Computer Science and Telecommunications Board's research while affiliated with United States University and other places

Publications (25)

Book
Computing in some form touches nearly every aspect of day to day life and is reflected in the ubiquitous use of cell phones, the expansion of automation into many industries, and the vast amounts of data that are routinely gathered about people's health, education, and buying habits. Computing is now a part of nearly every occupation, not only thos...
Book
Following a series of natural disasters, including Hurricane Katrina, that revealed shortcomings in the nation's ability to effectively alert populations at risk, Congress passed the Warning, Alert, and Response Network (WARN) Act in 2006. Today, new technologies such as smart phones and social media platforms offer new ways to communicate with the...
Book
The field of computer science (CS) is currently experiencing a surge in undergraduate degree production and course enrollments, which is straining program resources at many institutions and causing concern among faculty and administrators about how best to respond to the rapidly growing demand. There is also significant interest about what this gro...
Book
The need to manage, analyze, and extract knowledge from data is pervasive across industry, government, and academia. Scientists, engineers, and executives routinely encounter enormous volumes of data, and new techniques and tools are emerging to create knowledge out of these data, some of them capable of working with real-time streams of data. The...
Book
Recent years have yielded significant advances in computing and communication technologies, with profound impacts on society. Technology is transforming the way we work, play, and interact with others. From these technological capabilities, new industries, organizational forms, and business models are emerging. Technological advances can create eno...
Book
Advanced computing capabilities are used to tackle a rapidly growing range of challenging science and engineering problems, many of which are compute- and data-intensive as well. Demand for advanced computing has been growing for all types and capabilities of systems, from large numbers of single commodity nodes to jobs requiring thousands of cores...
Book
The Department of Commerce operates two telecommunications research laboratories located at the Department of Commerce's Boulder, Colorado, campus: the National Telecommunications and Information Administration's (NTIA's) Institute for Telecommunications Sciences (ITS) and the National Institute of Standards and Technology's (NIST's) Communications...
Book
The 2006 National Research Council report Renewing U.S. Telecommunications Research observed that "the telecommunications industry remains of crucial importance to the United States as a society, that a strong telecommunications research capability continues to be essential to the health and competitiveness of this U.S. industry internationally, an...
Book
The Bulk Collection of Signals Intelligence: Technical Options study is a result of an activity called for in Presidential Policy Directive 28 (PPD-28), issued by President Obama in January 2014, to evaluate U.S. signals intelligence practices. The directive instructed the Office of the Director of National Intelligence (ODNI) to produce a report w...
Book
Advanced computing capabilities are used to tackle a rapidly growing range of challenging science and engineering problems, many of which are compute- and data-intensive as well. Demand for advanced computing has been growing for all types and capabilities of systems, from large numbers of single commodity nodes to jobs requiring thousands of cores...
Book
Emerging and Readily Available Technologies and National Security is a study on the ethical, legal, and societal issues relating to the research on, development of, and use of rapidly changing technologies with low barriers of entry that have potential military application, such as information technologies, synthetic biology, and nanotechnology. Th...
Book
The Next Generation Air Transportation System (NextGen) is an effort begun in 2003 whose goals include improving the capacity, efficiency, and safety of the U.S. air transportation system and also enabling reduction in noise, pollution, and energy use. The Federal Aviation Administration and various stakeholders, including equipment providers, airl...
Book
Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed; the role of assessment...
Book
Information technology (IT) is widely understood to be the enabling technology of the 21st century. IT has transformed, and continues to transform, all aspects of our lives: commerce and finance, education, employment, energy, health care, manufacturing, government, national security, transportation, communications, entertainment, science, and engi...
Book
Combustion has provided society with most of its energy needs for millenia, from igniting the fires of cave dwellers to propelling the rockets that traveled to the Moon. Even in the face of climate change and the increasing availability of alternative energy sources, fossil fuels will continue to be used for many decades. However, they will likely...
Book
The end of dramatic exponential growth in single-processor performance marks the end of the dominance of the single microprocessor in computing. The era of sequential computing must give way to a new era in which parallelism is at the forefront. Although important scientific and engineering challenges lie ahead, this is an opportune time for innova...
Book
The use of radio-frequency communication--commonly referred to as wireless communication--is becoming more pervasive as well as more economically and socially important. Technological progress over many decades has enabled the deployment of several successive generations of cellular telephone technology, which is now used by many billions of people...
Book
Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and priva...
Book
In the military, information technology (IT) has enabled profound advances in weapons systems and the management and operation of the defense enterprise. A significant portion of the Department of Defense (DOD) budget is spent on capabilities acquired as commercial IT commodities, developmental IT systems that support a broad range of warfighting a...
Book
This report is the first phase of a larger project to conduct a broad, multidisciplinary examination of deterrence strategies and their possible utility to the U.S. government in its policies toward preventing cyberattacks. This first phase identifies the key issues and questions that merit examination. The next phase will engage experts to prepare...
Book
Improving State Voter Registration Databases outlines several actions that are needed to help make voter registration databases capable of sharing information within state agencies and across state lines. These include short-term changes to improve education, dissemination of information, and administrative processes, and long-term changes to make...
Book
The U.S. information technology (IT) research and development (R&D) ecosystem was the envy of the world in 1995. However, this position of leadership is not a birthright, and it is now under pressure. In recent years, the rapid globalization of markets, labor pools, and capital flows have encouraged many strong national competitors. During the same...
Book
All U.S. agencies with counterterrorism programs that collect or "mine" personal data -- such as phone records or Web sites visited -- should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassif...
Book
This report grew out of a National Research Council (NRC) project titled "Managing Vulnerabilities Arising from Global Infrastructure Interdependencies: Learning from Y2K." In mid-1998 the NRC initiated planning meetings to take advantage of what was then perceived as "an extraordinary opportunity to learn how various factors, including current man...
Book
The Domain Name System (DNS) enables user-friendly alphanumeric names-domain names-to be assigned to Internet sites. Many of these names have gained economic, social, and political value, leading to conflicts over their ownership, especially names containing trademarked terms. Congress, in P.L. 105-305, directed the Department of Commerce to reques...

