An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Allen L. Roginsky, Ken Christensen, Mehrgan Mostowfi
On-off scheduling of systems that have the ability to sleep can be used to extend system idle periods and enable greater opportunities for energy savings from sleeping. In this paper, we achieve a theoretical understanding of the delay behavior of on-off
Prevention, detection and response are nowadays considered to be three priority topics for protecting critical infrastructures, such as energy control systems. Despite attempts to address these current issues, there is still a particular lack of
Kevin L. Mills, Christopher E. Dabrowski, James J. Filliben, Sanford P. Ressler
Large infrastructures, such as clouds, can exhibit substantial outages, sometimes due to failure scenarios that were not considered during system design. We define a method that uses a genetic algorithm (GA) to search system simulations for parameter
Bryan M. Barnes, Martin Y. Sohn, Francois R. Goasmat, Hui Zhou, Andras Vladar, Richard M. Silver, Abraham Arceo
Identifying defects in photolithographic patterning is a persistent challenge in semiconductor manufacturing. Well-established optical methods in current use are jeopardized by upcoming sub-20 nm device dimensions. Volumetric processing of focus-resolved
The Ontology Summit 2012 explored the current and potential uses of ontology, its methods and paradigms, in big systems and big data: How ontology can be used to design, develop, and operate such systems. The systems addressed were not just software
Distributed mesh sensor networks provide cost-effective communications for deployment in various smart grid domains, such as home area networks (HAN), neighborhood area networks (NAN), and substation/plant-generation local area networks. This paper
Itzel Dominguez, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
This poster presents some measures of combinatorial coverage that can be helpful in estimating residual risk related to insufficient testing of rare interactions, and a tool for computing these measures.
How does one inspect terabyte-sized 3D images visually from multiple viewpoints? The current solutions are limited to gigabyte-sized images using specialized hardware to achieve interactivity and lacking the ability to share data for collaborative research
This work addresses the problem of re-projecting a terabyte-sized 3D data set represented as a set of 2D Deep Zoom pyramids. In general, a re-projection for small 3D data sets is executed directly in RAM. However, RAM becomes a limiting factor for terabyte
Peter Bajcsy, Antoine Vandecreme, Julien M. Amelot, Phuong T. Nguyen, Joe Chalfoun, Mary C. Brady
We present a characterization of four basic terabyte size image computations on a Hadoop cluster in terms of their relative efficiency according to the modified Amdahls law. The work is motivated by the fact that there is a lack of standard benchmarks and
The Text REtrieval Conference (TREC) is a series of annual workshops designed to build the infrastructure for large-scale evaluation of search systems and thus improve the state-of-the-art. Each workshop is organized around a set "tracks", challenge
The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up of
Jing Qin, Richard M. Silver, Bryan M. Barnes, Hui Zhou, Francois R. Goasmat
There has been much recent work in developing advanced optical metrology methods that use imaging optics for critical dimension measurements and defect detection. Sensitivity to nanometer scale changes has been observed when measuring critical dimensions
National Institute of Standards and Technology (NIST), Hildegard Ferraiolo, David Cooper, Salvatore Francomacaro, Ketan Mehta, Annie W. Sokol
[Superseded by FIPS 201-3 (January 2022) https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=934136] This Standard specifies the architecture and technical requirements for a common identification standard for Federal employees and contractors. The
In this paper we derive an analytical expression for the mean load at each node of an arbitrary undirected graph for the uniform multicommodity flow problem under random walk routing. We show the mean load is linearly dependent on the nodal degree with a
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta, Emad A. Nabbus
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of
John M. Libert, Shahram Orandi, Michael D. Garris, John D. Grantham
As part of NISTs investigative efforts to support development of the FBI Next Generation Identification (NGI) systems, this investigation evaluates effects on image fidelity of wavelet transform decomposition and quality layer options for JPEG 2000
There are now a series of published works related to Differential Fault Attack (DFA) on the Grain family, but most of them require quite a large number (hundreds) of faults (around $n \ln n$, where $n = 80$ for Grain v1 and $n = 128$ for Grain-128, Grain
This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800- 83 Revision 1,Guide to Malware Incident Prevention and Handling for Desktops and Laptops,which gives receommendations for organizations to improve their malware incident
ACT-Touch is a set of manual motor request extensions for ACT-R 6 (Adaptive Control of Thought-Rational, hereafter, ACT-R) . These manual request extensions constitute theoretical claims predicting motor preparation and execution times for certain manual
Ian M. Soboroff, Iadh Ounis, Craig Macdonald, Jimmy Lin
The Microblog track examines search tasks and evaluation methodologies for information seeking behaviors in microblogging environments such as Twitter. It was first introduced in 2011, addressing a real-time adhoc search task, whereby the user wishes to
Brian A. Weiss, Lisa J. Fronczek, Emile L. Morse, Zeid Kootbally, Craig I. Schlenoff
Transformative Apps (TransApps) is a DARPA-funded program whose goal is to develop a range of militarily-relevant software applications ("apps") to enhance the operational-effectiveness of military personnel on (and off) the battlefield. TransApps is also