An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The World Wide Web (W3C) Web Accessibility Initiative has developed comprehensive guidance on evaluating web accessibility. Web Content Accessibility Guidelines (WCAG) 2.0 specifies the success criteria for evaluating the conformance of web pages. In this
Chris Greer, David A. Wollman, Dean Prochaska, Paul A. Boynton, Jeffrey A. Mazer, Cuong Nguyen, Gerald FitzPatrick, Thomas L. Nelson, Galen H. Koepke, Allen R. Hefner Jr., Victoria Yan Pillitteri, Tanya L. Brewer, Nada T. Golmie, David H. Su, Allan C. Eustis, David Holmberg, Steven T. Bushby
Section 1305 of the Energy Independence and Security Act (EISA) of 2007 (Pub. L. 110-140) directs NIST ‘‘to coordinate the development of a framework that includes protocols and model standards for information management to achieve interoperability of
Users of biometric systems have expanded from traditional law enforcement operators to the general population with diverse backgrounds. Past research has shown that usability is improved when users received real-time system feedback regarding their hand
We intend to use a classic genetic algorithm (GA) to steer a population of cloud-computing simulators into behavioral directions that reveal degraded performance and system collapse. Such a method could serve as a design tool, empowering system engineers
Timothy Blattner, Walid Keyrouz, Joe Chalfoun, Bertrand C. Stivalet, Mary C. Brady, Shujia Zhou
Researchers in various fields are using optical microscopy to acquire very large images, 10K--200K of pixels per side. Optical microscopes acquire these images as grids of overlapping partial images (thousands of pixels per side) that are then stitched
Lingyu Wang, Meng Zhang, Sushil Jajodia, Anoop Singhal, M. Albanese
The interest in diversity as a security mechanism has recently been revived in various applications, such as Moving Target Defense (MTD), resisting worms in sensor networks, and improving the robustness of network routing. However, most existing efforts on
Determining image quality is dependent to some degree on human interpretation. Although entirely subjective methods of evaluating image quality may be adequate for consumer applications, they are not acceptable for security and safety applications where
Recent work has shown that quantum computers can in polynomial time compute scattering probabilities in massive quantum field theories. One can translate this task into a corresponding formal problem in computational complexity theory. Here, we establish
One-time memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. OTM's cannot exist in a fully-classical world, or in a fully-quantum world, but there is
By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.
Approximately 100 IT professionals participated in the 2014 IT Pro Conference on Information Systems Governance, held at the National Institute of Standards and Technology (NIST) on May 22, 2014 (www.computer.org/itproconf). Information systems governance
Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R. White
This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or to find
This paper presents a framework for object recognition using topological persistence. In particular, we show that the so-called persistence diagrams built from functions defined on the objects can serve as compact and informative descriptors for images and
Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third party website by using their SNS
This report is a draft of key tools and methods to assist smart grid system designers in making informed decisions about existing and emerging wireless technologies. An initial set of quantified requirements have been brought together for advanced metering
Passwords are the most commonly used mechanism in controlling users access to information systems. Little research has been established on the entire user password management lifecycle from the start of generating a password, maintaining the password
In this paper we report the results of the SHREC 2014 track on automatic location of landmarks used in manual anthropometry. The track has been organized to test the ability of modern computational geometry/pattern recognition techniques to locate
Large scale sketch-based 3D shape retrieval has received more and more attentions in the community of content- based 3D object retrieval. The objective of this track is to evaluate the performance of different sketch-based 3D model retrieval algorithms
The objective of this track is to evaluate the performance of 3D shape retrieval approaches on a large-sale com- prehensive 3D shape database which contains different types of models, such as generic, articulated, CAD and architecture models. The track is
This contribution reports the results of the SHREC 2014 track: Retrieval and classification on textured 3D models, whose goal is to evaluate the performance of retrieval algorithms when models vary either by geometric shape or texture, or both. The
We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets. Our dataset features exclusively human models, in a variety of body shapes and poses. 3D models of
This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control
We discuss the application of recently developed 670 GHz low-noise amplifiers based on InP HEMTs to passive indoor imaging. Packaged LNAs were integrated with commercial zero-bias diodes, and accurate measurements of system noise-equivalent temperature
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. criminal
Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, integrity