Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1326 - 1350 of 2294

Performance Metrics for IEEE 802.21 Media Independent Handover (MIH) Signaling

March 2, 2009
Author(s)
David W. Griffith, Richard A. Rouil, Nada T. Golmie
The IEEE 802.21 Media Independent Handover (MIH) working group is developing a set of mechanisms to facilitate migration of mobile users between access networks that use different link-layer technologies. Among these are mobility managers that create and

Static Analyzers in Software Engineering

March 2, 2009
Author(s)
Paul E. Black
Static analyzers can report possible problems in code and help reinforce good practices of developers. We contrast the strengths of static analyzers with testing and indicate the current state of the art.

2039: A Day in the Life of a Usability Engineer

February 24, 2009
Author(s)
Theresa O'Connell, E Murphy, R Roske-Shelton
As we approach the end of the fourth decade of the twenty-first century, intelligent agents will handle most of the time-consuming drudge work of usability engineering, freeing usability engineers (UEs) to focus on the mental work of analysis and usability

Common Biometric Exchange Formats Framework Standardization

February 13, 2009
Author(s)
Fernando L. Podio, Fred Herr
Common Biometric Exchange Formats Framework (CBEFF) provides a standardized set of definitions and procedures that support the interchange of biometric data in standard data structures called CBEFF biometric information records (BIRs). CBEFF permits

Security of Cell Phones and PDAs

January 29, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information disseminated in NIST Special Publication (SP) 800-124, Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology, which was written by Wayne Jansen and Karen

A Comparative Analysis of BGP Anomaly Detection and Robustness Algorithms

January 28, 2009
Author(s)
Kotikalapudi Sriram, Oliver Borchert, Patrick Gleichmann, Douglas C. Montgomery
We present an evaluation methodology for comparison of existing and proposed new algorithms for Border Gateway Protocol (BGP) anomaly detection and robustness. A variety of algorithms and alert tools have been proposed and/or prototyped recently. They

Information Technology Laboratory Brochure

January 21, 2009
Author(s)
Elizabeth B. Lennon
This brochure describes the Information Technology Laboratory (ITL) at NIST, including mission, core competencies, resources, products, and customers. It details ITL's eight programs and concludes with contact information.

Introducing "Insecure IT"

January 20, 2009
Author(s)
David R. Kuhn, Hart Rossman, Simon Liu
This article introduces a new department for IT Professional that will cover security in IT systems, ranging from desktops to global e-commerce networks. Our goal is to offer ideas to improve IT security, both by looking at ways it can go wrong as well as

Slap Fingerprint Segmentation Evaluation II - Procedures and Results

January 12, 2009
Author(s)
Craig I. Watson
In 2004, NIST conducted a fingerprint slap segmentation study [1] to assess the state-of-the-art in fingerprint segmentation technology. Given the development of new technology it has become necessary to reassess the current state-of-the-art of

On The Security Performance of Physical-Layer Network Coding

January 5, 2009
Author(s)
Yi Qian, Kejie Lu, Shengli Fu, Tao Zhang
Physical-layer network coding (PLNC) is a novel wireless communication technology, in which multiple transmitters can send signals on the same channel to the same receiver at the same time. Our previous studies have revealed that PLNC can substantially

Optimization of photon pair generation in dual-element PPKTP waveguide1

January 5, 2009
Author(s)
Xiao Tang, Oliver T. Slattery, Lijun Ma
A compact scheme for high-speed frequency doubling and down-conversion on a single dual-element PPKTP waveguide is investigated. Optimal temperature is achieved and photon pair coincidence is observed at over GHz repetition rate with pulsed pump input

Building Quantum Computers

December 1, 2008
Author(s)
Emanuel H. Knill
In theory, quantum computers can be used to efficiently factor numbers, quadratically speed up many search and optimization problems, and enable currently impossible physics simulations. At first, quantum states appeared to be too fragile for implementing

Overview of the TREC 2007 Question Answering Track

December 1, 2008
Author(s)
Hoa T. Dang, Diane Kelly, Jimmy Lin
The TREC 2007 question answering (QA) track contained two tasks: the main task consisting of series of factoid, list, and ``Other'' questions organized around a set of targets, and the complex, interactive question answering (ciQA) task. The main task

A Novel Topology Control Scheme for Future Wireless Mesh Networks

November 30, 2008
Author(s)
Yi Qian, Kejie Lu, Tao Zhang, Shengli Fu
In this paper, we address the topology control issue for future wireless mesh networks (WMNs) based on the principle of service-oriented design. In particular, we propose a novel topology control scheme that attempts to maximize the overall throughput in

A Secure VANET MAC Protocol for DSRC Applications

November 30, 2008
Author(s)
Yi Qian, Nader Moayeri, Kejie Lu
Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in active safety systems that increase passenger safety by exchanging warning messages

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

November 30, 2008
Author(s)
Michael R. Souryal, Huiqing You
We propose a non-coherent receiver for the fixed detect-and-forward relay channel and derive a closed-form tight upper bound on its bit error probability in Rayleigh fading channels. Using this upper bound, we show that the receiver achieves nearly full
Was this page helpful?