Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1076 - 1100 of 2282

Multigate Mesh Routing for Smart Grid Last Mile Communications

May 1, 2011
Author(s)
Hamid Gharavi, Bin Hu
One of the most important issues in Smart Grid is to provide consumers with the knowledge of their energy usage, as well as allowing the utility to monitor and control the electric system components with real time status. This would require the design of a

TRECVID 2010 - An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics

April 15, 2011
Author(s)
Paul D. Over, George M. Awad, Jonathan G. Fiscus, Brian Antonishek, Martial Michel, Alan Smeaton, Wessel Kraaij, Georges Quenot
The TREC Video Retrieval Evaluation (TRECVID) 2010 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last 10

SHREC11 Track: Generic Shape Retrieval

April 14, 2011
Author(s)
Helin Dutagaci, Afzal A. Godil
In this paper we present the results of the 3D Shape Retrieval Contest 2011 (SHREC’11) track on generic shape retrieval. The aim of this track is to evaluate the performance of 3D shape retrieval algorithms that can operate on arbitrary 3D models. The

Evaluation of 3D Interest Point Detection Techniques

April 7, 2011
Author(s)
Helin Dutagaci, Chun Pan (Benny) Cheung, Afzal A. Godil
In this paper, we compare the results of five 3D interest point detection techniques to the interest points marked by human subjects. This comparison is used to quantitatively evaluate the interest point detection algorithms. We asked human subjects to

Salient Local 3D Features for 3D Shape Retrieval

April 7, 2011
Author(s)
Afzal A. Godil, Asim Wagan
In this paper we describe a new formulation for the 3D salient local features based on the voxel grid inspired by the Scale Invariant Feature Transform (SIFT). We use it to identify the salient keypoints (invariant points) on a 3D voxelized model and

Specification for the Open Checklist Interactive Language (OCIL) Version 2.0

April 7, 2011
Author(s)
David A. Waltermire, Karen Scarfone, Maria Casipe
This report defines version 2.0 of the Open Checklist Interactive Language (OCIL). The intent of OCIL is to provide a standardized basis for expressing questionnaires and related information, such as answers to questions and final questionnaire results, so

RFID-based Localization and Tracking Technologies

April 1, 2011
Author(s)
Michael R. Souryal, Lionel M. Ni, Dian Zhang
Radio Frequency Identification (RFID) usually incorporates a tag into an object for the purpose of identification or localization using radio signals. It has gained a lot of attention recently due to its advantages in terms of low cost and easy deployment

Information Leakage Through the Domain Name System

March 31, 2011
Author(s)
Scott W. Rose, Anastase Nakassis, Ramaswamy Chandramouli
The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network attack. An attacker can query an organization's DNS as reconnaissance before attacking hosts on a

Thoughts on Higher Education and Scientific Research

March 22, 2011
Author(s)
Jeffrey M. Voas, George Hurlburt, Keith Miller, Phillip Laplante, Bret Michael
The notion of a "tipping point" isn't new, al though the concept has relevance in differing ways. Academia seems to be at a tipping point, whereby the steady state of disciplinary specialization is about to give way to an interdisciplinary, collaborative

Efficient Motion Vector Interpolation for Error Concealment of H.264/AVC

March 1, 2011
Author(s)
Hamid Gharavi
In video communications the compressed video stream is very likely to be corrupted by channel errors. In order to combat these channel errors, many methods have been proposed. In this paper, a new method for motion vectors (MVs) interpolation with the help

Guide to Using Vulnerability Naming Schemes

February 25, 2011
Author(s)
David A. Waltermire, Karen Scarfone
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration Enumeration (CCE). Draft SP 800-51 Revision 1 gives an introduction to both naming schemes and makes

Glossary of Key Information Security Terms

February 17, 2011
Author(s)
Richard L. Kissel
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800 series, NIST Interagency Report (NIST IR) series, and the Committee for National Security Systems

Ontology Summit 2010 Creating the Ontologists of the Future

February 15, 2011
Author(s)
Fabian M. Neuhaus
The goal of the Ontology Summit 2010 was to address the current shortage of persons with ontology expertise by developing a strategy for the education of ontologists. To achieve this goal we studied how ontologists are currently trained, the requirements

Who is Who? Biometrics provides answers for public and private sectors

February 10, 2011
Author(s)
Fernando L. Podio
One of the critical issues related to secured Information Technology (IT) systems and applications is the verification of the users identity. Biometrics provides for secure transactions, positive identification and augmentation to human judgment. For

Minimum-Risk Layer 2 Trigger Levels for Proactive Media-Independent Handovers

February 1, 2011
Author(s)
David W. Griffith, Alexandre Delye, Nada T. Golmie
Anticipated handovers that use Link Going Down (LGD) and Link Down (LD) trigger events require the network operator to set the LGD trigger high enough that the handover completes before the LD trigger event. However, setting the LGD trigger too high can
Displaying 1076 - 1100 of 2282
Was this page helpful?