Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 626 - 650 of 2269

A Hybrid Task Graph Scheduler for High Performance Image Processing Workflows

December 16, 2015
Author(s)
Timothy J. Blattner, Walid Keyrouz, Milton Halem, Shuvra S. Bhattacharyya, Mary C. Brady
The scalability of applications is a key requirement to improving performance in hybrid and cluster computing. Scheduling code to utilize parallelism is difficult, particularly when dealing with dependencies, memory management, data motion, and processor

Towards a Systematic Threat Modeling Approach for Cyber-physical Systems

December 15, 2015
Author(s)
Goncalo Martins, Sajal Bhatia, Xenofon Koutsoukos, Keith A. Stouffer, CheeYee Tang, Rick Candell
Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computational and networking components. These systems can potentially have an impact on the physical components, hence it is critical to safeguard them against a wide range of

Towards a Reconfigurable Distributed Testbed to Enable Advanced Research and Development of Timing and Synchronization in Cyber-Physical Systems

December 8, 2015
Author(s)
Aviral Shrivastava, J C. Eidson, Marc A. Weiss, Ya-Shian Li-Baboud, Hugo Andrade, Patricia Derler, Kevin Stanton
Timing and synchronization play a key role in advanced cyber-physical systems (CPS). Precise timing, as often required in safety-critical CPS, depends on hardware support for enforcement of periodic measure, compute, and actuate cycles. For general CPS

Catastrophic Event Phenomena in Communication Networks: A Survey

December 1, 2015
Author(s)
Christopher E. Dabrowski
With the rise of the Internet, there has been increased interest in the use of computer models to study the dynamics of communication networks. An important aspect of this trend has been the study of dramatic, but relatively infrequent, events that result

Deep-subwavelength Nanometric Image Reconstruction using Fourier Domain Optical Normalization

November 5, 2015
Author(s)
Jing Qin, Richard M. Silver, Bryan M. Barnes, Hui Zhou, Ronald G. Dixson, Mark Alexander Henn
Quantitative optical measurements of deep sub-wavelength, three-dimensional, nanometric structures with sensitivity to sub-nanometer details address an ubiquitous measurement challenge. A Fourier domain normalization approach is used in the Fourier optical

Cyber-Physical Systems Framework

November 2, 2015
Author(s)
David A. Wollman
Two worlds that have operated independently—the digital and physical worlds—are now merging, creating opportunities that will transform many sectors of our society. These new smart systems are based on engineered interacting networks of physical and

The NIST IAD Data Science Evaluation Series: Part of the NIST Information Access Division Data Science Research Program

October 29, 2015
Author(s)
Bonnie J. Dorr, Craig Greenberg, Peter Fontana, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Wo L. Chang
The Information Access Division (IAD) of the National Institute of Standards and Technology (NIST) launched a new Data Science Research Program (DSRP) in the fall of 2015. This research program focuses on evaluation-driven research and will establish a new

The Number of Boolean Functions with Multiplicative Complexity 2

October 27, 2015
Author(s)
Magnus G. Find, Daniel C. Smith-Tone, Meltem Sonmez Turan
Multiplicative complexity is a complexity measure, which is defined as the minimum number of AND gates required to implement a given primitive by a circuit over the basis (AND, XOR, NOT), with an unlimited number of NOT and XOR gates. Implementations of

De-Identification of Personal Information

October 22, 2015
Author(s)
Simson L. Garfinkel
Abstract: De-identification removes identifying information from a dataset so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing or

NIST Big Data Interoperability Framework: Volume 1, Big Data Definitions

October 22, 2015
Author(s)
Wo L. Chang, Nancy Grady, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 2, Big Data Taxonomies

October 22, 2015
Author(s)
Wo L. Chang, Nancy Grady, Community Resilience Program NIST
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 3, Use Cases and General Requirements

October 22, 2015
Author(s)
Wo L. Chang, Geoffrey Fox, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 4, Security and Privacy

October 22, 2015
Author(s)
Wo L. Chang, Arnab Roy, Mark Underwood, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 5, Architectures White Paper Survey

October 22, 2015
Author(s)
Wo L. Chang, Sanjay Mishra, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 6, Big Data Reference Architecture

October 22, 2015
Author(s)
Wo L. Chang, Orit Levin, David Boyd, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 7, Big Data Standards Roadmap

October 22, 2015
Author(s)
Wo L. Chang, David Boyd, Carl Buffington , NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

The NIST IAD Data Science Research Program

October 19, 2015
Author(s)
Bonnie J. Dorr, Peter C. Fontana, Craig S. Greenberg, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Martial Michel, Edmond J. Golden III, Wo L. Chang
We examine foundational issues in data science including current challenges, basic research questions, and expected advances, as the basis for a new Data Science Research Program and evaluation series, introduced by the Information Access Division of the

Confidence Estimation in Stem Cell Classification

October 15, 2015
Author(s)
Peter Bajcsy, Jana Kosecka, Zahra Rajabi
We study the problem of supervised classification of stem cell colonies and confidence estimation of the attained classification labels. The problem is investigated in the application context of heterogeneity labels of stem cell colonies observed by using

Poster:A Logic Based Network Forensics Model for Evidence Analysis

October 15, 2015
Author(s)
Anoop Singhal, Changwei Liu, Duminda Wijesekera
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

October 15, 2015
Author(s)
Tatu Ylonen, Paul Turner, Karen Scarfone, Murugiah Souppaya
Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges, for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management

Shape Descriptors Comparison for Cell Tracking

October 15, 2015
Author(s)
Michael P. Majurski, Christopher Zheng, Joe Chalfoun, Alden A. Dima, Mary C. Brady
New microscope technologies are enabling the acquisition of large volumes of live cell image data. Accurate temporal object tracking is required to facilitate the analysis of this data. One principle component of cell tracking is correspondence, matching

Who Touched my Mission: Towards Probabilistic Mission Impact Assessment

October 12, 2015
Author(s)
Xiaoyan Sun, Anoop Singhal, Peng Liu
Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact

On the Behavior of PRES Using Incomplete Judgment Sets

September 30, 2015
Author(s)
Ellen M. Voorhees
PRES, the Patent Retrieval Evaluation Score, is a family of retrieval system evaluation measures that combines recall and user effort to better reflect the quality of a retrieval run with respect to recall-oriented search tasks. Previous analysis of the
Displaying 626 - 650 of 2269
Was this page helpful?