Search Data.gov
Found 1139 dataset(s) matching "software evaluations".
-
Statistical analyses and maps representing mean, high, and low water-level conditions in the surface water and groundwater of Miami-Dade County were made by the U.S. Geological Survey, in...
-
Statistical analyses and maps representing mean, high, and low water-level conditions in the surface water and groundwater of Miami-Dade County were made by the U.S. Geological Survey, in...
-
Statistical analyses and maps representing mean, high, and low water-level conditions in the surface water and groundwater of Miami-Dade County were made by the U.S. Geological Survey, in...
-
Statistical analyses and maps representing mean, high, and low water-level conditions in the surface water and groundwater of Miami-Dade County were made by the U.S. Geological Survey, in...
-
Statistical analyses and maps representing mean, high, and low water-level conditions in the surface water and groundwater of Miami-Dade County were made by the U.S. Geological Survey, in...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of instruction fine tuned LLMs. A known percentage of these...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of malware packer classification AIs. A known percentage of these...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of RL agents operating in the Safety Gymnasium environment. A...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of models trained to predict whether code from public git...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of instruction fine tuned LLMs. A known percentage of these...
-
This is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of RL agents operating in the Colorful Memory environment. A known...
-
Round 9 Holdout DatasetThis is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to...
-
Round 9 Test DatasetThis is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs trained to perform...
-
Round 10 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of object detection AIs trained on the COCO...
-
Round 12 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of pdf malware classification AIs trained...
-
Round 11 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of image classification AIs trained on...
-
Round 13 Train DatasetThis is the training data used to create and evaluate trojan detection software solutions. This data, generated at NIST, consists of object detection AIs trained both on...
-
Round 9 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs...
-
A total of 100 samples were collected from two proximal sections of Keanakākoʻi, Tephra unit D deposits. Samples were analyzed on Microtrac CAMSIZER® P4 and X2 instruments for grain size and shape...
-
We have applied 3D shape-based retrieval to various disciplines such as computer vision, CAD/CAM, computer graphics, molecular biology and 3D anthropometry. We have organized two workshops on 3D...