An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
Measuring voice quality for telephony is not a new problem. However, packet-switched, best-effort networks such as the Internet present significant new challenges for the delivery of real-time voice traffic. Unlike the circuit-switched PSTN, Internet
This paper proposes a framework for performance evaluation md optimization of an emerging multimedia, packet Direct-Sequence Code Division Multiple Access (DS-CDMA) network with a wide range of Quality of Service (QoS) requirements on losses and delays
This paper presents the design and implementation of a simulation model for the cdma2000 reverse link. The model includes all the radio configurations and their corresponding data rates in accordance with the IS-2000 specifications. The paper first
The emergence of several radio technologies such as Bluetooth, and IEEE 802.11 operating in the 2.4 GHz unlicensed ISM frequency band may lead to signal interference and result in significant performance degradation when devices are co-located in the same
This presentation contains background information on the decision to create an Specification and Description Language (SDL) model, a discussion of the development cycle for the product development, a description of the SDL's creation, an explanation on how
We need to facilitate a change in user perception of security from a hindrance to an essential revenue generator and mission enabler. The Common Criteria protection profile (PP) and security target (ST) constructs can be used to help achieve this need. Yet
J K. Patel, S U. Kim, David H. Su, M Subramaniam, H A. Choi
ult and attack survivability in all-optical transport networks (AOTNs) require new approaches because of unique transmission characteristics. Specifically, fiber non-linearities and network transparency to transmitted signal types may make the network
In June 2001, ITL released NIST Special Publication (SP) 800-27, Engineering Principles for Information Technology Security (EP-ITS), by Gary Stoneburner, Clark Hayden, and Alexis Feringa. Engineering Principles for Information Technology (IT) Security (EP
The probability distribution is found for the link distance between two randomly positioned mobile radios for two representative deployment scenarios: (1) the mobile locations are uniformly distributed over a rectangular area and (2) the x and y
Evaluation has always been an important part of scientific research, and in information retrieval, this evaluation has mostly been done using test collections. In 1992, a new test collection was built at the National Institute of Standards and Technology
David Flater, James E. Fowler, Simon P. Frechette, Craig M. Shakarji, Michael Hogan, Shirley M. Radack, Douglas Montgomery, L Johnson, R Rosenthal, R Mccabe, R Carpenter, Lisa Carnahan, M M. Gray
Our high technology society continues to rely more and more upon sophisticated measurements, technical standards, and associated testing activities. This was true for the industrial society of the 20th century and remains true for the information society
Michael D. Hogan, Lisa J. Carnahan, Robert J. Carpenter, David W. Flater, James E. Fowler, Simon P. Frechette, M M. Gray, L A. Johnson, R. McCabe, Douglas C. Montgomery, Shirley M. Radack, R Rosenthal, Craig M. Shakarji
Our high technology society continues to rely more and more upon sophisticated measurements, technical standards, and associated testing activities. This was true for the industrial society of the 20th century and remains true for the information society
The emergence of Bluetooth devices operating in the same 2.4 GHz ISM frequency band as existing Wireless Local Area Network devices implementing the IEEE 802.11 standard specifications may lead to signal interference and result in significant performance
A flexible model called the GOP GBAR model based on Gamma-distributed variables is proposed for variable-rate MPEG video sources. This model is an extension of Heyman's GBAR model for video teleconferencing. The GOP GBAR model takes explicit account of
[Prepared for the CIO Council's Security, Privacy, and Critical Infrastructure Committee] The Federal Information Technology (IT) Security Assessment Framework (or Framework) provides a method for agency officials to 1) determine the current status of
This paper proposes an approach to network management under incomplete information on the operational environment. The approach employs a combination of the minimax and Bayes' methodologies for making network management decisions under uncertainty. As an
During the last two to three years, there has been considerable activity aimed towards deploying broadband wireless access systems. The U. S. Local Multipoint Distribution Services (LMDS) auctions in February-March 1998 of 1.3 GHz of spectrum between 27.5
The ITL Technical Accomplishments 2000 report presents the achievements and highlights of NIST's Information Technology Laboratory (ITL) during FY 2000. Technical projects in eight divisions are described, followed by industry interactions, international
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
Y Carlinet, V Galtier, Kevin L. Mills, Stefan D. Leigh, Andrew L. Rukhin
tive Network technology envisions deployment of virtual execution environments within network elements, so that nonhomogeneous processing can be applied to network traffic. For management purposes, each node must have a meaningful understanding of resource
The IEEE 802 has recently formed a new working group, 802.15, for developing Physical and Medium Access Control layer specifications for Wireless Personal Area Networks (WPANs) that allow proximal devices to share information and resources. One technology
In recent years, numerous commercial and experimental Role-Based Access Control (RBAC) implementations have emerged. Central to several of these RBAC systems are administrative facilities for displaying and managing user/role and role/privileges, and their
This paper addresses how financial institutions can use a Public Key Infrastructure (PKI) and some of the problems they may face in the process. PKI is an emerging cryptographic technology that is badly needed to realize the potential of information