Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Framing Ethical Standards for Consumer Data Use in Health Care

Impact Story
August 19, 2019
… Framing Ethical Standards for Consumer Data Use in Health Care How do we balance the desire of organizations to harness big data's power with the need to prevent potential harm to individuals or … many steps we take, what we search for on the internet, the mobile apps we use, and what we buy. Health organizations are harnessing this lifestyle data, called consumer-generated data …

Data Normalization Challenges and Mitigations in Software Bill of Materials Processing

Publication
October 24, 2024
… Materials Processing Penny Chase Margie Zuk Steven Christey Coley This white paper is directed to medical-device-sector stakeholders, discussing data normalization challenges and recommended … For information about workstreams and draft products, contact SBOM@cisa.dhs.gov. https://www.cisa.gov/sbom … Group, "CycloneDX Specification (Version 1.5)," June 2023. [Online]. Available: https://github.com/CycloneDX/specification/tree/1.5. [4] NIST, "Four New Reports Update Security Content …

Encrypted Dynamic Privacy for RFID

Copyrighted
… for RFID Cybersecurity Copyrighted MITRE enhances security and privacy for users of RFID tags in portal access applications. We will provide a standard RFID tag that changes ID numbers … between the tag and its authorized user. Encrypted Dynamic Privacy for RFID is applicable to any technology capable of reading and writing data as used to address the object. It provides … Worker Identification Credential. To discuss licensing or collaboration activities, please contact us . … MITRE enhances security and privacy for users of RFID tags in portal access …

MITRE Least Cost Test Method

Copyrighted
… MITRE Least Cost Test Method MITRE Least Cost Test Method Data/Image Processing Copyrighted In independent identical testing of a pass/fail requirement, in a limiting sense, there is one testing problem to be done: least cost testing for the sign of a one dimensional diffusion. There is a single … instead of deterministic stopping. To discuss licensing or collaboration activities, please contact us . … In independent identical testing of a pass/fail requirement, in a limiting sense, …

Methodologies for Performance Measurement by Federal Government Program Type

Publication
September 01, 2009
… Government Program Type Dr. Lisa Oakley-Bogdewic Patricia Salamone This paper addresses how to best gauge the value of a Federal program type, so that the value of their delivery can be … helpful with the detail of your project. 21 “What is Stakeholder Analysis,” S. Babou, at PMHut.com. Three-part article: 12 March, 11 April, and 15 April 2008. … of Federal Domestic Assistance (CFDA)42 provides a “summary of each grant program, as well as contact information for Federal agencies that award grants.” Appendix IV of the Catalog of …

Slow Defense Acquisitions Cost Lives

Publication
October 31, 2016
… Slow Defense Acquisitions Cost Lives Unless we make a dramatic shift in how we field advanced capabilities, there may soon be regions of the globe where the U.S. is … a Presidential election is complicated; preparing the federal government for a seamless shift to a new administration is crucial to continuing important work on behalf of the American people. … Understanding the Problem The notoriously slow and burdensome system we use to develop and buy equipment for our warfighters was designed during the Cold War. The people who work in it …

A Framework for Asynchronous Collaborative Learning and Problem Solving

Publication
September 01, 2001
… activities with small groups of peers. This educational value of student collaboration has led to the development of computer-supported collaborative learning (CSCL) tools. These tools enrich … approaches to asynchronous interaction. 2. Tools for asynchronous interaction Asynchonous contact between users is an important part of collaborative distance-learning. Yet, not all … P ietr ow icz, S ., an d S eg uin, C. (1 9 98 ). J av a Ob ject- S haring in H ab an er o , Com mu nicatio n s of th e ACM, 41 , pp 69 -7 6 . [4 ] Cheik es , B. A ., G eier , M., H ylan d, …

Object-Oriented Analysis of a DII COE Simulation Product Line Architecture

Publication
August 01, 2001
… architecture. Identification of a specific simulation infrastructure product set is the key to developing the technical steps required to achieve this vision. Integrating simulation into … The AEgis Technologies Group 12565 Research Parkway Orlando, FL 32765 rsprinkle@AEgisTG.com William P. Sudnikovich Atlantic Consulting Services 167 Avenue at the Common, Suite 4 … products and which products already exist and can be used as is. This is the same make/buy analysis that most systems engineers perform during system design. They identify system …

Enrollment and Identity Proofing Practices Statement Templates

Publication
May 01, 2020
… paper contains a methodology for high assurance identity proofing and customizable templates to develop a documented identity proofing process for Identity Assurance Levels 2 (Unsupervised … Information Service, Social Security Death Master File. Available at: https://www.ssdmf.com/Library/InfoManage/ Guide.asp?FolderID=1. [Red Flags Rule] 15 U.S.C. 1681m(e)(4), Pub. L. … and Identity Proofing Practices Statement Templates 72 Appendix D | Definitions Access To contact one or more discrete functions of an online, digital service. Address of Record The …

Getting Data to Applications: Why We Fail and How We Can Do Better(Part 2)

Publication
June 01, 2001
… Getting Data to Applications: Why We Fail and How We Can Do Better(Part 2) Frank Manola Dr. Len Seligman To … of—widely used vocabularies (e.g., common terms with agreed meanings) and make them available online. (This is something that eBusiness, health care (HL7), and other consortia are … of systems that are never really "complete," but continually get better. For more information, contact: Arnon Rosenthal Arnie@mitre.org Frank Manola fmanola@mitre.org Len Seligman …
  • First page
  • Previous page
  • …
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • Current page 28
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • …
  • Next page
  • Last page
Displaying 271 - 280 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links