Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 676 - 700 of 2297

Shape Descriptors Comparison for Cell Tracking

October 15, 2015
Author(s)
Michael P. Majurski, Christopher Zheng, Joe Chalfoun, Alden A. Dima, Mary C. Brady
New microscope technologies are enabling the acquisition of large volumes of live cell image data. Accurate temporal object tracking is required to facilitate the analysis of this data. One principle component of cell tracking is correspondence, matching

Who Touched my Mission: Towards Probabilistic Mission Impact Assessment

October 12, 2015
Author(s)
Xiaoyan Sun, Anoop Singhal, Peng Liu
Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact

On the Behavior of PRES Using Incomplete Judgment Sets

September 30, 2015
Author(s)
Ellen M. Voorhees
PRES, the Patent Retrieval Evaluation Score, is a family of retrieval system evaluation measures that combines recall and user effort to better reflect the quality of a retrieval run with respect to recall-oriented search tasks. Previous analysis of the

gtklogger: A Tool For Systematically Testing Graphical User Interfaces

August 20, 2015
Author(s)
Stephen A. Langer, Faical Y. Congo, Andrew C. Reid, Rhonald Lua, Valerie R. Coffman
We describe a scheme for systematically testing the operation of a graphical user interface. The scheme provides a capability for generating event logs, which are recordings of a user session with the interface. These logs can be annotated with assertion

Combinatorial Testing: Theory and Practice

August 18, 2015
Author(s)
David R. Kuhn, Renee Bryce, Feng Duan, Laleh Ghandehari, Yu Lei, Raghu N. Kacker
Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available, and practical success has been demonstrated. This article reviews the theory and application of this method, focusing

Combinatorial Testing: Theory and Practice, Section 8.

August 18, 2015
Author(s)
David R. Kuhn, Renee Bryce, Feng Duan, Laleh Ghandehari, Yu Lei, Raghu N. Kacker
Additional Section to PUB ID 918448. Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available, and practical success has been demonstrated. This article reviews the theory and

Effects of Password Permutation on Subjective Usability Across Platforms

August 4, 2015
Author(s)
Kristen Greene
The current work examines subjective password usability across platforms—desktop, smartphone, and tablet—using system- generated passwords that adhere to the stricter password requirements found in higher-security enterprise environments. This research

Improved Security and Mobility Through Updated Interfaces for PIV Cards

July 21, 2015
Author(s)
Hildegard Ferraiolo, Larry Feldman, Gregory A. Witte
This bulletin summarizes the information presented in NIST SP 800-73-4: Interfaces for Personal Identity Verification and NIST SP 800-78-4: Cryptographic Algorithms and Key Sizes for Personal Identity Verification. SP 800-73-4 has been updated to align

PIXEL FUSION BASED STEREO IMAGE RETARGETING

June 29, 2015
Author(s)
Hamid Gharavi
Image retargeting attempts to adapt images to different devices while preserving the salient contents. Most existing methods address retargeting of a single image. In this paper, we propose a novel image retargeting method for resizing a pair of stereo

Cloud-Enabled Prognosis for Manufacturing

June 22, 2015
Author(s)
Robert Gao, Lihui Wang, Roberto Teti, David Dornfeld, Soundar Kumara, Masahiko Mori, Moneer Helu
Advanced manufacturing depends on the timely acquisition, distribution, and utilization of information from machines and processes across spatial boundaries for improved accuracy and reliability in predicting resource needs and allocation, maintenance

Towards a Periodic Table of Bugs

June 19, 2015
Author(s)
Paul E. Black, Irena V. Bojanova, Yaacov Yesha, Yan Wu
High-confidence systems must not be vulnerable to attacks that reduce the security, reliability, or availability of the system as a whole. One collection of vulnerabilities is the Common Weakness Enumeration (CWE). It represents a considerable community

Increasing Visibility and Control of Your ICT Supply Chains

June 15, 2015
Author(s)
Jon M. Boyens, Celia Paulsen, Larry Feldman, Greg Witte
This bulletin summarizes the information presented in NIST SP 800-161, Supply Chain Management Practices for Federal Information Systems and Organizations, written by Jon Boyens and Celia Paulsen. The publication provides guidance to federal agencies on

JPEG 2000 CODEC Certification Guidance for 1000 ppi Fingerprint Friction Ridge Imagery

June 4, 2015
Author(s)
Shahram Orandi, John M. Libert, Michael Garris, John Grantham, Frederick R. Byers
The document describes the procedure by which applications of JPEG 2000 CODECs will be evaluated with respect to conformance to the NIST guidance for compression of 1000 ppi friction ridge images as detailed in NIST Special Publication 500-289 [NIST5]
Displaying 676 - 700 of 2297
Was this page helpful?