Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

Optimization of Registration Performance Metrics

Author(s)
Marek Franaszek, Geraldine Cheok
Perception systems are a very important component of automation and robotics. These systems localize objects in its local coordinate frame and the data has to

A Rational Foundation for Software Metrology

Author(s)
David W. Flater, Paul E. Black, Elizabeth N. Fong, Raghu N. Kacker, Vadim Okun, Stephen S. Wood, David R. Kuhn
Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for

A metamodel for optimization problems

Author(s)
Ibrahim Assouroko, Peter O. Denno
In mathematics, computer science, and operations research, mathematical optimization is the process of finding best feasible values (oftentimes maxima or minima

NIST Time and Frequency Bulletin

Author(s)
Karen L. Hansen Lichtfuss
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST

Cloud-based Accessibility for Voting Applications

Author(s)
Shanee T. Dawkins, Sharon J. Laskowski
Since its creation, the National Institute on Disability and Rehabilitation Research (NIDRR) of the U.S. Department of Education (ED) has supported the

Trusted Geolocation in the Cloud: Proof of Concept Implementation

Author(s)
Michael Bartock, Murugiah Souppaya, Raghuram Yeluri, Uttam Shetty, James Greene, Steve Orrin, Hemma Prafullchandra, John McLeese, Jason Mills, Daniel Carayiannis, Tarik Williams, Karen Scarfone
This publication explains selected security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. It then

Policy Machine: Features, Architecture, and Specification

Author(s)
David F. Ferraiolo, Serban I. Gavrila, Wayne Jansen
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of

The NIST Plan for Providing Public Access to Results of Federally Funded Research

Author(s)
Katherine E. Sharpless, Regina L. Avila, Sally S. Bruce, Wo L. Chang, Robert M. Dimeo, Virginia Covahey, Alan K. Dohne, Heather M. Evans, Aaron P. Fein, Donna J. Kimball, Andrea M. Medina-Smith, Alan E. Munter, James K. Olthoff, Dianne L. Poster, Kathleen M. Roberts, Susannah B. Schiller, John H. Scott, Barbara P. Silcox, James A. St Pierre, Mark D. Stiles
Documentation of the evolution of NIST's plan for providing public access to results of federally funded research is provided, including the plan itself

De-Identification of Personal Information

Author(s)
Simson L. Garfinkel
Abstract: De-identification removes identifying information from a dataset so that individual data cannot be linked with specific individuals. De-identification
Was this page helpful?