Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1226 - 1250 of 2282

The Science of Interaction

December 15, 2009
Author(s)
Theresa O'Connell, John Stasko, John Dill, William Pike, Alan MacEachren
There is a growing recognition within the visual analytics community that interaction and inquiry are inextricable. It is through the interactive manipulation of a visual interface the analytic discourse that knowledge is constructed, tested, refined, and

SER Performance Analysis for Physical Layer Network Coding over AWGN Channel

December 3, 2009
Author(s)
Yi Qian, Kejie Lu, Shengli Fu, Hsiao-Hwa Chen
While original network coding is proposed over data link layer, recent work suggests that it can also be implemented on physical layer. In fact it is more natural for wireless networks because of its omnidirectional transmission. In this paper, we

Quantitative Imaging to Assess Tumor Response to Therapy: Common Themes of Measurement, Truth Data & Error Sources

December 1, 2009
Author(s)
Charles D. Fenimore, Charles R. Meyer, Samuel G. Armato, Geoffrey McLennan, Luc Bidaut, Daniel P. Barboriak, Marios A. Gavrielides, Nicholas Petrick, Edward F. Jackson, Michael McNitt-Gray, Paul E. Kinahan, Binsheng Zhao
Rationale and Objectives Early detection of tumor response to therapy is a key goal. Finding measurement algorithms capable of early detection of tumor response could individualize therapy treatment as well as reduce the cost of bringing new drugs to

IPv6 Test Methods: General Description and Validation

November 30, 2009
Author(s)
J. S. Nightingale
The USG profile for IPv6 specifies requirements for host, router and network protection devices (NPD) and this document specifies the validation requirements for test methods and test specifications used to test these devices. It has become the practice

Rapidly-Deployable Mesh Network Testbed

November 30, 2009
Author(s)
Michael R. Souryal, Nader Moayeri, Andreas Wapf
This paper describes a wireless mesh network testbed for research in rapid deployment and auto-configuration of mesh nodes. Motivated by the needs of first responders and military personnel arriving to an incident area, we developed and tested an automated

The Benefits of Network Coding over a Wireless Backbone

November 30, 2009
Author(s)
Hui Guo, Yi Qian, Kejie Lu, Nader Moayeri
Network coding is a promising technology that can effectively improve the efficiency and capacity of multi-hop wireless networks by exploiting the broadcast nature of the wireless medium. However, existing studies have demonstrated that the benefits of

USGv6 Testing Program User's Guide

November 30, 2009
Author(s)
J. S. Nightingale
OMB Memorandum M-05-22 directed the National Institute of Standards and Technology (NIST) to develop the technical infrastructure (standards and testing) necessary to support wide scale adoption of IPv6 in the US Government (USG). Upon detailed inspection

Practical Interdomain Routing Security

November 20, 2009
Author(s)
David R. Kuhn, Simon Liu, Hart Rossman
This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce router

Cybersecurity Fundamentals for Small Business Owners

November 19, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information that was published in NIST Interagency Report (NISTIR) 7621, Small Business Information Security: The Fundamentals, by Richard Kissel. The publication presents three major areas that small businesses should address

Trends in Multimedia Communications Over Mobile Networks

November 3, 2009
Author(s)
Hamid Gharavi
Increasing demand for high quality multimedia services has been a driving factor in the technological evolution of high bandwidth wireless/mobile communications systems and standards. The most challenging aspect is the support of higher quality video

Simplified Analysis of Matcher Performance and Fusion

October 14, 2009
Author(s)
Vladimir N. Dvornychenko
Provides some first-order techniques for analyzing matcher performance. A novel argument is used to derive the power-law as a kind of baseline for analyzing matcher performance. The power-law is then applied to two situations: a) CMC curves, and b) fusion

Open Issues in Secure DNS Deployment

October 6, 2009
Author(s)
Ramaswamy Chandramouli, Scott W. Rose
This paper describes some practical administrative issues and challenges in the deployment of DNSSEC - an IETF specified suite of security measures for securing the Domain Name System (DNS). The issues covered include: (a) Choice of Cryptographic
Displaying 1226 - 1250 of 2282
Was this page helpful?