An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for
Georges Grinstein, Theresa O'Connell, Sharon J. Laskowski, Catherine Plaisant, Jean Scholtz, Mark Whiting
Visual analytics experts realize that one effective way to push the field forward and to develop metrics for measuring the performance of various visual analytics components is to hold an annual competition. The first Visual Analytics Science and
Biometric systems designed to detect or verify a persons identity are widely used in homeland security. A variety of commercially available biometric systems are now in existence; current technological progress makes it possible to evaluate these systems
Richard L. Kissel, Matthew A. Scholl, Steven Skolochenko, Xiang Li
Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. These media may require
Emile L. Morse, Michelle P. Steves, Jean C. Scholtz
In this paper we discuss the evaluation methodologies and metrics we have developed for ARDA's Novel Intelligence for Massive Data (NIMD) program. We discuss the challenges of developing methods and metrics in a situation where software components that
We describe two models of distributed computation in which the agents are anonymous finite-state sensors interacting through a communication network whose dynamics (in case the agents are mobile) and/or topology they do not control or even know about
In this paper, an error analysis based on boundary error popularity including semantic boundary categorization is applied in the context of the news story segmentation task from TRECVID, Clusters of systems were defined based on the input resources they
J Slutsker, K Thornton, Alexander Roytburd, A Warren, Geoffrey B. McFadden, P W. Voorhees
Effective visualizations can help researchers obtain a more complete understanding of high-level mathematical functions that arise in mathematics, statistics, physics, fluid dynamics and other fields of the mathematical and physical sciences. Accordingly
Instability of steady circular Couette flow with radial heating across a vertically oriented annulus with inner cylinder rotating and outer cylinder stationary is investigated using linear stability analysis. The convection regime base flow is developed
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
There is a clear need for evaluation methodologies specifically suited to ubiquitous computing applications. Here we investigate a user evaluation framework we proposed earlier which draws upon traditional desktop methods, but carefully adapts them based
In this paper we examine the performance of robot systems that use two different techniques for situation awareness for operators of robots in an urban search and rescue (USAR) competition: an automatic mapping technique using sonar and laser sensors and
Our goal is to produce metrics for assessing the impact of software tools and environments produced for the intelligence community. To this end we are developing a task difficulty questionnaire to attempt to identify and assess the impact of task
As a qubit is a two-level system whose state space is spanned by and , so a qudit is a -level system whose state space is spanned by ,..., . Quantum computation has stimulated much recent interest in algorithms factoring unitary evolutions of an -qubit
The Civilian American and European Surface Anthropometry Resource (CAESAR) database provides a comprehensive source for body measurement in numerous industries such as apparel, aerospace, and automobile. Generating animated CAESAR body sequences from still
Our goal is to produce metrics for measuring the effectiveness of software tools and environments produced for the intelligence community. To this end we need to understand the analytic process and to determine which data need to be captured to
Instability of steady circular Couette flow with radial heating across a vertically oriented annulus with inner cylinder rotating and outer cylinder stationary is investigated using linear stability analysis. The convection regime base flow is developed
Our goal is to produce metrics for assessing the impact of software tools and environments produced for the intelligence community. To this end we need to understand the variables that make some analytic tasks harder than others and to determine which data
Embedding metadata within a media file format becomes evermore popular for digital media. Traditional digital media files such as MP3 songs and JPEG photos do not carry any metadata structures to describe the media content until these file formats got
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
Instability of steady circular Couette flow with radial heating across a vertically oriented annulus with inner cylinder rotating and outer cylinder stationary is investigated using linear stability analysis. The convection regime base flow is developed
For the past two years we have been involved in evaluation of software technologies designed to improve analysis. We have been conducting evaluations both in the laboratory and in operational environments. While usability is an important aspect of software
The XML metadata technology of describing media contents has emerged as a dominant mode of making media searchable both for human and machine consumptions. To realize this promise, many online Web applications are pushing this concept to its full potential