Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 901 - 925 of 2282

Configuration of profiling tools for C/C++ applications under 64-bit Linux

March 20, 2013
Author(s)
David W. Flater
Application profiling tools are the instruments used to measure software performance at the function and application levels. Without careful configuration of the tools and the environment, invalid results are readily obtained. The errors may not become

Fast, All-Optical, Zero to PI Continuously Controllable Kerr Phase Gate

March 13, 2013
Author(s)
Runbing Li, Lu Deng, Edward W. Hagley
We demonstrate a fast-responding Kerr phase gate using a room-temperature 85Rb vapor operated in a Raman gain scheme where the probe/signal wave travels “superluminally”. Continuously controllable nonlinear Kerr phase shift of the probe wave from 0 to π

A Hybrid CPU-GPU Approach to Fourier-Based Image Stitching of Optical Microscopy Images

March 3, 2013
Author(s)
Walid Keyrouz, Timothy J. Blattner, Bertrand C. Stivalet, Joe Chalfoun, Mary C. Brady, Shujia Zhou
We present a hybrid CPU-GPU approach for the Fourier-based stitching of optical microscopy images. This system achieves sub-minute stitching rates with large grids; it stitches a grid of 59x42 tiles in 26 seconds on a two-CPU (8 physical cores) & two-GPU

Dynamic Key Refreshment for Smart Grid Mesh Network Security

February 24, 2013
Author(s)
Hamid Gharavi
This paper presents a dynamically updating key distribution strategy to enhance mesh network security against cyber attacks. The scheme has been applied to two security protocols known as Simultaneous Authentication of Equals (SAE) and Efficient Mesh

Latent Interoperability Transmission Specification

February 5, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
The Latent Interoperability Transmission Specification (LITS) is an application profile of the American National Standards Institute/National Institute of Standards and Technology, Information Technology Laboratory (ANSI/NIST-ITL) standard entitled

Markup Instructions for Extended Friction Ridge Features

February 5, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, Peter Komarinski, John Mayer-Splain, Rachel Wallner
This document provides instructions for latent print examiners in marking friction ridge features to maximize consistency among examiners. This document builds upon the Extended Feature Set (EFS) defined in American National Standards Institute/National

Mapping Evidence Graphs to Attack Graphs

January 17, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them for forensic analysis. In this paper, we show how to map evidence graphs to

Using Attack Graphs in Forensic Examinations

January 16, 2013
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help

Segmenting Time-lapse Phase Contrast Images of Adjacent NIH 3T3 Cells

January 15, 2013
Author(s)
Joe Chalfoun, Alden A. Dima, Marcin Kociolek, Michael W. Halter, Antonio Cardone, Adele P. Peskin, Peter Bajcsy, Mary C. Brady
We present a new method for segmenting phase contrast images of NIH 3T3 fibroblast cells that is accurate even when cells are in contact. The problem of segmentation, when cells are in contact, poses a challenge to the accurate automation of cell counting

Extended Feature Set Profile Specification

January 14, 2013
Author(s)
Melissa Taylor, Will Chapman, Austin Hicklin, George Kiebuzinski, John Mayer-Splain, Rachel Wallner, Peter Komarinski
This specification defines Extended Feature Set (EFS) Profiles - sets of features to be used in latent friction ridge (fingerprint, palmprint or plantar) searches of automated friction ridge identification systems (AFIS). The EFS Profiles are designed to

Evaluating Real-Time Search over Tweets

December 10, 2012
Author(s)
Ian M. Soboroff, Dean P. McCullough, Jimmy Lin, Craig Macdonald, Iadh Ounis, Richard McCreadie
Twitter offers a phenomenal platform for the social sharing of information. We describe new resources that have been created in the context of the Text Retrieval Conference (TREC) to support the academic study of Twitter as a real-time information source

Wireless Network Deployment in the Smart Grid: Design and Evaluation Issues

November 30, 2012
Author(s)
Camillo A. Gentile, David W. Griffith, Michael R. Souryal
The projected use of the power grid for “smart” applications such as advanced metering and distributed automation will require highly reliable, secure, well-designed and managed communication networks. While many of the benefits of wireless communications

A Credential Reliability and Revocation Model for Federated Identities

November 29, 2012
Author(s)
Hildegard Ferraiolo
A large number of Identity Management Systems (IDMSs) are being deployed worldwide that use different technologies for the population of their users. With the diverse set of technologies, and the unique business requirements for organizations to federate

Smart Networked Systems and Societies: Research Challenges

November 20, 2012
Author(s)
Ram D. Sriram
We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utilize a

Fast Sequential Importance Sampling to Estimate the Graph Reliability Polynomial

November 8, 2012
Author(s)
David G. Harris, Francis Sullivan, Isabel M. Beichl
The reliability polynomial of a graph measures the number of its connected subgraphs of various sizes. Algortihms based on sequential importance sampling (SIS) have been proposed to estimate a graph's reliahbility polynomial. We develop an improved SIS

On Distributed Energy Routing Protocols in the Smart Grid

November 5, 2012
Author(s)
Jie Lin, Guobin Xu, David W. Griffith, Xinyu Yang, Wei Yu
The Smart Grid is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. It promises to integrate distributed energy resources with conventional generation plants, and intelligently transmit energy

The New Golden Age of Algorithms and Data Structures

October 29, 2012
Author(s)
Paul E. Black
Before 1976 Communications of the ACM printed (and numbered!) new algorithms every issue. Quicksort was invented in 1960, Boyer-Moore string search in 1977, and combsort in 1980. I haven't seen a new, general sorting algorithm in over a decade. The latest
Displaying 901 - 925 of 2282
Was this page helpful?