Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 926 - 950 of 2269

Signal Processing Techniques for Smart Grid: Scanning the Issue

September 2, 2012
Author(s)
Hamid Gharavi
This is an editorial article for a special issue on Smart Grid. The main emphasis of this issue is the technical challenges of the Smart Grid from a signal processing perspective. Therefore, the selected articles aim at articulating signal processing

Big Data Issues in Quantitative Imaging

August 29, 2012
Author(s)
Mary C. Brady, Alden A. Dima, Charles D. Fenimore, James J. Filliben, John Lu, Adele Peskin, Mala Ramaiah, Ganesh Saiprasad, Ram D. Sriram

An Exploration of the Operational Ramifications of Lossless Compression of 1000 ppi Fingerprint Imagery

August 6, 2012
Author(s)
Shahram Orandi, John M. Libert, John D. Grantham, Kenneth Ko, Stephen S. Wood, Jin Chu Wu, Lindsay M. Petersen, Bruce Bandini
This paper presents the findings of a study initially conducted to measure the operational impact of JPEG 2000 lossy compression on 1000 ppi fingerprint imagery at various levels of compression, but later expanded to include lossless compression. Lossless

Efficient Methods for Interoperability Testing Using Event Sequences

July 31, 2012
Author(s)
David R. Kuhn, James M. Higdon, J .M. Lawrence, Raghu N. Kacker, Yu Lei
Many software testing problems involve sequences of events. The methods described in this paper were motivated by testing needs of mission critical systems that may accept multiple communication or sensor inputs and generate output to several communication

Mobile Application Device Power Usage Measurements

July 31, 2012
Author(s)
Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeff Voas
Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recent

Feature-preserved 3D Canonical Form

July 28, 2012
Author(s)
Afzal A. Godil, Zhouhui Lian
Abstract Measuring the dissimilarity between non-rigid objects is a challenging problem in 3D shape retrieval. One potential solution is to construct the models’ 3D canonical forms (i.e., isometry-invariant representations in 3D Euclidean domain) on which

The Date-Time Vocabulary

July 28, 2012
Author(s)
Mark H. Linehan, Edward J. Barkmeyer Jr., Stan Hendryx
The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary" (i.e

What's Special About Cloud Security?

July 16, 2012
Author(s)
Peter M. Mell
While cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it is not clear what security issues are special with respect to cloud computing. To approach this question, we attempt to derive cloud security issues

Preparing for and Responding to CA Compromise and Fraudulent Certificate Issuance

July 10, 2012
Author(s)
Paul Turner, William Polk, Elaine B. Barker
As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certificates

Continuous-variable quantum compressed sensing

July 9, 2012
Author(s)
Yi-Kai Liu, Matthias Ohliger, Vincent Nesme, David Gross, Jens Eisert
We introduce a novel method to faithfully reconstruct unknown quantum states that are approximately low-rank, using only a few measurement settings. The method is general enough to allow for measurements from a continuous family, and is also applicable to

Maximum Life Span Strategy for Target Tracking in Mobile Sensor Networks

June 29, 2012
Author(s)
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Amir G. Aghdam, Walid Masoudimansour
In this paper, an energy-efficient technique is proposed for tracking a target in a field using a network of mobile sensors while maximizing the life span of the network. The most important energy consumption sources in a mobile sensor network (MSN) are

Wireless Networks for Smart Grid Applications

June 29, 2012
Author(s)
David W. Griffith, Michael R. Souryal, Nada T. Golmie
This chapter discusses the use of wireless networks in the context of the smart grid. First, it provides an overview of the various applications envisaged in the smart grid and discusses their communication requirements. Sifting through thousands of

Combinatorial Testing

June 25, 2012
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing is a method that can reduce cost and improve test effectiveness significantly for many applications. The key insight underlying this form of testing is that not every parameter contributes to every failure, and empirical data suggest

Predicting Global Failure Regimes in Complex Information Systems

June 19, 2012
Author(s)
Christopher E. Dabrowski, James J. Filliben, Kevin L. Mills
Over the past five years, we investigated methods to characterize global behavior in large distributed systems and applied those methods to predict effects from deploying alternate distributed control algorithms. The methods we used assess global behaviors

A New Convexity Measurement for 3D Meshes

June 16, 2012
Author(s)
Afzal A. Godil, Zhouhui Lian
This paper presents a novel convexity measurement for 3D meshes. The new convexity measure is calculated by minimizing the ratio of the summed area of valid regions in a mesh’s six views, which are projected on faces of the bounding box whose edges are

Grand Challenges of Measurement Science with Big Data

June 14, 2012
Author(s)
Peter Bajcsy
This presentation discusses Grand Challenges of Measurement Science with Big Data. It illustrates the difference between Measurement Science with Little Data and Big Data in the domain of cell biology and microscopy image observations.

Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense

June 11, 2012
Author(s)
Rui Zhuang, Su Zhang, Scott DeLoach, Xinming Ou, Anoop Singhal
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network's configuration can increase the difficulty

The Internet of Things: A Reality Check

June 11, 2012
Author(s)
George Hurlburt, Jeff Voas, Keith Miller
The short persepctive explains the concept behind Internet of Things (IoT). The publication is a perspectives piece for an IEEE magazine and not intended to be technical. This is intended to be published in a specific column in the magazine.

An Assessment of the Accuracy of Automatic Evaluation in Summarization

June 8, 2012
Author(s)
Karolina K. Owczarzak, John M. Conroy, Hoa T. Dang, Ani Nenkova
Automatic evaluation has greatly facilitated system development in summarization. At the same time, the use of automatic evaluation has been viewed with mistrust by many, as its accuracy and correct application are not well understood. In this paper we
Displaying 926 - 950 of 2269
Was this page helpful?