An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit as measured by the number of non-linear gates it contains is reduced. The second step reduces the number
Richard M. Silver, Bryan M. Barnes, Francois R. Goasmat, Hui Zhou, Martin Y. Sohn
The semiconductor manufacturing industry is now facing serious challenges in achieving defect detection rates with acceptable throughput and accuracy. With conventional bright-field and dark- field inspection methods now at their limits, it has become
This ITL Bulletin describes the Cybersecurity Framework that NIST is developing to reduce cyber risks to our nation's critical infrastructure and announces the first Cybersecurity Framework Workshop.
Application profiling tools are the instruments used to measure software performance at the function and application levels. Without careful configuration of the tools and the environment, invalid results are readily obtained. The errors may not become
We demonstrate a fast-responding Kerr phase gate using a room-temperature 85Rb vapor operated in a Raman gain scheme where the probe/signal wave travels superluminally. Continuously controllable nonlinear Kerr phase shift of the probe wave from 0 to π
Walid Keyrouz, Timothy J. Blattner, Bertrand C. Stivalet, Joe Chalfoun, Mary C. Brady, Shujia Zhou
We present a hybrid CPU-GPU approach for the Fourier-based stitching of optical microscopy images. This system achieves sub-minute stitching rates with large grids; it stitches a grid of 59x42 tiles in 26 seconds on a two-CPU (8 physical cores) & two-GPU
This paper presents a dynamically updating key distribution strategy to enhance mesh network security against cyber attacks. The scheme has been applied to two security protocols known as Simultaneous Authentication of Equals (SAE) and Efficient Mesh
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
The Latent Interoperability Transmission Specification (LITS) is an application profile of the American National Standards Institute/National Institute of Standards and Technology, Information Technology Laboratory (ANSI/NIST-ITL) standard entitled
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
This document provides instructions for latent print examiners in marking friction ridge features to maximize consistency among examiners. This document builds upon the Extended Feature Set (EFS) defined in American National Standards Institute/National
This bulletin summarizes the information presented in NISTIR 7817, A Credential Reliability and Revocation Model for Federated Identities, written by Hildegard Ferraiolo. The publication analyzes the different types of digital credentials used in
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them for forensic analysis. In this paper, we show how to map evidence graphs to
Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help
Joe Chalfoun, Alden A. Dima, Marcin Kociolek, Michael W. Halter, Antonio Cardone, Adele P. Peskin, Peter Bajcsy, Mary C. Brady
We present a new method for segmenting phase contrast images of NIH 3T3 fibroblast cells that is accurate even when cells are in contact. The problem of segmentation, when cells are in contact, poses a challenge to the accurate automation of cell counting
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, John Mayer-Splain, Rachel Wallner, Peter Komarinski
This specification defines Extended Feature Set (EFS) Profiles - sets of features to be used in latent friction ridge (fingerprint, palmprint or plantar) searches of automated friction ridge identification systems (AFIS). The EFS Profiles are designed to
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-133, Recommendation for Cryptographic Key Generation. The publication helps federal government organizations generate the cryptographic keys that are to be used with
Paul D. Over, Johan Oomen, Wessel Kraaij, Alan Smeaton
Audiovisual archives are investing in large-scale digitisation efforts of their analogue holdings and in parallel ingest an ever-increasing amount of born-digital files in their digital storage facilities. Digitisation opened up new access paradigms and
Ian M. Soboroff, Dean P. McCullough, Jimmy Lin, Craig Macdonald, Iadh Ounis, Richard McCreadie
Twitter offers a phenomenal platform for the social sharing of information. We describe new resources that have been created in the context of the Text Retrieval Conference (TREC) to support the academic study of Twitter as a real-time information source
Spurred by the 2006 Miner Act, reliable two-way communications in mines has drawn the interest of network engineers in recent years. Critical to the design of these systems is an accurate channel propagation model. Given the elementary geometry seen in
Following the seminal success of the H.264/MPEG-4 advanced video coding (AVC) and its significant commercial impact on the IT industry, ISO/IEC SC29/WG11 (MPEG) and ITU-T SG16/Q6 (VCEG) began working together to develop the next generation video coding
In this paper we firstly propose a general model to combat the Inter-Symbol Interference (ISI) caused by frequency selective channels in a Multi-InputMulti-Output (MIMO) system and/or by asynchronous cooperative transmissions. The general model is not only
Camillo A. Gentile, David W. Griffith, Michael R. Souryal
The projected use of the power grid for smart applications such as advanced metering and distributed automation will require highly reliable, secure, well-designed and managed communication networks. While many of the benefits of wireless communications
A large number of Identity Management Systems (IDMSs) are being deployed worldwide that use different technologies for the population of their users. With the diverse set of technologies, and the unique business requirements for organizations to federate
We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utilize a
David G. Harris, Francis Sullivan, Isabel M. Beichl
The reliability polynomial of a graph measures the number of its connected subgraphs of various sizes. Algortihms based on sequential importance sampling (SIS) have been proposed to estimate a graph's reliahbility polynomial. We develop an improved SIS
Jie Lin, Guobin Xu, David W. Griffith, Xinyu Yang, Wei Yu
The Smart Grid is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. It promises to integrate distributed energy resources with conventional generation plants, and intelligently transmit energy