Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 576 - 600 of 2211

De-Identification of Personal Information

October 22, 2015
Author(s)
Simson L. Garfinkel
Abstract: De-identification removes identifying information from a dataset so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing or

NIST Big Data Interoperability Framework: Volume 1, Big Data Definitions

October 22, 2015
Author(s)
Wo L. Chang, Nancy Grady, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 2, Big Data Taxonomies

October 22, 2015
Author(s)
Wo L. Chang, Nancy Grady, Community Resilience Program NIST
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor- laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 3, Use Cases and General Requirements

October 22, 2015
Author(s)
Wo L. Chang, Geoffrey Fox, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 4, Security and Privacy

October 22, 2015
Author(s)
Wo L. Chang, Arnab Roy, Mark Underwood, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 5, Architectures White Paper Survey

October 22, 2015
Author(s)
Wo L. Chang, Sanjay Mishra, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 6, Big Data Reference Architecture

October 22, 2015
Author(s)
Wo L. Chang, Orit Levin, David Boyd, NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

NIST Big Data Interoperability Framework: Volume 7, Big Data Standards Roadmap

October 22, 2015
Author(s)
Wo L. Chang, David Boyd, Carl Buffington , NBD-PWG NIST Big Data Public Working Group
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

The NIST IAD Data Science Research Program

October 19, 2015
Author(s)
Bonnie J. Dorr, Peter C. Fontana, Craig S. Greenberg, Mark A. Przybocki, Marion Le Bras, Cathryn A. Ploehn, Oleg Aulov, Martial Michel, Edmond J. Golden III, Wo L. Chang
We examine foundational issues in data science including current challenges, basic research questions, and expected advances, as the basis for a new Data Science Research Program and evaluation series, introduced by the Information Access Division of the

Confidence Estimation in Stem Cell Classification

October 15, 2015
Author(s)
Peter Bajcsy, Jana Kosecka, Zahra Rajabi
We study the problem of supervised classification of stem cell colonies and confidence estimation of the attained classification labels. The problem is investigated in the application context of heterogeneity labels of stem cell colonies observed by using

Poster:A Logic Based Network Forensics Model for Evidence Analysis

October 15, 2015
Author(s)
Anoop Singhal, Changwei Liu, Duminda Wijesekera
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

October 15, 2015
Author(s)
Tatu Ylonen, Paul Turner, Karen Scarfone, Murugiah Souppaya
Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges, for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management

Shape Descriptors Comparison for Cell Tracking

October 15, 2015
Author(s)
Michael P. Majurski, Christopher Zheng, Joe Chalfoun, Alden A. Dima, Mary C. Brady
New microscope technologies are enabling the acquisition of large volumes of live cell image data. Accurate temporal object tracking is required to facilitate the analysis of this data. One principle component of cell tracking is correspondence, matching

Who Touched my Mission: Towards Probabilistic Mission Impact Assessment

October 12, 2015
Author(s)
Xiaoyan Sun, Anoop Singhal, Peng Liu
Cyber attacks inevitably generate impacts towards relevant missions. However, concrete methods to accurately evaluate such impacts are rare. In this paper, we propose a probabilistic approach based on Bayesian networks for quantitative mission impact

On the Behavior of PRES Using Incomplete Judgment Sets

September 30, 2015
Author(s)
Ellen M. Voorhees
PRES, the Patent Retrieval Evaluation Score, is a family of retrieval system evaluation measures that combines recall and user effort to better reflect the quality of a retrieval run with respect to recall-oriented search tasks. Previous analysis of the

gtklogger: A Tool For Systematically Testing Graphical User Interfaces

August 20, 2015
Author(s)
Stephen A. Langer, Faical Y. Congo, Andrew C. Reid, Rhonald Lua, Valerie R. Coffman
We describe a scheme for systematically testing the operation of a graphical user interface. The scheme provides a capability for generating event logs, which are recordings of a user session with the interface. These logs can be annotated with assertion

Combinatorial Testing: Theory and Practice

August 18, 2015
Author(s)
David R. Kuhn, Renee Bryce, Feng Duan, Laleh Ghandehari, Yu Lei, Raghu N. Kacker
Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available, and practical success has been demonstrated. This article reviews the theory and application of this method, focusing

Combinatorial Testing: Theory and Practice, Section 8.

August 18, 2015
Author(s)
David R. Kuhn, Renee Bryce, Feng Duan, Laleh Ghandehari, Yu Lei, Raghu N. Kacker
Additional Section to PUB ID 918448. Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available, and practical success has been demonstrated. This article reviews the theory and

Effects of Password Permutation on Subjective Usability Across Platforms

August 4, 2015
Author(s)
Kristen Greene
The current work examines subjective password usability across platforms—desktop, smartphone, and tablet—using system- generated passwords that adhere to the stricter password requirements found in higher-security enterprise environments. This research
Displaying 576 - 600 of 2211