and their corresponding data rates in accordance with the IS-2000 specifications. The paper first
The emergence of several radio technologies such as Bluetooth, and IEEE 802.11 operating in the 2.4 GHz unlicensed ISM frequency band may lead to signal interference and result in significant performance degradation when devices are co-located in the same
This presentation contains background information on the decision to create an Specification and Description Language (SDL) model, a discussion of the development cycle for the product development, a description of the SDL's creation, an explanation on how
We need to facilitate a change in user perception of security from a hindrance to an essential revenue generator and mission enabler. The Common Criteria protection profile (PP) and security target (ST) constructs can be used to help achieve this need. Yet
J K. Patel, S U. Kim, David H. Su, M Subramaniam, H A. Choi
ult and attack survivability in all-optical transport networks (AOTNs) require new approaches because of unique transmission characteristics. Specifically, fiber non-linearities and network transparency to transmitted signal types may make the network
In June 2001, ITL released NIST Special Publication (SP) 800-27, Engineering Principles for Information Technology Security (EP-ITS), by Gary Stoneburner, Clark Hayden, and Alexis Feringa. Engineering Principles for Information Technology (IT) Security (EP
The probability distribution is found for the link distance between two randomly positioned mobile radios for two representative deployment scenarios: (1) the mobile locations are uniformly distributed over a rectangular area and (2) the x and y
Evaluation has always been an important part of scientific research, and in information retrieval, this evaluation has mostly been done using test collections. In 1992, a new test collection was built at the National Institute of Standards and Technology