Institution
National Security Agency
Government•Fort George Meade, Maryland, United States•
About: National Security Agency is a government organization based out in Fort George Meade, Maryland, United States. It is known for research contribution in the topics: Signal & Encryption. The organization has 393 authors who have published 485 publications receiving 15916 citations. The organization is also known as: NSA & N.S.A..
Topics: Signal, Encryption, Finite field, Error detection and correction, Security information and event management
Papers published on a yearly basis
Papers
More filters
••
01 Jul 1995TL;DR: System engineers should become familiar with “technical” information system architecture alternatives, and advances in technology are leading to the merging of system, software, and hardware engineering disciplines at the architectural level.
Abstract: Government and industry are focusing on “information” system technology to provide dramatic changes that will be the critical factors in a comprehensive range of activities from achieving-competitive-advantage to winning-wars. System, software, and security engineering for information systems involve principles and practices that continue to evolve. This paper identifies, compares, and questions those principles and practices. It characterizes the information system development/integration paradigms as being in a state of flux. In addition, architectural concepts are discussed that provide a framework for information system services that support a variety of missions and functions.
Three salient points of the paper are: (1) system engineers should become familiar with “technical” information system architecture alternatives, (2) advances in technology are leading to the merging of system, software, and hardware engineering disciplines at the architectural level, and (3) requirements-definition and design-resolution procedures are being revolutionized through incremental/continuous development paradigms.
1 citations
•
26 Mar 2019TL;DR: In this paper, a method is presented for ranking documents identified in a search relative to a keyword, which utilizes a set of training documents to provide a co-occurrence matrix and a transition matrix.
Abstract: A method is presented for ranking documents identified in a search relative to a keyword. The method utilizes a set of training documents to provide a co-occurrence matrix and a transition matrix. A word pair relevancy measure is calculated for each word of the document to be ranked. These word pair relevancy measures are based upon the co-occurrence and transition matrices obtained from the training set and are utilized to calculate a document relevance measure. Documents identified in a search are ranked utilizing the document relevance measure.
1 citations
•
27 Feb 2007TL;DR: In this article, the authors present a method of eliminating loops from a computer program by receiving the program, graphing its function and control, identifying its entry point, and identifying groups of loops connected to its entry points.
Abstract: The present invention is a method of eliminating loops from a computer program by receiving the program, graphing its function and control, identifying its entry point, and identifying groups of loops connected to its entry point. Stop if there are no such groups. Otherwise, selecting a group of loops. Then, identifying the selected group's entry point. If the selected group includes no group of loops having a different entry point then replacing it with a recursive or non-recursive function, reconfiguring each connection entering and exiting the selected group to preserve their functionality, and returning to the fifth step. Otherwise, identifying groups of loops in the selected group connected to, but having different entry points and returning to the loop selection step.
1 citations
•
12 Dec 2011TL;DR: In this article, a device and method of routing traffic in a network by receiving the network, assigning a maximum temperature value to gateway nodes, calculating temperature values for router nodes, determining self-utilization values for nodes.
Abstract: A device and method of routing traffic in a network by receiving the network, assigning a maximum temperature value to gateway nodes, calculating temperature values for router nodes, determining self-utilization values for nodes, determining neighborhood-utilization values for router nodes, determining pressure values for gateway nodes, determining pressure values for router nodes, identifying router node sent traffic, identifying neighboring nodes having higher temperatures than router node, identifying neighboring node with lowest pressure value, sending traffic to neighboring node with lowest pressure value, and stopping if the neighboring node is a gateway node, otherwise identifying the node as a router node and returning to the step of finding neighboring nodes.
1 citations
•
14 Dec 2011TL;DR: In this article, the authors present a method for determining changes to a graphical user interface (GUI) that does not require the use of a configuration file or the use data from a previous operation of an application computer program.
Abstract: A device and method of determining changes to a graphical user interface (GUI) that does not require the use of a configuration file or the use of data from a previous operation of an application computer program by identifying a program currently running, determining a first tree structure for the GUI, identifying a communication from the program to the GUI, returning to the third step if the communication does not change the GUI, determining a second tree structure for the changed GUI, comparing the first and second tree structures for any change, discarding the first tree structure, renaming the second tree structure as the first tree structure, and transmitting the identified change to a user, and returning to the third step.
1 citations
Authors
Showing all 394 results
Name | H-index | Papers | Citations |
---|---|---|---|
Robert L. Grossman | 52 | 320 | 15551 |
Dianne P. O'Leary | 44 | 223 | 11469 |
Keith Schwab | 37 | 91 | 7617 |
Chris A. Mack | 31 | 231 | 4592 |
Young H. Kwark | 28 | 123 | 3133 |
Christopher J. K. Richardson | 23 | 122 | 1535 |
Akin Akturk | 19 | 102 | 1272 |
Julius Goldhar | 19 | 92 | 1218 |
Kevin Osborn | 19 | 65 | 2153 |
Patrick W. Dowd | 18 | 61 | 1437 |
Kevin Borders | 17 | 26 | 1314 |
David G. Harris | 17 | 102 | 1055 |
R. W. R. Darling | 16 | 54 | 1762 |
Gail Letzter | 15 | 32 | 986 |
Benjamin Palmer | 15 | 37 | 659 |