Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 3676 - 3700 of 7110

The Effect of Tilt on Waveform State Levels and Pulse Parameters

May 20, 2004
Author(s)
Nicholas Paulter, Donald R. Larson
Tilt is the slope in waveform values that occurs before and/or after a waveform transition. Tilt causes a bias in the computed values of waveform state levels that may affect the value of several waveform parameters. The effects of tilt on pulse parameters

On the Existence and Stability of Quadrijunctions

October 16, 2008
Author(s)
John W. Cahn, E S. Vanleck
The existence and stability of various microstructural features for two-phase materials with anisotropic energies is discussed. In particular, the existence of quadri and tri-junctions for energies with different symmetry properties is examined. An Ising

Manipulation Data Collection and Annotation Tool for Media Forensics

June 17, 2019
Author(s)
Eric Robertson, Haiying Guan, Mark Kozak, Yooyoung Lee, Amy Yates, Andrew Delgado, Daniel F. Zhou, Timothee N. Kheyrkhah, Jeff Smith, Jonathan G. Fiscus
With the increasing diversity and complexity of media forensics techniques, the evaluation of state-of-the-art detectors are impeded by lacking the metadata and manipulation history ground-truth. This paper presents a novel image/video manipulation

A Collaborative Data Management System for Additive Manufacturing

August 9, 2017
Author(s)
Yan Lu, Paul W. Witherell, M A. Donmez
As additive manufacturing (AM) continues to mature as a production technology, the limiting factors that have hindered its adoption in the past still exist, for example, process repeatability and material availability issues. Overcoming many of these

Automating Robot Planning using Product and Manufacturing Information

May 9, 2016
Author(s)
Frederick M. Proctor, Gijs van der Hoorn, Robert R. Lipman
Advances in sensing, modeling, and control have made it possible to increase the accuracy of robots, and enable them to perform in dynamic environments. Often, performance deficiencies are not evident until late in the development of the manufacturing

Tolerance Specification and Related Issues for Additively Manufactured Products

August 12, 2015
Author(s)
Gaurav Ameta, Robert R. Lipman, Paul W. Witherell, Shawn P. Moylan
Additive manufacturing (AM) has gained increased attention in the last decade as a versatile manufacturing process for customized products. AM process can create complex free-form shapes, internal cavities and lattices, which are either not feasible or

3D Ground-Truth Systems for Object/Human Recognition and Tracking

June 28, 2013
Author(s)
Afzal A. Godil, Roger V. Bostelman, Kamel Saidi, William P. Shackleford, Geraldine Cheok, Michael O. Shneier, Tsai H. Hong
We have been researching 3D ground-truth systems for performance evaluation of vision and perception systems in the fields of smart manufacturing and robotics safety. In this paper we first present an overview of different systems that have been used to

Dictionary-based Face Recognition from Video

December 10, 2012
Author(s)
P J. Phillips, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
The main challenge in recognizing faces in video is effec- tively exploiting the multiple frames of a face and the accompanying dynamic signature. One prominent method is based on extracting joint appearance and behavioral features. A second method models

How to Select Microscopy Image Similarity Metrics?

October 10, 2012
Author(s)
Peter Bajcsy, Joe Chalfoun, Mary C. Brady
Comparisons of two microscopy images can be accomplished in many different ways. This paper presents a system that recommends appropriate similarity metrics for microscopy image comparisons based on biological application requirements. The motivation stems

Cryptanalysis of the ESSENCE Family of Hash Functions

November 30, 2010
Author(s)
Nicky Mouha , Gautham Sekar, Jean-Philippe Aumasson , Thomas Peyrin, Soren S. Thomsen , Meltem Sonmez Turan, Bart Preneel
ESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST's SHA-3 competition. This paper presents the first known attacks on ESSENCE. We present a semi-free-start collision attack on 31 out of 32 rounds of ESSENCE-512

Herding, Second Preimage, and Trojan Message Attacks Beyond Merkle-Damgaard

November 3, 2009
Author(s)
Elena Andreeva, Charles Bouillaguet , Orr Dunkelman, John M. Kelsey
In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgaard construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process each

Facial Shape Analysis and Sizing System

July 24, 2009
Author(s)
Afzal A. Godil
The understanding of shape and size of the human head and faces is vital for design of facial wear products, such as respirators, helmets, eyeglasses and for ergonomic studies. 3D scanning is used to create 3D databases of thousands of humans from

Fast and Secure CBC Type MAC Algorithms

July 21, 2009
Author(s)
Mridul Nandi
The CBC-MAC, or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure over an arbitrary domain. There are several secure variants of CBC-MAC, among which
Displaying 3676 - 3700 of 7110
Was this page helpful?