Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 751 - 775 of 2282

A Hybrid CPU-GPU System for Stitching Large Scale Optical Microscopy Images

September 12, 2014
Author(s)
Timothy Blattner, Walid Keyrouz, Joe Chalfoun, Bertrand C. Stivalet, Mary C. Brady, Shujia Zhou
Researchers in various fields are using optical microscopy to acquire very large images, 10K--200K of pixels per side. Optical microscopes acquire these images as grids of overlapping partial images (thousands of pixels per side) that are then stitched

Image Quality Testing: Selection of Images for Assessing Test Subject Input

September 2, 2014
Author(s)
John R. Jendzurski, Nicholas G. Paulter Jr.
Determining image quality is dependent to some degree on human interpretation. Although entirely subjective methods of evaluating image quality may be adequate for consumer applications, they are not acceptable for security and safety applications where

BQP-completeness of Scattering in Scalar Quantum Field Theory

September 1, 2014
Author(s)
Stephen P. Jordan, Keith S. Lee, John Preskill
Recent work has shown that quantum computers can in polynomial time compute scattering probabilities in massive quantum field theories. One can translate this task into a corresponding formal problem in computational complexity theory. Here, we establish

Single-shot security for one-time memories in the isolated qubits model

August 21, 2014
Author(s)
Yi-Kai Liu
One-time memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but there is

The Future of Cybersecurity Education

August 19, 2014
Author(s)
Ernest L. McDuffie, V. P. Piotrowski
By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.

Approximate Matching: Definition and Terminology

July 2, 2014
Author(s)
Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R. White
This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or to find

Persistence-based Structural Recognition

June 28, 2014
Author(s)
Chunyuan Li
This paper presents a framework for object recognition using topological persistence. In particular, we show that the so-called persistence diagrams built from functions defined on the objects can serve as compact and informative descriptors for images and

Preserving Privacy More Than Reading a Message

June 27, 2014
Author(s)
Susanne M. Furman, Mary F. Theofanos
Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third party website by using their SNS

A Cognitive-Behavioral Framework of User Password Management Lifecycle

June 22, 2014
Author(s)
Yee-Yin Choong
Passwords are the most commonly used mechanism in controlling users’ access to information systems. Little research has been established on the entire user password management lifecycle from the start of generating a password, maintaining the password

SHREC14 Track: Extended Large Scale Sketch-Based 3D Shape Retrieval

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
Large scale sketch-based 3D shape retrieval has received more and more attentions in the community of content- based 3D object retrieval. The objective of this track is to evaluate the performance of different sketch-based 3D model retrieval algorithms

SHREC14 Track: Large Scale Comprehensive 3D Shape Retrieval

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
The objective of this track is to evaluate the performance of 3D shape retrieval approaches on a large-sale com- prehensive 3D shape database which contains different types of models, such as generic, articulated, CAD and architecture models. The track is

SHREC14 Track: Retrieval and classification on Textured 3D Models

June 12, 2014
Author(s)
Afzal A. Godil
This contribution reports the results of the SHREC 2014 track: Retrieval and classification on textured 3D models, whose goal is to evaluate the performance of retrieval algorithms when models vary either by geometric shape or texture, or both. The

SHREC14 Track: Shape Retrieval of Non-Rigid 3D Human Models

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets. Our dataset features exclusively human models, in a variety of body shapes and poses. 3D models of

ITL Forensic Science Program

June 5, 2014
Author(s)
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. criminal

NIST Cybersecurity Framework Addresses Risks to Critical Infrastructure

June 2, 2014
Author(s)
Victoria Y. Pillitteri
On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executive
Displaying 751 - 775 of 2282
Was this page helpful?