Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1776 - 1800 of 2282

Information Technology Measurement and Testing Activities at NIST

February 1, 2001
Author(s)
David Flater, James E. Fowler, Simon P. Frechette, Craig M. Shakarji, Michael Hogan, Shirley M. Radack, Douglas Montgomery, L Johnson, R Rosenthal, R Mccabe, R Carpenter, Lisa Carnahan, M M. Gray
Our high technology society continues to rely more and more upon sophisticated measurements, technical standards, and associated testing activities. This was true for the industrial society of the 20th century and remains true for the information society

Information Technology Measurement and Testing Activities at NIST

January 1, 2001
Author(s)
Michael D. Hogan, Lisa J. Carnahan, Robert J. Carpenter, David W. Flater, James E. Fowler, Simon P. Frechette, M M. Gray, L A. Johnson, R. McCabe, Douglas C. Montgomery, Shirley M. Radack, R Rosenthal, Craig M. Shakarji
Our high technology society continues to rely more and more upon sophisticated measurements, technical standards, and associated testing activities. This was true for the industrial society of the 20th century and remains true for the information society

Federal Information Technology Security Assessment Framework

November 28, 2000
Author(s)
E Roback
[Prepared for the CIO Council's Security, Privacy, and Critical Infrastructure Committee] The Federal Information Technology (IT) Security Assessment Framework (or Framework) provides a method for agency officials to 1) determine the current status of

Coding and Modulation for LMDS and Analysis of the LMDS Channel

October 1, 2000
Author(s)
J E. Hakegard
During the last two to three years, there has been considerable activity aimed towards deploying broadband wireless access systems. The U. S. Local Multipoint Distribution Services (LMDS) auctions in February-March 1998 of 1.3 GHz of spectrum between 27.5

ITL Technical Accomplishments 2000

October 1, 2000
Author(s)
Elizabeth B. Lennon, K K. Simon, M Helfer
The ITL Technical Accomplishments 2000 report presents the achievements and highlights of NIST's Information Technology Laboratory (ITL) during FY 2000. Technical projects in eight divisions are described, followed by industry interactions, international

ACE Website

September 1, 2000
Author(s)
John S. Garofolo
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint

Calibrating an Active Network Node

September 1, 2000
Author(s)
Y Carlinet, V Galtier, Kevin L. Mills, Stefan D. Leigh, Andrew L. Rukhin
tive Network technology envisions deployment of virtual execution environments within network elements, so that nonhomogeneous processing can be applied to network traffic. For management purposes, each node must have a meaningful understanding of resource

Public Key Infrastructures for the Financial Services Industry

June 21, 2000
Author(s)
William E. Burr, K L. Lyons-Burke
This paper addresses how financial institutions can use a Public Key Infrastructure (PKI) and some of the problems they may face in the process. PKI is an emerging cryptographic technology that is badly needed to realize the potential of information

Software Standards Development - Wherever - However - The Bugs are Free

March 1, 2000
Author(s)
Michael D. Hogan
The perceived tradeoff between the speed of development and the technical soundness of the resulting standards may not be relevant to the development of complex software standards. The market shelf life of a software standard tends to be more dependent

A Comparison of the SSE-CMM and NVLAP IT Security Testing

February 16, 2000
Author(s)
R J. Medlock
This paper describes the general accreditation requirements of the NIST National Voluntary Laboratory Accreditation Program (NVLAP) and the specific accreditation requirements for the Cryptographic Module Testing (CMT) and Common Criteria Testing (CCT)

A Differentiated Optical Services Model for WDM Networks

February 1, 2000
Author(s)
Nada T. Golmie, T D. Ndousse, David H. Su
This paper addresses the issues of guaranteed and scalable end-to-end QoS in Metropolitan DWDM networks serving as transit networks for IP access networks. DWDM offering few wavelengths have in the past been deployed in the backbone network to upgrade

Web-Based Annotation Collaboration Tool

February 1, 2000
Author(s)
Wo L. Chang
The Web has emerged as a dominant mode of making information available and is increasingly seen as the medium to support collaboration across boundaries of geography and time. To realize this potential the Web must support viewing and manipulating of multi

A Bandwidth Guaranteed Multi-Access Protocol for WDM Local Networks

January 1, 2000
Author(s)
J S. Choi, Nada T. Golmie, David H. Su
In this paper, we propose a bandwidth guaranteed multi-access protocol for broadcast-and-select WDM local networks with a star topology. The proposed protocol is based on a combination of contention and reservation mechanisms for time slotted WDM networks

A Reliable Message Delivery Protocol for Mobile Agents

January 1, 2000
Author(s)
Mudumbai Ranganathan, M Bednarek, Douglas C. Montgomery
The abstractions and protocol mechanisms that form the basis for inter-agent communications can significantly impact the overall design and effectiveness of Mobile Agent systems. We present the design and performance analysis of a reliable communication

The NIST 1999 Speaker Recognition Evaluation - An Overview

December 31, 1999
Author(s)
Alvin F. Martin, Mark A. Przybocki
This article summarizes the 1999 NIST Speaker Recognition Evaluation. It discusses the overall research objectives, the three task definitions, the development and evaluation data sets, the specified performance measures and their manner of presentation

Differentiated Services Over Cable Networks

December 5, 1999
Author(s)
Nada T. Golmie, F Mouveaux, David H. Su
The current Medium Access Control interface specifications of the Multimedia Cable Network System (MCNS) project describe a best effort access service over cable networks. In this paper, we show that even though these specifications are mainly intended to

Dynamic Power-Conscious Routing for MANETs: An Initial Approach

November 1, 1999
Author(s)
M W. Subbarao
We develop an initial dynamic power-conscious routing scheme (MPR) that incorporates physical layer and link layer statistics to conserve power, while compensating for the channel conditions and interference environments at the intended receiver. The aim

Towards a Measurement Technique for Risk Management

October 20, 1999
Author(s)
D G. Marks
The field of computer security is impeded by a lack of objective, quantitative measures. As a result, most systems, whether theoretical or actual, attempt to avoid, rather than manage, risk. Risk management requires looking at the complete protect, detect
Was this page helpful?