Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 676 - 700 of 2211

NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0

October 1, 2014
Author(s)
Chris Greer, David A. Wollman, Dean Prochaska, Paul A. Boynton, Jeffrey A. Mazer, Cuong Nguyen, Gerald FitzPatrick, Thomas L. Nelson, Galen H. Koepke, Allen R. Hefner Jr., Victoria Yan Pillitteri, Tanya L. Brewer, Nada T. Golmie, David H. Su, Allan C. Eustis, David Holmberg, Steven T. Bushby
Section 1305 of the Energy Independence and Security Act (EISA) of 2007 (Pub. L. 110-140) directs NIST ‘‘to coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperability of

A Hybrid CPU-GPU System for Stitching Large Scale Optical Microscopy Images

September 12, 2014
Author(s)
Timothy Blattner, Walid Keyrouz, Joe Chalfoun, Bertrand C. Stivalet, Mary C. Brady, Shujia Zhou
Researchers in various fields are using optical microscopy to acquire very large images, 10K--200K of pixels per side. Optical microscopes acquire these images as grids of overlapping partial images (thousands of pixels per side) that are then stitched

Image Quality Testing: Selection of Images for Assessing Test Subject Input

September 2, 2014
Author(s)
John R. Jendzurski, Nicholas G. Paulter Jr.
Determining image quality is dependent to some degree on human interpretation. Although entirely subjective methods of evaluating image quality may be adequate for consumer applications, they are not acceptable for security and safety applications where

BQP-completeness of Scattering in Scalar Quantum Field Theory

September 1, 2014
Author(s)
Stephen P. Jordan, Keith S. Lee, John Preskill
Recent work has shown that quantum computers can in polynomial time compute scattering probabilities in massive quantum field theories. One can translate this task into a corresponding formal problem in computational complexity theory. Here, we establish

Single-shot security for one-time memories in the isolated qubits model

August 21, 2014
Author(s)
Yi-Kai Liu
One-time memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but there is

The Future of Cybersecurity Education

August 19, 2014
Author(s)
Ernest L. McDuffie, V. P. Piotrowski
By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.

Approximate Matching: Definition and Terminology

July 2, 2014
Author(s)
Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R. White
This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or to find

Persistence-based Structural Recognition

June 28, 2014
Author(s)
Chunyuan Li
This paper presents a framework for object recognition using topological persistence. In particular, we show that the so-called persistence diagrams built from functions defined on the objects can serve as compact and informative descriptors for images and

Preserving Privacy – More Than Reading a Message

June 27, 2014
Author(s)
Susanne M. Furman, Mary F. Theofanos
Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third party website by using their SNS

A Cognitive-Behavioral Framework of User Password Management Lifecycle

June 22, 2014
Author(s)
Yee-Yin Choong
Passwords are the most commonly used mechanism in controlling users’ access to information systems. Little research has been established on the entire user password management lifecycle from the start of generating a password, maintaining the password

SHREC’14 Track: Extended Large Scale Sketch-Based 3D Shape Retrieval

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
Large scale sketch-based 3D shape retrieval has received more and more attentions in the community of content- based 3D object retrieval. The objective of this track is to evaluate the performance of different sketch-based 3D model retrieval algorithms

SHREC’14 Track: Large Scale Comprehensive 3D Shape Retrieval

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
The objective of this track is to evaluate the performance of 3D shape retrieval approaches on a large-sale com- prehensive 3D shape database which contains different types of models, such as generic, articulated, CAD and architecture models. The track is

SHREC’14 Track: Retrieval and classification on Textured 3D Models

June 12, 2014
Author(s)
Afzal A. Godil
This contribution reports the results of the SHREC 2014 track: Retrieval and classification on textured 3D models, whose goal is to evaluate the performance of retrieval algorithms when models vary either by geometric shape or texture, or both. The

SHREC’14 Track: Shape Retrieval of Non-Rigid 3D Human Models

June 12, 2014
Author(s)
Afzal A. Godil, Chunyuan Li
We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets. Our dataset features exclusively human models, in a variety of body shapes and poses. 3D models of

ITL Forensic Science Program

June 5, 2014
Author(s)
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. criminal
Displaying 676 - 700 of 2211