Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 776 - 800 of 2269

Optical volumetric inspection of sub-20 nm patterned defects with wafer noise

April 2, 2014
Author(s)
Bryan M. Barnes, Francois R. Goasmat, Martin Y. Sohn, Hui Zhou, Richard M. Silver, Andras Vladar, Abraham Arceo
We have previously introduced a new data analysis method that more thoroughly utilizes scattered optical intensity data collected during defect inspection using bright-field microscopy. This volumetric approach allows conversion of focus resolved 2-D

An Empirical Comparison of Combinatorial and Random Testing

April 1, 2014
Author(s)
Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N. Kacker, D. Richard Kuhn
Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the

Calibrating multiple microscopes with a smartphone

April 1, 2014
Author(s)
Peter Bajcsy, Mary C. Brady, Jacob Siegel
Summary: The iPhone liquid crystal displays allows efficient and accurate calibration of an inexpensive array of handheld microscopes for measuring microscopic dynamic events over a large field of view. How does one build an inexpensive array of handheld

Estimating Fault Detection Effectiveness

April 1, 2014
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
[Poster] A t-way covering array can detect t-way faults, however they generally include other combinations beyond t-way as well. For example, a particular test set of all 5-way combinations is shown capable of detecting all seeded faults in a test program

Human Engineering Design Criteria Standards Part 3: Interim Steps

April 1, 2014
Author(s)
Susanne M. Furman, Mary Theofanos, Hannah Wald
The Department of Homeland Security (DHS) requires general human systems integration (HSI) criteria for the design and development of human-machine interfaces for the technology, systems, equipment, and facilities employed by its user population. HSI is

An Interoperability Test Bed for Distributed Healthcare Applications

March 24, 2014
Author(s)
Robert D. Snelick
Standards provide the foundation for ensuring interoperability, but if they are not implemented correctly or consistently, their value is diminished leading to problematic installations and higher costs. Conformance and Interoperability testing is

An Integrated Detection System Against False Data Injection Attacks in the Smart Grid

March 4, 2014
Author(s)
Wei Yu, David W. Griffith, Linqiang Ge, Sulabh Bhattarai, Nada T. Golmie
The smart grid is a new type of power grid that will use the advanced communication network technologies to support more efficient energy transmission and distribution. The grid infrastructure was designed for reliability; but security, especially against

Trust Issues with Opportunistic Encryption

February 28, 2014
Author(s)
Scott W. Rose
Recent revelations have shed light on the scale of eavesdropping on Internet traffic; violating the privacy of almost every Internet user. In response, protocol designers, engineers and service operators have begun deploying encryption (often opportunistic

A Spectral Analytic Method for Fingerprint Image Sample Rate Estimation

February 25, 2014
Author(s)
John M. Libert, Shahram Orandi, John D. Grantham, Michael D. Garris
This study examines the use of the NIST Spectral Image Validation and Verification (SIVV) metric for the application of detecting the sample rate of a given fingerprint digital image. SIVV operates by reducing an input image to a 1-dimensional power

Framework for Improving Critical Infrastructure Cybersecurity

February 19, 2014
Author(s)
Kevin M. Stine, Kim Quill, Gregory A. Witte
Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed

Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0

February 12, 2014
Author(s)
Adam Sedgewick
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the Nation

Estimation of uncertainty in application profiles

February 3, 2014
Author(s)
David W. Flater
Application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling tools today is sampling-based profiling, where a

IT Risks

February 3, 2014
Author(s)
Linda Wilbanks, D. Richard Kuhn, Wes Chou
Risk management is a common phrase when managing information, from the CISO to the programmer. We acknowledge that risk management is the identification, assessment and prioritization of risks and reflects how we manage uncertainty. These are some areas of

Dynamic Spectrum Access: Current State of the Art and Future Challenges

February 2, 2014
Author(s)
Anirudha Sahoo, Michael R. Souryal
Dynamic Spectrum Access (DSA) is emerging as a promising technology to mitigate the spectrum scarcity caused by static frequency allocations. Despite the clear need for more efficient allocation, however, DSA faces a number of challenges, chief among them

The neural representation of faces and bodies in motion and at rest

January 29, 2014
Author(s)
P J. Phillips, Alice O'Toole, Vaidehi Natu, Xiaobo An, Rice Allyson, James Ryland
The neural organization of person processing relies on brain regions functionally selective for faces or bodies, with a subset of these regions preferring moving stimuli. Although the response properties of the individual areas are well established, less

Optimal Spread in Network Consensus Models

January 27, 2014
Author(s)
Fern Y. Hunt
Suppose we seek a set of nodes in a network that will enable the fastest spread of information in a decentralized communication environment. If communication resources are limited there are constraints on the number of nodes that can be selected. In this

Greedy Backpressure Routing for Smart Grid Sensor Networks

January 13, 2014
Author(s)
Hamid Gharavi
In this paper, a greedy backpressure routing protocol is proposed for multigate mesh networks. This protocol evaluates the greedy backpressure metric (GBM) value of mesh points and routes packets in the direction of the steepest gradient. The GBM value is
Displaying 776 - 800 of 2269
Was this page helpful?