Citations

... Just as sensors and physical computing have revolutionized science and engineering, so too do they offer the potential for students to engage in meaningful scientific inquiry activities in ways that resemble the work of contemporary scientists [2][3][4]. With growing emphasis on providing computer science education to all students [5], these technologies also enable instructional activities that integrate computing in deep and meaningful ways. This is especially true as sensors and microcontrollers drop in price with the rise in home technology hobbyist and maker movements [6]. ...
... Despite an ever-increasing demand for STEM and computer science workers, a concerning number of students in these disciplines leave the field before finishing their degree, sometimes citing discrimination and unwelcome environments [1]. Only around half of students enrolled in these programs actually graduate with the degree [2]. Underrepresented minorities (URM) are disproportionately represented in this group. ...
... Data on the status and condition of ecosystems are needed to identify trends, manage threats, and as a basis for adaptation strategies (Karl et al., 2012;Verstraete et al., 2011). Data-enabled advances include the development of predictive models of ecosystem change (Peck et al., 2019;Peters et al., 2020), seasonal and long-term forecasts (Ash et al., 2007;Dietze et al., 2018), quantitative benchmarks Webb et al., 2020), and decision-support frameworks for assessing management trade-offs and synergies (Musumba et al., 2017). There is now a great opportunity to improve ecosystem research and management through data systems that leverage modern cyberinfrastructure (i.e., networked software and hardware computational systems, servers, and databases; Atkins, 2003) and contemporary data sharing ideals (i.e., findable, accessible, interoperable, and reusable [FAIR]; Wilkinson et al., 2016) to aggregate data across communities, interactively connect data to models, and integrate data and models with decision-support tools. ...
... Starting with CHEMKIN-A Chemical Kinetics Software Package, developed by Sandia National Laboratories in the 1960s, standardisation of the kinetic and thermodynamic data format allowed for the widespread use of such software packages for modelling combustion. This was further facilitated by the software being open and made available on the world wide web (an informative historical description can be found by Council [614] and we have also recently reviewed the various databases available online at present [615]). These approaches have allowed experimental and increasingly powerful computational approaches to provide insights into soot formation. ...
... These tools, though, can also have direct negative effects. For example, teams comprised of both in-person and remote workers marginalize the remote members, who may be remote due to family care or other needs (Mortensen & Haas, 2021). Technology-based electronic monitoring threatens to further disadvantage vulnerable worker populations (Ravid et al., 2020(Ravid et al., , 2022. ...
... Since the interviews, phishing sites have adopted to HTTPS Everywhere, and the majority of phishing sites are now SSL enabled according to the Anti Phishing Working Group (APWG) [61]. The purpose of certificates on the web was to authenticate domain names when they were considered critical signposts in cyberspace (to quote the title of the National Academies report [62]). Now, with HTTPS Everywhere, web certificates play less of a role in distinguishing legitimate sites due to the misconception of HTTPS Everywhere. ...
... This data collection system organized job titles into more than 1,102 occupations as of July 2020 and down to 1016 occupational listings as of June 2021 [3]. As more workers seek to enter the cybersecurity labor force or think of themselves as cybersecurity professionals based on their roles, experience, and specific expertise, some seek activities related to professionalization leading to certifications [4]. Certifications can be driven by an employer's needs and requirements or by the government objectives to manage the workforce and establish a baseline for technical skills verifying federal workforce knowledge through standard certification [5] or to incorporate specific activities, occupations, and work roles into its operations [6]. ...
... Very large-scale text data management and analysis has been one of the frontiers for current and future research (Council, 2016) due to the availability of millions of documents in digital libraries, such as MEDLINE/PubMed (Karami et al., 2019a), and billions of comments and posts in social media such as Facebook and Twitter discussing different issues such as health (Karami and Shaw, 2019;Karami et al., 2018b), organizations (Karami and Collins, 2018), politics (Karami and Elkouri, 2019), and natural disasters (Karami et al., 2019b). While these large datasets provide extremely useful and valuable resources for researchers, there is a need to develop new approaches for processing high dimensional data. ...