Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1751 - 1775 of 2282

Predicting Resource Demand in Heterogeneous Active Networks

December 1, 2001
Author(s)
V Galtier, Kevin L. Mills, Y Carlinet, S Bush, A Kulkarni
Recent research, such as the Active Virtual Network Management Prediction (AVNMP) system, aims to use simulation models running ahead of real time to predict resource demand among network nodes. If accurate, such predictions can be used to allocate network

Segmentation for Robust Tracking in the Presence of Severe Occlusion

December 1, 2001
Author(s)
Camillo Gentile, M Sznaier, O Camps
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness can be increased by tracking a set of ¿parts¿, provided that a suitable set can be identified. In this paper we propose a novel segmentation, specifically

Underlying Technical Models for Information Technology Security

December 1, 2001
Author(s)
G Stoneburner
Underlying Technical Models for Information Technology Security provides a description of the technical foundations, termed models, that underlie secure information technology (IT). The intent is to provide, in a concise form, the models that should be

Video Transmission for Third Generation Mobile Communication Systems

December 1, 2001
Author(s)
Hamid Gharavi
This paper presents a method of transmitting video over the cdma2000 mobile systems. In this method, the video bit-stream, after splitting, is transmitted via the supplemental channels of the cdma2000 reverse link. The method takes advantage of the direct

Interference Aware Bluetooth Packet Scheduling

November 1, 2001
Author(s)
Nada T. Golmie, Nicolas Chevrollier, I El bakkouri
Bluetooth is a radio technology for Wireless Personal Area Networks operating in the 2.4 GHz ISM band. Since both Bluetooth and IEEE 802.11 devices use the same frequency band and may likely come together in a laptop or may be close together at a desktop

Techniques to Improve Bluetooth Performance in Interference Environments

October 1, 2001
Author(s)
Nada T. Golmie, Nicolas Chevrollier
Bluetooth is a radio technology for Wireless Personal Area Networks operating in the 2.4 GHz ISM band. Since both Bluetooth and IEEE 802.11 devices use the same frequency band and may likely come together in a laptop or may be close together at a desktop

An Improved Voronoi-Diagram-Based Neural Net for Pattern Classification

September 12, 2001
Author(s)
Camillo A. Gentile, M Sznaier
In this brief paper, we propose a novel two-layer neural network to answer a point query in Rn which is partitioned into polyhedral regions. Such a task solves among others nearest neighbor clustering. As in previous approaches to the problem, our design

Needs and Research Directions in Human-Robot Interactive Systems

September 12, 2001
Author(s)
V Lumelsky, Jean C. Scholtz
The advantages of using robotic systems will only be realized if non-experts in robotics are able to use the systems. This paper outlines some directions needed for research in human-robot interaction (HRI).

Machine Translation Website

September 1, 2001
Author(s)
John S. Garofolo
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint

Objective Speech Quality Measures for Internet Telephony

August 20, 2001
Author(s)
T Hall
Measuring voice quality for telephony is not a new problem. However, packet-switched, best-effort networks such as the Internet present significant new challenges for the delivery of real-time voice traffic. Unlike the circuit-switched PSTN, Internet

CDMA2000 Reverse-Link Simulation Model Design and Evaluation

July 1, 2001
Author(s)
Hamid Gharavi, R Wyatt-Millington, F Chin
This paper presents the design and implementation of a simulation model for the cdma2000 reverse link. The model includes all the radio configurations and their corresponding data rates in accordance with the IS-2000 specifications. The paper first

What to Expect When You Can Not Start at the Beginning

July 1, 2001
Author(s)
David E. Cypher
This presentation contains background information on the decision to create an Specification and Description Language (SDL) model, a discussion of the development cycle for the product development, a description of the SDL's creation, an explanation on how

Security - Revenue Generator and Mission Enabler

June 21, 2001
Author(s)
G Stoneburner
We need to facilitate a change in user perception of security from a hindrance to an essential revenue generator and mission enabler. The Common Criteria protection profile (PP) and security target (ST) constructs can be used to help achieve this need. Yet

A Framework for Managing Faults and Attacks in All-Optical Transport Networks

June 1, 2001
Author(s)
J K. Patel, S U. Kim, David H. Su, M Subramaniam, H A. Choi
ult and attack survivability in all-optical transport networks (AOTNs) require new approaches because of unique transmission characteristics. Specifically, fiber non-linearities and network transparency to transmitted signal types may make the network

Engineering Principles for Information Technology Security

June 1, 2001
Author(s)
G Stoneburner
In June 2001, ITL released NIST Special Publication (SP) 800-27, Engineering Principles for Information Technology Security (EP-ITS), by Gary Stoneburner, Clark Hayden, and Alexis Feringa. Engineering Principles for Information Technology (IT) Security (EP

Distribution of Link Distances in a Wireless Network

March 1, 2001
Author(s)
Leonard E. Miller
The probability distribution is found for the link distance between two randomly positioned mobile radios for two representative deployment scenarios: (1) the mobile locations are uniformly distributed over a rectangular area and (2) the x and y

The Importance of Focused Evaluations: A Case Study of TREC and DUC

March 1, 2001
Author(s)
Donna K. Harman
Evaluation has always been an important part of scientific research, and in information retrieval, this evaluation has mostly been done using test collections. In 1992, a new test collection was built at the National Institute of Standards and Technology
Was this page helpful?