The workshop is for developers to share their experiences with Speech Activity Detection (SAD), Automated Speech Recognition(ASR), and Keyword Search (KWS) algorithms or systems when applied to the data
The webcast recording will be posted within one week.
NIST will hold a workshop at the Boulder Colorado Laboratories to discuss the role of machine learning (ML) in optical communication systems. Optical communicatio
Appliances from refrigerators to thermostats are now available in models that interact with a wireless network, making them easier to control with a computer or smartphone.
The U.S Commerce Department’s National Institute of Standards and Technology (NIST) Manufacturing Extension Partnership (MEP) has made one (1) cooperative agreement award as part of its 2019
WASHINGTON — Ten researchers from the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) received the Presidential Early Career Award for Scientists and Engineers in a ceremony today.
Seemingly every appliance we use comes in a version that can be connected to a computer network. But each gizmo we add brings another risk to our security and privacy.
This webinar provides a 101 session on the NIST Privacy Framework: An Enterprise Risk Management Tool in preparation for Getting to V1.0 of the NIST Privacy Framework: Workshop #3, in Boise, Idaho.
NIST will host a workshop on Consensus Measurement Methodologies for Automated Vehicle Safety on June 25-26, 2019, at the NIST Gaithersburg, MD campus.
The Summer 2019 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government develo
An update to one of the National Institute of Standards and Technology’s (NIST) information security documents offers strategies to help protect sensitive information that is stored in computers supporting critical government
Prashant AthavaleAssistant Professor, Mathematics Department, Clarkson University
Deep Learning has revolutionized the fields of computer vision, speech recognition and control systems. Can Deep Learning work for scientific problems?
Niklas ElmqvistProfessor, College of Information Studies, University of Maryland
A draft white paper is now available for comment, An Application of Combinatorial M
The NIST Public Safety Communications Research (PSCR) Program has funded R&D grants in several research organizations under its Public Safety Innovation Accelerator (PSIAP) to support research in emerging analytic technolo
The Federal Computer Security Program Managers' Forum (Forum) is an informal group sponsored by the National Institute of Standards and Technology (NIST) to prom
Twenty-first century science and engineering (S&E) research continues to be transformed by the increasing availability and scales of computation and data, and national cyberinfrastructure (CI) ecosystem is a key catalyst f
The White House has released a new Executive Order on America’s Cybersecurity Workforce
Join NIST leadership to discuss the latest on the NIST Privacy Framework effort.
In the past few years, networks of optical parametric oscillators (OPOs) have been successfully used to simulate the classical Ising Hamiltonian leading to a platform that may be used as a special-purpose computer.
Electronic device manufacturers should find it less time-consuming to bring their wares to both the U.S.
We entrust our lives to software every time we step aboard a high-tech aircraft or modern car.
The Spring 2019 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government develo
D.C. Area Crypto Day is a bi-annual, one-day regional meeting of cryptographic researchers to promote research collaborations and disseminate fresh, state-of-the-art results in cryptography. Previous D.C.
In accordance with the Federal Advisory Committee Act (FACA), Public Law 92-463, as amended (5 U.S.C. Appendix 2), the U.S.
In late Fall 2018, NICE staff participated in a convening of experts from corporate, academic, nonprofit, and government backgrounds to consider new ideas and implementable strategies to bring women into and up through cyberse
NIST has long provided cryptographic key management guidance to encourage appropriate key management procedures, use algorithms that adequately protect sensitive information, and plan for potentially significant changes in the
Many U.S. Government information technology systems rely on strong cryptographic schemes to protect the integrity and confidentiality of the data they process.
Join the Cybersecurity for IoT Program as we discuss our thoughts on considerations for a core cybersecurity capabilities baseline for IoT devices.
FIPS 201, Personal Identity Verification (PIV) for federal employees and contractors will be going through a third revision soon.
After over two decades of relative architectural stability for distributed memory parallel computers, the end of Dennard scaling and the looming end of Moore's "law" is forcing major changes in computing systems.
The need for effective human-robot interaction (HRI) continues to present challenges for the field of robotics. As new technologies are integrated into human-robot teams in a myriad of application domains, exposures to and ex
Latest updates: All visitors to the NIST campus must be pre-registered. There is no onsite registration for meetings at NIST.
The NICE Program Office will be participating in the RSA Conference next week in San Francisco, California. See below for ways you can connect with us. We hope to see you there!
When vacationers buy a stake in a beachfront timeshare, they decide in advance who gets to use the property when.
Attribute-based access control systems rely upon enterprise-specific attributes to both define access control policy rules and enforce the access control.
GAITHERSBURG, Md.—Five years after the release of the Framework for Improving Critical Infrastructure Cybersecurity, organizations across all sectors of the economy ar
Engineers at the National Institute of Standards and Technology (NIST) needed a way to secure smart manufacturing systems using the
The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our current encryption methods obsolete.
Between the NICE Conference & Expo and the NICE K12 Cybersecurity Education Conference, over 1000 attendees came together
The Winter 2018-19 NICE eNewsletter has been published to provide subscribers information on academic, industry, and government
NIST has released Draft NIST Special Publication (SP) 800-189, Secure Interdomain Traffic Exchange: Routing Robustness and DDoS Mitigation, which provides technical guidance and recommendations for deploying t
There has never been a better time to bring modern computation and analytics to inform individualized treatments and interventions for our most vulnerable populations.
The White House has announced a new 5-year STEM strategy,