An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Roger V. Bostelman, Tsai Hong Hong, Rajmohan Madhavan
The performance evaluation of an obstacle detection and segmentation algorithm is explained upon comparing a new range camera to ground truth. Automated Guided...
John B. Schlager, Norman Sanford, Kristine A. Bertness, Joy Barker, Alexana Roshko, Paul T. Blanchard
Polarization- and temperature-dependent photoluminescence (PL) measurements were performed on individual GaN nanowires. These were grown by catalyst-free...
James S. Albus, Anthony J. Barbera, Harry A. Scott, Stephen B. Balakirsky
Tactical behaviors for autonomous ground and air vehicles are an area of high interest to the Army. They are critical for the inclusion of robots in the Future...
Hui-Min Huang, K Pavek, James S. Albus, Elena R. Messina
The initial construct of the framework for the Autonomy Levels of Unmanned Systems (ALFUS) was presented in the 2004 SPIE3 Defense and Security Symposium. This...
Roger V. Bostelman, Tsai Hong Hong, Rajmohan Madhavan, Tommy Chang, Harry A. Scott
As unmanned ground vehicles take on more and more intelligent tasks, determination of potential obstacles and accurate estimation of their position become...
Craig I. Schlenoff, R Washington, Anthony J. Barbera, C Manteuffel
The level of automation in combat vehicles being developed for the Army?s objective force is greatly increased over the Army?s legacy force. This automation is...
Craig I. Schlenoff, R Washington, Anthony J. Barbera
The level of automation in ground combat vehicles being developed for the Army?s objective force is greatly increased over the Army?s legacy force. The...
James S. Albus, Roger V. Bostelman, Tsai H. Hong, William P. Shackleford, Michael O. Shneier
The National Institute of Standards and Technology's (NIST) Intelligent Systems Division (ISD) has been a part of the Defense Advanced Research Project Agency...
Christopher J. Scrapper Jr, Stephen B. Balakirsky, Elena R. Messina
Urban Search and Rescue Simulation (USARSim) is an open source package that provides a high-resolution, physics based simulation of robotic platforms. The...
In this paper, we describe work in performance standards for urban search and rescue (USAR) robots begun in 2004 by the Department of Homeland Security. This...
Mike Foedisch, Craig I. Schlenoff, Michael O. Shneier
Our previous work on road detection suggests the usage of prior knowledge in order to improve performance. In this paper we will explain our motivation for a...
The National Institute of Standards and Technology (NIST) has several ongoing efforts to address industrial control system security. This paper will present an...
Roger V. Bostelman, Tsai Hong Hong, Rajmohan Madhavan, Brian A. Weiss
Urban search and rescue (US&R) operations can be extremely dangerous for human rescuers during disaster response. Human task forces carrying necessary tools and...
Our previous work on road detection suggests the usage of prior knowledge in order to improve performance. In this paper we will explain our motivation for a...
Sid Venkatesh, David Odendahl, Xun W. Xu, John L. Michaloski, Frederick M. Proctor, Thomas Kramer
A joint effort between Boeing and the National Institute of Standards and Technology (NIST) was undertaken for validating and evaluating STEP AP238 (STEP-NC)...
Roger V. Bostelman, Tsai H. Hong, Rajmohan (. Madhavan, Tommy Chang
As mobile robots have increasingly improved onboard intelligence, they are being used in more flexible manufacturing, warehouse and/or military environments...
For more than 15 years, the Intelligent Systems Division of the National Institute of Standards and Technology (NIST) has worked closely with the Army Research...
End-users and vendors of control systems used in Supervisory Control and Data Acquisition (SCADA) and Industrial Control System(s) (ICS) have expressed concerns...
The goal of this Robot Ontology effort is to develop and begin to populate a neutral knowledge representation (the data structures) capturing relevant...
Hai C. Tang, Roy S. Morgan, Thomas R. Rhodes, Clement Ridoret
The NIST HealthCare Standards Landscape (HCSL) web site is a project to develop and demonstrate a web-based repository of information (called "Landscape") on...
Robert D. Snelick, Leonard E. Gebase, Sydney Henrard
The advent of XML technologies for data exchange negotiations in B2B applications is proliferating a new class of messaging standards that are only fully...
John J. Bollinger, Marie J. Jensen, T Hasegawa, D H. Dubin
We laser cool up to 10 6 9Be + ions to ~ 1 mK in a Penning-Malmberg trap and measure the ion temperature as a function of time after turning off the cooling...
Piet Schmidt, Till P. Rosenband, Jeroen Koelemeij, David Hume, Wayne M. Itano, James C. Bergquist, David J. Wineland
Recently developed techniques for quantum computation using trapped ions allow unprecedented coherent control of the internal and external states of single...
Typical accelerometer calibrations by laser interferometer are performed by measuring displacement at three places on the shaker table. Each of these...
Hui-Min Huang, James S. Albus, Elena R. Messina, Harry A. Scott, Maris Juberts
Intelligent systems operate in uncertain and complex environments. In order to achieve their goals, these systems require rich and updated knowledge about the...
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry J. Hershman, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark, Carl J. Williams
A complete fiber-based polarization encoding quantum key distribution (QKD) system based on the BB84 protocol has been developed at National Institute of...
Proper fire safety design requires the appropriate selection of design fires against which the performance of the building is evaluated. The selection of the...
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies...