Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 851 - 875 of 2282

Where in the Internet is Congestion?

July 26, 2013
Author(s)
Daniel I. Genin
Understanding distribution of congestion in the Internet is a long-standing problem. Using data from the SamKnows US broadband access network measurement study, commissioned by the FCC, we explore patterns of congestion distribution in DSL and cable

Shape Calculus for Shape Energies in Image Processing

July 22, 2013
Author(s)
Gunay Dogan, Ricardo H. Nochetto
Many image processing problems are naturally expressed as energy minimization or shape optimization problems, in which the free variable is a shape, such as a curve in 2d or a surface in 3d. Examples are image segmentation, multiview stereo reconstruction

Digital Signature Standard (DSS)

July 19, 2013
Author(s)
National Institute of Standards and Technology (NIST), Elaine Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed

ITL Issues Guidelines for Managing the Security of Mobile Devices

July 15, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin announces the publication of NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Movile Devices in the Enterprise. The revised guidelines will assist organizations in managing the security of mobile

RECON -- A Controlled English for Business Rules

July 13, 2013
Author(s)
Fabian M. Neuhaus, Edward J. Barkmeyer Jr.
Capturing business rules in a formal logic representation supports the enterprise in two important ways: it enables the evaluation of logs and audit records for conformance to, or violation of, the rules; and it enables the conforming automation of some

Initial ACT-R Extensions for User Modeling in the Mobile Touchscreen Domain

July 12, 2013
Author(s)
Kristen Greene, Franklin Tamborello
Advances in mobile touchscreen computing offer new opportunities to test traditional cognitive architectures and modeling tools in a novel task domain. ACT-Touch, an extension of the ACT-R 6 (Adaptive Control of Thought- Rational) cognitive architecture

IREX VI - Temporal Stability of Iris Recognition Accuracy

July 11, 2013
Author(s)
Patrick J. Grother, James R. Matey, Elham Tabassi, George W. Quinn, Michael Chumakov
Background: Stability is a required definitional property for a biometric to be useful. Quantitative statements of stability are operationally important as they dictate re-enrollment schedules e.g. of a face on a passport. Ophthalmologists consider the

Strong equivalence of reversible circuits is coNP-complete

July 2, 2013
Author(s)
Stephen P. Jordan
It is well-known that deciding equivalence of logic circuits is a coNP-complete problem. As a corollary, the problem of deciding weak equivalence of reversible circuits, i.e. ignoring the ancilla bits, is also coNP-complete. The complexity of deciding

Overview of the TREC 2012 Medical Records Track

June 28, 2013
Author(s)
Ellen M. Voorhees, William Hersh
The TREC Medical Records track fosters research that allows electronic health records to be retrieved based on the semantic content of free-text fields. The ability to find records by matching semantic content will enhance clinical care and support the

The Challenge of Face Recognition From Digital Point-and-Shoot Cameras

June 25, 2013
Author(s)
P J. Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, Geof H. Givens, Yui M. Lui, Hao Zhang, W T. Scruggs, Kevin W. Bowyer, Patrick J. Flynn, Su L. Cheng
Face recognition is appearing in personal and commercial products at an astonishing rate, yet reliable face recognition remains challenging. Users expect a lot; they want to snap pictures and have their friends, family and acquaintances recognized. This

Enabling an Enterprise-wide, Data-centric Operating Environment

June 21, 2013
Author(s)
David F. Ferraiolo, Serban I. Gavrila, Wayne Jansen
Although access control (AC) currently plays an important role in securing DSs, if properly envisaged and designed, access control can serve a more vital role in computing than one might expect. The Policy Machine (PM), a framework for AC developed at NIST

Exposing Software Security and Availability Risks For Commercial Mobile Devices

June 21, 2013
Author(s)
Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeff Voas
In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including libraries

Combinatorial Methods in Testing

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 1 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Combinatorial Testing Applied

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 2 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Evolution From Design of Experiments

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 14 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the

Measuring Combinatorial Coverage

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 7 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Distributed Coverage Optimization in a Network of Static and Mobile Sensors

June 17, 2013
Author(s)
Kamran Sayrafian, Hamid Mahboubi, Jalal Habibi, Amir Aghdam
This paper proposes efficient schemes to increase sensing coverage in a network composed of both mobile and static sensors. The proposed deployment techniques properly assign a virtual weight to every point in the sensing field, based on the information

ITL Updates Glossary of Key Information Security Terms

June 12, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletins describes the recent update of NISTIR 7298, Glossary of Key Information Security Terms. NISTIR 7298, Revision 2, provides a summary glossary of terms used in NIST publications and other relevant sources.
Displaying 851 - 875 of 2282
Was this page helpful?