Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1201 - 1225 of 2282

Computer Security Division 2009 Annual Report

March 23, 2010
Author(s)
Patrick D. O'Reilly
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It discusses all projects and programs within the Division, staff highlights, and publications.

Grating-Enhanced Narrow-Band Spontaneous Parametric Down Conversion

March 10, 2010
Author(s)
Xiao Tang, Lijun Ma
We propose a new method to narrow the linewidth of entangled photons from spontaneous parametric down conversion incorporated with an internal Bragg grating. We study and show that it is a promising way to generate narrow-line entangled photons.

Linking Canny Edge Pixels with Pseudo-watershed Lines

March 1, 2010
Author(s)
Javier Bernal
A method is presented for computing pseudo-watershed lines that can be used for linking pixels that have been identified as edge pixels with the Canny edge detector. An additional procedure is also described for filling breaks that may still exist between

AN AUTOMATIC OVERLAP-BASED CELL TRACKING SYSTEM

February 26, 2010
Author(s)
Joe Chalfoun, Antonio Cardone, Alden A. Dima, Michael Halter, Daniel P. Allen
In order to facilitate the extraction of quantitative data from live cell image sets, automated image analysis methods are needed. This paper presents an overlap-based cell tracking algorithm that has the ability to track cells across a set of time-lapse

Asynchronous Cooperative MIMO Systems using A Linear Dispersion Structure

February 2, 2010
Author(s)
Hamid Gharavi
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs),which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion structure

Overlap-Based Cell Tracker

February 2, 2010
Author(s)
Joe Chalfoun, Antonio Cardone, Alden A. Dima, Michael Halter, Daniel P. Allen
In order to facilitate the extraction of quantitative data from live cell image sets, automated image analysis methods are needed. This paper presents an introduction to the general principle of an overlap cell tracking software developed by NIST. This

Attacking Paper-Based E2E Voting Systems

February 1, 2010
Author(s)
John M. Kelsey, Andrew R. Regenscheid, Tal Moran, David Chaum
In this paper, we develop methods for constructing vote-buying/coercion attacks on end-to-end voting systems, and describe vote-buying/coercion attacks on three end-to-end voting systems: Punchscan, Pret-a-Voter, and Threeballot. We also demonstrate a

Quantum Computing

January 28, 2010
Author(s)
Emanuel H. Knill
Imagine a computer that can exploit quantum mechanics to solve previously intractable problems in physics, mathematics and cryptography. Such a quantum computer would revolutionize computing technology while teaching us about fundamental physics and ways

View subspaces for indexing and retrieval of 3D models

January 21, 2010
Author(s)
Helin Dutagaci, Afzal A. Godil, Bulent Sankur, Yucel Yemez
View-based indexing schemes for 3D object retrieval is gaining popularity since they provide good retrieval results. These schemes are coherent with the theory that humans recognize objects based on their 2D appearances. The view-based techniques also

The Semantics of Modules in Common Logic

January 20, 2010
Author(s)
Fabian M. Neuhaus
Common Logic (CL) is an ISO standard that specifies a family of knowledge representation languages. The function of modules within CL is to support local context with a local domains of discourse. Modules play a crucial role since they enable users to

Complex Systems Program Activities Summary, Fiscal Years 2007-2008

January 12, 2010
Author(s)
Sanford P. Ressler
This report summarizes the work of the Complex Systems Program within NIST s Information Technology Laboratory. The Overview presents some background material and a high-level overview of the Program s activities including significant technical

Ephemera

January 11, 2010
Author(s)
Isabel M. Beichl
An editorial on the growing importance of soft errors in software.

A Hybrid Frame Concealment Algorithm for H.264/AVC

January 5, 2010
Author(s)
Hamid Gharavi
In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors, however most of the existing

EDITOR IN CHIEF (EIC) MESSAGE

January 1, 2010
Author(s)
Hamid Gharavi
This Editor In Chief's (EIC) message is expected to appear in the January, 2010 issue of the IEEE Transactions on CAS for Video Technology (TCSVT). The editorial team will be under the leadership of the new EIC for a period of two years.

Proceedings of the Privilege Management Workshop, September 1-3, 2009

January 1, 2010
Author(s)
Tanya L. Brewer, Annie W. Sokol, Sheldon A. Durrant
Privilege management is large and complex, often the source of heated debate and opinion, and fraught with widely-understood, yet ill-defined terminology and concepts. The National Institute of Standards and Technology (NIST) and the National Security

Model of magnetic impurities within the Josephson junction of a phase qubita

December 23, 2009
Author(s)
David P. Pappas, R. P. Erickson
We consider a superconducting phase qubit consisting of a monocrystalline sapphire Josephson junction with symmetry axis perpendicular to the junction interfaces. Via the London gauge we present a theoretical model of Fe3+ magnetic impurities within the
Displaying 1201 - 1225 of 2282
Was this page helpful?