An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Identification and recognition of three dimensional (3D) objects in range data is a challenging problem. We propose a novel method to fulfill the task through two steps: 1) construct the feature signatures for the objects in the scene and the models in a
In this paper, we analyze the state of current human and automatic evaluation of topic-focused summarization in the Document Understanding Conference main task for 2005-2007. The analyses show that while ROUGE has very strong correlation with
Ian M. Soboroff, Craig Macdonald, Ben He, Iadh Ounis
In opinion-finding, the retrieval system is tasked with re- trieving not just relevant documents, but which also express an opinion towards the query target entity. Most opinion- finding systems are based on a two-stage approach, where initially the system
Ian M. Soboroff, Peter Bailey, Nick Craswell, Alan Smeaton, Emine Yilmaz, Paul Thomas
We investigate to what extent people making relevance judgments for a reusable IR test collection are exchangeable. We consider three classes of judge: gold standard judges, who are topic origi- nators and are experts in a particular information seeking
Justin M. Shaw, Stephen E. Russek, Michael J. Donahue, Thomas Thomson, Bruce Terris, Michael Schneider, Miles Olsen
We find that the reversal mechanism in magnetic nanostructures is highly dependent on the nature and condition of the edges. Temperature and size dependent reversal properties of fabricated perpendicularly magnetized nanostructures down to 25 nm in
Environmental regulations impacting the electronics industry are driving the need for new data management systems to track environmental data including material data. This paper describes efforts to take a holistic approach in managing this information by
Evaluation of Machine Translation (MT) technology is often tied to the requirement for tedious manual judgments of translation quality. While automated MT metrology continues to be an active area of research, a well known and often accepted standard metric
Research and development of nanotechnology, with applications ranging from smart materials to quantum computation to biolabs on a chip, has a high national priority. In this article we focus on the use of high performance computing an visualization for
The rise of blogging as a new grassroots publishing medium and the many interesting peculiarities that characterize blogs compared to other genres of documents opened up several new interesting research areas in the information retrieval field. The Blog
We consider the security of Damgaard-Merkle variants which computer linear-XOR or additive checksums over message blocks, intermediate hash values, or both, and process these checksums in computing the final hash value. We show that these Damgaard-Merkle
Market-based compute grids encompass service providers offering limited resources to potential users with varying demands and willingness to pay. Providers face difficult decisions about which jobs to admit and when to schedule admitted jobs. For this
For Websites to succeed, they must be user-centered. This is accomplished through usability engineering. The first part of this article gives usability engineering definitions; the second describes its processes.
Catherine Plaisant, Georges Grinstein, Jean Scholtz, Mark Whiting, Theresa O'Connell, Sharon J. Laskowski, T Chien, A Tat, W Wright, C Gorg, Z Liu, N Parekh, K Singhal, John Stasko
The second Visual Analytics Science and Technology (VAST) contest?s data consisted of a heterogeneous synthetic collection of news articles with additional supporting files and contained a scenario with embedded threats that provided ground truth. Using
Georges Grinstein, Catherine Plaisant, Theresa O'Connell, Sharon J. Laskowski, Jean Scholtz, Mark Whiting
Visual analytics experts realize that one effective way to push the field forward and to develop metrics for measuring the performance of various visual analytics components is to hold an annual competition. The second Visual Analytics Science and
Vinod Anandarajah, Naveen Kalappa, Julien L. Baboud, Ya-Shian Li-Baboud, James Moyne
In today's fabs, coordination of time-based information throughout the factory and enterprise has become necessary. This has driven the need to have time synchronization at all levels of the enterprise. Time synchronization protocols such as Network Time
Deployment of standards-based biometric technologies is expected to significantly raise levels of security for critical infrastructures that has not been possible to date with other technologies. These systems require a comprehensive set of technically
Naveen Kalappa, Vinod Anandarajah, Julien L. Baboud, Ya-Shian Li-Baboud, James Moyne
In today?s fabs, coordination of time-based information throughout the factory and enterprise has become necessary. This has driven the need to have time synchronization at all levels of the enterprise. Time synchronization protocols such as Network Time
Test collections are most useful when they are reusable, that is, when they can be reliably used to rank systems that did not contribute to the pools. Pooled relevance judgments for very large collections may not be reusable for two reasons: they will be
The primary goal of this work is to extend two methodsof random effects models to multiparameter situation. These methods comprise the DerSimonian-Laird estimator, arising in the meta-analysis, and the Mandel-Paule algorithm widely used in interlaboratory
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for
Georges Grinstein, Theresa O'Connell, Sharon J. Laskowski, Catherine Plaisant, Jean Scholtz, Mark Whiting
Visual analytics experts realize that one effective way to push the field forward and to develop metrics for measuring the performance of various visual analytics components is to hold an annual competition. The first Visual Analytics Science and
Biometric systems designed to detect or verify a persons identity are widely used in homeland security. A variety of commercially available biometric systems are now in existence; current technological progress makes it possible to evaluate these systems