Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 851 - 875 of 2269

The Challenge of Face Recognition From Digital Point-and-Shoot Cameras

June 25, 2013
Author(s)
P J. Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, Geof H. Givens, Yui M. Lui, Hao Zhang, W T. Scruggs, Kevin W. Bowyer, Patrick J. Flynn, Su L. Cheng
Face recognition is appearing in personal and commercial products at an astonishing rate, yet reliable face recognition remains challenging. Users expect a lot; they want to snap pictures and have their friends, family and acquaintances recognized. This

Enabling an Enterprise-wide, Data-centric Operating Environment

June 21, 2013
Author(s)
David F. Ferraiolo, Serban I. Gavrila, Wayne Jansen
Although access control (AC) currently plays an important role in securing DSs, if properly envisaged and designed, access control can serve a more vital role in computing than one might expect. The Policy Machine (PM), a framework for AC developed at NIST

Exposing Software Security and Availability Risks For Commercial Mobile Devices

June 21, 2013
Author(s)
Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeff Voas
In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including libraries

Combinatorial Methods in Testing

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 1 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Combinatorial Testing Applied

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 2 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Evolution From Design of Experiments

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 14 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the

Measuring Combinatorial Coverage

June 20, 2013
Author(s)
David R. Kuhn, Raghu N. Kacker
Chapter 7 in "Introduction to Combinatorial Testing" from CRC Press. Background material for Introduction to Combinatorial Testing from NIST SP 800-142 and other technical papers, which explain concepts of combinatorial testing, application to the Document

Distributed Coverage Optimization in a Network of Static and Mobile Sensors

June 17, 2013
Author(s)
Kamran Sayrafian, Hamid Mahboubi, Jalal Habibi, Amir Aghdam
This paper proposes efficient schemes to increase sensing coverage in a network composed of both mobile and static sensors. The proposed deployment techniques properly assign a virtual weight to every point in the sensing field, based on the information

ITL Updates Glossary of Key Information Security Terms

June 12, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletins describes the recent update of NISTIR 7298, Glossary of Key Information Security Terms. NISTIR 7298, Revision 2, provides a summary glossary of terms used in NIST publications and other relevant sources.

SHREC13 Track: Large Scale Sketch-Based 3D Shape Retrieval

June 6, 2013
Author(s)
Afzal A. Godil, Bo Li , Yijuan Lu, Tobias Schreck
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods based on a large scale hand-drawn sketch

In-plane Rotation and Scale Invariant Clustering and Dictionary Learning

June 3, 2013
Author(s)
P J. Phillips, Challa Sastry, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
n this paper, we present an approach that simulta- neously clusters images and learns dictionaries from the clusters. The method learns dictionaries in the Radon transform domain, while clustering in the image domain. The main feature of the proposed

Modeling a Nationwide Public Safety Broadband Network

June 1, 2013
Author(s)
Richard A. Rouil, Antonio Izquierdo Manzanares, Michael R. Souryal, Camillo Gentile, David W. Griffith, Nada T. Golmie
As governments plan nationwide, interoperable broadband networks for their public safety services, the challenge arises of determining how and where to invest limited resources to meet demanding requirements. The United States is at the early stages of

Testing quantum expanders is co-QMA-complete

May 31, 2013
Author(s)
Yi-Kai Liu, Stephen P. Jordan, Pawel Wocjan, Adam Bookatz
A quantum expander is a unital quantum channel that is rapidly mixing, has only a few Kraus operators, and can be implemented efficiently on a quantum computer. We consider the problem of estimating the mixing time (i.e., the spectral gap) of a quantum

The Economic Benefits from Improved Cyber Security Infrastructure

May 22, 2013
Author(s)
Gregory C. Tassey
Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities, and

Writing Guidelines to Develop an Memorandum of Understanding for Interoperable Automated Fingerprint Identification Systems

May 14, 2013
Author(s)
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the

Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs

May 10, 2013
Author(s)
Rene C. Peralta, Jose A. Montenegro, Javier Lopez
This work describes the design and implementation of an auction system using secure multiparty computation techniques. Our aim is to produce a system that is practical under actual eld constraints on computation, mem- ory, and communication. The underlying
Displaying 851 - 875 of 2269
Was this page helpful?