An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
P J. Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, Geof H. Givens, Yui M. Lui, Hao Zhang, W T. Scruggs, Kevin W. Bowyer, Patrick J. Flynn, Su L. Cheng
Face recognition is appearing in personal and commercial products at an astonishing rate, yet reliable face recognition remains challenging. Users expect a lot; they want to snap pictures and have their friends, family and acquaintances recognized. This
Multivariate Public Key Cryptography (MPKC) has become one of a few options for security in the quantum model of computing. Though a few multivariate systems have resisted years of effort from the cryptanalytic community, many such systems have fallen to a
David F. Ferraiolo, Serban I. Gavrila, Wayne Jansen
Although access control (AC) currently plays an important role in securing DSs, if properly envisaged and designed, access control can serve a more vital role in computing than one might expect. The Policy Machine (PM), a framework for AC developed at NIST
Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeff Voas
In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including libraries
Chapter 1 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document
Chapter 2 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document
Chapter 14 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the
Preface and Appendices A and B in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing
Chapter 7 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document
Kamran Sayrafian, Hamid Mahboubi, Jalal Habibi, Amir Aghdam
This paper proposes efficient schemes to increase sensing coverage in a network composed of both mobile and static sensors. The proposed deployment techniques properly assign a virtual weight to every point in the sensing field, based on the information
This ITL Bulletins describes the recent update of NISTIR 7298, Glossary of Key Information Security Terms. NISTIR 7298, Revision 2, provides a summary glossary of terms used in NIST publications and other relevant sources.
In wireless propagation, the multipath arrivals of a transmitted signal appear clustered at the receiver. Because the notion of clusters tends to be intuitive rather than well-defined, cluster identification in channel modeling has traditionally been
Content-based 3D object retrieval has be- come an active topic in many research communities. In this paper, we propose a novel visual similarity based 3Dshaperetrievalmethod(CM-BOF)usingClockMatch- ing and Bag-of-Features. Specifically, pose normaliza-
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods based on a large scale hand-drawn sketch
Elaine B. Barker, Lidong Chen, Allen L. Roginsky, Miles Smid
This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu- Vanstone(MQV) key establishment schemes. [Supersedes SP
Kevin L. Mills, Christopher E. Dabrowski, Darrin J. Santay
The recent explosion of affordable multicore, multichip systems, coupled with cluster management software, encourages the development of novel distributed applications for exploring large parameter spaces. We expect many such applications will soon appear
P J. Phillips, Challa Sastry, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
n this paper, we present an approach that simulta- neously clusters images and learns dictionaries from the clusters. The method learns dictionaries in the Radon transform domain, while clustering in the image domain. The main feature of the proposed
Richard A. Rouil, Antonio Izquierdo Manzanares, Michael R. Souryal, Camillo Gentile, David W. Griffith, Nada T. Golmie
As governments plan nationwide, interoperable broadband networks for their public safety services, the challenge arises of determining how and where to invest limited resources to meet demanding requirements. The United States is at the early stages of
Yi-Kai Liu, Stephen P. Jordan, Pawel Wocjan, Adam Bookatz
A quantum expander is a unital quantum channel that is rapidly mixing, has only a few Kraus operators, and can be implemented efficiently on a quantum computer. We consider the problem of estimating the mixing time (i.e., the spectral gap) of a quantum
Dynamic resource sharing has both positive and negative effects on the system performance. Current research mostly concentrates on the positive effect resulting from the statistical multiplexing gain. However, the negative effect resulting from the
Programmers routinely omit run-time safety checks from applications because they assume that these safety checks would degrade performance. The simplest example is the use of arrays or array-like data structures that do not enforce the constraint that
Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities, and
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the
This work describes the design and implementation of an auction system using secure multiparty computation techniques. Our aim is to produce a system that is practical under actual eld constraints on computation, mem- ory, and communication. The underlying