Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 13976 - 14000 of 17285

Benchmarks, Performance Evaluation and Contests for 3D Shape Retrieval

December 20, 2010
Author(s)
Afzal A. Godil, Zhouhui Lian, Helin Dutagaci
Benchmarking of 3D Shape retrieval allows developers and researchers to compare the strengths of different algorithms on a standard dataset. Here we discuss the different steps involved in developing a benchmark and some of the issues involved. We then

Maintainers Manual for Version 2.2.1 of the NIST DMIS Test Suite

October 25, 2010
Author(s)
Thomas R. Kramer, John A. Horst
This manual is a maintainers manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual is

Toward Spin Squeezing with Trapped Ions

September 23, 2010
Author(s)
John J. Bollinger, Hermann Uys, Michael Biercuk, Joseph W. Britton
Building robust instruments capable of making interferometric measurements with precision beyond the standard quantum limit remains an important goal in many metrology laboratories. We describe here the basic concepts underlying spin squeezing experiments

Electronic Vector-Network-Analyzer Verification

October 1, 2009
Author(s)
Dylan F. Williams, Arkadiusz C. Lewandowski, Denis X. LeGolvan, Ronald A. Ginley
… The National Institute of Standards and Technology (NIST) has just introduced a fully …

Property Verification for Generic Access Control Models

December 20, 2008
Author(s)
Chung Tong Hu, David R. Kuhn, Tao Xie
To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general

Securing Wireless Networks

April 26, 2007
Author(s)
Shirley M. Radack
… of the guideline; the family of voluntary industry standards developed by the Institute of Electrical and …

SAMATE's Contribution to Information Assurance

September 1, 2006
Author(s)
Paul E. Black
The amount of software in today's information world is far too large to check manually. Automated tools are a must. These tools can help design and build the right software in the first place, but they can also help if the system being designed includes

Data Exchange for Machine Shop Simulation

July 1, 2005
Author(s)
Yung-Tsun Lee, Yan Luo
… shop data model developed at the National Institute of Standards and Technology (NIST). The data model is described …

Software Assurances Metrics and Tool Evaluation

June 1, 2005
Author(s)
Paul E. Black
NIST is starting two ambitious projects to (1) develop a taxonomy of software security flaws and vulnerabilities, (2) develop a taxonomy of software assurance (SA) functions and techniques which detect those flaws, (3) perform and maintain a survey of SA
Displaying 13976 - 14000 of 17285
Was this page helpful?