An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Password management is the ubiquitous struggle of the modern human. Despite usability playing a vital role in authentication, many password policies and requirements focus on security without sufficient consideration of human factors. In fact, security and
The generation stage of the user password management lifecycle is arguably the most important yet perilous step. Fulfilling minimum length and character type requirements while attempting to create something memorable can become an arduous task, leaving
Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-73-4: Interfaces for Personal Identity Verification and NIST SP 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification. SP 800-73-4 has been updated to align
This paper presents an effective and simple image resizing method. Our method is an improved version of seam carving that changes the backtracking basis of seam carving. We use a Scale Invariant Feature Transform (SIFT) feature in our method. SIFT key
Image retargeting attempts to adapt images to different devices while preserving the salient contents. Most existing methods address retargeting of a single image. In this paper, we propose a novel image retargeting method for resizing a pair of stereo
Christofer J. McGinnis, Dylan J. Yaga, Fernando L. Podio
Conformance testing measures whether an implementation faithfully implements the technical requirements defined in a standard. Conformance testing provides developers, users, and purchasers with increased levels of confidence in product quality and
Robert Gao, Lihui Wang, Roberto Teti, David Dornfeld, Soundar Kumara, Masahiko Mori, Moneer Helu
Advanced manufacturing depends on the timely acquisition, distribution, and utilization of information from machines and processes across spatial boundaries for improved accuracy and reliability in predicting resource needs and allocation, maintenance
Paul E. Black, Irena V. Bojanova, Yaacov Yesha, Yan Wu
High-confidence systems must not be vulnerable to attacks that reduce the security, reliability, or availability of the system as a whole. One collection of vulnerabilities is the Common Weakness Enumeration (CWE). It represents a considerable community
Jon M. Boyens, Celia Paulsen, Larry Feldman, Greg Witte
This bulletin summarizes the information presented in NIST SP 800-161, Supply Chain Management Practices for Federal Information Systems and Organizations, written by Jon Boyens and Celia Paulsen. The publication provides guidance to federal agencies on
There has been a growing interest in the deployment of Phasor Measurement Units (PMUs) in a Distributed Generation (DG) grid system. The main obstacle is the lack of a communication network infrastructure that can support phasor measurements for
Shahram Orandi, John M. Libert, Michael Garris, John Grantham, Frederick R. Byers
The document describes the procedure by which applications of JPEG 2000 CODECs will be evaluated with respect to conformance to the NIST guidance for compression of 1000 ppi friction ridge images as detailed in NIST Special Publication 500-289 [NIST5]
In this era of inter-connectivity where almost everybody, everything, and anything are networked, Cyber-Physical Systems (CPS) also known as the Internet of Things (IoT) have emerged as vital systems that use information systems to observe and modify the
In this treatise, we focus our attention on the cooperative uplink transmissions of systems beyond the LTE-Advanced initiative. We commence a unified treatment of the principle of single-carrier frequency-division multiple-access (FDMA) and the
Bonita V. Saunders, Brian Antonishek, Qiming Wang, Bruce R. Miller
In 1997 the National Institute of Standards and Technology (NIST) embarked on a huge project to replace one of the most cited resources for mathematical, physical and engineering scientists, the Handbook of Mathematical Functions with Formulas, Graphs, and
This incoming Editor In Chief's (EIC) message is expected to appear in the next issue of the IEEE wireless communications. The editorial team will be under the leadership of the new EIC for a period of three years.
The ability to share precise models of suppliers manufacturing service capability (MSC) information is necessary to develop reliable methods that enable Original Equipment Manufacturers (OEMs) to efficiently configure agile and responsive supply chains
The objective of the SHREC'15 Range Scans based 3D Shape Retrieval track is to evaluate algorithms that match range scans of real objects to complete 3D mesh models in a target dataset. The task is to retrieve a rank list of complete 3D models that are of
Kristen Greene, Joshua M. Franklin, John M. Kelsey
Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics
Nathan A. Hotaling, Kapil Bharti, Haydn Kriel, Carl G. Simon Jr.
Despite the growing use of nanofiber scaffolds for tissue engineering applications, there is not a validated, readily available (commercial or open source) solution for rapid, automated analysis of nanofiber diameter from scanning electron microscope (SEM)
We propose a novel shape optimization algorithm for region-based active contour models. Region-based active contours are preferred for many segmentation problems, because they incorporate more global information by aggregating cues or statistics over the
Jon Hagar, Thomas Wissink, D. Richard Kuhn, Raghu N. Kacker
A two-year study of eight pilot projects to introduce combinatorial testing in a large aerospace corporation found that the new methods were practical, significantly lowered development costs, and improved test coverage by 20 to 50 percent.
The Text REtrieval Conference (TREC) Clinical Decision Support Track fosters research on systems that link electronic health records with information that is relevant for patient care. TREC 2014 is the initial year of the track. The focus of the first year
Facial gender classification is an area studied in the Face Recognition Vendor Test (FRVT) with Still Facial Images Track. While peripheral to automated face recognition, it has become a growing area of research, given its potential use in various