Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1051 - 1075 of 2282

An Efficient Sensitivity Analysis Method for Large Cloud Simulations

July 4, 2011
Author(s)
Kevin L. Mills
We describe Koala, an infrastructure Cloud simulator inspired by the Amazon Elastic Compute Cloud (EC2). We conduct a sensitivity analysis of Koala, revealing eight behavioral dimensions, which are influenced significantly by six parameters. Our findings

Messaging Work Bench Instructions

July 1, 2011
Author(s)
Ioana Singureanu
Documentation on using the Messaging Workbench (MWB) tool to edit the profile created for the NCPDP SCRIPT Implementation Guide: Version 10.6 NEWRX New Prescription and RXHRES Prescription History Response message structures.

Guidelines for Protecting Basic Input/Output System (BIOS) Firmware

June 28, 2011
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-147, BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology. The publication was written by David Cooper, William Polk

Who wrote What Where: Analyzing the content of human and automatic summaries

June 23, 2011
Author(s)
Karolina K. Owczarzak, Hoa T. Dang
Abstractive summarization has been a long-standing and long-term goal in automatic summarization, because systems that can generate abstracts demonstrate a deeper understanding of language and the meaning of documents than systems that merely extract

Specification for the Asset Reporting Format 1.1

June 21, 2011
Author(s)
David A. Waltermire, Adam Halbardier, Mark Johnson
This specification describes the Asset Reporting Format (ARF), a data model for expressing the transport format of information about assets and the relationships between assets and reports. The standardized data model facilitates the reporting, correlating

Specification for Asset Identification 1.1

June 17, 2011
Author(s)
David A. Waltermire, John Wunder, Adam Halbardier
Asset identification plays an important role in an organization‟s ability to quickly correlate different sets of information about assets. This specification provides the necessary constructs to uniquely identify assets based on known identifiers and/or

Successful Design of Biometric Tests in a Constrained Environment

June 9, 2011
Author(s)
Vladimir N. Dvornychenko
The National Institute of Standards and Technology (NIST), with participation of the biometrics community, conducts evaluations of biometrics-based verification and identification systems. Among the more challenging is testing of automated latent

Cybersecurity, Innovation and the Internet Economy

June 8, 2011
Author(s)
Ari M. Schwartz
The Department of Commerce's Internet Policy Task Force Green Paper on Cybersecurity, Innovation and the Internet Economy recommends consideration of a new framework for addressing internet security issues for companies outside the orbit of critical

Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)

June 7, 2011
Author(s)
Keith A. Stouffer, Joseph A. Falco, Karen A. Scarfone
NIST Special Publication (SP) 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems

Throughput and Delay Analysis of Half-Duplex IEEE 802.11 Mesh Networks

June 6, 2011
Author(s)
Camillo A. Gentile
Emerging technologies for mesh networks can provide users with last-mile service to an access point by forwarding data through wireless relays instead of through expensive wireline infrastructure. While an extensive amount of literature on mesh networks

Identity Management and Privacy: A Rare Opportunity To Get It Right

June 1, 2011
Author(s)
Ari M. Schwartz
Since 1976, when Whitfield Diffie and Martin Helleman, first surmised the possibilities for the potential uses for digital signatures in an IEEE publication, there has been ongoing discussion of building an online identity management structure. As use of

Linear Dispersion Codes for Asynchronous Cooperative MIMO Systems

June 1, 2011
Author(s)
Hamid Gharavi
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs), which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion

Multigate Communication Network For Smart Grid

June 1, 2011
Author(s)
Hamid Gharavi
It is envisioned that one of the most important issues in Smart Grid will be to design a network architecture that is capable of providing secure and reliable two-way communication from meters to other Smart Grid domains. While networking technologies and

Scanning the Issue Smart Grid: The Electric Energy System of the Future

June 1, 2011
Author(s)
Hamid Gharavi
This is an editorial article for a special issue on smart grid. The main objective is to report on some, if not all, of smart grid future technical challenges. While acknowledging its limited coverage, this issue offers a wide range of interesting

Selective Pixel Interpolation for Spatial Error Concealment

June 1, 2011
Author(s)
Hamid Gharavi, Yi Ge, Bo Yan, Kairan Sun
This paper proposes an effective algorithm for spatial error concealment with accurate edge detection and partitioning interpolation. Firstly, a new method is used for detecting possible edge pixels and their matching pixels around the lost block. Then

Computer Security Division 2010 Annual Report

May 31, 2011
Author(s)
Patrick D. O'Reilly
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.

Healthcare Information Technology Standards: General Suitability Analysis

May 31, 2011
Author(s)
Liora Alschuler
The methodology described in this document was produced and developed by Lantana Consulting Group for the National Institute of Standards and Technology (NIST). It is part of a series of suitability analsyses on four healthcare standards performed under

Templated CDA:Key Concept for Interoperability

May 31, 2011
Author(s)
Liora Alschuler
This document supplements information about “templated CDA” in the context of the Healthcare Information Technology (HIT) Standards Analysis Project carried out by Lantana Consulting Group for the National Institute of Standards and Technology (NIST).

Modeling queuing dynamics of TCP: a simple model and its empirical validation.

May 6, 2011
Author(s)
Daniel I. Genin, Anastase Nakassis
Understanding queuing dynamics of TCP is important for correct router buffer sizing as well as for optimizing the performance of the TCP protocol itself. However, modeling of buffer content dynamics under TCP has received relatively little attention given
Displaying 1051 - 1075 of 2282
Was this page helpful?