Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 826 - 850 of 2282

Combining Genetic Algorithms & Simulation to Search for Failure Scenarios in System Models

October 28, 2013
Author(s)
Kevin L. Mills, Christopher E. Dabrowski, James J. Filliben, Sanford P. Ressler
Large infrastructures, such as clouds, can exhibit substantial outages, sometimes due to failure scenarios that were not considered during system design. We define a method that uses a genetic algorithm (GA) to search system simulations for parameter

Three-dimensional deep sub-wavelength defect detection using (lambda) = 193 nm optical microscopy

October 25, 2013
Author(s)
Bryan M. Barnes, Martin Y. Sohn, Francois R. Goasmat, Hui Zhou, Andras Vladar, Richard M. Silver, Abraham Arceo
Identifying defects in photolithographic patterning is a persistent challenge in semiconductor manufacturing. Well-established optical methods in current use are jeopardized by upcoming sub-20 nm device dimensions. Volumetric processing of focus-resolved

Ontology for Big Systems: The Ontology Summit 2012 Communique

October 16, 2013
Author(s)
Ram D. Sriram, Mary C. Brady
The Ontology Summit 2012 explored the current and potential uses of ontology, its methods and paradigms, in big systems and big data: How ontology can be used to design, develop, and operate such systems. The systems addressed were not just software

CCM: A Tool for Measuring Combinatorial Coverage of System State Space

October 10, 2013
Author(s)
Itzel Dominguez, D. Richard Kuhn, Raghu N. Kacker, Yu Lei
This poster presents some measures of combinatorial coverage that can be helpful in estimating residual risk related to insufficient testing of rare interactions, and a tool for computing these measures.

Re-Projection of Terabyte-sized 3D Images for Interactive Visualization

October 9, 2013
Author(s)
Peter Bajcsy, Antoine Vandecreme, Mary C. Brady
How does one inspect terabyte-sized 3D images visually from multiple viewpoints? The current solutions are limited to gigabyte-sized images using specialized hardware to achieve interactivity and lacking the ability to share data for collaborative research

Re-projection of Terabyte-Sized Images

October 7, 2013
Author(s)
Peter Bajcsy, Antoine Vandecreme, Mary C. Brady
This work addresses the problem of re-projecting a terabyte-sized 3D data set represented as a set of 2D Deep Zoom pyramids. In general, a re-projection for small 3D data sets is executed directly in RAM. However, RAM becomes a limiting factor for terabyte

Terabyte Size Image Computations on Hadoop Cluster Platforms

October 7, 2013
Author(s)
Peter Bajcsy, Antoine Vandecreme, Julien M. Amelot, Phuong T. Nguyen, Joe Chalfoun, Mary C. Brady
We present a characterization of four basic terabyte size image computations on a Hadoop cluster in terms of their relative efficiency according to the modified Amdahl’s law. The work is motivated by the fact that there is a lack of standard benchmarks and

The TREC Medical Records Track

September 25, 2013
Author(s)
Ellen M. Voorhees
The Text REtrieval Conference (TREC) is a series of annual workshops designed to build the infrastructure for large-scale evaluation of search systems and thus improve the state-of-the-art. Each workshop is organized around a set "tracks", challenge

Secure Domain Name System (DNS) Deployment Guide

September 18, 2013
Author(s)
Ramaswamy Chandramouli, Scott W. Rose
The Domain Name System (DNS) is a distributed computing system that enables access to Internet resources by user-friendly domain names rather than IP addresses, by translating domain names to IP addresses and back. The DNS infrastructure is made up of

Fourier Domain Optical Tool Normalization for Quantitative Parametric Image Reconstruction

September 5, 2013
Author(s)
Jing Qin, Richard M. Silver, Bryan M. Barnes, Hui Zhou, Francois R. Goasmat
There has been much recent work in developing advanced optical metrology methods that use imaging optics for critical dimension measurements and defect detection. Sensitivity to nanometer scale changes has been observed when measuring critical dimensions

Congestion Due to Random Walk Routing

August 31, 2013
Author(s)
Vladimir V. Marbukh, Iraj Saniee, Onuttom Narayan
In this paper we derive an analytical expression for the mean load at each node of an arbitrary undirected graph for the uniform multicommodity flow problem under random walk routing. We show the mean load is linearly dependent on the nodal degree with a

Electronic Authentication Guideline

August 29, 2013
Author(s)
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta, Emad A. Nabbus
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of

ITL Publishes Guidance on Preventing and Handling Malware Incidents

August 22, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800- 83 Revision 1,Guide to Malware Incident Prevention and Handling for Desktops and Laptops,which gives receommendations for organizations to improve their malware incident

ACT-Touch Reference Manual, Working Draft

August 15, 2013
Author(s)
Kristen Greene, Franklin Tamborello
ACT-Touch is a set of manual motor request extensions for ACT-R 6 (Adaptive Control of Thought-Rational, hereafter, ACT-R) . These manual request extensions constitute theoretical claims predicting motor preparation and execution times for certain manual

Overview of the TREC 2011 Microblog Track

August 15, 2013
Author(s)
Ian M. Soboroff, Iadh Ounis, Craig Macdonald, Jimmy Lin
The Microblog track examines search tasks and evaluation methodologies for information seeking behaviors in microblogging environments such as Twitter. It was first introduced in 2011, addressing a real-time adhoc search task, whereby the user wishes to

Electrically-protected resonant exchange qubits in triple quantum dots

July 31, 2013
Author(s)
Jacob M. Taylor, Vanita Srinivasa, Medford Jim
We present a modulated microwave approach for quantum computing with qubits comprising three spins in a triple quantum dot. This approach includes single- and two-qubit gates that are protected against low-frequency electrical noise, due to an operating
Displaying 826 - 850 of 2282
Was this page helpful?