Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1226 - 1250 of 4392

Overview of the TREC 2014 Clinical Decision Support Track

April 22, 2015
Author(s)
Ellen M. Voorhees
The Text REtrieval Conference (TREC) Clinical Decision Support Track fosters research on systems that link electronic health records with information that is relevant for patient care. TREC 2014 is the initial year of the track. The focus of the first year

InChI, the IUPAC International Chemical Identifier

April 15, 2015
Author(s)
Stephen R. Heller, Alan McNaught, Igor Pletnev, Stephen Stein, Dmitrii Tchekhovskoi
This paper documents the design, layout and algorithms of the IUPAC International Chemical Identifier, InChI.

Privacy Amplification in the Isolated Qubits Model

April 14, 2015
Author(s)
Yi-Kai Liu
Isolated qubits are a special class of quantum devices, which can be used to implement tamper-resistant cryptographic hardware such as one-time memories (OTM's). Unfortunately, these OTM constructions leak some information, and standard methods for privacy

Password Entry Errors: Memory or Motor?

April 9, 2015
Author(s)
Kristen Greene, Frank Tamborello
As we increasingly rely upon our computer information systems to store and operate on sensitive information, the methods we use to authenticate user identity also become more important. One of the most important such methods is the password. However

Towards a "Periodic Table" of Bugs

April 8, 2015
Author(s)
Irena Bojanova
Our vision for a "periodic table" of bugs is a "natural" organization of a catalog or dictionary or taxonomy to describe software weaknesses and vulnerabilities. Such an organization will help the community to: a) more closely explain the nature of

ACT-R Modeling of Password Entry Errors

April 2, 2015
Author(s)
Kristen Greene, Franklin Tamborello
Validated predictive models of human error for password-related tasks could better inform password requirements for both government and civilian systems. Here, we build upon prior modeling work focused on disentangling the source of password entry errors

Combinatorial Coverage as an Aspect of Test Quality

March 31, 2015
Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
There are relatively few good methods for evaluating test set quality, after ensuring basic requirements traceability. Structural coverage, mutation testing, and related methods can be used if source code is available, but these approaches may entail

Assessing Effects of Asymmetries, Dynamics, and Failures on a Cloud Simulator

March 29, 2015
Author(s)
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
We characterize the effects of asymmetries, dynamics, and failures when introduced into a cloud computing simulator, which had previously been characterized under static, homogeneous configurations with various patterns of demand and supply. We aim to

TRECVID 2014 -- An Overview of the Goals, Tasks, Data, Evaluation Mechanisms, and Metrics

March 26, 2015
Author(s)
Paul D. Over, Jonathan G. Fiscus, Gregory A. Sanders, David M. Joy, Martial Michel, George Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
The TREC Video Retrieval Evaluation (TRECVID) 2014 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last

Guidance for Secure Authorization of Mobile Applications in the Corporate Environment

March 19, 2015
Author(s)
Athanasios T. Karygiannis, Stephen Quirolgico, Larry Feldman, Gregory A. Witte
This bulletin provides an overview of NIST Special Publication (SP) 800-163, "Vetting the Security of Mobile Applications." The NIST SP helps organizations understand the process for vetting the security of mobile applications, plan for the implementation
Was this page helpful?