NIST logo

Publications Portal

You searched on: Topic Area: Information Technology

Displaying records 51 to 60 of 710 records.
Resort by: Date / Title

51. TRECVID 2013 -- An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics
Topic: Information Technology
Published: 5/5/2014
Authors: Paul Douglas Over, Jonathan G Fiscus, Gregory A Sanders, David M Joy, Martial Michel, George Morad Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
Abstract: TRECVID 2013 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last ten years this effort has yielded ...

52. The ghost in the machine: Don't let it haunt your software performance measurements
Series: Technical Note (NIST TN)
Report Number: 1830
Topic: Information Technology
Published: 4/28/2014
Authors: Vreda Pieterse, David W Flater
Abstract: This paper describes pitfalls, issues, and methodology for measuring software performance. Ideally, measurement should be performed and reported in such a way that others will be able to reproduce the results in order to confirm their validity. W ...

53. Performance Testing and Evaluation of Transformative Apps Devices
Topic: Information Technology
Published: 4/16/2014
Authors: Anthony J Downs, Lisa Jean Fronczek, Emile L. Morse, Brian A Weiss, Ian Patrick Bashor, Craig I Schlenoff
Abstract: Transformative Apps (TransApps) is a Defense Advanced Research Projects Agency (DARPA) funded program whose goal is to develop a range of militarily-relevant software applications ("apps") to enhance the operational effectiveness of military personne ...

54. NIST and Computer Security
Topic: Information Technology
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...

55. An Empirical Comparison of Combinatorial and Random Testing
Topic: Information Technology
Published: 4/1/2014
Authors: Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N Kacker, David R Kuhn
Abstract: Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the s ...

56. Estimating Fault Detection Effectiveness
Topic: Information Technology
Published: 4/1/2014
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: [Poster] A t-way covering array can detect t-way faults, however they generally include other combinations beyond t-way as well. For example, a particular test set of all 5-way combinations is shown capable of detecting all seeded faults in a test pr ...

57. Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report
Topic: Information Technology
Published: 4/1/2014
Authors: Jon Hagar, David R Kuhn, Raghu N Kacker, Thomas Wissink
Abstract: This poster gives an overview of the experience of eight pilot projects, over two years, applying combinatorial testing in a large aerospace organization. While results varied across the different pilot projects, overall it was estimated that CT wou ...

58. An Interoperability Test Bed for Distributed Healthcare Applications
Topic: Information Technology
Published: 3/24/2014
Author: Robert D Snelick
Abstract: Standards provide the foundation for ensuring interoperability, but if they are not implemented correctly or consistently, their value is diminished leading to problematic installations and higher costs. Conformance and Interoperability testing is es ...

59. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Topic: Information Technology
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...

60. Methods for improving visibility measurement standards of powered industrial vehicles
Topic: Information Technology
Published: 2/28/2014
Authors: Roger V Bostelman, Jochen Teizer, Soumitry J. Ray, Mike Agronin, Dominic Albanese
Abstract: Poor visibility of powered industrial vehicles, such as forklifts, used in industry is often the cause of accidents that include pedestrians. Current standards allow up to 20% non-visible regions for forklifts where measurement of these regions is p ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series