Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1176 - 1200 of 2282

Complex Systems Program Activities Summary, Fiscal Year 2009

May 18, 2010
Author(s)
Sanford P. Ressler
This report summarizes the work of the Complex Systems Program within NIST s Information Technology Laboratory. The Overview presents some background material and a high-level overview of the Program s activities including significant technical

Precision and Accuracy in Scientific Imaging

May 18, 2010
Author(s)
Russell A. Kirsch
Digital images are commonly used to represent scientific data. Typically, high resolution images with many square pixels are considered to be necessary under the assumption that the increased precision of such images yields increased accuracy to the viewer

Study of Proposed Internet Congestion-Control Mechanisms

May 17, 2010
Author(s)
Kevin L. Mills, James J. Filliben, Dong Y. Cho, Edward J. Schwartz, Daniel I. Genin
This study describes a coherent set of modeling and analysis methods to investigate the behavior of large distributed systems. The methods are applied to compare several proposed Internet congestion-control mechanisms operating under a wide range of

Multiple Encounter Dataset I (MEDS-I)

May 9, 2010
Author(s)
Craig I. Watson
In December, 2008, the FBI provided MITRE with an extract of submissions of deceased persons. The submissions contain face images of subjects with multiple encounters over time. The type 10 records (face and SMT) are mostly frontal or near frontal face

3D shape retrieval based on Multi-scale Integral Orientations

May 2, 2010
Author(s)
Afzal A. Godil, Stephane Bres, Asim Wagan
In this paper we describe a novel 3D shape retrieval method based on Multi-scale Integral Orientations. In our approach, a 3D model after normalization is represented by a set of depth images captured uniformly on a unit circle. Then the shape descriptor

SHREC 10 Track: Generic 3D Warehouse

May 2, 2010
Author(s)
Vanamali ThiruvadandamPorethi, Afzal A. Godil, Helin Dutagaci, Zhouhui Lian, Ryutarou Ohbuchi, Takahiko Furuya
In this paper we present the results of the Shape Retrieval Contest 10 (SHREC 10) of Generic 3D Warehouse. The aim of this track was to evaluate the performances of various 3D shape retrieval algorithms on a large Generic benchmark based on the Google 3D

SHREC'10 Track - Range Scan Retrieval

May 2, 2010
Author(s)
Helin Dutagaci, Afzal A. Godil, Chun Pan (Benny) Cheung
The SHREC 10 Shape Retrieval Contest of Range Scans aims at comparing algorithms that match a range scan to complete 3D models in a target database. The queries are range scans of real objects, and the objective is to retrieve complete 3D models that are

TRECVID 2009 -- Goals, Tasks, Data, Evaluation Mechanisms and Metrics

April 30, 2010
Author(s)
Paul D. Over, George M. Awad, Jonathan G. Fiscus, Martial Michel, Alan Smeaton, Wessel Kraaij
The TREC Video Retrieval Evaluation (TRECVID) 2009 was a TREC-style video analysis and retrieval evaluation, the goal of which was to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. 63 teams from various

RFSQUID-Mediated Coherent Tunable Coupling Between a Superconducting Phase Qubit and a Lumped Element Resonator

April 29, 2010
Author(s)
Michael S. Allman, Fabio Altomare, Jed D. Whittaker, Katarina Cicak, Dale Li, Adam J. Sirois, Joshua Strong, John D. Teufel, Raymond W. Simmonds
We demonstrate coherent tunable coupling between a superconducting phase qubit and a lumpedelement resonator. The coupling strength is mediated by a flux-biased rf SQUID operated in the nonhysteretic regime. By tuning the applied flux bias to the rf SQUID

Guide to Protecting Personally Identifiable Information

April 28, 2010
Author(s)
Shirley M. Radack
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). Written by Erika McCallister, Tim Grance, and Karen Scarfone of NIST, the

How often and how long should a cognitive radio sense the spectrum?

April 7, 2010
Author(s)
Nader Moayeri
This paper presents a Bayesian framework and a pricing structure for a secondary wireless user that opportunistically uses a RF channel belonging to a network of N primary users. The secondary user operates in a time-slotted fashion, where each time slot

Confidence Regions for Parameters of Linear Models

April 1, 2010
Author(s)
Andrew L. Rukhin
A method is suggested for constructing a conservative confidence region for the parameters of a general linear model. In meta-analytical applications, when the results of independent but heterogeneous studies are to be combined, this region can be employed

On Hash Functions Using Checksums

April 1, 2010
Author(s)
Praveen Gauruvarum, John M. Kelsey, L. Knudsen, S. Thomsen
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one- way checksum functions

A Report on the Privilege (Access) Management Workshop

March 30, 2010
Author(s)
Annie W. Sokol
This document is based on the discussions and conclusions of the Privilege (Access) Management Workshop held on 1-3 September, 2009 at the Gaithersburg, Maryland facilities of the National Institute of Standards and Technology (NIST), sponsored by NIST and

Data Loss Prevention

March 29, 2010
Author(s)
Simon Liu, D. Richard Kuhn
In today's digital economy, data enters and leaves enterprises' cyberspace at record rates. For a typical enterprise, millions of emails are sent and received and thousands of files are downloaded, saved or transferred via various channels or devices on a
Displaying 1176 - 1200 of 2282
Was this page helpful?