scispace - formally typeset
Search or ask a question
Journal ArticleDOI

National Institute of Standards and Technology における超伝導研究及び生活

01 Oct 2001-Ieej Transactions on Fundamentals and Materials (一般社団法人 電気学会)-Vol. 121, Iss: 10, pp 968-968
About: This article is published in Ieej Transactions on Fundamentals and Materials.The article was published on 2001-10-01 and is currently open access. It has received 2687 citations till now.
Citations
More filters
01 Oct 2008
TL;DR: The database contains labeled face photographs spanning the range of conditions typically encountered in everyday life, and exhibits “natural” variability in factors such as pose, lighting, race, accessories, occlusions, and background.
Abstract: Most face databases have been created under controlled conditions to facilitate the study of specific parameters on the face recognition problem. These parameters include such variables as position, pose, lighting, background, camera quality, and gender. While there are many applications for face recognition technology in which one can control the parameters of image acquisition, there are also many applications in which the practitioner has little or no control over such parameters. This database, Labeled Faces in the Wild, is provided as an aid in studying the latter, unconstrained, recognition problem. The database contains labeled face photographs spanning the range of conditions typically encountered in everyday life. The database exhibits “natural” variability in factors such as pose, lighting, race, accessories, occlusions, and background. In addition to describing the details of the database, we provide specific experimental paradigms for which the database is suitable. This is done in an effort to make research performed with the database as consistent and comparable as possible. We provide baseline results, including results of a state of the art face recognition system combined with a face alignment system. To facilitate experimentation on the database, we provide several parallel databases, including an aligned version.

5,742 citations

Journal ArticleDOI
TL;DR: This review attempts to synthesize the literature on environmental origin, distribution/occurrence, and effects and to catalyze a more focused discussion in the environmental science community.
Abstract: During the last three decades, the impact of chemical pollution has focused almost exclusively on the conventional "priority" pollutants, especially those acutely toxic/carcinogenic pesticides and industrial intermediates displaying persistence in the environment. This spectrum of chemicals, however, is only one piece of the larger puzzle in "holistic" risk assessment. Another diverse group of bioactive chemicals receiving comparatively little attention as potential environmental pollutants includes the pharmaceuticals and active ingredients in personal care products (in this review collectively termed PPCPs), both human and veterinary, including not just prescription drugs and biologics, but also diagnostic agents, "nutraceuticals," fragrances, sun-screen agents, and numerous others. These compounds and their bioactive metabolites can be continually introduced to the aquatic environment as complex mixtures via a number of routes but primarily by both untreated and treated sewage. Aquatic pollution is particularly troublesome because aquatic organisms are captive to continual life-cycle, multigenerational exposure. The possibility for continual but undetectable or unnoticed effects on aquatic organisms is particularly worrisome because effects could accumulate so slowly that major change goes undetected until the cumulative level of these effects finally cascades to irreversible change--change that would otherwise be attributed to natural adaptation or ecologic succession. As opposed to the conventional, persistent priority pollutants, PPCPs need not be persistent if they are continually introduced to surface waters, even at low parts-per-trillion/parts-per-billion concentrations (ng-microg/L). Even though some PPCPs are extremely persistent and introduced to the environment in very high quantities and perhaps have already gained ubiquity worldwide, others could act as if they were persistent, simply because their continual infusion into the aquatic environment serves to sustain perpetual life-cycle exposures for aquatic organisms. This review attempts to synthesize the literature on environmental origin, distribution/occurrence, and effects and to catalyze a more focused discussion in the environmental science community.

4,347 citations

01 Jan 2012
TL;DR: This article surveys the literature till 2011 on the enabling technologies for the Smart Grid, and explores three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.

2,337 citations


Cites background from "National Institute of Standards and..."

  • ...Since lowering peak demand and smoothing demand profile reduces overall plant and capital cost requirements, in the peak period the electric utility can use real-time pricing to convince some users to reduce their power demands, so that the total demand profile full of peaks can be shaped to a…...

    [...]

  • ...Although realization of reliable system operation, resistance to attacks and failures, and preservation of privacy are the principle characteristics in the SG vision, realizing these objectives poses many challenges....

    [...]

Journal ArticleDOI
TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Abstract: Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and μTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. μTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

2,298 citations


Cites methods from "National Institute of Standards and..."

  • ...First, we build an authenticated routing application, and second, a two-party key agreement protocol....

    [...]

Book
01 Jan 2001
TL;DR: In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.
Abstract: Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about. Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.

