Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 876 - 900 of 2269

Towards Ontology Evaluation across the Life Cycle

May 3, 2013
Author(s)
Fabian M. Neuhaus, Amanda Vizedom, Ken Baclawski, Mike Bennet, Mike Dean, Michael Denny, Michael Gruninger, Ali Hashemi, Terry Longstreth, Leo Obrst, Steven R. Ray, Ram D. Sriram, Todd Schneider, Marcela Vegetti, Matthew West, Peter Yim
Currently, there is no agreed on methodology for development of ontologies, and there is no consensus on how ontologies should be evaluated. Consequently, evaluation techniques and tools are not widely utilized in the development of ontologies. This can

ITL Publishes Security and Privacy Controls for Federal Agencies

May 1, 2013
Author(s)
Elizabeth B. Lennon
This ITL Bulletin for May 2013 announces the publication of NIST Special Publication 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Developed by the Joint Task Force Transformation Initiative

Writing Guidelines for Requests for Proposals for Automated Fingerprint Identification Systems

April 25, 2013
Author(s)
Susan M. Ballou, Michael Garris, Anthony Clay, Joi Dickerson, Peter T. Higgins, Janet Hoin, Lisa Jackson, Mike Lesko, Joe Morrissey, Leo Norton, Beth Owens, Joe Polski, Melissa Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the

The Biological Evidence Preservation Handbook: Best Practices for Evidence Handlers

April 23, 2013
Author(s)
Susan M. Ballou, Margaret C. Kline, Mark D. Stolorow, Melissa Taylor, Shannan Williams, Phylis S. Bamberger, Burney Yvette, Larry Brown, Cynthia E. Jones, Ralph Keaton, William Kiley, Karen Thiessen, Gerry LaPorte, Joseph Latta, Linda E. Ledray, Randy Nagy, Linda Schwind, Stephanie Stoiloff, Brian Ostrom
The report of the Technical Working Group on Biological Evidence Preservation offers guidance for individuals involved in the collection, examination, tracking, packaging, storing, and disposition of biological evidence. This may include crime scene

Dictionary Learning from Ambiguously Labeled Data

April 9, 2013
Author(s)
P J. Phillips, Yi-Chen Chen, Vishal M. Patel, Jaishanker K. Pillai, Rama Chellappa
We propose a novel dictionary-based learning method for ambiguously labeled multiclass classification, where each training sample has multiple labels and only one of them is the correct label. The dictionary learning problem is solved using an iterative

Logic Minimization Techniques with Applications to Cryptology

April 1, 2013
Author(s)
Joan Boyar, Philip Matthews, Rene Peralta
A new technique for combinational logic optimization is described. The technique is a two-step process. In the rst step, the non-linearity of a circuit as measured by the number of non-linear gates it contains is reduced. The second step reduces the number

Configuration of profiling tools for C/C++ applications under 64-bit Linux

March 20, 2013
Author(s)
David W. Flater
Application profiling tools are the instruments used to measure software performance at the function and application levels. Without careful configuration of the tools and the environment, invalid results are readily obtained. The errors may not become

Fast, All-Optical, Zero to PI Continuously Controllable Kerr Phase Gate

March 13, 2013
Author(s)
Runbing Li, Lu Deng, Edward W. Hagley
We demonstrate a fast-responding Kerr phase gate using a room-temperature 85Rb vapor operated in a Raman gain scheme where the probe/signal wave travels “superluminally”. Continuously controllable nonlinear Kerr phase shift of the probe wave from 0 to π

A Hybrid CPU-GPU Approach to Fourier-Based Image Stitching of Optical Microscopy Images

March 3, 2013
Author(s)
Walid Keyrouz, Timothy J. Blattner, Bertrand C. Stivalet, Joe Chalfoun, Mary C. Brady, Shujia Zhou
We present a hybrid CPU-GPU approach for the Fourier-based stitching of optical microscopy images. This system achieves sub-minute stitching rates with large grids; it stitches a grid of 59x42 tiles in 26 seconds on a two-CPU (8 physical cores) & two-GPU

Dynamic Key Refreshment for Smart Grid Mesh Network Security

February 24, 2013
Author(s)
Hamid Gharavi
This paper presents a dynamically updating key distribution strategy to enhance mesh network security against cyber attacks. The scheme has been applied to two security protocols known as Simultaneous Authentication of Equals (SAE) and Efficient Mesh

Latent Interoperability Transmission Specification

February 5, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
The Latent Interoperability Transmission Specification (LITS) is an application profile of the American National Standards Institute/National Institute of Standards and Technology, Information Technology Laboratory (ANSI/NIST-ITL) standard entitled

Markup Instructions for Extended Friction Ridge Features

February 5, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
This document provides instructions for latent print examiners in marking friction ridge features to maximize consistency among examiners. This document builds upon the Extended Feature Set (EFS) defined in American National Standards Institute/National

Mapping Evidence Graphs to Attack Graphs

January 17, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them for forensic analysis. In this paper, we show how to map evidence graphs to

Using Attack Graphs in Forensic Examinations

January 16, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help

Segmenting Time-lapse Phase Contrast Images of Adjacent NIH 3T3 Cells

January 15, 2013
Author(s)
Joe Chalfoun, Alden A. Dima, Marcin Kociolek, Michael W. Halter, Antonio Cardone, Adele P. Peskin, Peter Bajcsy, Mary C. Brady
We present a new method for segmenting phase contrast images of NIH 3T3 fibroblast cells that is accurate even when cells are in contact. The problem of segmentation, when cells are in contact, poses a challenge to the accurate automation of cell counting

Extended Feature Set Profile Specification

January 14, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, John Mayer-Splain, Rachel Wallner, Peter Komarinski
This specification defines Extended Feature Set (EFS) Profiles - sets of features to be used in latent friction ridge (fingerprint, palmprint or plantar) searches of automated friction ridge identification systems (AFIS). The EFS Profiles are designed to
Displaying 876 - 900 of 2269
Was this page helpful?