Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1301 - 1325 of 2282

From Network Microeconomics to Network Infrastructure Emergence

April 24, 2009
Author(s)
Vladimir V. Marbukh
This paper suggests that evolutionary models of network infrastructure in market economy can be derived from the underlying selfish behavior of users and providers of network services in the same way as non-equilibrium thermodynamics is derived from the

Identities for Negative Moments of Quadratic Forms in Normal Variables

April 15, 2009
Author(s)
Andrew L. Rukhin
Two formulae for the central inverse moments of a Quadratic form in normal variables and of the ratio forms are established. They relate the quadratic form determined by a positive definite matrix to that defined by the inverse matrix.

Quantum Resistant Public Key Cryptography: A Survey

April 14, 2009
Author(s)
Ray A. Perlner, David A. Cooper
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper

An Evaluation of Automated Latent Fingerprint Identification Technology (Phase II)

April 2, 2009
Author(s)
Michael D. Indovina, Vladimir N. Dvornychenko, Elham Tabassi, George W. Quinn, Patrick J. Grother, Stephen Meagher, Michael D. Garris
The National Institute of Standards and Technology (NIST), with the cooperation of eight technology providers, performed a test of accuracy for searching latent fingerprints when using automatically extracted features and matching (AFEM). This test is

A Location-Based Mechanism for Mobile Device Security

March 31, 2009
Author(s)
Wayne Jansen, Vlad Korolev
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device s contents is authentication. This paper describes a location-based

SHREC 09 Track: Structural Shape Retrieval on Watertight Models

March 29, 2009
Author(s)
Afzal A. Godil, Helin Dutagaci, Xiaolan Li, Petros Daras, Ryutarou Ohbuchi, Takahiko Furuya, Masaki Tezuka, Thibault Napoleon
The annual SHape REtrieval Contest (SHREC) measures the performance of 3D model retrieval methods for several different types of models and retrieval purposes. In this contest the structural shape retrieval track focuses on the retrieval of 3d models which

SHREC 2009 - Shape Retrieval Contest of Partial 3D Models

March 29, 2009
Author(s)
Helin Dutagaci, Afzal A. Godil, A. Axenopoulos, P. Daras, T. Furuya, R. Ohbuchi
The objective of the SHREC 09 Shape Retrieval Contest of Partial Models is to compare the performances of algorithms that accept a range image as the query and retrieve relevant 3D models from a database. The use of a range scan as the query addresses a

SHREC'09 Track: Generic Shape Retrieval

March 29, 2009
Author(s)
Afzal A. Godil, Helin Dutagaci
In this paper we present the results of the SHREC 09- Generic Shape Retrieval Contest. The aim of this track was to evaluate the performances of various 3D shape retrieval algorithms on the NIST generic shape benchmark. We hope that the NIST shape

Performance Metrics for IEEE 802.21 Media Independent Handover (MIH) Signaling

March 2, 2009
Author(s)
David W. Griffith, Richard A. Rouil, Nada T. Golmie
The IEEE 802.21 Media Independent Handover (MIH) working group is developing a set of mechanisms to facilitate migration of mobile users between access networks that use different link-layer technologies. Among these are mobility managers that create and

Static Analyzers in Software Engineering

March 2, 2009
Author(s)
Paul E. Black
Static analyzers can report possible problems in code and help reinforce good practices of developers. We contrast the strengths of static analyzers with testing and indicate the current state of the art.

2039: A Day in the Life of a Usability Engineer

February 24, 2009
Author(s)
Theresa O'Connell, E Murphy, R Roske-Shelton
As we approach the end of the fourth decade of the twenty-first century, intelligent agents will handle most of the time-consuming drudge work of usability engineering, freeing usability engineers (UEs) to focus on the mental work of analysis and usability

Common Biometric Exchange Formats Framework Standardization

February 13, 2009
Author(s)
Fernando L. Podio, Fred Herr
Common Biometric Exchange Formats Framework (CBEFF) provides a standardized set of definitions and procedures that support the interchange of biometric data in standard data structures called CBEFF biometric information records (BIRs). CBEFF permits

Security of Cell Phones and PDAs

January 29, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information disseminated in NIST Special Publication (SP) 800-124, Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology, which was written by Wayne Jansen and Karen

A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms

January 28, 2009
Author(s)
Kotikalapudi Sriram, Oliver Borchert, Patrick Gleichmann, Douglas C. Montgomery
We present an evaluation methodology for comparison of existing and proposed new algorithms for Border Gateway Protocol (BGP) anomaly detection and robustness. A variety of algorithms and alert tools have been proposed and/or prototyped recently. They

Information Technology Laboratory Brochure

January 21, 2009
Author(s)
Elizabeth B. Lennon
This brochure describes the Information Technology Laboratory (ITL) at NIST, including mission, core competencies, resources, products, and customers. It details ITL's eight programs and concludes with contact information.
Was this page helpful?