An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This report provides an example application of screening techniques in experimental computer science, including validation and selection of metrics and measures, the screening experiment itself, and supporting statistical methods. Together with related
Sungseob Lee, SuKyoung Lee, Kim KyungSoo, David W. Griffith, Nada T. Golmie
As data traffic demand in cellular networks grows exponentially, operators need to add new cell sites to keep up; unfortunately, it is costly to build and operate macrocells. Moreover, it may not be possible to obtain the needed approvals for additional
Peter Bajcsy, Antoine Vandecreme, Mary C. Brady, Phuong Nguyen
Our objective is to lower the barrier of executing spatial image computations in a computer cluster/cloud environment instead of in a desktop/laptop computing environment. We research two related problems encountered during an execution of spatial
The major benefits of the emerging cloud computing infrastructure include elimination of the fixed cost and reduction in the marginal cost for the users due to the economy of scale and dynamic resource sharing. This paper argues that these unquestionable
The National Institute of Standards and Technology (NIST), consistent with its mission, has a technology leadership role in support of United States Government (USG) secure and effective adoption of the Cloud Computing model to reduce costs and improve
Kristen Greene, Melissa A. Gallagher, Franklin Tamborello
Given the high propensity of users motoric errors with smaller touchscreen usa-buttons, knowing the endpoint distributions for finger- based pointing and tapping is especially important for higher-fidelity predictive modeling of tasks on such devices. One
Xing Chen, Wei Yu, David W. Griffith, Nada T. Golmie, Guobin Xu, Chao Lu
Recently, there are growing concerns about smart grid security and resilience. The performance of smart grid may suffer from component failures or targeted attacks. A sophisticated adversary may target critical components in a smart grid, leading to
Wei Yu, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu
Developing effective energy resource management in the smart grid is challenging because the entities in both the demand and supply sides experience various uncertainties. This paper addresses the issue of quantifying uncertainties on the energy demand
Performance is an important facet of software quality, and application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling
The most important drawback to code-based cryptography has historically been its large key sizes. Recently, several promising approaches have been proposed to reduce keysizes. In particular, significant keysize reduction has been achieved by using
The World Wide Web (W3C) Web Accessibility Initiative has developed comprehensive guidance on evaluating web accessibility. Web Content Accessibility Guidelines (WCAG) 2.0 specifies the success criteria for evaluating the conformance of web pages. In this
Chris Greer, David A. Wollman, Dean Prochaska, Paul A. Boynton, Jeffrey A. Mazer, Cuong Nguyen, Gerald FitzPatrick, Thomas L. Nelson, Galen H. Koepke, Allen R. Hefner Jr., Victoria Yan Pillitteri, Tanya L. Brewer, Nada T. Golmie, David H. Su, Allan C. Eustis, David Holmberg, Steven T. Bushby
Section 1305 of the Energy Independence and Security Act (EISA) of 2007 (Pub. L. 110-140) directs NIST ‘‘to coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperability of
Users of biometric systems have expanded from traditional law enforcement operators to the general population with diverse backgrounds. Past research has shown that usability is improved when users received real-time system feedback regarding their hand
We intend to use a classic genetic algorithm (GA) to steer a population of cloud-computing simulators into behavioral directions that reveal degraded performance and system collapse. Such a method could serve as a design tool, empowering system engineers
Timothy Blattner, Walid Keyrouz, Joe Chalfoun, Bertrand C. Stivalet, Mary C. Brady, Shujia Zhou
Researchers in various fields are using optical microscopy to acquire very large images, 10K--200K of pixels per side. Optical microscopes acquire these images as grids of overlapping partial images (thousands of pixels per side) that are then stitched
Lingyu Wang, Meng Zhang, Sushil Jajodia, Anoop Singhal, M. Albanese
The interest in diversity as a security mechanism has recently been revived in various applications, such as Moving Target Defense (MTD), resisting worms in sensor networks, and improving the robustness of network routing. However, most existing efforts on
Determining image quality is dependent to some degree on human interpretation. Although entirely subjective methods of evaluating image quality may be adequate for consumer applications, they are not acceptable for security and safety applications where
Recent work has shown that quantum computers can in polynomial time compute scattering probabilities in massive quantum field theories. One can translate this task into a corresponding formal problem in computational complexity theory. Here, we establish
One-time memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but there is
By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.
Approximately 100 IT professionals participated in the 2014 IT Pro Conference on Information Systems Governance, held at the National Institute of Standards and Technology (NIST) on May 22, 2014 (www.computer.org/itproconf). Information systems governance
Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R. White
This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or to find
This paper presents a framework for object recognition using topological persistence. In particular, we show that the so-called persistence diagrams built from functions defined on the objects can serve as compact and informative descriptors for images and
Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third party website by using their SNS
This report is a draft of key tools and methods to assist smart grid system designers in making informed decisions about existing and emerging wireless technologies. An initial set of quantified requirements have been brought together for advanced metering