An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This paper presents a framework for object recognition using topological persistence. In particular, we show that the so-called persistence diagrams built from functions defined on the objects can serve as compact and informative descriptors for images and
Social media has become a mainstream activity where people share all kinds of personal and intimate details about their lives. These social networking sites (SNS) allow users to conveniently authenticate to the third party website by using their SNS
This report is a draft of key tools and methods to assist smart grid system designers in making informed decisions about existing and emerging wireless technologies. An initial set of quantified requirements have been brought together for advanced metering
Passwords are the most commonly used mechanism in controlling users access to information systems. Little research has been established on the entire user password management lifecycle from the start of generating a password, maintaining the password
In this paper we report the results of the SHREC 2014 track on automatic location of landmarks used in manual anthropometry. The track has been organized to test the ability of modern computational geometry/pattern recognition techniques to locate
Large scale sketch-based 3D shape retrieval has received more and more attentions in the community of content- based 3D object retrieval. The objective of this track is to evaluate the performance of different sketch-based 3D model retrieval algorithms
The objective of this track is to evaluate the performance of 3D shape retrieval approaches on a large-sale com- prehensive 3D shape database which contains different types of models, such as generic, articulated, CAD and architecture models. The track is
This contribution reports the results of the SHREC 2014 track: Retrieval and classification on textured 3D models, whose goal is to evaluate the performance of retrieval algorithms when models vary either by geometric shape or texture, or both. The
We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets. Our dataset features exclusively human models, in a variety of body shapes and poses. 3D models of
This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control
We discuss the application of recently developed 670 GHz low-noise amplifiers based on InP HEMTs to passive indoor imaging. Packaged LNAs were integrated with commercial zero-bias diodes, and accurate measurements of system noise-equivalent temperature
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. criminal
Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, integrity