Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1751 - 1775 of 2269

Machine Translation Website

September 1, 2001
Author(s)
John S. Garofolo
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint

Objective Speech Quality Measures for Internet Telephony

August 20, 2001
Author(s)
T Hall
Measuring voice quality for telephony is not a new problem. However, packet-switched, best-effort networks such as the Internet present significant new challenges for the delivery of real-time voice traffic. Unlike the circuit-switched PSTN, Internet

CDMA2000 Reverse-Link Simulation Model Design and Evaluation

July 1, 2001
Author(s)
Hamid Gharavi, R Wyatt-Millington, F Chin
This paper presents the design and implementation of a simulation model for the cdma2000 reverse link. The model includes all the radio configurations and their corresponding data rates in accordance with the IS-2000 specifications. The paper first

What to Expect When You Can Not Start at the Beginning

July 1, 2001
Author(s)
David E. Cypher
This presentation contains background information on the decision to create an Specification and Description Language (SDL) model, a discussion of the development cycle for the product development, a description of the SDL's creation, an explanation on how

Security - Revenue Generator and Mission Enabler

June 21, 2001
Author(s)
G Stoneburner
We need to facilitate a change in user perception of security from a hindrance to an essential revenue generator and mission enabler. The Common Criteria protection profile (PP) and security target (ST) constructs can be used to help achieve this need. Yet

A Framework for Managing Faults and Attacks in All-Optical Transport Networks

June 1, 2001
Author(s)
J K. Patel, S U. Kim, David H. Su, M Subramaniam, H A. Choi
ult and attack survivability in all-optical transport networks (AOTNs) require new approaches because of unique transmission characteristics. Specifically, fiber non-linearities and network transparency to transmitted signal types may make the network

Engineering Principles for Information Technology Security

June 1, 2001
Author(s)
G Stoneburner
In June 2001, ITL released NIST Special Publication (SP) 800-27, Engineering Principles for Information Technology Security (EP-ITS), by Gary Stoneburner, Clark Hayden, and Alexis Feringa. Engineering Principles for Information Technology (IT) Security (EP

Distribution of Link Distances in a Wireless Network

March 1, 2001
Author(s)
Leonard E. Miller
The probability distribution is found for the link distance between two randomly positioned mobile radios for two representative deployment scenarios: (1) the mobile locations are uniformly distributed over a rectangular area and (2) the x and y

The Importance of Focused Evaluations: A Case Study of TREC and DUC

March 1, 2001
Author(s)
Donna K. Harman
Evaluation has always been an important part of scientific research, and in information retrieval, this evaluation has mostly been done using test collections. In 1992, a new test collection was built at the National Institute of Standards and Technology

Information Technology Measurement and Testing Activities at NIST

February 1, 2001
Author(s)
David Flater, James E. Fowler, Simon P. Frechette, Craig M. Shakarji, Michael Hogan, Shirley M. Radack, Douglas Montgomery, L Johnson, R Rosenthal, R Mccabe, R Carpenter, Lisa Carnahan, M M. Gray
Our high technology society continues to rely more and more upon sophisticated measurements, technical standards, and associated testing activities. This was true for the industrial society of the 20th century and remains true for the information society

Information Technology Measurement and Testing Activities at NIST

January 1, 2001
Author(s)
Michael D. Hogan, Lisa J. Carnahan, Robert J. Carpenter, David W. Flater, James E. Fowler, Simon P. Frechette, M M. Gray, L A. Johnson, R. McCabe, Douglas C. Montgomery, Shirley M. Radack, R Rosenthal, Craig M. Shakarji
Our high technology society continues to rely more and more upon sophisticated measurements, technical standards, and associated testing activities. This was true for the industrial society of the 20th century and remains true for the information society

Federal Information Technology Security Assessment Framework

November 28, 2000
Author(s)
E Roback
[Prepared for the CIO Council's Security, Privacy, and Critical Infrastructure Committee] The Federal Information Technology (IT) Security Assessment Framework (or Framework) provides a method for agency officials to 1) determine the current status of

Coding and Modulation for LMDS and Analysis of the LMDS Channel

October 1, 2000
Author(s)
J E. Hakegard
During the last two to three years, there has been considerable activity aimed towards deploying broadband wireless access systems. The U. S. Local Multipoint Distribution Services (LMDS) auctions in February-March 1998 of 1.3 GHz of spectrum between 27.5

ITL Technical Accomplishments 2000

October 1, 2000
Author(s)
Elizabeth B. Lennon, K K. Simon, M Helfer
The ITL Technical Accomplishments 2000 report presents the achievements and highlights of NIST's Information Technology Laboratory (ITL) during FY 2000. Technical projects in eight divisions are described, followed by industry interactions, international

ACE Website

September 1, 2000
Author(s)
John S. Garofolo
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint

Calibrating an Active Network Node

September 1, 2000
Author(s)
Y Carlinet, V Galtier, Kevin L. Mills, Stefan D. Leigh, Andrew L. Rukhin
tive Network technology envisions deployment of virtual execution environments within network elements, so that nonhomogeneous processing can be applied to network traffic. For management purposes, each node must have a meaningful understanding of resource

Public Key Infrastructures for the Financial Services Industry

June 21, 2000
Author(s)
William E. Burr, K L. Lyons-Burke
This paper addresses how financial institutions can use a Public Key Infrastructure (PKI) and some of the problems they may face in the process. PKI is an emerging cryptographic technology that is badly needed to realize the potential of information
Was this page helpful?