Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1001 - 1025 of 2282

VM Leakage and Orphan Control in Open-Source Clouds

November 29, 2011
Author(s)
Christopher E. Dabrowski, Kevin L. Mills
Computer systems often exhibit degraded performance due to resource leakage caused by erroneous programming or malicious attacks, and computers can even crash in extreme cases of resource exhaustion. The advent of cloud computing provides increased

Uncertainties of Measures in Speaker Recognition Evaluation

November 10, 2011
Author(s)
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) Speaker Recognition Evaluations (SRE) are an ongoing series of projects conducted by NIST. In the NIST SRE, speaker detection performance is measured using a detection cost function, which is

Ocular and Iris Recognition Baseline Algorithm

November 7, 2011
Author(s)
Yooyoung Lee, Ross J. Micheals, James J. Filliben, P J. Phillips, Hassan A. Sahibzada
Due to its distinctiveness, the human eye is a popular biometricv feature used to identity a person with high accuracy. The Grand Challenge in biometrics is to have an effective algorithm for subject verification or identification under a broad range of

Service Model Driven Variations in Security Measures for Cloud Environments

November 6, 2011
Author(s)
Ramaswamy Chandramouli
With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has become a

An Efficient Target Monitoring Scheme with Controlled Node Mobility for Sensor Networks

November 3, 2011
Author(s)
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper is concerned with target monitoring using a network of collaborative mobile sensors. The objective is to compute (online) the desired sensing and communication radii of sensors as well as their location at each time instant, such that a set of

Data Dependency on Measurement Uncertainties in Speaker Recognition Evaluation

November 3, 2011
Author(s)
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) has been conducting an ongoing series of Speaker Recognition Evaluations (SRE). Speaker detection performance is measured using a detection cost function defined as a weighted sum of the

"Just Try"

November 1, 2011
Author(s)
Isabel M. Beichl

Mobile-App Addiction: Threat to Security?

November 1, 2011
Author(s)
George Hurlburt, Jeff Voas, Keith Miller
Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but it's

Integrating jQuery with the 3D Descriptive Markup of X3DOM

October 31, 2011
Author(s)
Sanford P. Ressler
This paper describes a number of techniques using jQuery to take advantage of the 3D descriptive markup implemented by X3DOM. X3DOM is a project of the Web3D Consortium, primarily being implemented by staff at Fraunhoffer IGD to provide 3D descriptive

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks

October 27, 2011
Author(s)
Tony V. Cheneau, Maryline Laurent, Andrei V. Sambra
This paper presents a new public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication and Key Exchange Scheme. Its originality lies in performing authentication and key distribution with no need for a trusted

Analysis of Advanced Metering over a Wide Area Cellular Network

October 17, 2011
Author(s)
Michael R. Souryal, Nada T. Golmie
This paper presents a framework for analysis of the coverage and capacity of advanced metering over a wide area cellular network. The coverage analysis predicts the maximum cell size subject to an outage criterion, and the capacity analysis predicts the

Real-time Feedback for Usable Fingerprint Systems

October 11, 2011
Author(s)
Mary F. Theofanos, Brian C. Stanton, Yee-Yin Choong, Haiying Guan
Compared with traditional password and other identification methods, biometrics like face, iris, and fingerprint for automatic personal identification/verification have many advantages, and are increasingly gaining popularity in all kinds of applications

COMPARISON OF TWO DIMENSION-REDUCTION METHODS FOR NETWORK SIMULATION MODELS

October 5, 2011
Author(s)
Kevin L. Mills, James J. Filliben
Experimenters characterize the behavior of simulation models for data communications networks by measuring multiple responses under selected parameter combinations. The resulting multivariate data may include redundant responses reflecting aspects of a

Distributed Deployment Algorithms for Improved Coverage in Mobile Sensor Networks

September 28, 2011
Author(s)
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam
In this paper, various sensor deployment strategies are studied for effective coverage in wireless sensor networks. In the proposed algorithms, each sensor discovers the coverage holes within its Voronoi polygons, and then moves in a proper direction to

Managing the Configuration of Information Systems with a Focus on Security

September 26, 2011
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-128, Guide to Security-Focused Configuration Management of Information Systems. The publication was written by Arnold Johnson, Kelley Dempsey, and Ron Ross of NIST, and

Quality Reporting Data Architecture (QRDA) Standards Action Plan

September 23, 2011
Author(s)
Liora Alschuler
This document is the action plan to improve the suitability of Health Level Seven (HL7) Implementation Guide for CDA Release 2 – Quality Reporting Document Architecture (QRDA) Release 1 for quality reporting. Lantana Consulting Group prepared this report

Quality Reporting Data Architecture (QRDA) Suitability Analysis

September 23, 2011
Author(s)
Liora Alschuler
This document analyzes the suitability of Quality Reporting Data Architecture (QRDA) to meet its purpose and to support the US Department of Health and Human Services’ (HHS) Meaningful Use. It is part of the Healthcare Information Technology (HIT)

Evaluation of 2-Way Iraqi Arabic-English Speech Translation Systems Using Automated Metrics

September 22, 2011
Author(s)
Gregory A. Sanders, Sherri Condon, Mark Arehart, Dan Parvaz, Christy Doran, John Aberdeen
The Defense Advanced Research Projects (DARPA) Spoken Language Communication and Translation System for Tactical Use (TRANSTAC) program faced many challenges in applying automated measures of translation quality to Iraqi Arabic-English speech translation
Displaying 1001 - 1025 of 2282
Was this page helpful?