NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In this paper, we present a systematic design structure for high-density ad hoc networks aimed at achieving full cooperative diversity, based on which the PHY, MAC and Network layers of the system are specifically tailored. For the latter in particular, we
A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the non-linearity of a circuit - as measured by the number of non-linear gates it contains - is reduced. The second step reduces the
This report summarizes the work of the Complex Systems Program within NIST s Information Technology Laboratory. The Overview presents some background material and a high-level overview of the Program s activities including significant technical
Digital images are commonly used to represent scientific data. Typically, high resolution images with many square pixels are considered to be necessary under the assumption that the increased precision of such images yields increased accuracy to the viewer
Kevin L. Mills, James J. Filliben, Dong Y. Cho, Edward J. Schwartz, Daniel I. Genin
This study describes a coherent set of modeling and analysis methods to investigate the behavior of large distributed systems. The methods are applied to compare several proposed Internet congestion-control mechanisms operating under a wide range of
Statistical modeling of Ultra-Wideband (UWB) signals is undertaken to examine the existence of short term fading and shadowing. Based on the data collected from multiple locations and 4 different sites using a single transmitter and a 96-element receiving
In December, 2008, the FBI provided MITRE with an extract of submissions of deceased persons. The submissions contain face images of subjects with multiple encounters over time. The type 10 records (face and SMT) are mostly frontal or near frontal face
In this paper we describe a novel 3D shape retrieval method based on Multi-scale Integral Orientations. In our approach, a 3D model after normalization is represented by a set of depth images captured uniformly on a unit circle. Then the shape descriptor
In this paper we present the results of the Shape Retrieval Contest 10 (SHREC 10) of Generic 3D Warehouse. The aim of this track was to evaluate the performances of various 3D shape retrieval algorithms on a large Generic benchmark based on the Google 3D
Helin Dutagaci, Afzal A. Godil, Chun Pan (Benny) Cheung
The SHREC 10 Shape Retrieval Contest of Range Scans aims at comparing algorithms that match a range scan to complete 3D models in a target database. The queries are range scans of real objects, and the objective is to retrieve complete 3D models that are
In Orthogonal Frequency Division Multiplex (OFDM) wireless networks such as 3GPP LTE and IEEE 802.16 WiMAX, the scheduler should allocate more resources to users with lower channel quality, such as users near the edge of the Base Station (BS) coverage area
Paul D. Over, George M. Awad, Jonathan G. Fiscus, Martial Michel, Alan Smeaton, Wessel Kraaij
The TREC Video Retrieval Evaluation (TRECVID) 2009 was a TREC-style video analysis and retrieval evaluation, the goal of which was to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. 63 teams from various
Michael S. Allman, Fabio Altomare, Jed D. Whittaker, Katarina Cicak, Dale Li, Adam J. Sirois, Joshua Strong, John D. Teufel, Raymond W. Simmonds
We demonstrate coherent tunable coupling between a superconducting phase qubit and a lumpedelement resonator. The coupling strength is mediated by a flux-biased rf SQUID operated in the nonhysteretic regime. By tuning the applied flux bias to the rf SQUID
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Written by Erika McCallister, Tim Grance, and Karen Scarfone of NIST, the
This paper presents a Bayesian framework and a pricing structure for a secondary wireless user that opportunistically uses a RF channel belonging to a network of N primary users. The secondary user operates in a time-slotted fashion, where each time slot
Erika McCallister, Timothy Grance, Karen A. Scarfone
The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The document explains the importance of protecting the confidentiality of PII in the context
Quantum information systems are commonly operated in conventional communication bands (1310 and 1550 nm) over an optical fiber to take advantage of low transmission loss. However, the detection and spectral measurement of single photons in these
A method is suggested for constructing a conservative confidence region for the parameters of a general linear model. In meta-analytical applications, when the results of independent but heterogeneous studies are to be combined, this region can be employed
Praveen Gauruvarum, John M. Kelsey, L. Knudsen, S. Thomsen
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum functions
This document is based on the discussions and conclusions of the Privilege (Access) Management Workshop held on 1-3 September, 2009 at the Gaithersburg, Maryland facilities of the National Institute of Standards and Technology (NIST), sponsored by NIST and
In today's digital economy, data enters and leaves enterprises' cyberspace at record rates. For a typical enterprise, millions of emails are sent and received and thousands of files are downloaded, saved or transferred via various channels or devices on a