Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 951 - 975 of 2282

Continuous-variable quantum compressed sensing

July 9, 2012
Author(s)
Yi-Kai Liu, Matthias Ohliger, Vincent Nesme, David Gross, Jens Eisert
We introduce a novel method to faithfully reconstruct unknown quantum states that are approximately low-rank, using only a few measurement settings. The method is general enough to allow for measurements from a continuous family, and is also applicable to

Maximum Life Span Strategy for Target Tracking in Mobile Sensor Networks

June 29, 2012
Author(s)
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Amir G. Aghdam, Walid Masoudimansour
In this paper, an energy-efficient technique is proposed for tracking a target in a field using a network of mobile sensors while maximizing the life span of the network. The most important energy consumption sources in a mobile sensor network (MSN) are

Wireless Networks for Smart Grid Applications

June 29, 2012
Author(s)
David W. Griffith, Michael R. Souryal, Nada T. Golmie
This chapter discusses the use of wireless networks in the context of the smart grid. First, it provides an overview of the various applications envisaged in the smart grid and discusses their communication requirements. Sifting through thousands of

Combinatorial Testing

June 25, 2012
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing is a method that can reduce cost and improve test effectiveness significantly for many applications. The key insight underlying this form of testing is that not every parameter contributes to every failure, and empirical data suggest

Predicting Global Failure Regimes in Complex Information Systems

June 19, 2012
Author(s)
Christopher E. Dabrowski, James J. Filliben, Kevin L. Mills
Over the past five years, we investigated methods to characterize global behavior in large distributed systems and applied those methods to predict effects from deploying alternate distributed control algorithms. The methods we used assess global behaviors

A New Convexity Measurement for 3D Meshes

June 16, 2012
Author(s)
Afzal A. Godil, Zhouhui Lian
This paper presents a novel convexity measurement for 3D meshes. The new convexity measure is calculated by minimizing the ratio of the summed area of valid regions in a mesh’s six views, which are projected on faces of the bounding box whose edges are

Grand Challenges of Measurement Science with Big Data

June 14, 2012
Author(s)
Peter Bajcsy
This presentation discusses Grand Challenges of Measurement Science with Big Data. It illustrates the difference between Measurement Science with Little Data and Big Data in the domain of cell biology and microscopy image observations.

Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense

June 11, 2012
Author(s)
Rui Zhuang, Su Zhang, Scott DeLoach, Xinming Ou, Anoop Singhal
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network's configuration can increase the difficulty

The Internet of Things: A Reality Check

June 11, 2012
Author(s)
George Hurlburt, Jeff Voas, Keith Miller
The short persepctive explains the concept behind Internet of Things (IoT). The publication is a perspectives piece for an IEEE magazine and not intended to be technical. This is intended to be published in a specific column in the magazine.

An Assessment of the Accuracy of Automatic Evaluation in Summarization

June 8, 2012
Author(s)
Karolina K. Owczarzak, John M. Conroy, Hoa T. Dang, Ani Nenkova
Automatic evaluation has greatly facilitated system development in summarization. At the same time, the use of automatic evaluation has been viewed with mistrust by many, as its accuracy and correct application are not well understood. In this paper we

Traffic Scheduling Technique for Smart Grid Advanced Metering Applications

June 5, 2012
Author(s)
Hamid Gharavi
In this paper, we present a multi-gate mesh network architecture that has been developed to ensure high performance and reliability under emergency conditions when a system expects to receive power outage notifications and exchanges. In order to handle the

Cloud Computing Synopsis and Recommendations

May 29, 2012
Author(s)
Mark L. Badger, Timothy Grance, Robert Patt-Corner, Jeffrey M. Voas
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations

SHREC12 Track: Generic 3D Shape Retrieval

May 13, 2012
Author(s)
Bo Li, Afzal A. Godil
Generic 3D shape retrieval is a fundamental research area in the field of content-based 3D model retrieval. The aim of this track is to measure and compare the performance of generic 3D shape retrieval methods implemented by different participants over the

SHREC12 Track: Sketch-Based 3D Shape Retrieval

May 13, 2012
Author(s)
Bo Li, Afzal A. Godil
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods implemented by different participants

LDPC Error Correction in the Context of Quantum Key Distribution

April 23, 2012
Author(s)
Anastase Nakassis
Secret keys can be established through the use of Quantum channels monitored through classical channels which can be thought of as being error free. Because many of the feasible implementation of the quantum channel are subject to erasures –often massive-

IREX III Supplement 1: Failure Analysis

April 18, 2012
Author(s)
George W. Quinn, Patrick J. Grother
Iris recognition has the potential to be extremely accurate, but it is highly dependent on the quality of the input data. Iris occlusion, off-axis gaze, blurred images, and iris rotation are common problems that can make recognizing individuals more
Displaying 951 - 975 of 2282
Was this page helpful?