Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 976 - 1000 of 2269

Initiating Mobile Software Development - Lessons Learned From a 12-Month Project

December 30, 2011
Author(s)
Frederic J. de Vaulx, Paul Khouri Saba, Marcus W. Newrock, Bertrand C. Stivalet
As mobile devices’ capabilities keep on improving, today’s mobile software ecosystem evolves at an unprecedented speed. This evolution makes mobile software development more common and critical. Moreover, the ever-increasing number of new development

Universal Low-rank Matrix Recovery from Pauli Measurements

December 12, 2011
Author(s)
Yi-Kai Liu
We study the problem of reconstructing an unknown matrix M of rank r and dimension d using O(rd poly log d) Pauli measurements. This has applications in quantum state tomography, and is a non- commutative analogue of a well-known problem in compressed

Guidelines on Security and Privacy in Public Cloud Computing

December 9, 2011
Author(s)
Timothy Grance, Wayne Jansen
Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from

Role Engineering: Methods and Standards

December 8, 2011
Author(s)
Edward Coyne, Timothy Weil, D. Richard Kuhn
This article explains problems and approaches to designing permission structures for role based access control. RBAC and the RBAC standard are summarized, common approaches to role engineering described, and the current status and plans for the INCITS role

Objective Evaluation of Imager Performance

December 1, 2011
Author(s)
Francine K. Amon, Dennis D. Leber, Nicholas Paulter
We describe a method by which the evaluation and characterization of the performance of an imager can be done objectively and scientifically, that is, without routine operator interpretation. Although this method is demonstrated herein for passive long

QCMA with One-sided Error Equals QCMA with Two-sided Error

November 30, 2011
Author(s)
Stephen P. Jordan, Daniel Nagaj
QCMA is the set of decision problems such that if the answer is yes, there exists a classical bitstring, or proof, that can be efficiently verified by a quantum computer. The verifier is allowed a small probability of rejecting a valid proof or accepting

Comparing VM-Placement Algorithms for On-Demand Clouds

November 29, 2011
Author(s)
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
Much recent research has been devoted to investigating algorithms for allocating virtual machines (VMs) to physical machines (PMs) in infrastructure clouds. Many such algorithms address distinct problems, such as initial placement, consolidation, or

VM Leakage and Orphan Control in Open-Source Clouds

November 29, 2011
Author(s)
Christopher E. Dabrowski, Kevin L. Mills
Computer systems often exhibit degraded performance due to resource leakage caused by erroneous programming or malicious attacks, and computers can even crash in extreme cases of resource exhaustion. The advent of cloud computing provides increased

Uncertainties of Measures in Speaker Recognition Evaluation

November 10, 2011
Author(s)
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) Speaker Recognition Evaluations (SRE) are an ongoing series of projects conducted by NIST. In the NIST SRE, speaker detection performance is measured using a detection cost function, which is

Ocular and Iris Recognition Baseline Algorithm

November 7, 2011
Author(s)
Yooyoung Lee, Ross J. Micheals, James J. Filliben, P J. Phillips, Hassan A. Sahibzada
Due to its distinctiveness, the human eye is a popular biometricv feature used to identity a person with high accuracy. The Grand Challenge in biometrics is to have an effective algorithm for subject verification or identification under a broad range of

Service Model Driven Variations in Security Measures for Cloud Environments

November 6, 2011
Author(s)
Ramaswamy Chandramouli
With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has become a

An Efficient Target Monitoring Scheme with Controlled Node Mobility for Sensor Networks

November 3, 2011
Author(s)
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper is concerned with target monitoring using a network of collaborative mobile sensors. The objective is to compute (online) the desired sensing and communication radii of sensors as well as their location at each time instant, such that a set of

Data Dependency on Measurement Uncertainties in Speaker Recognition Evaluation

November 3, 2011
Author(s)
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) has been conducting an ongoing series of Speaker Recognition Evaluations (SRE). Speaker detection performance is measured using a detection cost function defined as a weighted sum of the

"Just Try"

November 1, 2011
Author(s)
Isabel M. Beichl

Mobile-App Addiction: Threat to Security?

November 1, 2011
Author(s)
George Hurlburt, Jeff Voas, Keith Miller
Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but it's

Integrating jQuery with the 3D Descriptive Markup of X3DOM

October 31, 2011
Author(s)
Sanford P. Ressler
This paper describes a number of techniques using jQuery to take advantage of the 3D descriptive markup implemented by X3DOM. X3DOM is a project of the Web3D Consortium, primarily being implemented by staff at Fraunhoffer IGD to provide 3D descriptive

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks

October 27, 2011
Author(s)
Tony V. Cheneau, Maryline Laurent, Andrei V. Sambra
This paper presents a new public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication and Key Exchange Scheme. Its originality lies in performing authentication and key distribution with no need for a trusted
Displaying 976 - 1000 of 2269
Was this page helpful?