An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Passwords are the most commonly used mechanism in controlling users access to information systems. Little research has been established on the entire user password management lifecycle from the start of generating a password, maintaining the password
In this paper we report the results of the SHREC 2014 track on automatic location of landmarks used in manual anthropometry. The track has been organized to test the ability of modern computational geometry/pattern recognition techniques to locate
Large scale sketch-based 3D shape retrieval has received more and more attentions in the community of content- based 3D object retrieval. The objective of this track is to evaluate the performance of different sketch-based 3D model retrieval algorithms
The objective of this track is to evaluate the performance of 3D shape retrieval approaches on a large-sale com- prehensive 3D shape database which contains different types of models, such as generic, articulated, CAD and architecture models. The track is
This contribution reports the results of the SHREC 2014 track: Retrieval and classification on textured 3D models, whose goal is to evaluate the performance of retrieval algorithms when models vary either by geometric shape or texture, or both. The
We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets. Our dataset features exclusively human models, in a variety of body shapes and poses. 3D models of
This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control
We discuss the application of recently developed 670 GHz low-noise amplifiers based on InP HEMTs to passive indoor imaging. Packaged LNAs were integrated with commercial zero-bias diodes, and accurate measurements of system noise-equivalent temperature
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. criminal
Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, integrity
Opportunistic Spectrum Access (OSA) is one of the models proposed for Dynamic Spectrum Access (DSA). In OSA systems, it is important to restrict the interference of Secondary Users (SUs) to the Primary Users (PUs), so that the performance degradation of PU
On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executive
National security depends on the reliable functioning of critical infrastructures. Security mechanisms and controls for critical infrastructure protection arent useful unless adopted, so NIST seeks, while fostering creation of effective cybersecurity
Ian M. Soboroff, Iadh Ounis, Jimmy Lin, Craig Macdonald
The Microblog track examines search tasks and evaluation meth- odologies for information seeking behaviours in microblogging en- vironments such as Twitter. It was first introduced in 2011, address- ing a real-time adhoc search task, whereby the user
Infrastructure as a Service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of resources such as computing (Virtual Machines or VMs), virtual network, storage and utility programs (DBMS). Any large
Polar coding is the most recent encoding scheme in the quest for error correction codes that approaches the Shannon limit, has a simple structure, and admits fast decoders. As such, it is an interesting candidate for the quantum key distribution (QKD)
The building industry uses numerous engineering standards, building codes, specifications and regulations and a diverse set of industry vocabularies to describe, assess, and deliver constructed facilities. As part of the expanding use of building
In this report, we present results of a physical layer performance study for all MCSs (from MCS0 to MCS28) in terms of block error rate (BLER) and spectral efficiency. The results are obtained by using the Steepest Ascent LTE toolbox for MATLAB which
Paul D. Over, Jonathan G. Fiscus, Gregory A. Sanders, David M. Joy, Martial Michel, George M. Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
TRECVID 2013 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last ten years this effort has yielded a better
Vladimir N. Dvornychenko, Stephen B. Meagher, Michael Garris
The term "lights-out" for AFIS ten-print fingerprint operations has been around for many years and is generally understood to mean "no human intervention is involved." But is this appropriate for AFIS latent print operations? Is it truly possible to
NIST SP 800-52, Revision 1 provides guidance to U.S. Government information system managers for the selection and configuration of TLS protocol implementations. U.S. Office of Management and Budget (OMB) Circular A-130, Management of Federal Information
This paper describes pitfalls, issues, and methodology for measuring software performance. Ideally, measurement should be performed and reported in such a way that others will be able to reproduce the results in order to confirm their validity. We aim to
Explores methods for defining a standardized matcher score for Automated Fingerprint Identification Systems (AFIS). A standardized score facilitates evaluating candidate lists from AFIS, and decreases the burden on the human expert. Such scoring will also
Anthony J. Downs, Lisa J. Fronczek, Emile L. Morse, Brian A. Weiss, Ian P. Bashor, Craig I. Schlenoff
Transformative Apps (TransApps) is a Defense Advanced Research Projects Agency (DARPA) funded program whose goal is to develop a range of militarily-relevant software applications ("apps") to enhance the operational effectiveness of military personnel on
William E. Burr, Hildegard Ferraiolo, David A. Waltermire
The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information