Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 726 - 750 of 2269

Optimal Deployment of Pico Base Stations in LTE-Advanced Heterogeneous Networks

October 29, 2014
Author(s)
Sungseob Lee, SuKyoung Lee, Kim KyungSoo, David W. Griffith, Nada T. Golmie
As data traffic demand in cellular networks grows exponentially, operators need to add new cell sites to keep up; unfortunately, it is costly to build and operate macrocells. Moreover, it may not be possible to obtain the needed approvals for additional

Spatial Computations over Terabyte-Sized Images on Hadoop Platforms

October 27, 2014
Author(s)
Peter Bajcsy, Antoine Vandecreme, Mary C. Brady, Phuong Nguyen
Our objective is to lower the barrier of executing spatial image computations in a computer cluster/cloud environment instead of in a desktop/laptop computing environment. We research two related problems encountered during an execution of spatial

On Systemic Risk in the Cloud Computing Model

October 23, 2014
Author(s)
Vladimir V. Marbukh
The major benefits of the emerging cloud computing infrastructure include elimination of the fixed cost and reduction in the marginal cost for the users due to the economy of scale and dynamic resource sharing. This paper argues that these unquestionable

On Cascading Failures and Countermeasure based on Energy Storage in the Smart Grid

October 8, 2014
Author(s)
Xing Chen, Wei Yu, David W. Griffith, Nada T. Golmie, Guobin Xu, Chao Lu
Recently, there are growing concerns about smart grid security and resilience. The performance of smart grid may suffer from component failures or targeted attacks. A sophisticated adversary may target critical components in a smart grid, leading to

On Statistical Modeling and Forecasting of Energy Usage in Smart Grid

October 8, 2014
Author(s)
Wei Yu, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu
Developing effective energy resource management in the smart grid is challenging because the entities in both the demand and supply sides experience various uncertainties. This paper addresses the issue of quantifying uncertainties on the energy demand

Estimation of uncertainty in application profiles

October 3, 2014
Author(s)
David W. Flater
Performance is an important facet of software quality, and application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling

NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0

October 1, 2014
Author(s)
Chris Greer, David A. Wollman, Dean Prochaska, Paul A. Boynton, Jeffrey A. Mazer, Cuong Nguyen, Gerald FitzPatrick, Thomas L. Nelson, Galen H. Koepke, Allen R. Hefner Jr., Victoria Yan Pillitteri, Tanya L. Brewer, Nada T. Golmie, David H. Su, Allan C. Eustis, David Holmberg, Steven T. Bushby
Section 1305 of the Energy Independence and Security Act (EISA) of 2007 (Pub. L. 110-140) directs NIST ‘‘to coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperability of

A Hybrid CPU-GPU System for Stitching Large Scale Optical Microscopy Images

September 12, 2014
Author(s)
Timothy Blattner, Walid Keyrouz, Joe Chalfoun, Bertrand C. Stivalet, Mary C. Brady, Shujia Zhou
Researchers in various fields are using optical microscopy to acquire very large images, 10K--200K of pixels per side. Optical microscopes acquire these images as grids of overlapping partial images (thousands of pixels per side) that are then stitched

Image Quality Testing: Selection of Images for Assessing Test Subject Input

September 2, 2014
Author(s)
John R. Jendzurski, Nicholas G. Paulter Jr.
Determining image quality is dependent to some degree on human interpretation. Although entirely subjective methods of evaluating image quality may be adequate for consumer applications, they are not acceptable for security and safety applications where

BQP-completeness of Scattering in Scalar Quantum Field Theory

September 1, 2014
Author(s)
Stephen P. Jordan, Keith S. Lee, John Preskill
Recent work has shown that quantum computers can in polynomial time compute scattering probabilities in massive quantum field theories. One can translate this task into a corresponding formal problem in computational complexity theory. Here, we establish

Single-shot security for one-time memories in the isolated qubits model

August 21, 2014
Author(s)
Yi-Kai Liu
One-time memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but there is

The Future of Cybersecurity Education

August 19, 2014
Author(s)
Ernest L. McDuffie, V. P. Piotrowski
By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.

Approximate Matching: Definition and Terminology

July 2, 2014
Author(s)
Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R. White
This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or to find

Persistence-based Structural Recognition

June 28, 2014
Author(s)
Chunyuan Li
This paper presents a framework for object recognition using topological persistence. In particular, we show that the so-called persistence diagrams built from functions defined on the objects can serve as compact and informative descriptors for images and

Preserving Privacy More Than Reading a Message

June 27, 2014
Author(s)
Susanne M. Furman, Mary F. Theofanos
Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third party website by using their SNS
Displaying 726 - 750 of 2269
Was this page helpful?