An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Paul D. Over, George M. Awad, Jonathan G. Fiscus, Martial Michel, Alan Smeaton, Wessel Kraaij
The TREC Video Retrieval Evaluation (TRECVID) 2009 was a TREC-style video analysis and retrieval evaluation, the goal of which was to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. 63 teams from various
Michael S. Allman, Fabio Altomare, Jed D. Whittaker, Katarina Cicak, Dale Li, Adam J. Sirois, Joshua Strong, John D. Teufel, Raymond W. Simmonds
We demonstrate coherent tunable coupling between a superconducting phase qubit and a lumpedelement resonator. The coupling strength is mediated by a flux-biased rf SQUID operated in the nonhysteretic regime. By tuning the applied flux bias to the rf SQUID
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Written by Erika McCallister, Tim Grance, and Karen Scarfone of NIST, the
This paper presents a Bayesian framework and a pricing structure for a secondary wireless user that opportunistically uses a RF channel belonging to a network of N primary users. The secondary user operates in a time-slotted fashion, where each time slot
Erika McCallister, Timothy Grance, Karen A. Scarfone
The purpose of this document is to assist Federal agencies in protecting the confidentiality of personally identifiable information (PII) in information systems. The document explains the importance of protecting the confidentiality of PII in the context
Quantum information systems are commonly operated in conventional communication bands (1310 and 1550 nm) over an optical fiber to take advantage of low transmission loss. However, the detection and spectral measurement of single photons in these
A method is suggested for constructing a conservative confidence region for the parameters of a general linear model. In meta-analytical applications, when the results of independent but heterogeneous studies are to be combined, this region can be employed
Praveen Gauruvarum, John M. Kelsey, L. Knudsen, S. Thomsen
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum functions
This document is based on the discussions and conclusions of the Privilege (Access) Management Workshop held on 1-3 September, 2009 at the Gaithersburg, Maryland facilities of the National Institute of Standards and Technology (NIST), sponsored by NIST and
In today's digital economy, data enters and leaves enterprises' cyberspace at record rates. For a typical enterprise, millions of emails are sent and received and thousands of files are downloaded, saved or transferred via various channels or devices on a
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-37, Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. Developed by NIST in partnership with
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publications.
We propose a new method to narrow the linewidth of entangled photons from spontaneous parametric down conversion incorporated with an internal Bragg grating. We study and show that it is a promising way to generate narrow-line entangled photons.
A method is presented for computing pseudo-watershed lines that can be used for linking pixels that have been identified as edge pixels with the Canny edge detector. An additional procedure is also described for filling breaks that may still exist between
Joe Chalfoun, Antonio Cardone, Alden A. Dima, Michael Halter, Daniel P. Allen
In order to facilitate the extraction of quantitative data from live cell image sets, automated image analysis methods are needed. This paper presents an overlap-based cell tracking algorithm that has the ability to track cells across a set of time-lapse
This report summarizes the technical work of the Mathematical and Computational Sciences Division (MCSD) of NIST s Information Technology Laboratory. Part I (Overview) provides a high-level overview of the Division s activities, including highlights of
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing
Raju V. Datla, Ruediger Kessel, Allan W. Smith, Raghu N. Kacker, D. B. Pollock
Climate change monitoring requires long time series radiometric measurements using multiple optical sensors in multiple platforms covering the globe over decades. The problem of achieving traceability to SI units for these measurements is discussed. A
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs),which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion structure
Joe Chalfoun, Antonio Cardone, Alden A. Dima, Michael Halter, Daniel P. Allen
In order to facilitate the extraction of quantitative data from live cell image sets, automated image analysis methods are needed. This paper presents an introduction to the general principle of an overlap cell tracking software developed by NIST. This
John M. Kelsey, Andrew R. Regenscheid, Tal Moran, David Chaum
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three end-to-end voting systems: Punchscan, Pret-a-Voter, and Threeballot. We also demonstrate a