Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 926 - 950 of 2282

Circuit Quantum Electrodynamics with a Spin-Orbit Qubit

October 17, 2012
Author(s)
Jacob M. Taylor, Karl Petersson, L. McFaul, M. Schroer, M. Jung, Andrew Houck, Jason Petta
We develop a circuit quantum electrodynamics architecture for spin qubits by coupling an InAs double quantum dot to a high quality factor superconducting cavity. A charge trapped in the double quantum dot interacts with the electric field of the cavity

Comparing Face Recognition Algorithms to Humans on Challenging Tasks

October 17, 2012
Author(s)
P J. Phillips, Alice O'Toole, Xiaobo An, Joseph Dunlop, Vaidehi Natu
We compared face identifcation by humans and machines using images taken under a variety of uncontrolled illumination conditions in both indoor and outdoor settings. Natural variations in a person's day-to-day appearance (e.g., hair style, facial

Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics

October 11, 2012
Author(s)
Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal
A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing

How to Select Microscopy Image Similarity Metrics?

October 10, 2012
Author(s)
Peter Bajcsy, Joe Chalfoun, Mary C. Brady
Comparisons of two microscopy images can be accomplished in many different ways. This paper presents a system that recommends appropriate similarity metrics for microscopy image comparisons based on biological application requirements. The motivation stems

Toward a Recommendation System for Image Similarity Metrics

October 7, 2012
Author(s)
Peter Bajcsy, Joe Chalfoun, Mary C. Brady
This paper addresses the problem of mapping application specific requirements on image similarity metrics to the plethora of existing image similarity computations. The work is motivated by the fact that there is no recommendation method for choosing a

Interference Mitigation Using Adaptive Schemes in Body Area Networks

September 30, 2012
Author(s)
Wen-Bin Yang, Kamran Sayrafian
Considering the medical nature of the information carried in Body Area Networks (BAN), interference from coexisting wireless networks or even other nearby BANs could create serious problems on their operational reliability. As practical implementation of

A comparison of methods for Non-rigid 3D shape retrieval

September 26, 2012
Author(s)
Zhouhui Lian, Afzal A. Godil
Non-rigid 3D shape retrieval has become an active and important research topic in content-based 3D object retrieval. The aim of this paper is to measure and compare the performance of state-of-the-art methods for non-rigid 3D shape retrieval. The paper

An evaluation of local shape descriptors for 3D shape retrieval

September 26, 2012
Author(s)
Afzal A. Godil, Sarah Y. Tang
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. A common approach is to calculate a shape descriptor for each object, which can then be compared to determine two objects’ similarity. However

Guide for Conducting Risk Assessments

September 17, 2012
Author(s)
Ronald S. Ross
The purpose of Special Publication 800-30 is to provide guidance for conducting risk assessments of federal information systems and organizations, amplifying the guidance provided in Special Publication 800-39. This document provides guidance for carrying

Boundary Discovery in Complex Systems

September 5, 2012
Author(s)
Eric D. Simmon, Joseph Chalfoun, Arthur Griesser
Many of today’s extremely complex meta-systems are cross-domain, they require development by multiple stakeholder groups with different goals each implementing a sub-set of the functionality required for the entire meta-system to operate. As these systems

Signal Processing Techniques for Smart Grid: Scanning the Issue

September 2, 2012
Author(s)
Hamid Gharavi
This is an editorial article for a special issue on Smart Grid. The main emphasis of this issue is the technical challenges of the Smart Grid from a signal processing perspective. Therefore, the selected articles aim at articulating signal processing

Big Data Issues in Quantitative Imaging

August 29, 2012
Author(s)
Mary C. Brady, Alden A. Dima, Charles D. Fenimore, James J. Filliben, John Lu, Adele Peskin, Mala Ramaiah, Ganesh Saiprasad, Ram D. Sriram

An Exploration of the Operational Ramifications of Lossless Compression of 1000 ppi Fingerprint Imagery

August 6, 2012
Author(s)
Shahram Orandi, John M. Libert, John D. Grantham, Kenneth Ko, Stephen S. Wood, Jin Chu Wu, Lindsay M. Petersen, Bruce Bandini
This paper presents the findings of a study initially conducted to measure the operational impact of JPEG 2000 lossy compression on 1000 ppi fingerprint imagery at various levels of compression, but later expanded to include lossless compression. Lossless

Efficient Methods for Interoperability Testing Using Event Sequences

July 31, 2012
Author(s)
David R. Kuhn, James M. Higdon, J .M. Lawrence, Raghu N. Kacker, Yu Lei
Many software testing problems involve sequences of events. The methods described in this paper were motivated by testing needs of mission critical systems that may accept multiple communication or sensor inputs and generate output to several communication

Mobile Application Device Power Usage Measurements

July 31, 2012
Author(s)
Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeff Voas
Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recent

Feature-preserved 3D Canonical Form

July 28, 2012
Author(s)
Afzal A. Godil, Zhouhui Lian
Abstract Measuring the dissimilarity between non-rigid objects is a challenging problem in 3D shape retrieval. One potential solution is to construct the models’ 3D canonical forms (i.e., isometry-invariant representations in 3D Euclidean domain) on which

The Date-Time Vocabulary

July 28, 2012
Author(s)
Mark H. Linehan, Edward J. Barkmeyer Jr., Stan Hendryx
The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary" (i.e

What's Special About Cloud Security?

July 16, 2012
Author(s)
Peter M. Mell
While cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it is not clear what security issues are special with respect to cloud computing. To approach this question, we attempt to derive cloud security issues

Preparing for and Responding to CA Compromise and Fraudulent Certificate Issuance

July 10, 2012
Author(s)
Paul Turner, William Polk, Elaine B. Barker
As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certificates
Displaying 926 - 950 of 2282
Was this page helpful?