An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We have proposed a superseding algorithm approach for image analysis of the pore size distribution (PSD) of porous media. This approach adapts the intrinsic definition of skeletonization for an object representation to the characterization of the PSD, and
This document and NIST Special Publication 800-50, Building an Information Technology Security Awareness and Training Program describe the following key approaches of an information security awareness and training program that federal departments and
David W. Griffith, Richard A. Rouil, Nada T. Golmie
The IEEE 802.21 Media Independent Handover (MIH) working group is developing a set of mechanisms to facilitate migration of mobile users between access networks that use different link-layer technologies. Among these are mobility managers that create and
Static analyzers can report possible problems in code and help reinforce good practices of developers. We contrast the strengths of static analyzers with testing and indicate the current state of the art.
This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-116, A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS), written by William MacGregor of NIST, Ketan Mehta of Mehta, Inc., and
As we approach the end of the fourth decade of the twenty-first century, intelligent agents will handle most of the time-consuming drudge work of usability engineering, freeing usability engineers (UEs) to focus on the mental work of analysis and usability
Common Biometric Exchange Formats Framework (CBEFF) provides a standardized set of definitions and procedures that support the interchange of biometric data in standard data structures called CBEFF biometric information records (BIRs). CBEFF permits
The 2008 Performance Metrics for Intelligent Systems (PerMIS'08) Workshop is the eighth in the series that started in 2000 targeted at defining measures and methodologies of evaluating performance of intelligent systems. PerMIS focused on applications of
SuKyoung Lee, Kotikalapudi Sriram, Kyungsoo Kim, JongHyup Lee, YoonHyuk Kim, Nada T. Golmie
There are currently a large variety of wireless access networks, including the emerging Vehicular Adhoc Networks (VANETs). A large variety of applications utilizing these networks will demand features such as real-time, high-availability and even
This bulletin summarizes the information disseminated in NIST Special Publication (SP) 800-124, Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology, which was written by Wayne Jansen and Karen
Kotikalapudi Sriram, Oliver Borchert, Patrick Gleichmann, Douglas C. Montgomery
We present an evaluation methodology for comparison of existing and proposed new algorithms for Border Gateway Protocol (BGP) anomaly detection and robustness. A variety of algorithms and alert tools have been proposed and/or prototyped recently. They
This brochure describes the Information Technology Laboratory (ITL) at NIST, including mission, core competencies, resources, products, and customers. It details ITL's eight programs and concludes with contact information.
In large-scale grid systems with decentralized control, the interactions of many service providers and consumers will likely lead to emergent global system behaviours that result in unpredictable, often detrimental, outcomes. This possibility argues for
This article introduces a new department for IT Professional that will cover security in IT systems, ranging from desktops to global e-commerce networks. Our goal is to offer ideas to improve IT security, both by looking at ways it can go wrong as well as
In 2004, NIST conducted a fingerprint slap segmentation study [1] to assess the state-of-the-art in fingerprint segmentation technology. Given the development of new technology it has become necessary to reassess the current state-of-the-art of
Lijun Ma, Oliver T. Slattery, Xiao Tang, Tiejun Chang
We demonstrated non-degenerate sequential time-bin entanglement using periodically poled KTP waveguide at a repetition rate of 1 GHz. The wavelengths of signal and idler are 895 and 1310 nm. The two-photon-interference-fringe visibility is 79%.
Physical-layer network coding (PLNC) is a novel wireless communication technology, in which multiple transmitters can send signals on the same channel to the same receiver at the same time. Our previous studies have revealed that PLNC can substantially
A compact scheme for high-speed frequency doubling and down-conversion on a single dual-element PPKTP waveguide is investigated. Optimal temperature is achieved and photon pair coincidence is observed at over GHz repetition rate with pulsed pump input
Fine time resolution enables Ultra-Wideband (UWB) ranging systems to reliably extract the first multipath arrival corresponding to the range between a transmitter and receiver, even when attenuated in strength compared to later arrivals. Bearing systems
In theory, quantum computers can be used to efficiently factor numbers, quadratically speed up many search and optimization problems, and enable currently impossible physics simulations. At first, quantum states appeared to be too fragile for implementing
Direct-sequence spread-spectrum underwater acoustic communications are analyzed in this paper between communication nodes, at least one of which is moving. At-sea data are analyzed which show that the phase change due to source motion is significant. The
The TREC 2007 question answering (QA) track contained two tasks: the main task consisting of series of factoid, list, and ``Other'' questions organized around a set of targets, and the complex, interactive question answering (ciQA) task. The main task
In this paper, we address the topology control issue for future wireless mesh networks (WMNs) based on the principle of service-oriented design. In particular, we propose a novel topology control scheme that attempts to maximize the overall throughput in
Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in active safety systems that increase passenger safety by exchanging warning messages
We propose a non-coherent receiver for the fixed detect-and-forward relay channel and derive a closed-form tight upper bound on its bit error probability in Rayleigh fading channels. Using this upper bound, we show that the receiver achieves nearly full