Adding Human Expertise to the Quantitative Analysis of Fingerprints, Final Report
Latent Print Detection by MacroRaman Imaging
Alternatives to Custodial Supervision: The Day Fine
Wisconsin State Patrol Tests New Path to Radio Interoperability
National Institute of Justice Annual Report 2008
Estimation of likelihood ratios for forensic handwriting analysis
Forensic Discrimination of Dyed Hair Color: I. UV-Visible Microspectrophotometry
Cysteine S-conjugate beta-lyases: important roles in the metabolism of naturally occurring sulfur and selenium-containing compounds, xenobiotics and anticancer agents
RF MEMS Integrated Frequency Reconfigurable Annular Slot Antenna
Assessing the Spatial-Temporal Relationship Between Disorder and Violence
Evaluating the Juvenile Breaking the Cycle Program's Impact on Recidivism
Pilot Study of Automated Bullet Signature Identification Based on Topography Measurements and Correlations
Predicting Phenotype From Genotype: Normal Pigmentation
Guidebook for Less-lethal Devices: Planning for, Selecting, and Implementing Technology Solutions
Law Enforcement Research Priorities for 2010 and Beyond: Results of the IACP Membership Survey and Focus Group 2009-2010
The Nexus Between Economics and Family Violence: The Expected Impact of Recent Economic Declines on the Rates and Patterns of Intimate, Child and Elder Abuse
Enhanced Studies of LC/MS/MS Capabilities to Analyze Toxicology Postmortem Samples
Quantifying the Specific Deterrent Effects of DNA Databases
Examining the Creation, Distribution, and Function of Malware On-Line
Examining the Creation, Distribution, and Function of Malware On-Line: Executive Summary
Simulated Evidence on the Prospects of Treating More Drug-Involved Offenders
Incapacitated, Forcible, and Drug/Alcohol-Facilitated Rape in Relation to Binge Drinking, Marijuana Use, and Illicit Drug Use: A National Survey
Minimizing the Number of Voltage Sources for Pinched Injection on a Microfluidic Device
Biometric Classifier Update Using Online Learning: A Case Study in Near Infrared Face Verification
Why study white supremacist terror? A research note
Research Forensic Library
We invite you to also search the Research Forensic Library, a curated collection of publicly-accessible material relating to every discipline of the forensic sciences.