Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 701 - 725 of 2294

PASSING THE BATON: Message FROM THE INCOMING EDITOR-IN-CHIEF

June 1, 2015
Author(s)
Hamid Gharavi
This incoming Editor In Chief's (EIC) message is expected to appear in the next issue of the IEEE wireless communications. The editorial team will be under the leadership of the new EIC for a period of three years.

A Framework to Canonicalize Manufacturing Service Capability Models

May 15, 2015
Author(s)
Boonserm Kulvatunyou, Yunsu Lee, Nenad Ivezic, Yun Peng
The ability to share precise models of suppliers’ manufacturing service capability (MSC) information is necessary to develop reliable methods that enable Original Equipment Manufacturers (OEMs) to efficiently configure agile and responsive supply chains

SHREC'15: Range Scans based 3D Shape Retrieval

May 3, 2015
Author(s)
Afzal A. Godil
The objective of the SHREC'15 Range Scans based 3D Shape Retrieval track is to evaluate algorithms that match range scans of real objects to complete 3D mesh models in a target dataset. The task is to retrieve a rank list of complete 3D models that are of

Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry

May 1, 2015
Author(s)
Kristen Greene, Joshua M. Franklin, John M. Kelsey
Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics

Validated Open Source Nanofiber Diameter Measurement Tool

April 30, 2015
Author(s)
Nathan A. Hotaling, Kapil Bharti, Haydn Kriel, Carl G. Simon Jr.
Despite the growing use of nanofiber scaffolds for tissue engineering applications, there is not a validated, readily available (commercial or open source) solution for rapid, automated analysis of nanofiber diameter from scanning electron microscope (SEM)

Introducing Combinatorial Testing in a Large Organization

April 23, 2015
Author(s)
Jon Hagar, Thomas Wissink, D. Richard Kuhn, Raghu N. Kacker
A two-year study of eight pilot projects to introduce combinatorial testing in a large aerospace corporation found that the new methods were practical, significantly lowered development costs, and improved test coverage by 20 to 50 percent.

Overview of the TREC 2014 Clinical Decision Support Track

April 22, 2015
Author(s)
Ellen M. Voorhees
The Text REtrieval Conference (TREC) Clinical Decision Support Track fosters research on systems that link electronic health records with information that is relevant for patient care. TREC 2014 is the initial year of the track. The focus of the first year

InChI, the IUPAC International Chemical Identifier

April 15, 2015
Author(s)
Stephen R. Heller, Alan McNaught, Igor Pletnev, Stephen Stein, Dmitrii Tchekhovskoi
This paper documents the design, layout and algorithms of the IUPAC International Chemical Identifier, InChI.

Privacy Amplification in the Isolated Qubits Model

April 14, 2015
Author(s)
Yi-Kai Liu
Isolated qubits are a special class of quantum devices, which can be used to implement tamper-resistant cryptographic hardware such as one-time memories (OTM's). Unfortunately, these OTM constructions leak some information, and standard methods for privacy

Password Entry Errors: Memory or Motor?

April 9, 2015
Author(s)
Kristen Greene, Frank Tamborello
As we increasingly rely upon our computer information systems to store and operate on sensitive information, the methods we use to authenticate user identity also become more important. One of the most important such methods is the password. However

Towards a "Periodic Table" of Bugs

April 8, 2015
Author(s)
Irena Bojanova
Our vision for a "periodic table" of bugs is a "natural" organization of a catalog or dictionary or taxonomy to describe software weaknesses and vulnerabilities. Such an organization will help the community to: a) more closely explain the nature of

ACT-R Modeling of Password Entry Errors

April 2, 2015
Author(s)
Kristen Greene, Franklin Tamborello
Validated predictive models of human error for password-related tasks could better inform password requirements for both government and civilian systems. Here, we build upon prior modeling work focused on disentangling the source of password entry errors

Combinatorial Coverage as an Aspect of Test Quality

March 31, 2015
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
There are relatively few good methods for evaluating test set quality, after ensuring basic requirements traceability. Structural coverage, mutation testing, and related methods can be used if source code is available, but these approaches may entail

Assessing Effects of Asymmetries, Dynamics, and Failures on a Cloud Simulator

March 29, 2015
Author(s)
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
We characterize the effects of asymmetries, dynamics, and failures when introduced into a cloud computing simulator, which had previously been characterized under static, homogeneous configurations with various patterns of demand and supply. We aim to

TRECVID 2014 -- An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics

March 26, 2015
Author(s)
Paul D. Over, Jonathan G. Fiscus, Gregory A. Sanders, David M. Joy, Martial Michel, George Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
The TREC Video Retrieval Evaluation (TRECVID) 2014 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last

Guidance for Secure Authorization of Mobile Applications in the Corporate Environment

March 19, 2015
Author(s)
Athanasios T. Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implementation

The Multiplicative Complexity of Boolean Functions on Four and Five Variables

March 17, 2015
Author(s)
Meltem Sonmez Turan, Rene C. Peralta
A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT and SPONGENT). In order to efficiently implement the primitive, optimal

Measuring the Resiliency of Cellular Base Station Deployments

March 11, 2015
Author(s)
David W. Griffith, Richard A. Rouil, Antonio Izquierdo Manzanares, Nada T. Golmie
The National Public Safety Telecommunications Council (NPSTC) has defined Resiliency as the ability of a network to withstand the loss of assets and to recover quickly from such losses. How to measure the resiliency of a base station deployment is an
Displaying 701 - 725 of 2294
Was this page helpful?