Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 751 - 775 of 2269

A Cognitive-Behavioral Framework of User Password Management Lifecycle

June 22, 2014
Author(s)
Yee-Yin Choong
Passwords are the most commonly used mechanism in controlling users’ access to information systems. Little research has been established on the entire user password management lifecycle from the start of generating a password, maintaining the password

SHREC14 Track: Extended Large Scale Sketch-Based 3D Shape Retrieval

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
Large scale sketch-based 3D shape retrieval has received more and more attentions in the community of content- based 3D object retrieval. The objective of this track is to evaluate the performance of different sketch-based 3D model retrieval algorithms

SHREC14 Track: Large Scale Comprehensive 3D Shape Retrieval

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
The objective of this track is to evaluate the performance of 3D shape retrieval approaches on a large-sale com- prehensive 3D shape database which contains different types of models, such as generic, articulated, CAD and architecture models. The track is

SHREC14 Track: Retrieval and classification on Textured 3D Models

June 12, 2014
Author(s)
Afzal A. Godil
This contribution reports the results of the SHREC 2014 track: Retrieval and classification on textured 3D models, whose goal is to evaluate the performance of retrieval algorithms when models vary either by geometric shape or texture, or both. The

SHREC14 Track: Shape Retrieval of Non-Rigid 3D Human Models

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets. Our dataset features exclusively human models, in a variety of body shapes and poses. 3D models of

ITL Forensic Science Program

June 5, 2014
Author(s)
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. criminal

NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure

June 2, 2014
Author(s)
Victoria Y. Pillitteri
On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executive

Overview of the TREC-2012 Microblog Track

June 2, 2014
Author(s)
Ian M. Soboroff, Iadh Ounis, Jimmy Lin, Craig Macdonald
The Microblog track examines search tasks and evaluation meth- odologies for information seeking behaviours in microblogging en- vironments such as Twitter. It was first introduced in 2011, address- ing a real-time adhoc search task, whereby the user

Polar codes in a QKD Environment

May 22, 2014
Author(s)
Anastase Nakassis, Alan Mink
Polar coding is the most recent encoding scheme in the quest for error correction codes that approaches the Shannon limit, has a simple structure, and admits fast decoders. As such, it is an interesting candidate for the quantum key distribution (QKD)

The Case for Delivering the Infrastructure for Digital Building Regulations

May 19, 2014
Author(s)
Mark E. Palmer, James H. Garrett
The building industry uses numerous engineering standards, building codes, specifications and regulations and a diverse set of industry vocabularies to describe, assess, and deliver constructed facilities. As part of the expanding use of building

LTE Physical Layer Performance Analysis

May 15, 2014
Author(s)
Wen-Bin Yang, Michael R. Souryal
In this report, we present results of a physical layer performance study for all MCSs (from MCS0 to MCS28) in terms of block error rate (BLER) and spectral efficiency. The results are obtained by using the Steepest Ascent LTE toolbox for MATLAB which

TRECVID 2013 -- An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics

May 5, 2014
Author(s)
Paul D. Over, Jonathan G. Fiscus, Gregory A. Sanders, David M. Joy, Martial Michel, George M. Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
TRECVID 2013 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last ten years this effort has yielded a better

Performance Testing and Evaluation of Transformative Apps Devices

April 16, 2014
Author(s)
Anthony J. Downs, Lisa J. Fronczek, Emile L. Morse, Brian A. Weiss, Ian P. Bashor, Craig I. Schlenoff
Transformative Apps (TransApps) is a Defense Advanced Research Projects Agency (DARPA) funded program whose goal is to develop a range of militarily-relevant software applications ("apps") to enhance the operational effectiveness of military personnel on

NIST and Computer Security

April 4, 2014
Author(s)
William E. Burr, Hildegard Ferraiolo, David A. Waltermire
The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information
Displaying 751 - 775 of 2269
Was this page helpful?