An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This ITL Bulletins describes the recent update of NISTIR 7298, Glossary of Key Information Security Terms. NISTIR 7298, Revision 2, provides a summary glossary of terms used in NIST publications and other relevant sources.
In wireless propagation, the multipath arrivals of a transmitted signal appear clustered at the receiver. Because the notion of clusters tends to be intuitive rather than well-defined, cluster identification in channel modeling has traditionally been
Content-based 3D object retrieval has be- come an active topic in many research communities. In this paper, we propose a novel visual similarity based 3Dshaperetrievalmethod(CM-BOF)usingClockMatch- ing and Bag-of-Features. Specifically, pose normaliza-
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods based on a large scale hand-drawn sketch
Elaine B. Barker, Lidong Chen, Allen L. Roginsky, Miles Smid
This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu- Vanstone(MQV) key establishment schemes. [Supersedes SP
Kevin L. Mills, Christopher E. Dabrowski, Darrin J. Santay
The recent explosion of affordable multicore, multichip systems, coupled with cluster management software, encourages the development of novel distributed applications for exploring large parameter spaces. We expect many such applications will soon appear
P J. Phillips, Challa Sastry, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
n this paper, we present an approach that simulta- neously clusters images and learns dictionaries from the clusters. The method learns dictionaries in the Radon transform domain, while clustering in the image domain. The main feature of the proposed
Richard A. Rouil, Antonio Izquierdo Manzanares, Michael R. Souryal, Camillo Gentile, David W. Griffith, Nada T. Golmie
As governments plan nationwide, interoperable broadband networks for their public safety services, the challenge arises of determining how and where to invest limited resources to meet demanding requirements. The United States is at the early stages of
Yi-Kai Liu, Stephen P. Jordan, Pawel Wocjan, Adam Bookatz
A quantum expander is a unital quantum channel that is rapidly mixing, has only a few Kraus operators, and can be implemented efficiently on a quantum computer. We consider the problem of estimating the mixing time (i.e., the spectral gap) of a quantum
Dynamic resource sharing has both positive and negative effects on the system performance. Current research mostly concentrates on the positive effect resulting from the statistical multiplexing gain. However, the negative effect resulting from the
Programmers routinely omit run-time safety checks from applications because they assume that these safety checks would degrade performance. The simplest example is the use of arrays or array-like data structures that do not enforce the constraint that
Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities, and
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the
This work describes the design and implementation of an auction system using secure multiparty computation techniques. Our aim is to produce a system that is practical under actual eld constraints on computation, mem- ory, and communication. The underlying
Fabian M. Neuhaus, Amanda Vizedom, Ken Baclawski, Mike Bennet, Mike Dean, Michael Denny, Michael Gruninger, Ali Hashemi, Terry Longstreth, Leo Obrst, Steven R. Ray, Ram D. Sriram, Todd Schneider, Marcela Vegetti, Matthew West, Peter Yim
Currently, there is no agreed on methodology for development of ontologies, and there is no consensus on how ontologies should be evaluated. Consequently, evaluation techniques and tools are not widely utilized in the development of ontologies. This can
This ITL Bulletin for May 2013 announces the publication of NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Developed by the Joint Task Force Transformation Initiative
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Janet Hoin, Lisa Jackson, Mike Lesko, Joe Morrissey, Leo Norton, Beth Owens, Joe Polski, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the
Susan M. Ballou, Margaret C. Kline, Mark D. Stolorow, Melissa Taylor, Shannan Williams, Phylis S. Bamberger, Burney Yvette, Larry Brown, Cynthia E. Jones, Ralph Keaton, William Kiley, Karen Thiessen, Gerry LaPorte, Joseph Latta, Linda E. Ledray, Randy Nagy, Linda Schwind, Stephanie Stoiloff, Brian Ostrom
The report of the Technical Working Group on Biological Evidence Preservation offers guidance for individuals involved in the collection, examination, tracking, packaging, storing, and disposition of biological evidence. This may include crime scene
In this paper, we present a novel design framework aimed at developing cooperative diversity in 802.11-based wireless sensor networks. The proposed scheme is a combination of a time-reversed Space-Time Block Code (TR STBC) scheme at the physical layer
This ITL Bulletin describes a new ITL publication, NISTIR 7511, Revision 3, Ssecurity Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements.
P J. Phillips, Yi-Chen Chen, Vishal M. Patel, Jaishanker K. Pillai, Rama Chellappa
We propose a novel dictionary-based learning method for ambiguously labeled multiclass classification, where each training sample has multiple labels and only one of them is the correct label. The dictionary learning problem is solved using an iterative