An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Leonard M. Hanssen, Benjamin K. Tsai, Sergey Mekhontsev
A new capability for the measurement of the temperature-dependent emittance of specular samples in the near infrared spectral region has been developed in NIST...
Benjamin K. Tsai, Kenneth G. Kreider, William A. Kimes
The advent of the cable-less lightpipe radiation thermometer (CLRT) has resulted in a significant improvement in the accuracy of lightpipe radiation thermometer...
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, Ronald Boisvert, Charles W. Clark, Carl J. Williams, A Gross, E Hagley, J Wen
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the...
Maciej Myslinski, Dominique Schreurs, Catherine A. Remley, Michael McKinley, Bart Nauwelaers
This work presents a large-signal time-domain behavioral model of an off-the-shelf RF amplifier based on QPSK-like multisine measurements. The multisine has...
P J. Phillips, P J. Flynn, W T. Scruggs, K W. Bowyer, J S. Chang, K Hoffman, J Marques, J Min, W Worek
Over the last couple of years, face recognition researchers have been developing new techniques, such as recognition from three-dimensional and high resolution...
With the mass deploy of cameras, concern has risen about protecting a person's privacy as he goes about his daily life. Many of the cameras are installed to...
This paper describes an approach for relaying in multihop networks that adapts to the time-varying channel and exploits spatial diversity to mitigate multipath...
Designers of distributed software systems often rely on server replicas for increased robustness, scalability, and performance. Replicated server architectures...
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of...
Jun-Feng Song, Theodore V. Vorburger, Li Ma, John M. Libert, Susan M. Ballou
Based on the maximum cross-correlation function, CCFmax, a new parameter called signature difference, Ds, is developed for verifying the similarity of the 2D...
Interest in dense sensor networks due to falling price and reduced size has motivated research in sensor location in recent years. While many algorithms can be...
A challenge for search systems is to detect not only when an item is relevant to the user's information need, but also when it contains something new which the...
Our goal is to produce metrics for measuring the effectiveness of software tools and environments produced for the intelligence community. To this end we need...
We begin this expository essay by reviewing with examples what a typical engineer already knows about statistics. We then consider a central question in...
Embedding metadata within a media file format becomes evermore popular for digital media. Traditional digital media files such as MP3 songs and JPEG photos do...
As a qubit is a two-level system whose state space is spanned by and , so a qudit is a -level system whose state space is spanned by ,..., . Quantum computation...
There is a clear need for evaluation methodologies specifically suited to ubiquitous computing applications. Here we investigate a user evaluation framework we...
A simple technique to estimate the position of a given mobile source inside a building is based on the received signal strength. For this methodology to have a...
The XML metadata technology of describing media contents has emerged as a dominant mode of making media searchable both for human and machine consumptions. To...
We begin this expository essay by reviewing with examples what a typical engineer already knows about statistics. We then consider a central question in...
In this paper we examine the performance of robot systems that use two different techniques for situation awareness for operators of robots in an urban search...
For the past two years we have been involved in evaluation of software technologies designed to improve analysis. We have been conducting evaluations both in...
The National Software Reference Library (NSRL) of the U.S. National Institute of Standards and Technology (NIST) collects software from various sources and...
The Federal Building and Fire Safety Investigation of the World Trade Center Disaster is currently essentially completed. The pre-collapse progression was...
Adriana Hornikova, Nien F. Zhang, Michael J. Welch, Susan S. Tai
NIST Standard Reference Materials (SRM) are certified reference materials that are developed at NIST and provided to laboratories (industry, government and...
Kotikalapudi Sriram, David W. Griffith, G Di lorenzo, Oliver Borchert, Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the...
Kotikalapudi Sriram, David W. Griffith, Oliver Borchert, G Dilorenzo, R Su, Nada T. Golmie
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric...