Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1626 - 1650 of 2269

Software Fault Complexity and Implications for Software Testing

June 16, 2004
Author(s)
D. Richard Kuhn, D Wallace, A M. Gallo
Exhaustive testing of computer software is intractable, but empirical studies of software failures suggest that testing can in some cases be effectively exhaustive. Data reported in this study and others show that software failures in a variety of domains

Improving the Usability and Accessibility of Voting Systems and Products

May 7, 2004
Author(s)
Sharon J. Laskowski, James H. Yen, Marguerite W. Autry, J Cuginin, William H. Killam
The goal of this report is to describe how research and best practices from the human factors, human-machine and human-computer interaction, and usability engineering disciplines can be brought to bear to improve the usability and accessibility of voting

Micro-Time-Scale Network Measurements and Harmonic Effects

April 28, 2004
Author(s)
Mark E. Carson, Darrin J. Santay
As network transmission speeds increase, packet streams increasingly uncover fine details of the interior behavior of router hardware and software. This behavior reveals itself as a set of harmonic effects, as interior clocks periodically interrupt packet

Selecting Information Technology Security Products

April 28, 2004
Author(s)
Shirley M. Radack
This bulletin summarizes NIST Special Publication 800-36, "Guide to Selecting Information Technology Security Products." The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure

A Cross-Correlation Based Method for Spatial-Temporal Traffic Analysis

March 10, 2004
Author(s)
Kevin L. Mills, J Yuan
Analyzing spatial-temporal characteristics of traffic in large-scale networks requires both suitable analysis method and a means to reduce the amount of data that must be collected. Of particular interest would be techniques that reduce the amount of data

Segmentation for Robust Tracking in the Presence of Severe Occlusion

February 18, 2004
Author(s)
Camillo A. Gentile, M Sznaier, O Camps
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness to occlusion can be increased by tracking the object as a set of parts such that not all of these are occluded at the same time. However, successful

Computer Modeling of Crack Propagation in Biaxially-Stressed Glass Disks

February 1, 2004
Author(s)
George W. Quinn, Dianne M. O'Leary, Janet Quinn
A computer program was written to model the propagation of two-dimensional traveling cracks in a biaxially-stressed glass disk. This was accomplished by using a combination of known fractographic equations and empirical observations with generic algorithms

Testing: A Key to Building Trust and Confidence in IT Systems

February 1, 2004
Author(s)
S F. Zevin
The ubiquitous computer now touches nearly every aspect of human life. The promise of information technology is improvement to the quality of life. Maintaining trust and confidence in information technology is central to keeping that promise. This is
Was this page helpful?