Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 651 - 675 of 2288

Cyber-Physical Systems Framework

November 2, 2015
Author(s)
David A. Wollman
Two worlds that have operated independently—the digital and physical worlds—are now merging, creating opportunities that will transform many sectors of our society. These new smart systems are based on engineered interacting networks of physical and

The NIST IAD Data Science Evaluation Series: Part of the NIST Information Access Division Data Science Research Program

October 29, 2015
Author(s)
Bonnie J. Dorr, Craig Greenberg, Peter Fontana, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Wo L. Chang
The Information Access Division (IAD) of the National Institute of Standards and Technology (NIST) launched a new Data Science Research Program (DSRP) in the fall of 2015. This research program focuses on evaluation-driven research and will establish a new

The Number of Boolean Functions with Multiplicative Complexity 2

October 27, 2015
Author(s)
Magnus G. Find, Daniel C. Smith-Tone, Meltem Sonmez Turan
Multiplicative complexity is a complexity measure, which is defined as the minimum number of AND gates required to implement a given primitive by a circuit over the basis (AND, XOR, NOT), with an unlimited number of NOT and XOR gates. Implementations of

De-Identification of Personal Information

October 22, 2015
Author(s)
Simson L. Garfinkel
Abstract: De-identification removes identifying information from a dataset so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing or

NIST Big Data Interoperability Framework: Volume 1, Big Data Definitions

October 22, 2015
Author(s)
Wo L. Chang, Nancy Grady, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 2, Big Data Taxonomies

October 22, 2015
Author(s)
Wo L. Chang, Nancy Grady, Community Resilience Program NIST
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 3, Use Cases and General Requirements

October 22, 2015
Author(s)
Wo L. Chang, Geoffrey Fox, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 4, Security and Privacy

October 22, 2015
Author(s)
Wo L. Chang, Arnab Roy, Mark Underwood, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 5, Architectures White Paper Survey

October 22, 2015
Author(s)
Wo L. Chang, Sanjay Mishra, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 6, Big Data Reference Architecture

October 22, 2015
Author(s)
Wo L. Chang, Orit Levin, David Boyd, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 7, Big Data Standards Roadmap

October 22, 2015
Author(s)
Wo L. Chang, David Boyd, Carl Buffington , NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

The NIST IAD Data Science Research Program

October 19, 2015
Author(s)
Bonnie J. Dorr, Peter C. Fontana, Craig S. Greenberg, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Martial Michel, Edmond J. Golden III, Wo L. Chang
We examine foundational issues in data science including current challenges, basic research questions, and expected advances, as the basis for a new Data Science Research Program and evaluation series, introduced by the Information Access Division of the

Confidence Estimation in Stem Cell Classification

October 15, 2015
Author(s)
Peter Bajcsy, Jana Kosecka, Zahra Rajabi
We study the problem of supervised classification of stem cell colonies and confidence estimation of the attained classification labels. The problem is investigated in the application context of heterogeneity labels of stem cell colonies observed by using

Poster:A Logic Based Network Forensics Model for Evidence Analysis

October 15, 2015
Author(s)
Anoop Singhal, Changwei Liu, Duminda Wijesekera
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

October 15, 2015
Author(s)
Tatu Ylonen, Paul Turner, Karen Scarfone, Murugiah Souppaya
Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges, for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management

Shape Descriptors Comparison for Cell Tracking

October 15, 2015
Author(s)
Michael P. Majurski, Christopher Zheng, Joe Chalfoun, Alden A. Dima, Mary C. Brady
New microscope technologies are enabling the acquisition of large volumes of live cell image data. Accurate temporal object tracking is required to facilitate the analysis of this data. One principle component of cell tracking is correspondence, matching

Who Touched my Mission: Towards Probabilistic Mission Impact Assessment

October 12, 2015
Author(s)
Xiaoyan Sun, Anoop Singhal, Peng Liu
Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact

On the Behavior of PRES Using Incomplete Judgment Sets

September 30, 2015
Author(s)
Ellen M. Voorhees
PRES, the Patent Retrieval Evaluation Score, is a family of retrieval system evaluation measures that combines recall and user effort to better reflect the quality of a retrieval run with respect to recall-oriented search tasks. Previous analysis of the
Was this page helpful?