Search Data.gov
Found 2642 dataset(s) matching "Information Technology".
-
Round 6 Train DatasetThis is the training data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs...
-
Round 3 Test DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
-
Round 1 Test DatasetThe data being generated and disseminated is the test data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
-
Round 5 Train DatasetThe data being generated and disseminated is the train data used to construct trojan detection software solutions. This data, generated at NIST, consists of natural language...
-
Round 4 Test DatasetThe data being generated and disseminated is the test data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
-
Round 4 Holdout DatasetThe data being generated and disseminated is the holdout data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level...
-
Round 4 Train DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
-
Round1 Holdout DatasetThe data being generated and disseminated is the holdout data used to evaluate trojan detection software solutions. This data, generated at NIST, consists of human level AIs...
-
Round 5 Test DatasetThis is the test data used to construct and evaluate trojan detection software solutions. This data, generated at NIST, consists of natural language processing (NLP) AIs...
-
Round 3 Training DatasetThe data being generated and disseminated is the training data used to construct trojan detection software solutions. This data, generated at NIST, consists of human level...
-
The President`s Cyberspace Policy Review challenges the Federal community to develop a framework for research and development strategies that focus on game-changing technologies that can...
-
This is software that has the purpose of a web-based interactive neural network (NN) calculator with a NN inefficiency measurement. The software has been developed for the purpose of detecting...
-
This repository contains the collected resources submitted to and created by the NIST Collaborative Research Cycle (CRC) Data and Metrics Archive. The NIST Collaborative Research Cycle (CRC) is an...
-
The NIST Excerpts Benchmark Data are a set of target data for deidentification algorithms. The data are configured to work with "SDNist: Synthetic Data Report Tool", a package for evaluating...
-
The purpose of this code and data is to enable reproductionand facilitate extension of the computationalresults associated with following workDeJaco, R. F.; Roberts, M. J.; Romsos, E. L.; Vallone,...
-
The NIST BGP RPKI IO framework (BRIO) is a test tool only subset of the BGP-SRx Framework. It is an open source implementation and test platform that allows the synthetic generation of test data...
-
This document is a supplement to the President`s 2017 Budget Request to Congress. It describes the activities planned for FY2017 by the Federal agencies participating in the Networking and...
-
This document is a supplement to the President`s 2020 Budget Request to Congress. It describes research and development coordination activities planned for FY2020 by the Federal agencies...
-
This document is a supplement to the President`s 2018 Budget Request to Congress. It describes the activities planned for FY2018 by the Federal agencies participating in the Networking and...
-
The use of common operational picture (COP) technology can give law enforcement and its public safety response partners the capacity to develop a shared situational awareness to support effective...