Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 676 - 700 of 2288

gtklogger: A Tool For Systematically Testing Graphical User Interfaces

August 20, 2015
Author(s)
Stephen A. Langer, Faical Y. Congo, Andrew C. Reid, Rhonald Lua, Valerie R. Coffman
We describe a scheme for systematically testing the operation of a graphical user interface. The scheme provides a capability for generating event logs, which are recordings of a user session with the interface. These logs can be annotated with assertion

Combinatorial Testing: Theory and Practice

August 18, 2015
Author(s)
David R. Kuhn, Renee Bryce, Feng Duan, Laleh Ghandehari, Yu Lei, Raghu N. Kacker
Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available, and practical success has been demonstrated. This article reviews the theory and application of this method, focusing

Combinatorial Testing: Theory and Practice, Section 8.

August 18, 2015
Author(s)
David R. Kuhn, Renee Bryce, Feng Duan, Laleh Ghandehari, Yu Lei, Raghu N. Kacker
Additional Section to PUB ID 918448. Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available, and practical success has been demonstrated. This article reviews the theory and

Effects of Password Permutation on Subjective Usability Across Platforms

August 4, 2015
Author(s)
Kristen Greene
The current work examines subjective password usability across platforms—desktop, smartphone, and tablet—using system- generated passwords that adhere to the stricter password requirements found in higher-security enterprise environments. This research

Improved Security and Mobility Through Updated Interfaces for PIV Cards

July 21, 2015
Author(s)
Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-73-4: Interfaces for Personal Identity Verification and NIST SP 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification. SP 800-73-4 has been updated to align

PIXEL FUSION BASED STEREO IMAGE RETARGETING

June 29, 2015
Author(s)
Hamid Gharavi
Image retargeting attempts to adapt images to different devices while preserving the salient contents. Most existing methods address retargeting of a single image. In this paper, we propose a novel image retargeting method for resizing a pair of stereo

Cloud-Enabled Prognosis for Manufacturing

June 22, 2015
Author(s)
Robert Gao, Lihui Wang, Roberto Teti, David Dornfeld, Soundar Kumara, Masahiko Mori, Moneer Helu
Advanced manufacturing depends on the timely acquisition, distribution, and utilization of information from machines and processes across spatial boundaries for improved accuracy and reliability in predicting resource needs and allocation, maintenance

Towards a Periodic Table of Bugs

June 19, 2015
Author(s)
Paul E. Black, Irena V. Bojanova, Yaacov Yesha, Yan Wu
High-confidence systems must not be vulnerable to attacks that reduce the security, reliability, or availability of the system as a whole. One collection of vulnerabilities is the Common Weakness Enumeration (CWE). It represents a considerable community

Increasing Visibility and Control of Your ICT Supply Chains

June 15, 2015
Author(s)
Jon M. Boyens, Celia Paulsen, Larry Feldman, Greg Witte
This bulletin summarizes the information presented in NIST SP 800-161, Supply Chain Management Practices for Federal Information Systems and Organizations, written by Jon Boyens and Celia Paulsen. The publication provides guidance to federal agencies on

JPEG 2000 CODEC Certification Guidance for 1000 ppi Fingerprint Friction Ridge Imagery

June 4, 2015
Author(s)
Shahram Orandi, John M. Libert, Michael Garris, John Grantham, Frederick R. Byers
The document describes the procedure by which applications of JPEG 2000 CODECs will be evaluated with respect to conformance to the NIST guidance for compression of 1000 ppi friction ridge images as detailed in NIST Special Publication 500-289 [NIST5]

Designing a Cyber-Physical Cloud Computing Architecture

June 2, 2015
Author(s)
Eric D. Simmon, Sulayman Sowe, Koji Zettsu
In this era of inter-connectivity where almost everybody, everything, and anything are networked, Cyber-Physical Systems (CPS) also known as the Internet of Things (IoT) have emerged as vital systems that use information systems to observe and modify the

Dynamic 3D Visualizations of Complex Function Surfaces Using X3DOM and WebGL

June 1, 2015
Author(s)
Bonita V. Saunders, Brian Antonishek, Qiming Wang, Bruce R. Miller
In 1997 the National Institute of Standards and Technology (NIST) embarked on a huge project to replace one of the most cited resources for mathematical, physical and engineering scientists, the Handbook of Mathematical Functions with Formulas, Graphs, and

PASSING THE BATON: Message FROM THE INCOMING EDITOR-IN-CHIEF

June 1, 2015
Author(s)
Hamid Gharavi
This incoming Editor In Chief's (EIC) message is expected to appear in the next issue of the IEEE wireless communications. The editorial team will be under the leadership of the new EIC for a period of three years.

A Framework to Canonicalize Manufacturing Service Capability Models

May 15, 2015
Author(s)
Boonserm Kulvatunyou, Yunsu Lee, Nenad Ivezic, Yun Peng
The ability to share precise models of suppliers’ manufacturing service capability (MSC) information is necessary to develop reliable methods that enable Original Equipment Manufacturers (OEMs) to efficiently configure agile and responsive supply chains

SHREC'15: Range Scans based 3D Shape Retrieval

May 3, 2015
Author(s)
Afzal A. Godil
The objective of the SHREC'15 Range Scans based 3D Shape Retrieval track is to evaluate algorithms that match range scans of real objects to complete 3D mesh models in a target dataset. The task is to retrieve a rank list of complete 3D models that are of

Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry

May 1, 2015
Author(s)
Kristen Greene, Joshua M. Franklin, John M. Kelsey
Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics

Validated Open Source Nanofiber Diameter Measurement Tool

April 30, 2015
Author(s)
Nathan A. Hotaling, Kapil Bharti, Haydn Kriel, Carl G. Simon Jr.
Despite the growing use of nanofiber scaffolds for tissue engineering applications, there is not a validated, readily available (commercial or open source) solution for rapid, automated analysis of nanofiber diameter from scanning electron microscope (SEM)
Was this page helpful?