Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1076 - 1100 of 2294

Identity Management and Privacy: A Rare Opportunity To Get It Right

June 1, 2011
Author(s)
Ari M. Schwartz
Since 1976, when Whitfield Diffie and Martin Helleman, first surmised the possibilities for the potential uses for digital signatures in an IEEE publication, there has been ongoing discussion of building an online identity management structure. As use of

Linear Dispersion Codes for Asynchronous Cooperative MIMO Systems

June 1, 2011
Author(s)
Hamid Gharavi
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs), which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion

Multigate Communication Network For Smart Grid

June 1, 2011
Author(s)
Hamid Gharavi
It is envisioned that one of the most important issues in Smart Grid will be to design a network architecture that is capable of providing secure and reliable two-way communication from meters to other Smart Grid domains. While networking technologies and

Scanning the Issue Smart Grid: The Electric Energy System of the Future

June 1, 2011
Author(s)
Hamid Gharavi
This is an editorial article for a special issue on smart grid. The main objective is to report on some, if not all, of smart grid future technical challenges. While acknowledging its limited coverage, this issue offers a wide range of interesting

Selective Pixel Interpolation for Spatial Error Concealment

June 1, 2011
Author(s)
Hamid Gharavi, Yi Ge, Bo Yan, Kairan Sun
This paper proposes an effective algorithm for spatial error concealment with accurate edge detection and partitioning interpolation. Firstly, a new method is used for detecting possible edge pixels and their matching pixels around the lost block. Then

Computer Security Division 2010 Annual Report

May 31, 2011
Author(s)
Patrick D. O'Reilly
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.

Healthcare Information Technology Standards: General Suitability Analysis

May 31, 2011
Author(s)
Liora Alschuler
The methodology described in this document was produced and developed by Lantana Consulting Group for the National Institute of Standards and Technology (NIST). It is part of a series of suitability analsyses on four healthcare standards performed under

Templated CDA:Key Concept for Interoperability

May 31, 2011
Author(s)
Liora Alschuler
This document supplements information about “templated CDA” in the context of the Healthcare Information Technology (HIT) Standards Analysis Project carried out by Lantana Consulting Group for the National Institute of Standards and Technology (NIST).

Modeling queuing dynamics of TCP: a simple model and its empirical validation.

May 6, 2011
Author(s)
Daniel I. Genin, Anastase Nakassis
Understanding queuing dynamics of TCP is important for correct router buffer sizing as well as for optimizing the performance of the TCP protocol itself. However, modeling of buffer content dynamics under TCP has received relatively little attention given

Multigate Mesh Routing for Smart Grid Last Mile Communications

May 1, 2011
Author(s)
Hamid Gharavi, Bin Hu
One of the most important issues in Smart Grid is to provide consumers with the knowledge of their energy usage, as well as allowing the utility to monitor and control the electric system components with real time status. This would require the design of a

TRECVID 2010 - An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics

April 15, 2011
Author(s)
Paul D. Over, George M. Awad, Jonathan G. Fiscus, Brian Antonishek, Martial Michel, Alan Smeaton, Wessel Kraaij, Georges Quenot
The TREC Video Retrieval Evaluation (TRECVID) 2010 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last 10

SHREC11 Track: Generic Shape Retrieval

April 14, 2011
Author(s)
Helin Dutagaci, Afzal A. Godil
In this paper we present the results of the 3D Shape Retrieval Contest 2011 (SHREC’11) track on generic shape retrieval. The aim of this track is to evaluate the performance of 3D shape retrieval algorithms that can operate on arbitrary 3D models. The

Evaluation of 3D Interest Point Detection Techniques

April 7, 2011
Author(s)
Helin Dutagaci, Chun Pan (Benny) Cheung, Afzal A. Godil
In this paper, we compare the results of five 3D interest point detection techniques to the interest points marked by human subjects. This comparison is used to quantitatively evaluate the interest point detection algorithms. We asked human subjects to

Salient Local 3D Features for 3D Shape Retrieval

April 7, 2011
Author(s)
Afzal A. Godil, Asim Wagan
In this paper we describe a new formulation for the 3D salient local features based on the voxel grid inspired by the Scale Invariant Feature Transform (SIFT). We use it to identify the salient keypoints (invariant points) on a 3D voxelized model and

Specification for the Open Checklist Interactive Language (OCIL) Version 2.0

April 7, 2011
Author(s)
David A. Waltermire, Karen Scarfone, Maria Casipe
This report defines version 2.0 of the Open Checklist Interactive Language (OCIL). The intent of OCIL is to provide a standardized basis for expressing questionnaires and related information, such as answers to questions and final questionnaire results, so

RFID-based Localization and Tracking Technologies

April 1, 2011
Author(s)
Michael R. Souryal, Lionel M. Ni, Dian Zhang
Radio Frequency Identification (RFID) usually incorporates a tag into an object for the purpose of identification or localization using radio signals. It has gained a lot of attention recently due to its advantages in terms of low cost and easy deployment

Information Leakage Through the Domain Name System

March 31, 2011
Author(s)
Scott W. Rose, Anastase Nakassis, Ramaswamy Chandramouli
The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network attack. An attacker can query an organization's DNS as reconnaissance before attacking hosts on a
Was this page helpful?