Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Interagency/Internal Report (NISTIR)

SATE V Ockham Sound Analysis Criteria

Author(s)
Paul E. Black, Athos Ribeiro
Static analyzers examine the source or executable code of programs to find problems. Many static analyzers use some heuristics or approximations to handle

Optimization of Registration Performance Metrics

Author(s)
Marek Franaszek, Geraldine Cheok
Perception systems are a very important component of automation and robotics. These systems localize objects in its local coordinate frame and the data has to

A Rational Foundation for Software Metrology

Author(s)
David W. Flater, Paul E. Black, Elizabeth N. Fong, Raghu N. Kacker, Vadim Okun, Stephen S. Wood, David R. Kuhn
Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for

A metamodel for optimization problems

Author(s)
Ibrahim Assouroko, Peter O. Denno
In mathematics, computer science, and operations research, mathematical optimization is the process of finding best feasible values (oftentimes maxima or minima

NIST Time and Frequency Bulletin

Author(s)
Karen L. Hansen Lichtfuss
The Time and Frequency Bulletin provides information on performance of time scales and a variety of broadcasts (and related information) to users of the NIST

Cloud-based Accessibility for Voting Applications

Author(s)
Shanee T. Dawkins, Sharon J. Laskowski
Since its creation, the National Institute on Disability and Rehabilitation Research (NIDRR) of the U.S. Department of Education (ED) has supported the

Trusted Geolocation in the Cloud: Proof of Concept Implementation

Author(s)
Michael Bartock, Murugiah Souppaya, Raghuram Yeluri, Uttam Shetty, James Greene, Steve Orrin, Hemma Prafullchandra, John McLeese, Jason Mills, Daniel Carayiannis, Tarik Williams, Karen Scarfone
This publication explains selected security challenges involving Infrastructure as a Service (IaaS) cloud computing technologies and geolocation. It then
Was this page helpful?