Research Menu

.
Skip Search Box

Technology Profile Fact Sheets

As a part of the Technology Transfer effort, the NSA Technology Transfer Program (NTTP) Office has created Technology Profile Fact Sheets, which describes technologies available for transfer.

  1. Method of Combining Databases of Transcribed Speech
  2. Method of Converting a Computer Program with Loops to One without Loops
  3. Wideband Mixer-Circulator Retro-reflector
  4. Mapping Tool
  5. Method of Fabricating Nanometer Patterned Device Using Sacrificial Spacer Layer
  6. Method of Visualizing a Software Program
  7. Method of Generating a Non-Deterministic Random Number
  8. Method for Improving Performance of Virtual Machines
  9. All-Digital Audio Power Amplifier with Random Switching
  10. Method of fabricating an optical device using multiple sacrificial spacer layers
  11. Via Construction to Dampen Cavity Modes in Printed Circuit Boards
  12. Method of Detecting Duplicate Voice Recordings
  13. Method for More Efficient Processing of Binary BCH Codes
  14. Retrieving Electronic Data during Enhanced Note Taking
  15. Wireless Intrusion Detection System
  16. IRC Characterization and Behavior Observation Tool
  17. Three-dimensional Microsystem and Method of Fabrication
  18. Automatically Describing and Categorizing the Topic of Text
  19. Environmental Time Synchronization Protocol
  20. Double Use Tamper Indicating Bag
  21. Circuit Preparation for Imaging of Cell Structures Represented in Polysilicon Active Layers and First Level Metal
  22. Method of Modeling Single Class Data from Multi-class Data
  23. Garnet Imager Stage
  24. L-band F1:F1 Repeater
  25. Method of Distinguishing Handwritten and Machine-Printed Images
  26. Tokeneer Password Modification
  27. Low Cost Single Die-level Plating Process for Integrated Circuits
  28. High Speed Model-Free Optical Character Recognition (OCR) Technique For Arabic Script
  29. Fabricating Very High Density Double-Sided Multi Layered Flex Interconnect
  30. Low-Pass Fiber Optics to Chip Alignment
  31. Dual Counter Mode: A new mode for pipelined encryption and data integrity
  32. Re-useable Tamper Indicating Label Fixture
  33. High density, high performance multilayer flex
  34. Device for forward scattered electron imaging (FSEI) in a scanning electron microscope
  35. Method to Find Stepping Stones By Comparing Network Latency Times from Different Protocol Stack Layers
  36. Mode Transition-Discrimination Photonic Logic Device
  37. Method of Fabricating Waveguide using Sacrificial Spacer Layer
  38. Method of Fabricating Turning Mirror Using a Sacrificial Spacer Layer (S2L) and device
  39. Lightweight Process for Interactive Vector Correlation
  40. Method for measuring gain of photonic inverters
  41. Summary Text Extract Association Metric (STEAM)
  42. Determining semiconductor- Laser Facet Reflectivity after Reflectance Modification
  43. Method of Coating Multiple Optical Device Facets with Dielectric Layers
  44. Method of Image Binarization Using Histogram Modeling
  45. Shredder Residue Dispersion System (SRDS)
  46. Aladdin Tagger
  47. A process for identifying software delivered over a computer network and mechanism for governing its execution
  48. Method of Fabricating and Integrating High-Quality Decoupling Capacitors
  49. Method of bumping a thin wafer
  50. Aladdin Name Matcher - Name Matching by Normalization of Both Query and Data
  51. Method of Generating Multiple Random Bit Sequences
  52. Transliterated Names: An Automated System for Generating Multiple Spellings of Name Components
  53. Multiverse
  54. STE Service Interrupt Circuit (SIC)
  55. Battery Isolator and Switch
  56. Generic Multi-Network Channel Simulator
  57. NetTop®
  58. Classification of Machine-Printed and Handwritten Text for Document Images
  59. Renoir: General Network Visualization and Manipulation Program
  60. All-fiber tunable bandpass filter
  61. Enhanced Beacon Recognition for Laser Communications
  62. Method of Identifying All Minimum-Cost Cutsets in a Network
  63. Method for Storage and Reconstruction of the Extended Hamming Code for an 8-dimensional Lattice Quantizer
  64. Vertical-cavity surface-emitting laser employing native oxide of Group III-V semiconductor
  65. Method of Summarizing Text Using Just the Text
  66. Syllable Rate Speech Activity Detector
  67. Method of Acknowledging, Reassembling and Transmitting Data Packets
  68. Method of Efficiently Increasing Readability of FrameMaker® Graphical User Interface
  69. Method of Extracting Text Present in a Color Image
  70. Secure Printing or Improved Process of Printing Impress Encoded Documents
  71. ATM Mapping and Monitoring Tool
  72. Network Anomaly Detection Algorithm
  73. Gaussian Model-based Image Binarization
  74. Electronic Connector That Minimizes Bent Pins (For PCMCIA Cards)
  75. Information Sorting and Retrieval by Language or Topic
  76. Method of Metallizing a Diamond Substrate without Using a Refractory Metal
  77. PCMCIA Card Connector
  78. Recovering an Integrated Circuits (ICs) Gate-Level Netlist from a Transistor-Level Netlist Using the EXTRACT Algorithm
  79. Technique for Correcting Symbol Errors in Formatted Modem Transmissions Using Soft Decisions
  80. Two Dimensional Display of a Three Dimensional Toroidal Interconnection Network
  81. Visualization and Analysis of Associated Information
  82. Wafer and Die Thinning Technology
  83. Wafer Level Coating Designed to Protect Integrated Circuits from Reverse Engineering
  84. Autonomous Metadata Producer
  85. Device for high resolution scanning transmission electron microscopy in a scanning electron microscope
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15 2009

 
bottom

National Security Agency / Central Security Service