Institution
National Security Agency
Government•Fort George Meade, Maryland, United States•
About: National Security Agency is a government organization based out in Fort George Meade, Maryland, United States. It is known for research contribution in the topics: Signal & Encryption. The organization has 393 authors who have published 485 publications receiving 15916 citations. The organization is also known as: NSA & N.S.A..
Topics: Signal, Encryption, Finite field, Error detection and correction, Security information and event management
Papers published on a yearly basis
Papers
More filters
••
16 Jun 2004TL;DR: In this article, the problem of computing van der Waerden numbers is represented by parameterized propositional theories in such a way that decisions concerning their satisfiability determine the numbers (function) in question.
Abstract: In this paper we bring together the areas of combinatorics and propositional satisfiability. Many combinatorial theorems establish, often constructively, the existence of positive integer functions, without actually providing their closed algebraic form or tight lower and upper bounds. The area of Ramsey theory is especially rich in such results. Using the problem of computing van der Waerden numbers as an example, we show that these problems can be represented by parameterized propositional theories in such a way that decisions concerning their satisfiability determine the numbers (function) in question. We show that by using general-purpose complete and local-search techniques for testing propositional satisfiability, this approach becomes effective — competitive with specialized approaches. By following it, we were able to obtain several new results pertaining to the problem of computing van der Waerden numbers. We also note that due to their properties, especially their structural simplicity and computational hardness, propositional theories that arise in this research can be of use in development, testing and benchmarking of SAT solvers.
56 citations
••
03 Apr 2005
TL;DR: This paper studies the effectiveness of two approaches in handling nominal features: a simple coding scheme via the use of indicator variables and a scaling method based on multiple correspondence analysis (MCA) with two anomaly detection methods.
Abstract: Computer network data stream used in intrusion detection usually involve many data types. A common data type is that of symbolic or nominal features. Whether being coded into numerical values or not, nominal features need to be treated differently from numeric features. This paper studies the effectiveness of two approaches in handling nominal features: a simple coding scheme via the use of indicator variables and a scaling method based on multiple correspondence analysis (MCA). In particular, we apply the techniques with two anomaly detection methods: the principal component classifier (PCC) and the Canberra metric. The experiments with KDD 1999 data demonstrate that MCA works better than the indicator variable approach for both detection methods with the PCC coming much ahead of the Canberra metric.
56 citations
•
18 Apr 2007TL;DR: In this article, a method of protecting a return address on a computer stack is disclosed, where two stacks are created, the first a normal stack, and the second, or shadow, having shadow frames containing the return address upon a subroutine call, the address on the first stack where the return addresses is stored, and a user-definable state variable which is used to identify a shadow frame as return address.
Abstract: A method of protecting a return address on a computer stack is disclosed. Two stacks are created, the first a normal stack, and the second, or shadow, having shadow frames containing the return address upon a subroutine call, the address on the first stack where the return address is stored, and a user-definable state variable which is used to identify a shadow frame as a return address. Before returning from a subroutine, the two return addresses are compared, and if they do not match, the second stack is searched down, and then up, for a matching return address. If there is a match, the shadow is re-synchronized with the first stack by comparing the stored values of the first stack pointer with the first stack pointer and adjusting appropriately the shadow stack pointer. The matching shadow frame must also be a return address datatype of return address.
53 citations
••
TL;DR: This paper examines the one type of divisible [2n, n] codes which need not be self-dual and obtains a strengthening of the Assmus-Mattson theore and shows that the extremal f.s.d. even codes of lengths 10 and 18 are unique.
Abstract: Binary formally self-dual (f.s.d.) even codes are the one type of divisible [2n, n] codes which need not be self-dual. We examine such codes in this paper. On occasion a f.s.d. even [2n, n] code can have a larger minimum distance than a [2n, n] self-dual code. We give many examples of interesting f.s.d even codes. We also obtain a strengthening of the Assmus-Mattson theore. IfC is a f.s.d. extremal code of lengthn≡2 (mol 8) [n ≡6 (mod 8)], then the words of a fixed weight inC ∪C
⊥ hold a 3-design [1-design]. Finally, we show that the extremal f.s.d. codes of lengths 10 and 18 are unique.
52 citations
•
01 Dec 2009TL;DR: In this paper, an RF power harvesting circuit with improved sensitivity to RF energy is presented, which includes an inductor, a first capacitor connected to the inductor and a first MOSFET connected to a first node.
Abstract: Provided is an RF power harvesting circuit with improved sensitivity to RF energy. The RF power harvesting device includes an inductor, a first capacitor connected to the inductor, a first MOSFET connected to a first node, and a second MOSFET connected to the first node. The inductor or the first capacitor are connected to the first node.
51 citations
Authors
Showing all 394 results
Name | H-index | Papers | Citations |
---|---|---|---|
Robert L. Grossman | 52 | 320 | 15551 |
Dianne P. O'Leary | 44 | 223 | 11469 |
Keith Schwab | 37 | 91 | 7617 |
Chris A. Mack | 31 | 231 | 4592 |
Young H. Kwark | 28 | 123 | 3133 |
Christopher J. K. Richardson | 23 | 122 | 1535 |
Akin Akturk | 19 | 102 | 1272 |
Julius Goldhar | 19 | 92 | 1218 |
Kevin Osborn | 19 | 65 | 2153 |
Patrick W. Dowd | 18 | 61 | 1437 |
Kevin Borders | 17 | 26 | 1314 |
David G. Harris | 17 | 102 | 1055 |
R. W. R. Darling | 16 | 54 | 1762 |
Gail Letzter | 15 | 32 | 986 |
Benjamin Palmer | 15 | 37 | 659 |