An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Fabian M. Neuhaus, Amanda Vizedom, Ken Baclawski, Mike Bennet, Mike Dean, Michael Denny, Michael Gruninger, Ali Hashemi, Terry Longstreth, Leo Obrst, Steven R. Ray, Ram D. Sriram, Todd Schneider, Marcela Vegetti, Matthew West, Peter Yim
Currently, there is no agreed on methodology for development of ontologies, and there is no consensus on how ontologies should be evaluated. Consequently, evaluation techniques and tools are not widely utilized in the development of ontologies. This can
This ITL Bulletin for May 2013 announces the publication of NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Developed by the Joint Task Force Transformation Initiative
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Janet Hoin, Lisa Jackson, Mike Lesko, Joe Morrissey, Leo Norton, Beth Owens, Joe Polski, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the
Susan M. Ballou, Margaret C. Kline, Mark D. Stolorow, Melissa Taylor, Shannan Williams, Phylis S. Bamberger, Burney Yvette, Larry Brown, Cynthia E. Jones, Ralph Keaton, William Kiley, Karen Thiessen, Gerry LaPorte, Joseph Latta, Linda E. Ledray, Randy Nagy, Linda Schwind, Stephanie Stoiloff, Brian Ostrom
The report of the Technical Working Group on Biological Evidence Preservation offers guidance for individuals involved in the collection, examination, tracking, packaging, storing, and disposition of biological evidence. This may include crime scene
In this paper, we present a novel design framework aimed at developing cooperative diversity in 802.11-based wireless sensor networks. The proposed scheme is a combination of a time-reversed Space-Time Block Code (TR STBC) scheme at the physical layer
This ITL Bulletin describes a new ITL publication, NISTIR 7511, Revision 3, Ssecurity Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements.
P J. Phillips, Yi-Chen Chen, Vishal M. Patel, Jaishanker K. Pillai, Rama Chellappa
We propose a novel dictionary-based learning method for ambiguously labeled multiclass classification, where each training sample has multiple labels and only one of them is the correct label. The dictionary learning problem is solved using an iterative
A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit as measured by the number of non-linear gates it contains is reduced. The second step reduces the number
Richard M. Silver, Bryan M. Barnes, Francois R. Goasmat, Hui Zhou, Martin Y. Sohn
The semiconductor manufacturing industry is now facing serious challenges in achieving defect detection rates with acceptable throughput and accuracy. With conventional bright-field and dark- field inspection methods now at their limits, it has become
This ITL Bulletin describes the Cybersecurity Framework that NIST is developing to reduce cyber risks to our nation's critical infrastructure and announces the first Cybersecurity Framework Workshop.
Application profiling tools are the instruments used to measure software performance at the function and application levels. Without careful configuration of the tools and the environment, invalid results are readily obtained. The errors may not become
We demonstrate a fast-responding Kerr phase gate using a room-temperature 85Rb vapor operated in a Raman gain scheme where the probe/signal wave travels superluminally. Continuously controllable nonlinear Kerr phase shift of the probe wave from 0 to π
Walid Keyrouz, Timothy J. Blattner, Bertrand C. Stivalet, Joe Chalfoun, Mary C. Brady, Shujia Zhou
We present a hybrid CPU-GPU approach for the Fourier-based stitching of optical microscopy images. This system achieves sub-minute stitching rates with large grids; it stitches a grid of 59x42 tiles in 26 seconds on a two-CPU (8 physical cores) & two-GPU
This paper presents a dynamically updating key distribution strategy to enhance mesh network security against cyber attacks. The scheme has been applied to two security protocols known as Simultaneous Authentication of Equals (SAE) and Efficient Mesh
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
The Latent Interoperability Transmission Specification (LITS) is an application profile of the American National Standards Institute/National Institute of Standards and Technology, Information Technology Laboratory (ANSI/NIST-ITL) standard entitled
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
This document provides instructions for latent print examiners in marking friction ridge features to maximize consistency among examiners. This document builds upon the Extended Feature Set (EFS) defined in American National Standards Institute/National
This bulletin summarizes the information presented in NISTIR 7817, A Credential Reliability and Revocation Model for Federated Identities, written by Hildegard Ferraiolo. The publication analyzes the different types of digital credentials used in
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them for forensic analysis. In this paper, we show how to map evidence graphs to
Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help
Joe Chalfoun, Alden A. Dima, Marcin Kociolek, Michael W. Halter, Antonio Cardone, Adele P. Peskin, Peter Bajcsy, Mary C. Brady
We present a new method for segmenting phase contrast images of NIH 3T3 fibroblast cells that is accurate even when cells are in contact. The problem of segmentation, when cells are in contact, poses a challenge to the accurate automation of cell counting
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, John Mayer-Splain, Rachel Wallner, Peter Komarinski
This specification defines Extended Feature Set (EFS) Profiles - sets of features to be used in latent friction ridge (fingerprint, palmprint or plantar) searches of automated friction ridge identification systems (AFIS). The EFS Profiles are designed to
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-133, Recommendation for Cryptographic Key Generation. The publication helps federal government organizations generate the cryptographic keys that are to be used with