Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Conferences

Torsion Balance Test of Couplings to Spin

Author(s)
Blayne R. Heckel, Eric G. Adelberger, William A. Terrano, Claire E. Cramer
This article describes constraints on possible new spin-coupled interactions using a torsion pendulum with approximately 1 × 1023 polarized electrons.

Predicting Segmentation Accuracy for Biological Cell Images

Author(s)
Adele P. Peskin, Alden A. Dima, Joe Chalfoun, John T. Elliott
We have performed segmentation procedures on a large number of images from two mammalian cell lines that were seeded at low density, in order to study trends in...

Speeding up the Wide-Pipe: Secure and Fast Hashing

Author(s)
Mridul Nandi, Souradyuti Paul
In this paper we propose a new sequential mode of operation – the Fast wide pipe or FWP for short - to hash messages of arbitrary length. The mode is shown to...

Toward Objective Global Privacy Standards

Author(s)
Ari M. Schwartz
Technical standards offer a new ability to support the important public policy goal of better protecting privacy. To do so most effectively, we must begin to...

Modeling Affiliations in Networks

Author(s)
Brian D. Cloteaux
One way to help understand the structure of certain networks is to examine what common group memberships the actors in the network share. Linking actors to...

How to Model a TCP/IP Network Using Only 20 Parameters

Author(s)
Kevin L. Mills, Edward J. Schwartz, Jian Yuan
Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values. Such models are difficult to...

Characterization of high-purity, pulsed squeezed light at telecom wavelengths from pp-KTP for quantum information applications

Author(s)
Thomas Gerrits, Burm Baek, Martin J. Stevens, Brice R. Calkins, Adriana E. Lita, Scott C. Glancy, Emanuel H. Knill, Sae Woo Nam, Richard P. Mirin, Robert Hadfield, Ryan Bennink, Warren Grice, Sander N. Dorenbos, Tony Zijlstra, Teun Klapwijk, Val Zwiller
Pure optical squeezing in a single mode is highly desirable for quantum information applications such as continuous variable quantum computing and the...

Cryptanalysis of the ESSENCE Family of Hash Functions

Author(s)
Nicky Mouha , Gautham Sekar, Jean-Philippe Aumasson , Thomas Peyrin, Soren S. Thomsen , Meltem Sonmez Turan, Bart Preneel
ESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST's SHA-3 competition. This paper presents the first known attacks on...

A Meta-Analysis of Face Recognition Covariates

Author(s)
Yui M. Lui, David Bolme, Bruce A. Draper, J. R. Beveridge, Geof H. Givens, P. Jonathon Phillips
This paper presents a meta-analysis for covariates that affect performance of face recognition algorithms. Our review of the literature found six covariates for...
Was this page helpful?