Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 876 - 900 of 2282

SHREC13 Track: Large Scale Sketch-Based 3D Shape Retrieval

June 6, 2013
Author(s)
Afzal A. Godil, Bo Li , Yijuan Lu, Tobias Schreck
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods based on a large scale hand-drawn sketch

In-plane Rotation and Scale Invariant Clustering and Dictionary Learning

June 3, 2013
Author(s)
P J. Phillips, Challa Sastry, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
n this paper, we present an approach that simulta- neously clusters images and learns dictionaries from the clusters. The method learns dictionaries in the Radon transform domain, while clustering in the image domain. The main feature of the proposed

Modeling a Nationwide Public Safety Broadband Network

June 1, 2013
Author(s)
Richard A. Rouil, Antonio Izquierdo Manzanares, Michael R. Souryal, Camillo Gentile, David W. Griffith, Nada T. Golmie
As governments plan nationwide, interoperable broadband networks for their public safety services, the challenge arises of determining how and where to invest limited resources to meet demanding requirements. The United States is at the early stages of

Testing quantum expanders is co-QMA-complete

May 31, 2013
Author(s)
Yi-Kai Liu, Stephen P. Jordan, Pawel Wocjan, Adam Bookatz
A quantum expander is a unital quantum channel that is rapidly mixing, has only a few Kraus operators, and can be implemented efficiently on a quantum computer. We consider the problem of estimating the mixing time (i.e., the spectral gap) of a quantum

The Economic Benefits from Improved Cyber Security Infrastructure

May 22, 2013
Author(s)
Gregory C. Tassey
Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities, and

Writing Guidelines to Develop an Memorandum of Understanding for Interoperable Automated Fingerprint Identification Systems

May 14, 2013
Author(s)
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the

Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs

May 10, 2013
Author(s)
Rene C. Peralta, Jose A. Montenegro, Javier Lopez
This work describes the design and implementation of an auction system using secure multiparty computation techniques. Our aim is to produce a system that is practical under actual eld constraints on computation, mem- ory, and communication. The underlying

Towards Ontology Evaluation across the Life Cycle

May 3, 2013
Author(s)
Fabian M. Neuhaus, Amanda Vizedom, Ken Baclawski, Mike Bennet, Mike Dean, Michael Denny, Michael Gruninger, Ali Hashemi, Terry Longstreth, Leo Obrst, Steven R. Ray, Ram D. Sriram, Todd Schneider, Marcela Vegetti, Matthew West, Peter Yim
Currently, there is no agreed on methodology for development of ontologies, and there is no consensus on how ontologies should be evaluated. Consequently, evaluation techniques and tools are not widely utilized in the development of ontologies. This can

ITL Publishes Security and Privacy Controls for Federal Agencies

May 1, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin for May 2013 announces the publication of NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Developed by the Joint Task Force Transformation Initiative

Writing Guidelines for Requests for Proposals for Automated Fingerprint Identification Systems

April 25, 2013
Author(s)
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Janet Hoin, Lisa Jackson, Mike Lesko, Joe Morrissey, Leo Norton, Beth Owens, Joe Polski, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the

The Biological Evidence Preservation Handbook: Best Practices for Evidence Handlers

April 23, 2013
Author(s)
Susan M. Ballou, Margaret C. Kline, Mark D. Stolorow, Melissa Taylor, Shannan Williams, Phylis S. Bamberger, Burney Yvette, Larry Brown, Cynthia E. Jones, Ralph Keaton, William Kiley, Karen Thiessen, Gerry LaPorte, Joseph Latta, Linda E. Ledray, Randy Nagy, Linda Schwind, Stephanie Stoiloff, Brian Ostrom
The report of the Technical Working Group on Biological Evidence Preservation offers guidance for individuals involved in the collection, examination, tracking, packaging, storing, and disposition of biological evidence. This may include crime scene

Dictionary Learning from Ambiguously Labeled Data

April 9, 2013
Author(s)
P J. Phillips, Yi-Chen Chen, Vishal M. Patel, Jaishanker K. Pillai, Rama Chellappa
We propose a novel dictionary-based learning method for ambiguously labeled multiclass classification, where each training sample has multiple labels and only one of them is the correct label. The dictionary learning problem is solved using an iterative

Logic Minimization Techniques with Applications to Cryptology

April 1, 2013
Author(s)
Joan Boyar, Philip Matthews, Rene Peralta
A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit as measured by the number of non-linear gates it contains is reduced. The second step reduces the number
Displaying 876 - 900 of 2282
Was this page helpful?