Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 826 - 850 of 2269

Congestion Due to Random Walk Routing

August 31, 2013
Author(s)
Vladimir V. Marbukh, Iraj Saniee, Onuttom Narayan
In this paper we derive an analytical expression for the mean load at each node of an arbitrary undirected graph for the uniform multicommodity flow problem under random walk routing. We show the mean load is linearly dependent on the nodal degree with a

Electronic Authentication Guideline

August 29, 2013
Author(s)
William E. Burr, Donna F. Dodson, Elaine M. Newton, Ray A. Perlner, William T. Polk, Sarbari Gupta, Emad A. Nabbus
This recommendation provides technical guidelines for Federal agencies implementing electronic authentication and is not intended to constrain the development or use of standards outside of this purpose. The recommendation covers remote authentication of

ITL Publishes Guidance on Preventing and Handling Malware Incidents

August 22, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin summarizes a new ITL publication, NIST Special Publication 800- 83 Revision 1,Guide to Malware Incident Prevention and Handling for Desktops and Laptops,which gives receommendations for organizations to improve their malware incident

ACT-Touch Reference Manual, Working Draft

August 15, 2013
Author(s)
Kristen Greene, Franklin Tamborello
ACT-Touch is a set of manual motor request extensions for ACT-R 6 (Adaptive Control of Thought-Rational, hereafter, ACT-R) . These manual request extensions constitute theoretical claims predicting motor preparation and execution times for certain manual

Overview of the TREC 2011 Microblog Track

August 15, 2013
Author(s)
Ian M. Soboroff, Iadh Ounis, Craig Macdonald, Jimmy Lin
The Microblog track examines search tasks and evaluation methodologies for information seeking behaviors in microblogging environments such as Twitter. It was first introduced in 2011, addressing a real-time adhoc search task, whereby the user wishes to

Electrically-protected resonant exchange qubits in triple quantum dots

July 31, 2013
Author(s)
Jacob M. Taylor, Vanita Srinivasa, Medford Jim
We present a modulated microwave approach for quantum computing with qubits comprising three spins in a triple quantum dot. This approach includes single- and two-qubit gates that are protected against low-frequency electrical noise, due to an operating

Where in the Internet is Congestion?

July 26, 2013
Author(s)
Daniel I. Genin
Understanding distribution of congestion in the Internet is a long-standing problem. Using data from the SamKnows US broadband access network measurement study, commissioned by the FCC, we explore patterns of congestion distribution in DSL and cable

Shape Calculus for Shape Energies in Image Processing

July 22, 2013
Author(s)
Gunay Dogan, Ricardo H. Nochetto
Many image processing problems are naturally expressed as energy minimization or shape optimization problems, in which the free variable is a shape, such as a curve in 2d or a surface in 3d. Examples are image segmentation, multiview stereo reconstruction

Digital Signature Standard (DSS)

July 19, 2013
Author(s)
National Institute of Standards and Technology (NIST), Elaine Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed

ITL Issues Guidelines for Managing the Security of Mobile Devices

July 15, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin announces the publication of NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Movile Devices in the Enterprise. The revised guidelines will assist organizations in managing the security of mobile

RECON -- A Controlled English for Business Rules

July 13, 2013
Author(s)
Fabian M. Neuhaus, Edward J. Barkmeyer Jr.
Capturing business rules in a formal logic representation supports the enterprise in two important ways: it enables the evaluation of logs and audit records for conformance to, or violation of, the rules; and it enables the conforming automation of some

Initial ACT-R Extensions for User Modeling in the Mobile Touchscreen Domain

July 12, 2013
Author(s)
Kristen Greene, Franklin Tamborello
Advances in mobile touchscreen computing offer new opportunities to test traditional cognitive architectures and modeling tools in a novel task domain. ACT-Touch, an extension of the ACT-R 6 (Adaptive Control of Thought- Rational) cognitive architecture

IREX VI - Temporal Stability of Iris Recognition Accuracy

July 11, 2013
Author(s)
Patrick J. Grother, James R. Matey, Elham Tabassi, George W. Quinn, Michael Chumakov
Background: Stability is a required definitional property for a biometric to be useful. Quantitative statements of stability are operationally important as they dictate re-enrollment schedules e.g. of a face on a passport. Ophthalmologists consider the

Strong equivalence of reversible circuits is coNP-complete

July 2, 2013
Author(s)
Stephen P. Jordan
It is well-known that deciding equivalence of logic circuits is a coNP-complete problem. As a corollary, the problem of deciding weak equivalence of reversible circuits, i.e. ignoring the ancilla bits, is also coNP-complete. The complexity of deciding

Overview of the TREC 2012 Medical Records Track

June 28, 2013
Author(s)
Ellen M. Voorhees, William Hersh
The TREC Medical Records track fosters research that allows electronic health records to be retrieved based on the semantic content of free-text fields. The ability to find records by matching semantic content will enhance clinical care and support the
Displaying 826 - 850 of 2269
Was this page helpful?