1,852 citations

References
More filters
01 Oct 2008
TL;DR: The database contains labeled face photographs spanning the range of conditions typically encountered in everyday life, and exhibits “natural” variability in factors such as pose, lighting, race, accessories, occlusions, and background.
Abstract: Most face databases have been created under controlled conditions to facilitate the study of specific parameters on the face recognition problem. These parameters include such variables as position, pose, lighting, background, camera quality, and gender. While there are many applications for face recognition technology in which one can control the parameters of image acquisition, there are also many applications in which the practitioner has little or no control over such parameters. This database, Labeled Faces in the Wild, is provided as an aid in studying the latter, unconstrained, recognition problem. The database contains labeled face photographs spanning the range of conditions typically encountered in everyday life. The database exhibits “natural” variability in factors such as pose, lighting, race, accessories, occlusions, and background. In addition to describing the details of the database, we provide specific experimental paradigms for which the database is suitable. This is done in an effort to make research performed with the database as consistent and comparable as possible. We provide baseline results, including results of a state of the art face recognition system combined with a face alignment system. To facilitate experimentation on the database, we provide several parallel databases, including an aligned version.

5,742 citations

Journal ArticleDOI
TL;DR: This review attempts to synthesize the literature on environmental origin, distribution/occurrence, and effects and to catalyze a more focused discussion in the environmental science community.
Abstract: During the last three decades, the impact of chemical pollution has focused almost exclusively on the conventional "priority" pollutants, especially those acutely toxic/carcinogenic pesticides and industrial intermediates displaying persistence in the environment. This spectrum of chemicals, however, is only one piece of the larger puzzle in "holistic" risk assessment. Another diverse group of bioactive chemicals receiving comparatively little attention as potential environmental pollutants includes the pharmaceuticals and active ingredients in personal care products (in this review collectively termed PPCPs), both human and veterinary, including not just prescription drugs and biologics, but also diagnostic agents, "nutraceuticals," fragrances, sun-screen agents, and numerous others. These compounds and their bioactive metabolites can be continually introduced to the aquatic environment as complex mixtures via a number of routes but primarily by both untreated and treated sewage. Aquatic pollution is particularly troublesome because aquatic organisms are captive to continual life-cycle, multigenerational exposure. The possibility for continual but undetectable or unnoticed effects on aquatic organisms is particularly worrisome because effects could accumulate so slowly that major change goes undetected until the cumulative level of these effects finally cascades to irreversible change--change that would otherwise be attributed to natural adaptation or ecologic succession. As opposed to the conventional, persistent priority pollutants, PPCPs need not be persistent if they are continually introduced to surface waters, even at low parts-per-trillion/parts-per-billion concentrations (ng-microg/L). Even though some PPCPs are extremely persistent and introduced to the environment in very high quantities and perhaps have already gained ubiquity worldwide, others could act as if they were persistent, simply because their continual infusion into the aquatic environment serves to sustain perpetual life-cycle exposures for aquatic organisms. This review attempts to synthesize the literature on environmental origin, distribution/occurrence, and effects and to catalyze a more focused discussion in the environmental science community.

4,347 citations

Journal ArticleDOI
TL;DR: In this paper, the authors survey the literature till 2011 on the enabling technologies for the Smart Grid and explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.
Abstract: The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this article, we survey the literature till 2011 on the enabling technologies for the Smart Grid. We explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system. We also propose possible future directions in each system. colorred{Specifically, for the smart infrastructure system, we explore the smart energy subsystem, the smart information subsystem, and the smart communication subsystem.} For the smart management system, we explore various management objectives, such as improving energy efficiency, profiling demand, maximizing utility, reducing cost, and controlling emission. We also explore various management methods to achieve these objectives. For the smart protection system, we explore various failure protection mechanisms which improve the reliability of the Smart Grid, and explore the security and privacy issues in the Smart Grid.

2,433 citations

Journal ArticleDOI
TL;DR: A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.
Abstract: Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized for sensor networks: SPINS. SPINS has two secure building blocks: SNEP and μTESLA. SNEP includes: data confidentiality, two-party data authentication, and evidence of data freshness. μTESLA provides authenticated broadcast for severely resource-constrained environments. We implemented the above protocols, and show that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of our network. Additionally, we demonstrate that the suite can be used for building higher level protocols.

2,298 citations

Book
01 Jan 2001
TL;DR: In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.
Abstract: Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about. Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.

1,852 citations