scispace - formally typeset
Search or ask a question
Institution

National Security Agency

GovernmentFort George Meade, Maryland, United States
About: National Security Agency is a government organization based out in Fort George Meade, Maryland, United States. It is known for research contribution in the topics: Signal & Encryption. The organization has 393 authors who have published 485 publications receiving 15916 citations. The organization is also known as: NSA & N.S.A..


Papers
More filters
Journal ArticleDOI
01 Dec 2020
TL;DR: In this article, the ability of cybersecurity content to achieve virality in social networks can be useful for measuring security attributes, such as the ability to spread rapidly and widely on the Internet.
Abstract: The Internet is a rich environment for information to spread rapidly and widely. The ability of cybersecurity content to achieve virality in social networks can be useful for measuring security awa...
Proceedings ArticleDOI
01 Dec 1991
TL;DR: This paper identifies some of the technical and attitudinal barriers that exist at NSA, attempts to explain why they exist, introduces some methods being used to diminish or eliminate the barriers, and discusses previous and current Ada development projects.
Abstract: Similar to the barriers faced by Ada proponents in commercial industry and other branches of the Department of Defense, we have faced many difficulties in adopting Ada at the National Security Agency (NSA). The difficulties encountered when introducing Ada, though often proclaimed to be tec~lcal problems, actually stem more from people’s unfavorable perceptions of the language. Hidden behind technical excuses, the negative attitudes towards Ada are a resistive barrier to the spread of Ada’s use. This paper identifies some of the technical and attitudinal barriers that exist at NSA, attempts to explain why they exist, introduces some methods being used to diminish or eliminate the barriers, and discusses previous and current Ada development projects. Introduction The introduction of Ada at the National Security Agency (NSA), just as witMn most of the software development world, has been slow and faced its share of obstacles. From the mountains to the molehills, we have had to tackle the common excuses and genuine problems posed by developers and managers alike. From the C fanatics to the “old dogs”, Ada has faced opposition. To overcome some of the obstacles and opposition, we formulated a two-part strategy -identify the barriers and deal with them the best way possible. After asking numerous questions (regarding the lack of Ada development efforts at NSA) and receiving many unjustifiable answers, we determined that the barriers stem more from the attitudes people have formed towards Ada than from actual technical problems they encountered using Ada. The technical barriers were already being addressed, the impact of adverse attitudes or how to handle them had not been adequately 1991 ACM 0-89791445-7191 I1OOO-0191
Patent
30 Mar 2021
TL;DR: In this article, an elongated flat rigid member is used to restrain the first blocking member relative to the flat rigid members in order to prevent the door from being opened by the first and second blocking members.
Abstract: A device for securing a door includes an elongated flat rigid member. A first segment is connected to a second segment by a transition segment perpendicular to the first and second segments. The first segment forms an aperture to admit a restraining device. The device also includes a first blocking member having two apertures and configured to engage the first member such that the restraining device restrains the first blocking member relative to the flat rigid member. The device also includes a second blocking member configured to lockably engage the second segment, thereby securing the device relative to a frame of the door with the first and second segments on opposite sides of the frame. When the device is secured and the door closed, and the first blocking member restrained relative to the flat rigid member, the door is blocked from being opened by the first and second blocking members.
Journal ArticleDOI
TL;DR: A substantial subset of the class of recursive functions for which termination arguments can be provided automatically is provided, when the ordinal measure used to justify termination is less than $$\omega^{\omega}$$.
Abstract: An often neglected part of proof automation is simply admitting recursive function definitions into a constructive logic. Since function termination in general is undecidable, current generation theorem provers are quick to involve the human. There is, however, a substantial subset of the class of recursive functions for which termination arguments can be provided automatically. In particular, when the ordinal measure used to justify termination is less than $$\omega^{\omega}$$ , we provide algorithms and proofs that guarantee optimum results, given the capability of existing proof libraries on the theorem-proving system.
Proceedings ArticleDOI
TL;DR: In this article, the Doppler effects are modelled as a shift in frequency, and delay and doppler are estimated from a cross-ambiguity function (CAF) in which delay and frequency shift are assumed to be independent and approximately constant.
Abstract: There are many applications for which it is important to resolve the location and motion of a target position. For the static situation in which a target transmitter and several receivers are not in motion, the target may be completely resolved by triangulation using relative time delays estimated by several receivers at known locations. These delays are normally estimated from the location of peaks in the magnitude of the cross-correlation function. For active radars, a transmitted signal is reflected by the target, and range and radial velocity are estimated from the delay and Doppler effects on the received signal. In this process, Doppler effects are conventionally modeled as a shift in frequency, and delay and Doppler are estimated from a cross-ambiguity function (CAF) in which delay and Doppler frequency shift are assumed to be independent and approximately constant. Delay and Doppler are jointly estimated as the location of the peak magnitude of the CAF plane. We present methods for accurately estimating delay for the static case and delay and the time-varying Doppler effects for non-static models, such as the radar model.

Authors

Showing all 394 results

NameH-indexPapersCitations
Robert L. Grossman5232015551
Dianne P. O'Leary4422311469
Keith Schwab37917617
Chris A. Mack312314592
Young H. Kwark281233133
Christopher J. K. Richardson231221535
Akin Akturk191021272
Julius Goldhar19921218
Kevin Osborn19652153
Patrick W. Dowd18611437
Kevin Borders17261314
David G. Harris171021055
R. W. R. Darling16541762
Gail Letzter1532986
Benjamin Palmer1537659
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

75% related

Microsoft
86.9K papers, 4.1M citations

75% related

AT&T
21.2K papers, 949K citations

74% related

Google
39.8K papers, 2.1M citations

72% related

University of Trento
30.9K papers, 896.6K citations

72% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20222
20218
202014
201914
20184
20178