You searched on: Topic Area: Information Technology Sorted by: title
Displaying records 731 to 734.
Resort by: Date / Title
731. Writing Guidelines to Develop an Memorandum of Understanding for Interoperable Automated Fingerprint
Special Publication (NIST SP)
Susan M Ballou, Michael D Garris, Anthony Clay, Joi Dickerson, Peter T Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa K Taylor
This is one of a series of documents prepared by the Latent Print Automated Fingerprint
Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to
provide guidance and a framework to those involved in the id ...
732. dint u say that: Digital Discourse, Digital Natives and Gameplay
Theresa O'Connell, John Donald Grantham, Wyatt Wong, Kevin Workman, Alexander Wang
Traditional, new and modified discourse analysis methods were applied to a corpus of 858 discrete gameplay discourse events disclosing discourse characteristics during collaborative problem solving. Four teams of four digital natives each played Pane ...
733. gtklogger: A Tool For Systematically Testing Graphical User Interfaces
Technical Note (NIST TN)
Stephen A Langer, Faical Yannick Palingwende Congo, Andrew Charles edmu Reid, Rhonald Lua, Valerie R. Coffman
We describe a scheme for systematically testing the operation of a graphical user interface.
scheme provides a capability for generating event logs, which are recordings of a user session
the interface. These logs can be annotated with ...
734. k-Zero Day Safety: Measuring the Security Risk of Networks Against Unknown Attacks
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the process of finding such flaws and developing exploits seems to be cha ...