Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1176 - 1200 of 2269

TRECVID 2009 -- Goals, Tasks, Data, Evaluation Mechanisms and Metrics

April 30, 2010
Author(s)
Paul D. Over, George M. Awad, Jonathan G. Fiscus, Martial Michel, Alan Smeaton, Wessel Kraaij
The TREC Video Retrieval Evaluation (TRECVID) 2009 was a TREC-style video analysis and retrieval evaluation, the goal of which was to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. 63 teams from various

RFSQUID-Mediated Coherent Tunable Coupling Between a Superconducting Phase Qubit and a Lumped Element Resonator

April 29, 2010
Author(s)
Michael S. Allman, Fabio Altomare, Jed D. Whittaker, Katarina Cicak, Dale Li, Adam J. Sirois, Joshua Strong, John D. Teufel, Raymond W. Simmonds
We demonstrate coherent tunable coupling between a superconducting phase qubit and a lumpedelement resonator. The coupling strength is mediated by a flux-biased rf SQUID operated in the nonhysteretic regime. By tuning the applied flux bias to the rf SQUID

Guide to Protecting Personally Identifiable Information

April 28, 2010
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Written by Erika McCallister, Tim Grance, and Karen Scarfone of NIST, the

How often and how long should a cognitive radio sense the spectrum?

April 7, 2010
Author(s)
Nader Moayeri
This paper presents a Bayesian framework and a pricing structure for a secondary wireless user that opportunistically uses a RF channel belonging to a network of N primary users. The secondary user operates in a time-slotted fashion, where each time slot

Confidence Regions for Parameters of Linear Models

April 1, 2010
Author(s)
Andrew L. Rukhin
A method is suggested for constructing a conservative confidence region for the parameters of a general linear model. In meta-analytical applications, when the results of independent but heterogeneous studies are to be combined, this region can be employed

On Hash Functions Using Checksums

April 1, 2010
Author(s)
Praveen Gauruvarum, John M. Kelsey, L. Knudsen, S. Thomsen
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum functions

A Report on the Privilege (Access) Management Workshop

March 30, 2010
Author(s)
Annie W. Sokol
This document is based on the discussions and conclusions of the Privilege (Access) Management Workshop held on 1-3 September, 2009 at the Gaithersburg, Maryland facilities of the National Institute of Standards and Technology (NIST), sponsored by NIST and

Data Loss Prevention

March 29, 2010
Author(s)
Simon Liu, D. Richard Kuhn
In today's digital economy, data enters and leaves enterprises' cyberspace at record rates. For a typical enterprise, millions of emails are sent and received and thousands of files are downloaded, saved or transferred via various channels or devices on a

Computer Security Division 2009 Annual Report

March 23, 2010
Author(s)
Patrick D. O'Reilly
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publications.

Grating-Enhanced Narrow-Band Spontaneous Parametric Down Conversion

March 10, 2010
Author(s)
Xiao Tang, Lijun Ma
We propose a new method to narrow the linewidth of entangled photons from spontaneous parametric down conversion incorporated with an internal Bragg grating. We study and show that it is a promising way to generate narrow-line entangled photons.

Linking Canny Edge Pixels with Pseudo-watershed Lines

March 1, 2010
Author(s)
Javier Bernal
A method is presented for computing pseudo-watershed lines that can be used for linking pixels that have been identified as edge pixels with the Canny edge detector. An additional procedure is also described for filling breaks that may still exist between

AN AUTOMATIC OVERLAP-BASED CELL TRACKING SYSTEM

February 26, 2010
Author(s)
Joe Chalfoun, Antonio Cardone, Alden A. Dima, Michael Halter, Daniel P. Allen
In order to facilitate the extraction of quantitative data from live cell image sets, automated image analysis methods are needed. This paper presents an overlap-based cell tracking algorithm that has the ability to track cells across a set of time-lapse

Asynchronous Cooperative MIMO Systems using A Linear Dispersion Structure

February 2, 2010
Author(s)
Hamid Gharavi
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs),which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion structure

Overlap-Based Cell Tracker

February 2, 2010
Author(s)
Joe Chalfoun, Antonio Cardone, Alden A. Dima, Michael Halter, Daniel P. Allen
In order to facilitate the extraction of quantitative data from live cell image sets, automated image analysis methods are needed. This paper presents an introduction to the general principle of an overlap cell tracking software developed by NIST. This

Attacking Paper-Based E2E Voting Systems

February 1, 2010
Author(s)
John M. Kelsey, Andrew R. Regenscheid, Tal Moran, David Chaum
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three end-to-end voting systems: Punchscan, Pret-a-Voter, and Threeballot. We also demonstrate a
Displaying 1176 - 1200 of 2269
Was this page helpful?