Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 901 - 925 of 2269

Evaluating Real-Time Search over Tweets

December 10, 2012
Author(s)
Ian M. Soboroff, Dean P. McCullough, Jimmy Lin, Craig Macdonald, Iadh Ounis, Richard McCreadie
Twitter offers a phenomenal platform for the social sharing of information. We describe new resources that have been created in the context of the Text Retrieval Conference (TREC) to support the academic study of Twitter as a real-time information source

Wireless Network Deployment in the Smart Grid: Design and Evaluation Issues

November 30, 2012
Author(s)
Camillo A. Gentile, David W. Griffith, Michael R. Souryal
The projected use of the power grid for “smart” applications such as advanced metering and distributed automation will require highly reliable, secure, well-designed and managed communication networks. While many of the benefits of wireless communications

A Credential Reliability and Revocation Model for Federated Identities

November 29, 2012
Author(s)
Hildegard Ferraiolo
A large number of Identity Management Systems (IDMSs) are being deployed worldwide that use different technologies for the population of their users. With the diverse set of technologies, and the unique business requirements for organizations to federate

Smart Networked Systems and Societies: Research Challenges

November 20, 2012
Author(s)
Ram D. Sriram
We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utilize a

Fast Sequential Importance Sampling to Estimate the Graph Reliability Polynomial

November 8, 2012
Author(s)
David G. Harris, Francis Sullivan, Isabel M. Beichl
The reliability polynomial of a graph measures the number of its connected subgraphs of various sizes. Algortihms based on sequential importance sampling (SIS) have been proposed to estimate a graph's reliahbility polynomial. We develop an improved SIS

On Distributed Energy Routing Protocols in the Smart Grid

November 5, 2012
Author(s)
Jie Lin, Guobin Xu, David W. Griffith, Xinyu Yang, Wei Yu
The Smart Grid is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. It promises to integrate distributed energy resources with conventional generation plants, and intelligently transmit energy

The New Golden Age of Algorithms and Data Structures

October 29, 2012
Author(s)
Paul E. Black
Before 1976 Communications of the ACM printed (and numbered!) new algorithms every issue. Quicksort was invented in 1960, Boyer-Moore string search in 1977, and combsort in 1980. I haven't seen a new, general sorting algorithm in over a decade. The latest

Circuit Quantum Electrodynamics with a Spin-Orbit Qubit

October 17, 2012
Author(s)
Jacob M. Taylor, Karl Petersson, L. McFaul, M. Schroer, M. Jung, Andrew Houck, Jason Petta
We develop a circuit quantum electrodynamics architecture for spin qubits by coupling an InAs double quantum dot to a high quality factor superconducting cavity. A charge trapped in the double quantum dot interacts with the electric field of the cavity

Comparing Face Recognition Algorithms to Humans on Challenging Tasks

October 17, 2012
Author(s)
P J. Phillips, Alice O'Toole, Xiaobo An, Joseph Dunlop, Vaidehi Natu
We compared face identifcation by humans and machines using images taken under a variety of uncontrolled illumination conditions in both indoor and outdoor settings. Natural variations in a person's day-to-day appearance (e.g., hair style, facial

Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics

October 11, 2012
Author(s)
Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal
A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing

How to Select Microscopy Image Similarity Metrics?

October 10, 2012
Author(s)
Peter Bajcsy, Joe Chalfoun, Mary C. Brady
Comparisons of two microscopy images can be accomplished in many different ways. This paper presents a system that recommends appropriate similarity metrics for microscopy image comparisons based on biological application requirements. The motivation stems

Toward a Recommendation System for Image Similarity Metrics

October 7, 2012
Author(s)
Peter Bajcsy, Joe Chalfoun, Mary C. Brady
This paper addresses the problem of mapping application specific requirements on image similarity metrics to the plethora of existing image similarity computations. The work is motivated by the fact that there is no recommendation method for choosing a

Interference Mitigation Using Adaptive Schemes in Body Area Networks

September 30, 2012
Author(s)
Wen-Bin Yang, Kamran Sayrafian
Considering the medical nature of the information carried in Body Area Networks (BAN), interference from coexisting wireless networks or even other nearby BANs could create serious problems on their operational reliability. As practical implementation of

A comparison of methods for Non-rigid 3D shape retrieval

September 26, 2012
Author(s)
Zhouhui Lian, Afzal A. Godil
Non-rigid 3D shape retrieval has become an active and important research topic in content-based 3D object retrieval. The aim of this paper is to measure and compare the performance of state-of-the-art methods for non-rigid 3D shape retrieval. The paper

An evaluation of local shape descriptors for 3D shape retrieval

September 26, 2012
Author(s)
Afzal A. Godil, Sarah Y. Tang
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. A common approach is to calculate a shape descriptor for each object, which can then be compared to determine two objects’ similarity. However

Guide for Conducting Risk Assessments

September 17, 2012
Author(s)
Ronald S. Ross
The purpose of Special Publication 800-30 is to provide guidance for conducting risk assessments of federal information systems and organizations, amplifying the guidance provided in Special Publication 800-39. This document provides guidance for carrying

Boundary Discovery in Complex Systems

September 5, 2012
Author(s)
Eric D. Simmon, Joseph Chalfoun, Arthur Griesser
Many of today’s extremely complex meta-systems are cross-domain, they require development by multiple stakeholder groups with different goals each implementing a sub-set of the functionality required for the entire meta-system to operate. As these systems
Displaying 901 - 925 of 2269
Was this page helpful?