NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
David Flater, James E. Fowler, Simon P. Frechette, Craig M. Shakarji, Michael Hogan, Shirley M. Radack, Douglas Montgomery, L Johnson, R Rosenthal, R Mccabe, R Carpenter, Lisa Carnahan, M M. Gray
Our high technology society continues to rely more and more upon sophisticated measurements, technical standards, and associated testing activities. This was true for the industrial society of the 20th century and remains true for the information society
Michael D. Hogan, Lisa J. Carnahan, Robert J. Carpenter, David W. Flater, James E. Fowler, Simon P. Frechette, M M. Gray, L A. Johnson, R. McCabe, Douglas C. Montgomery, Shirley M. Radack, R Rosenthal, Craig M. Shakarji
Our high technology society continues to rely more and more upon sophisticated measurements, technical standards, and associated testing activities. This was true for the industrial society of the 20th century and remains true for the information society
The emergence of Bluetooth devices operating in the same 2.4 GHz ISM frequency band as existing Wireless Local Area Network devices implementing the IEEE 802.11 standard specifications may lead to signal interference and result in significant performance
A flexible model called the GOP GBAR model based on Gamma-distributed variables is proposed for variable-rate MPEG video sources. This model is an extension of Heyman's GBAR model for video teleconferencing. The GOP GBAR model takes explicit account of
[Prepared for the CIO Council's Security, Privacy, and Critical Infrastructure Committee] The Federal Information Technology (IT) Security Assessment Framework (or Framework) provides a method for agency officials to 1) determine the current status of
This paper proposes an approach to network management under incomplete information on the operational environment. The approach employs a combination of the minimax and Bayes' methodologies for making network management decisions under uncertainty. As an
During the last two to three years, there has been considerable activity aimed towards deploying broadband wireless access systems. The U. S. Local Multipoint Distribution Services (LMDS) auctions in February-March 1998 of 1.3 GHz of spectrum between 27.5
The ITL Technical Accomplishments 2000 report presents the achievements and highlights of NIST's Information Technology Laboratory (ITL) during FY 2000. Technical projects in eight divisions are described, followed by industry interactions, international
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
Y Carlinet, V Galtier, Kevin L. Mills, Stefan D. Leigh, Andrew L. Rukhin
tive Network technology envisions deployment of virtual execution environments within network elements, so that nonhomogeneous processing can be applied to network traffic. For management purposes, each node must have a meaningful understanding of resource
The IEEE 802 has recently formed a new working group, 802.15, for developing Physical and Medium Access Control layer specifications for Wireless Personal Area Networks (WPANs) that allow proximal devices to share information and resources. One technology
In recent years, numerous commercial and experimental Role-Based Access Control (RBAC) implementations have emerged. Central to several of these RBAC systems are administrative facilities for displaying and managing user/role and role/privileges, and their
This paper addresses how financial institutions can use a Public Key Infrastructure (PKI) and some of the problems they may face in the process. PKI is an emerging cryptographic technology that is badly needed to realize the potential of information
The perceived tradeoff between the speed of development and the technical soundness of the resulting standards may not be relevant to the development of complex software standards. The market shelf life of a software standard tends to be more dependent
This paper describes the general accreditation requirements of the NIST National Voluntary Laboratory Accreditation Program (NVLAP) and the specific accreditation requirements for the Cryptographic Module Testing (CMT) and Common Criteria Testing (CCT)
This paper addresses the issues of guaranteed and scalable end-to-end QoS in Metropolitan DWDM networks serving as transit networks for IP access networks. DWDM offering few wavelengths have in the past been deployed in the backbone network to upgrade
This paper presents a closed-form expression for multiple forward diffraction by rows of tree canopies and buildings, applicable to the propagation predictions at centimeter and millimeter wavelengths for local multipoint distribution service (LMDS). The
The Web has emerged as a dominant mode of making information available and is increasingly seen as the medium to support collaboration across boundaries of geography and time. To realize this potential the Web must support viewing and manipulating of multi
In this paper, we propose a bandwidth guaranteed multi-access protocol for broadcast-and-select WDM local networks with a star topology. The proposed protocol is based on a combination of contention and reservation mechanisms for time slotted WDM networks
Mudumbai Ranganathan, M Bednarek, Douglas C. Montgomery
The abstractions and protocol mechanisms that form the basis for inter-agent communications can significantly impact the overall design and effectiveness of Mobile Agent systems. We present the design and performance analysis of a reliable communication
V Galtier, Kevin L. Mills, Y Carlinet, Stefan D. Leigh, Andrew L. Rukhin
tive Network technology envisions deployment of virtual execution environments within network elements, such as switches and routers, so that nonhomogeneous processing can be applied to network traffic associated with services, flows, or even individual
This article summarizes the 1999 NIST Speaker Recognition Evaluation. It discusses the overall research objectives, the three task definitions, the development and evaluation data sets, the specified performance measures and their manner of presentation
The current Medium Access Control interface specifications of the Multimedia Cable Network System (MCNS) project describe a best effort access service over cable networks. In this paper, we show that even though these specifications are mainly intended to
We develop an initial dynamic power-conscious routing scheme (MPR) that incorporates physical layer and link layer statistics to conserve power, while compensating for the channel conditions and interference environments at the intended receiver. The aim
The field of computer security is impeded by a lack of objective, quantitative measures. As a result, most systems, whether theoretical or actual, attempt to avoid, rather than manage, risk. Risk management requires looking at the complete protect, detect