Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1101 - 1125 of 2282

Guide to Security for Full Virtualization Technologies

January 28, 2011
Author(s)
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to provide recommendations for addressing these concerns. Full virtualization technologies run one or

Securing WiMAX Wireless Communications

December 27, 2010
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-127, Guide to Securing WiMAX Wireless Communications: Recommendations of the National Institute of Standards and Technology. The publication, which was written by Karen

A Benchmark for Best View Selection of 3D Objects

December 23, 2010
Author(s)
Helin Dutagaci, Chun Pan (Benny) Cheung, Afzal A. Godil
The best view selection corresponds to the task of automatically selecting the most representative view of a 3D model. In this paper, we describe a benchmark for evaluation of best view selection algorithms. The benchmark consists of the preferred views of

Benchmarks, Performance Evaluation and Contests for 3D Shape Retrieval

December 20, 2010
Author(s)
Afzal A. Godil, Zhouhui Lian, Helin Dutagaci
Benchmarking of 3D Shape retrieval allows developers and researchers to compare the strengths of different algorithms on a standard dataset. Here we discuss the different steps involved in developing a benchmark and some of the issues involved. We then

Free and Open Source Software

December 13, 2010
Author(s)
Keith Miller, Jeff Voas, Tom Costello
In this paper, free and open source software are discussed. Open source is an intellectual property destroyer. Nothing could be worse than this for the software business and the intellectual-property business. Microsoft has an official open source presence

Mobile Applications: the Fifth Cycle

December 13, 2010
Author(s)
George Hurlburt, Jeff Voas, Keith Miller
Using the analogy of an existing smart car, this paper explores Power to the Edge , where the edge is commercial mobile computing. The world is poised for a 5th Cycle of computer capability, this time focused on the burgeoning phenomena of mobile computing

Speeding up the Wide-Pipe: Secure and Fast Hashing

December 12, 2010
Author(s)
Mridul Nandi, Souradyuti Paul
In this paper we propose a new sequential mode of operation – the Fast wide pipe or FWP for short - to hash messages of arbitrary length. The mode is shown to be (1) preimage-resistance preserving, (2) collision-resistance-preserving and, most importantly

k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks

December 10, 2010
Author(s)
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be chaotic

Toward Objective Global Privacy Standards

December 8, 2010
Author(s)
Ari M. Schwartz
Technical standards offer a new ability to support the important public policy goal of better protecting privacy. To do so most effectively, we must begin to move from the privacy standards based on subjective and procedural efforts to a series of

AN EFFICIENT SENSITIVITY ANALYSIS METHOD FOR NETWORK SIMULATION MODELS

December 7, 2010
Author(s)
Kevin L. Mills, James J. Filliben
Simulation models for data communications networks encompass numerous parameters that can each take on millions of values, presenting experimenters with a vast space of potential parameter combinations. To apply such simulation models experimenters face a

How to Model a TCP/IP Network Using Only 20 Parameters

December 5, 2010
Author(s)
Kevin L. Mills, Edward J. Schwartz, Jian Yuan
Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values. Such models are difficult to understand, parameterize and investigate. This paper explains how to model a modern data

Image Classification of Vascular Smooth Muscle Cells

November 11, 2010
Author(s)
Michael Grasso, Ronil Mokashi , Alden A. Dima, Antonio Cardone, Kiran Bhadriraju, Anne L. Plant, Mary C. Brady, Yaacov Yesha, Yelena Yesha
The traditional method of cell microscopy can be subjective, due to observer variability, a lack of standardization, and a limited feature set. To address this challenge, we developed an image classifier using a machine learning approach. Our system was

An Integrated PHY and MAC Layer Model for Half-Duplex IEEE 802.11 Networks

November 2, 2010
Author(s)
David W. Griffith, Michael R. Souryal, Camillo A. Gentile, Nada T. Golmie
This paper introduces an IEEE 802.11 analytical model that examines uplink and downlink communications between non-saturated stations and a non-saturated access point. The model integrates channel effects and collisions into a single expression for the

Dystopia

November 1, 2010
Author(s)
Isabel M. Beichl
This is an editorial for Computing in Science & Engineering on the subject of undergraduate education.

A New Call Admission Control Scheme for Heterogeneous Wireless Networks

October 31, 2010
Author(s)
Duk Kyung Kim, David W. Griffith, Nada T. Golmie
Call admission control between heterogeneous networks,such as an integrated 3GPP LTE and WLAN network, plays an important role to utilize the system resources in a more efficient way. In this paper, we propose that the preference to the WLAN is determined
Displaying 1101 - 1125 of 2282
Was this page helpful?