Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 551 - 575 of 2211

Updates to the NIST SCAP Validation Program and Associated Test Requirements

March 15, 2016
Author(s)
Melanie Cook, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NISTIR 7511, Rev. 4, "Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements". This is the fourth revision of the NISTIR which defines the requirements and

Linear Time Vertex Partitioning on Massive Graphs

March 7, 2016
Author(s)
Peter M. Mell, Richard Harang, Assane Gueye
The problem of optimally removing a set of vertices from a graph to minimize the size of the largest resultant component is known to be NP-complete. Prior work has provided near optimal heuristics with a high time complexity that function on up to hundreds

Secure Virtual Network Configuration for Virtual Machine (VM) Protection

March 7, 2016
Author(s)
Ramaswamy Chandramouli
Virtual Machines (VMs) are key resources to be protected since they are the compute engines hosting mission-critical applications. Since VMs are end-nodes of a virtual network, the configuration of the virtual network forms an important element in the

3D Segmentation of Stem Cells from Thousands of Confocal Microscopy Images

March 1, 2016
Author(s)
Peter Bajcsy, Mylene H. Simon, Stephen J. Florczyk, Carl G. Simon Jr., Derek Juba, Mary C. Brady
We address the problem of estimating 3D segmentation performance when segmentation is applied to thousands of confocal microscopy images (z-stacks) of cells. With a very large number of z-stacks, manual inputs to validate each segmentation result are

Learning Internet of Things Security "Hands-on"

February 3, 2016
Author(s)
Constantinos Kolias, Angelos Stavrou, Jeff Voas, Irena Bojanova, D. Richard Kuhn
Our research began from asking whether there is a science behind the Internet of Things (IoT). We started from zero knowledge and no bias. The results of that work determined that indeed there is a science, but it is a science of numerous actors, that when

Kinetic-Based Micro Energy-Harvesting for Wearable Sensors

January 28, 2016
Author(s)
Kamran Sayrafian, Dora Budic, Dina Simunic
Wearable sensors are considered to be a key component of cognitive infocommunications systems. These sensors, which are basically enabler of inter-cognitive communication, will provide physical interfaces between humans and future information and

A Rational Foundation for Software Metrology

January 20, 2016
Author(s)
David W. Flater, Paul E. Black, Elizabeth N. Fong, Raghu N. Kacker, Vadim Okun, Stephen S. Wood, David R. Kuhn
Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for those measurements since the work of Gray, Hogan, et al. in 1996-2001. Given a physical object

A metamodel for optimization problems

January 8, 2016
Author(s)
Ibrahim Assouroko, Peter O. Denno
In mathematics, computer science, and operations research, mathematical optimization is the process of finding best feasible values (oftentimes maxima or minima) of a given objective that is modeled mathematically. This paper introduces the concept of a

Survey Statistics of Automated Segmentations Applied to Optical Imaging of Mammalian Cells

January 8, 2016
Author(s)
Peter Bajcsy, Antonio Cardone, Joe Chalfoun, Michael W. Halter, Derek Juba, Marcin Kociolek, Michael P. Majurski, Adele P. Peskin, Carl G. Simon Jr., Mylene H. Simon, Antoine Vandecreme, Anne L. Plant, Mary C. Brady
The goal of this survey paper is to overview cellular measurements using optical microscopy imaging followed by automated image segmentation. The cellular measurements of primary interest are taken from mammalian cells and their components. They are

The Influence of Realism on Congestion in Network Simulations

January 8, 2016
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
Many researchers have used simulation to investigate the spread of congestion in networks. These researchers often find that congestion can be modeled as a percolation process, spreading slowly under increasing load until a critical point. After the

An Effective Video Synopsis Approach with Seam Carving

January 1, 2016
Author(s)
Hamid Gharavi
With a growth of surveillance cameras, the amount of captured videos expands. Manually analyzing and retrieving surveillance video is labor intensive and expensive. It would be much more convenient to generate a video digest, with which we can view the

Third-Party Software's Trust Quagmire

December 18, 2015
Author(s)
Jeffrey M. Voas, George Hurlburt
Integrating software developed by third-party organizations into a larger system raises concerns about the software's quality, origin, functionality, security, and interoperability. Addressing these concerns requires rethinking the roles of software's

A Hybrid Task Graph Scheduler for High Performance Image Processing Workflows

December 16, 2015
Author(s)
Timothy J. Blattner, Walid Keyrouz, Milton Halem, Shuvra S. Bhattacharyya, Mary C. Brady
The scalability of applications is a key requirement to improving performance in hybrid and cluster computing. Scheduling code to utilize parallelism is difficult, particularly when dealing with dependencies, memory management, data motion, and processor

Towards a Systematic Threat Modeling Approach for Cyber-physical Systems

December 15, 2015
Author(s)
Goncalo Martins, Sajal Bhatia, Xenofon Koutsoukos, Keith A. Stouffer, CheeYee Tang, Rick Candell
Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computational and networking components. These systems can potentially have an impact on the physical components, hence it is critical to safeguard them against a wide range of

Towards a Reconfigurable Distributed Testbed to Enable Advanced Research and Development of Timing and Synchronization in Cyber-Physical Systems

December 8, 2015
Author(s)
Aviral Shrivastava, J C. Eidson, Marc A. Weiss, Ya-Shian Li-Baboud, Hugo Andrade, Patricia Derler, Kevin Stanton
Timing and synchronization play a key role in advanced cyber-physical systems (CPS). Precise timing, as often required in safety-critical CPS, depends on hardware support for enforcement of periodic measure, compute, and actuate cycles. For general CPS

Catastrophic Event Phenomena in Communication Networks: A Survey

December 1, 2015
Author(s)
Christopher E. Dabrowski
With the rise of the Internet, there has been increased interest in the use of computer models to study the dynamics of communication networks. An important aspect of this trend has been the study of dramatic, but relatively infrequent, events that result

Deep-subwavelength Nanometric Image Reconstruction using Fourier Domain Optical Normalization

November 5, 2015
Author(s)
Jing Qin, Richard M. Silver, Bryan M. Barnes, Hui Zhou, Ronald G. Dixson, Mark Alexander Henn
Quantitative optical measurements of deep sub-wavelength, three-dimensional, nanometric structures with sensitivity to sub-nanometer details address an ubiquitous measurement challenge. A Fourier domain normalization approach is used in the Fourier optical

Cyber-Physical Systems Framework

November 2, 2015
Author(s)
David A. Wollman
Two worlds that have operated independently—the digital and physical worlds—are now merging, creating opportunities that will transform many sectors of our society. These new smart systems are based on engineered interacting networks of physical and

The NIST IAD Data Science Evaluation Series: Part of the NIST Information Access Division Data Science Research Program

October 29, 2015
Author(s)
Bonnie J. Dorr, Craig Greenberg, Peter Fontana, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Wo L. Chang
The Information Access Division (IAD) of the National Institute of Standards and Technology (NIST) launched a new Data Science Research Program (DSRP) in the fall of 2015. This research program focuses on evaluation-driven research and will establish a new

The Number of Boolean Functions with Multiplicative Complexity 2

October 27, 2015
Author(s)
Magnus G. Find, Daniel C. Smith-Tone, Meltem Sonmez Turan
Multiplicative complexity is a complexity measure, which is defined as the minimum number of AND gates required to implement a given primitive by a circuit over the basis (AND, XOR, NOT), with an unlimited number of NOT and XOR gates. Implementations of
Displaying 551 - 575 of 2211