Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 976 - 1000 of 4392

Entangling distant resonant exchange qubits via circuit quantum electrodynamics

November 16, 2016
Author(s)
Jacob M. Taylor, Vanita Srinivasa, Charles Tahan
We investigate a hybrid quantum system consisting of spatially separated resonant exchange qubits, defined in three-electron semiconductor triple quantum dots, that are coupled via a super- conducting transmission line resonator. By analyzing three

Towards a generalized energy prediction model for machine tools

November 9, 2016
Author(s)
Raunak Bhinge, Jinkyoo Park, Kincho H. Law, David Dornfeld, Moneer Helu, Sudarsan Rachuri
Energy prediction of machine tools can deliver many advantages to a manufacturing enterprise, ranging from energy-efficient process planning to machine tool monitoring. Physics-based energy prediction models have been proposed in the past to understand the

Modeling the Internet of Things and People: A Foundational Approach

November 1, 2016
Author(s)
Spencer J. Breiner, Eswaran Subrahmanian, Ram D. Sriram
As we extend the reach of the Internet through sensing and automation, networked systems interact more and more of our daily lives, requiring much greater sensitivity to social networks and greater robustness in the face of human behavior. A tremendous

Caring: An Undiscovered Super "Ility" of Smart Healthcare

October 28, 2016
Author(s)
Nancy Laplante, Phillip Laplante, Jeff Voas
As new and exciting applications emerge using smart technologies, the Internet of Things, data analytics, and others for healthcare, a critical problem is emerging: the potential loss of "caring." The interplay of technology and caring has been discussed

The Algebra of Systems and System Interactions with an application to Smart Grid

October 14, 2016
Author(s)
Charif Mahmoudi, Hasnae Bilil, Edward R. Griffor
Systems are integrations of devices or component elements and even other systems. The notion of a system comprehends engineered and biological or mechanical or physical systems. Examples include information and dynamical systems as well as integrations of

Guide to Cyber Threat Information Sharing

October 4, 2016
Author(s)
Christopher S. Johnson, Mark L. Badger, David A. Waltermire, Julie Snyder, Clem Skorupka
Cyber threat information is any information that can help an organization identify, assess, monitor, and respond to cyber threats. Cyber threat information includes indicators of compromise; tactics, techniques, and procedures used by threat actors

Demystifying the Internet of Things

September 26, 2016
Author(s)
Jeffrey M. Voas, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-183, Networks of 'Things'. This publication offers an underlying and foundational science to IoT based on the realization that IoT involves sensing, computing, communication, and actuation.

Framework for learning agents in quantum environments

September 22, 2016
Author(s)
Jacob M. Taylor, Hans Briegel, Vedran Dunjko
In this paper we provide a broad framework for describing learning agents in general quantum environments. We analyze the types of environments which allow for quantum enhancements in learning, by contrasting environments to quantum oracles. We show that

A Probabilistic Network Forensics Model for Evidence Analysis

September 20, 2016
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack

Trustworthy Email

September 6, 2016
Author(s)
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information security specialists and network managers. This guideline applies to federal IT systems and will
Displaying 976 - 1000 of 4392
Was this page helpful?