An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Power Line Communication (PLC) systems provide a bi-directional communication platform capable of delivering data for a variety of Smart Grid applications such as home energy management and intelligent meter reading and control. One benefit of applying
In this paper, we present a multi-gate mesh network architecture that has been developed to ensure high performance and reliability under emergency conditions when a system expects to receive power outage notifications and exchanges. In order to handle the
Mark L. Badger, Timothy Grance, Robert Patt-Corner, Jeffrey M. Voas
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations
Generic 3D shape retrieval is a fundamental research area in the field of content-based 3D model retrieval. The aim of this track is to measure and compare the performance of generic 3D shape retrieval methods implemented by different participants over the
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods implemented by different participants
This bulletin summarizes the information that is included in revised Federal Information Processing Standard 180-4, Secure Hash Standard. The revised standard, announced in a March 6, 2012, Federal Register notice, was approved by the Secretary of Commerce
It has become common practice to automate data acquisition from programmable instrumentation and a range of different software solutions fulfill this task. Many routine measurements require sequential processing of certain tasks, for instance to adjust the
Marcus T. Cicerone, Khaled A. Aamer, Young J. Lee, Eric Vartiainen
Phase retrieval methods are used to recover Raman spectra from multiplex and broadband CARS signals. Two methods are in widespread use, one based on maximum entropy (MEM), and one based on a modified time-domain Kramers-Kronig (TDKK) method. Here we
This paper presents the findings of a study conducted to compare the effects of WSQ and JPEG 2000 compression on 500 ppi fingerprint imagery at a typical operational compression rate of 0.55 bpp (bits per pixel), corresponding to an effective compression
Secret keys can be established through the use of Quantum channels monitored through classical channels which can be thought of as being error free. Because many of the feasible implementation of the quantum channel are subject to erasures often massive-
Iris recognition has the potential to be extremely accurate, but it is highly dependent on the quality of the input data. Iris occlusion, off-axis gaze, blurred images, and iris rotation are common problems that can make recognizing individuals more
In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify the
Allowing selfish agents to acquire and exploit system information has both positive and negative effects on the overall performance of resource allocation systems. The positive effect results from reduction in the uncertainty inherently present in large
This paper reports on work in progress on modeling of the effect of packet-level TCP congestion avoidance dynamics on flow-level Internet performance and management including buffer sizing under arriving/departing flows. The proposed model accounts for the
Patrick J. Grother, George W. Quinn, James R. Matey, Mei L. Ngan, Wayne J. Salamon, Gregory P. Fiumara, Craig I. Watson
Iris recognition has long been held as an accurate and fast biometric. In the first public evaluation of one-to-many iris identification technologies, this third activity in the Iris Exchange (IREX) program has measured the core algorithmic efficacy and
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-144, Guidelines on Security and Privacy in Public Cloud Computing. These new guidelines, which were written by Wayne Jansen of Booz Allen Hamilton and Tim Grance of
David F. Ferraiolo, Jeffrey M. Voas, George Hurlburt
This paper discusses system security policies. System policies are the set of rules that when implemented afford a strategy for the protection of information. The policy objectives are diverse and span the social-economic spectrum. System policies govern
Julien M. Amelot, YaShian Li-Baboud, Clement Vasseur, Jeffrey Fletcher, Dhananjay Anand, James Moyne
The numerous time synchronization performance requirements in the Smart Grid entails the need for a set of common metrics and test methods to verify the ability of the network system and its components to meet the power industry�s accuracy, reliability and
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. Most prominently, shape descriptors are used to describe the geometric and topological properties of objects and compared to determine two
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-153, Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. The publication was written by
George W. Arnold, Gerald FitzPatrick, David A. Wollman, Thomas L. Nelson, Paul A. Boynton, Galen H. Koepke, Allen R. Hefner Jr., Cuong Nguyen, Jeffrey A. Mazer, Dean Prochaska, Marianne M. Swanson, Tanya L. Brewer, Victoria Yan Pillitteri, David H. Su, Nada T. Golmie, Eric D. Simmon, Allan C. Eustis, David Holmberg, Steven T. Bushby, Michael D. Janezic, Ajitkumar Jillavenkatesa
The Energy Independence and Security Act (EISA) of 2007 requires that NIST develop a framework of standards for the Smart Grid. This document is the second release of the framework first published in January, 2010. It covers the activities and outputs of
Angelos Stavrou, Jeff Voas, Tom T. Karygiannis, Stephen Quirolgico
Recent advancements in hardware have increased the computing power, memory, storage, and wireless connectivity of handheld mobile devices. Smart-phone devices are used for everyday activities that range from Maps and Geo-location tagging to banking. Indeed
Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-126 Rev. 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2. This publication was written by David Waltermire and
This brochure describes the Information Technology Laboratory (ITL) at the National Institute of Standards and Technology, its mission, highlights, and research programs.