Abstract:An emerging consensus in engineering holds that aleatory uncertainty should be propagated by traditional methods of probability theory but that epistemic uncertainty may require methods that do not confuse incertitude with variability by requiring every possibility be associated with a probability… more
Abstract:Two methods for analyzing software security risks are dynamic application security testing (DAST) - an outside in perspective - and static application
security testing (SAST) - and inside out perspective. Both have shortfalls. DAST findings do not give insight into the root cause, making… more
Abstract:ABSTRACT: As networked computing becomes more and more critical to the US government and US corporations, it is crucial to protect them against new and unknown threats. The field of trusted computing has grown to provide assurances that the software on a computing system has not been tampered. … more
Abstract:The current testing methods of the NIST Security Content Automation Protocol (SCAP) Validation Program are largely manual and labor-intensive, making comprehensive validation of SCAP-enabled IT security products difficult and time-consuming. ATC-NY will design and develop the Automated SCAP Tool… more
Abstract:ABSTRACT: Development and deployment of airborne multistatic radar systems and the algorithms that control them can be greatly aided by accurate modeling and performance prediction. Capturing physical, electromagnetic and environmental real-world effects of multistatics in a simulation capability… more
Abstract:ABSTRACT: Today"s analysts have an exceptional amount of GMTI intelligence readily available to them for servicing Requests for Information (RFI) because of the growing plethora of GMTI collection systems and multiple forensic data archives; however, only a small fraction of this GMTI is… more
Abstract:ABSTRACT: The challenge set by Fully Adaptive radar tech techniques is how to best optimize all of the possible radar settings all of the possible transmit and receive degrees of freedom to maximize radar performance. The available degrees of freedom, including transmitter parameters such as… more
Abstract:One of the major benefits of tactical cloud computing is improved net-centric capabilities and operations with the objective of information dominance. The reassign-able pools of computing resources and efficient information across operational boundaries can produce a more accurate and up to date… more
Abstract:ABSTRACT: Clear Science Corp. proposes to develop and demonstrate accurate and computationally efficient analysis software for computing aircraft store trajectories and quantifying the risk of trajectory deviations resulting from unsteady flow in the weapons bay. The software will include… more
Abstract:Clear Science Corp. and the University of Texas at Austin will develop and demonstrate technology that accurately quantifies aero-optical distortion associated with high-energy laser (HEL) weapons on rotorcraft and will utilize the information in designing adaptive optics (AO) systems to maximize… more
Abstract:ABSTRACT: Warfighters need to be able to trust the systems on which their lives depend. Cases include an individual human trusting an individual computer, an individual computer trusting a server or network to which it is connecting, a server or network trusting an individual computer connecting to… more
Abstract:ABSTRACT: The overall objective is to enable users on-the-move to reliably and securely send and receive information, targeted for recipients? geographic locations, filtered on their credentials, made persistently available if so designated, and tailored for their devices, facilitating their rapid… more
Abstract:Diamond Visionics proposes a solution to decouple rendering channels from simulators and displays by developing a novel architecture consisting of both hardware and software. Modern video processing and networking techniques will be utilized such that any display in the system can be connected to… more
Abstract:The utility of stereoscopic 3D image representation in many applications is now well established. It is not just a matter of stereo being better than 2D, but of stereo being necessary to interpret representations of complex data sets, physical phenomena, engineering designs and position in space. … more
Abstract:ABSTRACT: The proposed research focuses on a generalized formulation and an integrated implementation of bearing life and heat generation models. Since the internal bearing geometry changes with temperature, mechanical stresses, contributing to fatigue, are intricately coupled with thermal effects.… more
Abstract:Develop an innovative approach for cargo and personnel handling system that requires minimal labor effort by the crew to operate. The cargo and personnel system approach shall be capable of carrier take-offs and landings and not reduce current aircraft capabilities. Demonstrate the feasibility of… more
Abstract:The use of plastic (polyethylene, Polypropylene, polyurethane and poly lactic acid) has grown and continues to grow steadily because of the materials’ high strength-to-weigh ratios, low cost, and ease of molding as compared to conventional natural materials. Unfortunately, almost all commercial… more
Abstract:The Phase 1 grant that serves as a precursor to this proposal, prototyped complex storage techniques for high speed structured data that is being produced in accelerator diagnostics and beam line experiments. It demonstrates the technologies that can be used to archive and retrieve complex data… more
Abstract:ABSTRACT: We propose an algorithm for aimpoint maintenance that is robust to large changes in target aspect as well as scintillation and atmospheric turbulence. The approach makes use of flexible, parametrized vehicle models that are capable of representing a vast array of potential targets.… more
Abstract:The project will prototype a specification editing and discovery tool (SPEEDY) for C/C++ that will assist software developers with modular formal verification tasks by- providing active user interface guidance in writing and editing software specifications, integrated into a common, open IDE… more
Abstract:"The complexity of modern computer systems has grown to the point of stressing human ability to understand their behavior completely. The sheer number of software components (and the myriad interactions between them) that are present on a single desktop computer presents a difficult security… more
Abstract:Software continues to be a weak link in our critical systems. A prudent operator should employ a defense-in-depth strategy whereby"safe"systems are still monitored to detect breaches and respond to them. Unfortunately, such monitoring is challenging in practice, since there is no universal… more
Abstract:The objective of this effort is to develop signal waveform characteristics and processing algorithms that will deduce sensor-invariant attributes of a tracked object so that it can be classified, discriminated and evaluated for engagement. Under our proposed effort, we will develop enhanced radio… more
Abstract:The objective of the proposed research project is to develop novel algorithms and signal processing techniques that will minimize Aegis-to-3G & 4G and 3G & 4G-to-Aegis interference. We will perform an investigation and research of new RF waveform characteristics that could enhance Aegis BMD… more
Abstract:The objective of the proposed program is to develop innovative algorithms and techniques to automatically detect, classify, and uniquely identify emitters exhibiting multi-dimensional agilities, extremely wide band RF distribution, high time-bandwidth coherent characteristics, and solid state power… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.