Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1226 - 1250 of 2294

Quantum Computing

January 28, 2010
Author(s)
Emanuel H. Knill
Imagine a computer that can exploit quantum mechanics to solve previously intractable problems in physics, mathematics and cryptography. Such a quantum computer would revolutionize computing technology while teaching us about fundamental physics and ways

View subspaces for indexing and retrieval of 3D models

January 21, 2010
Author(s)
Helin Dutagaci, Afzal A. Godil, Bulent Sankur, Yucel Yemez
View-based indexing schemes for 3D object retrieval is gaining popularity since they provide good retrieval results. These schemes are coherent with the theory that humans recognize objects based on their 2D appearances. The view-based techniques also

The Semantics of Modules in Common Logic

January 20, 2010
Author(s)
Fabian M. Neuhaus
Common Logic (CL) is an ISO standard that specifies a family of knowledge representation languages. The function of modules within CL is to support local context with a local domains of discourse. Modules play a crucial role since they enable users to

Complex Systems Program Activities Summary, Fiscal Years 2007-2008

January 12, 2010
Author(s)
Sanford P. Ressler
This report summarizes the work of the Complex Systems Program within NIST s Information Technology Laboratory. The Overview presents some background material and a high-level overview of the Program s activities including significant technical

Ephemera

January 11, 2010
Author(s)
Isabel M. Beichl
An editorial on the growing importance of soft errors in software.

A Hybrid Frame Concealment Algorithm for H.264/AVC

January 5, 2010
Author(s)
Hamid Gharavi
In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors, however most of the existing

EDITOR IN CHIEF (EIC) MESSAGE

January 1, 2010
Author(s)
Hamid Gharavi
This Editor In Chief's (EIC) message is expected to appear in the January, 2010 issue of the IEEE Transactions on CAS for Video Technology (TCSVT). The editorial team will be under the leadership of the new EIC for a period of two years.

Proceedings of the Privilege Management Workshop, September 1-3, 2009

January 1, 2010
Author(s)
Tanya L. Brewer, Annie W. Sokol, Sheldon A. Durrant
Privilege management is large and complex, often the source of heated debate and opinion, and fraught with widely-understood, yet ill-defined terminology and concepts. The National Institute of Standards and Technology (NIST) and the National Security

Model of magnetic impurities within the Josephson junction of a phase qubita

December 23, 2009
Author(s)
David P. Pappas, R. P. Erickson
We consider a superconducting phase qubit consisting of a monocrystalline sapphire Josephson junction with symmetry axis perpendicular to the junction interfaces. Via the London gauge we present a theoretical model of Fe3+ magnetic impurities within the

The Science of Interaction

December 15, 2009
Author(s)
Theresa O'Connell, John Stasko, John Dill, William Pike, Alan MacEachren
There is a growing recognition within the visual analytics community that interaction and inquiry are inextricable. It is through the interactive manipulation of a visual interface the analytic discourse that knowledge is constructed, tested, refined, and

SER Performance Analysis for Physical Layer Network Coding over AWGN Channel

December 3, 2009
Author(s)
Yi Qian, Kejie Lu, Shengli Fu, Hsiao-Hwa Chen
While original network coding is proposed over data link layer, recent work suggests that it can also be implemented on physical layer. In fact it is more natural for wireless networks because of its omnidirectional transmission. In this paper, we

Quantitative Imaging to Assess Tumor Response to Therapy: Common Themes of Measurement, Truth Data & Error Sources

December 1, 2009
Author(s)
Charles D. Fenimore, Charles R. Meyer, Samuel G. Armato, Geoffrey McLennan, Luc Bidaut, Daniel P. Barboriak, Marios A. Gavrielides, Nicholas Petrick, Edward F. Jackson, Michael McNitt-Gray, Paul E. Kinahan, Binsheng Zhao
Rationale and Objectives Early detection of tumor response to therapy is a key goal. Finding measurement algorithms capable of early detection of tumor response could individualize therapy treatment as well as reduce the cost of bringing new drugs to

IPv6 Test Methods: General Description and Validation

November 30, 2009
Author(s)
J. S. Nightingale
The USG profile for IPv6 specifies requirements for host, router and network protection devices (NPD) and this document specifies the validation requirements for test methods and test specifications used to test these devices. It has become the practice

Rapidly-Deployable Mesh Network Testbed

November 30, 2009
Author(s)
Michael R. Souryal, Nader Moayeri, Andreas Wapf
This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and military personnel arriving to an incident area, we developed and tested an automated

The Benefits of Network Coding over a Wireless Backbone

November 30, 2009
Author(s)
Hui Guo, Yi Qian, Kejie Lu, Nader Moayeri
Network coding is a promising technology that can effectively improve the efficiency and capacity of multi-hop wireless networks by exploiting the broadcast nature of the wireless medium. However, existing studies have demonstrated that the benefits of

USGv6 Testing Program User's Guide

November 30, 2009
Author(s)
J. S. Nightingale
OMB Memorandum M-05-22 directed the National Institute of Standards and Technology (NIST) to develop the technical infrastructure (standards and testing) necessary to support wide scale adoption of IPv6 in the US Government (USG). Upon detailed inspection

Practical Interdomain Routing Security

November 20, 2009
Author(s)
David R. Kuhn, Simon Liu, Hart Rossman
This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce router

Cybersecurity Fundamentals for Small Business Owners

November 19, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information that was published in NIST Interagency Report (NISTIR) 7621, Small Business Information Security: The Fundamentals, by Richard Kissel. The publication presents three major areas that small businesses should address
Was this page helpful?