Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 21101 - 21125 of 73697

Quantifying Network Topology Robustness Under Budget Constraints

June 24, 2013
Author(s)
Assane Gueye, Aron Lazska
To design robust network topologies that resist strategic attacks, one must first be able to quantify robustness. In a recent line of research, the theory of network blocking games has been used to derive robustness metrics for topologies. A network

A New Metric for Latent Fingerprint Image Preprocessing

June 23, 2013
Author(s)
Mary Frances Theofanos, Andrew Dienstfrey, Brian Stanton, Haiying Guan
Although fingerprint recognition is a well-studied area, forensic fingerprint preprocessing based on computational theory is still a relatively new domain in need of further scientific study and development of standards of best practice. Latent fingerprint

Four Measures of Nonlinearity

June 23, 2013
Author(s)
Joan Boyar, Magnus Find, Rene Peralta
Cryptographic applications, such as hashing, block ciphers and stream ciphers, make use of functions which are simple by some criteria (such as circuit implementations), yet hard to invert almost everywhere. A necessary condition for the latter property is

Dexterous Manipulation for Manufacturing Applications Workshop

June 21, 2013
Author(s)
Joseph A. Falco, Jeremy A. Marvel, Elena R. Messina
The National Institute of Standards and Technology organized a free workshop in conjunction with the 2013 Automate and ProMat trade shows in Chicago, IL. The workshop addressed the application of dexterous robot technologies to meet the application needs

Enabling an Enterprise-wide, Data-centric Operating Environment

June 21, 2013
Author(s)
David F. Ferraiolo, Serban I. Gavrila, Wayne Jansen
Although access control (AC) currently plays an important role in securing DSs, if properly envisaged and designed, access control can serve a more vital role in computing than one might expect. The Policy Machine (PM), a framework for AC developed at NIST

Exposing Software Security and Availability Risks For Commercial Mobile Devices

June 21, 2013
Author(s)
Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeff Voas
In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including libraries

Guidelines for Managing the Security of Mobile Devices in the Enterprise

June 21, 2013
Author(s)
Murugiah P. Souppaya, Karen Scarfone
Mobile devices, such as smart phones and tablets, typically need to support multiple security objectives: confidentiality, integrity, and availability. To achieve these objectives, mobile devices should be secured against a variety of threats. The purpose

Lessons Learned in Establishing the NIST Metal Additive Manufacturing Laboratory

June 21, 2013
Author(s)
Shawn P. Moylan, John A. Slotwinski, April Cooke, Kevin K. Jurrens, M A. Donmez
This publication presents a summary of lessons learned by NIST staff during establishment of the NIST Metal Additive Manufacturing Laboratory and implementation of the metal additive manufacturing capability at NIST. These lessons learned resulted from the

Combinatorial Methods in Testing

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 1 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Combinatorial Testing Applied

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 2 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Detection of Topological Matter with Quantum Gases

June 20, 2013
Author(s)
Ian B. Spielman
Creating and measuring topological matter – with order deeply imbedded it’s quantum mechanical eigenstates structure – presents unique experimental challenges. This sort of intrinsically non-local order might seem experimentally inaccessible in any

Effects of Processing on Microstructure and Mechanical Properties of Ti-6Al-4V Fabricated using Electron Beam Melting (EBM), Part 2: Energy Input, Orientation, and Location

June 20, 2013
Author(s)
Nikolas W. Hrabe, Timothy P. Quinn, Ryan Kircher
Selective electron beam melting (EBM) is a layer-by-layer additive manufacturing technique that shows great promise for fabrication of medical devices and aerospace components. Before its potential can be fully realized, however, a deeper understanding of

Effects of Processing on Microstructure and Mechanical Properties of Ti-6Al-4V Fabricated using Electron Beam Melting (EBM), Part 1: Distance from Build Plate and Part Size

June 20, 2013
Author(s)
Nikolas W. Hrabe, Timothy P. Quinn, Ryan Kircher
Selective electron beam melting (EBM) is a layer-by-layer additive manufacturing technique that shows great promise for fabrication of medical devices and aerospace components. Before its potential can be fully realized, however, a deeper understanding of

Evolution From Design of Experiments

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 14 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the

Measuring Combinatorial Coverage

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 7 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Of Massive Static Analysis Data

June 20, 2013
Author(s)
Aurelien M. Delaitre, Vadim Okun, Elizabeth N. Fong
Static analysis produces large amounts of data. The volume of data allows for new developments in research. Practical observations of the effectiveness of static analysis tools can be derived from that data. The question of tool statistical independence

VULCAN: Vulnerability Assessment Framework for Cloud Computing

June 20, 2013
Author(s)
Patrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, Anoop Singhal
Assessing security of software services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform and the software services. In many systems, the platform or the infrastructure on which the software will actually run

Cellulose Nanomaterials: Nanocomposite Imaging using FRET

June 19, 2013
Author(s)
Jeffrey W. Gilman, Mauro Zammarano, Iulia A. Sacui, Jeremiah Woodcock
Cellulose is the most abundant organic polymer on Earth, found in plants (cotton, hemp, wood), marine animals (Tunicate), algae (Valonia) bacteria (Acetobacter xylium) and even amoeba (Dictyostelium discoideum). Critical features of the structural
Displaying 21101 - 21125 of 73697
Was this page helpful?