Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 801 - 825 of 2282

Framework for Improving Critical Infrastructure Cybersecurity

February 19, 2014
Author(s)
Kevin M. Stine, Kim Quill, Gregory A. Witte
Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed

Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0

February 12, 2014
Author(s)
Adam Sedgewick
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the Nation

Estimation of uncertainty in application profiles

February 3, 2014
Author(s)
David W. Flater
Application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling tools today is sampling-based profiling, where a

IT Risks

February 3, 2014
Author(s)
Linda Wilbanks, D. Richard Kuhn, Wes Chou
Risk management is a common phrase when managing information, from the CISO to the programmer. We acknowledge that risk management is the identification, assessment and prioritization of risks and reflects how we manage uncertainty. These are some areas of

Dynamic Spectrum Access: Current State of the Art and Future Challenges

February 2, 2014
Author(s)
Anirudha Sahoo, Michael R. Souryal
Dynamic Spectrum Access (DSA) is emerging as a promising technology to mitigate the spectrum scarcity caused by static frequency allocations. Despite the clear need for more efficient allocation, however, DSA faces a number of challenges, chief among them

The neural representation of faces and bodies in motion and at rest

January 29, 2014
Author(s)
P J. Phillips, Alice O'Toole, Vaidehi Natu, Xiaobo An, Rice Allyson, James Ryland
The neural organization of person processing relies on brain regions functionally selective for faces or bodies, with a subset of these regions preferring moving stimuli. Although the response properties of the individual areas are well established, less

Optimal Spread in Network Consensus Models

January 27, 2014
Author(s)
Fern Y. Hunt
Suppose we seek a set of nodes in a network that will enable the fastest spread of information in a decentralized communication environment. If communication resources are limited there are constraints on the number of nodes that can be selected. In this

Greedy Backpressure Routing for Smart Grid Sensor Networks

January 13, 2014
Author(s)
Hamid Gharavi
In this paper, a greedy backpressure routing protocol is proposed for multigate mesh networks. This protocol evaluates the greedy backpressure metric (GBM) value of mesh points and routes packets in the direction of the steepest gradient. The GBM value is

A New Standard for Securing Media-Independent Handover: IEEE 802.21a

December 31, 2013
Author(s)
Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE 802

A comparison of methods for sketch-based 3D shape retrieval

December 13, 2013
Author(s)
Afzal A. Godil
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. To foster this research area, two Shape Retrieval Contest (SHREC) tracks on this topic have been organized by us in 2012 and 2013 based on a small

Depicting Web Images for the Blind and Visually Impaired

December 9, 2013
Author(s)
Andrea Bajcsy, Ya-Shian Li-Baboud, Mary C. Brady
A prototype to translate web graph and map images into 3D printed models in order to give the blind and visually impaired access to voting and election information.

Sparse Embedding-based Domain Adaptation for Object Recognition

December 8, 2013
Author(s)
P J. Phillips, Jingjing Zheng, Rama Chellappa
Domain adaptation algorithms aim at handling the shift between source and target domains. A classifier is trained on images from the source domain; and the classifier recognizes objects in images from the target domain. In this paper, we present a joint

Delay Behavior of On-Off Scheduling: Extending Idle Periods

November 1, 2013
Author(s)
Allen L. Roginsky, Ken Christensen, Mehrgan Mostowfi
On-off scheduling of systems that have the ability to sleep can be used to extend system idle periods and enable greater opportunities for energy savings from sleeping. In this paper, we achieve a theoretical understanding of the delay behavior of on-off
Displaying 801 - 825 of 2282
Was this page helpful?