NIST logo

Publications Portal

You searched on:
Topic Area: Math
Sorted by: date

Displaying records 11 to 20 of 221 records.
Resort by: Date / Title


11. HAZARDOUS CONTINUATION BACKWARD IN TIME IN NONLINEAR PARABOLIC EQUATIONS AND AN EXPERIMENT IN DEBLURRING NONLINEARLY BLURRED IMAGERY
Series: Journal of Research (NIST JRES)
Report Number: 118.010
Topic: Math
Published: 4/25/2013
Author: Alfred S Carasso
Abstract: Identifying sources of ground water pollution, and deblurring nanoscale imagery, as well as astronomical galaxy images, often involves the numerical computation of parabolic equations backward in time. However, very little computational experien ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912357

12. An Input Space Modeling Methodology for Combinatorial Testing
Topic: Math
Published: 3/20/2013
Authors: David R Kuhn, Raghu N Kacker
Abstract: The input space of a system must be modeled before combinatorial testing can be applied to this system. The effectiveness of combinatorial testing to a large extent depends on the quality of the input space model. In this paper we introduce an input ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913205

13. Applying Combinatorial Testing to the Siemens Suite
Topic: Math
Published: 3/20/2013
Authors: David R Kuhn, Raghu N Kacker
Abstract: Combinatorial testing has attracted a lot of attention from both industry and academia. A number of reports suggest that combinatorial testing can be effective for practical applications. However, there still seems to lack systematic, controlled stud ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913206

14. An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation
Topic: Math
Published: 3/18/2013
Author: Raghu N Kacker
Abstract: Combinatorial testing has been shown to be a very effective testing strategy. An important problem in combinatorial testing is dealing with constraints, i.e., restrictions that must be satisfied in order for a test to be valid. In this paper, we ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913191

15. Five Examples of Assessment and Expression of Measurement Uncertainty
Topic: Math
Published: 2/12/2013
Author: Antonio M Possolo
Abstract: It is a long accepted tenet of scientific practice that every measurement result ought to include a statement of uncertainty associated with the measured value, and that such uncertainty should be propagated to derivative products. It is also widely ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910812

16. Alternative methods of latent fingerprint enhancement and metrics for comparing them
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7910
Topic: Math
Published: 1/14/2013
Author: Alfred S Carasso
Abstract: Digital enhancements of latent fingerprints using Photoshop processing is the preferred methodology among law enforcement forensic experts. This report explores alternative enhancement methods that are independent of Photoshop, relying instead o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912758

17. A Bayesian Quantitative Nondestructive Evaluation (QNDE) Approach to Estimating Remaining Life of Aging Pressure Vessels and Piping
Topic: Math
Published: 1/1/2013
Authors: Jeffrey T Fong, William F Guthrie, James J Filliben, Nathanael A Heckert
Abstract: In this paper, we use a Bayesian quantitative nondestructive evaluation (QNDE) approach to estimating the remaining life of aging structures and components. Our approach depends on in-situ NDE measurements of detectable crack lengths and crack g ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913221

18. Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier
Topic: Math
Published: 12/2/2012
Authors: Dustin Moody, Daniel Smith, Souradyuti Paul
Abstract: A hash function secure in the indi fferentiability framework is able to resist all generic attacks. Such hash functions also play a crucial role in the security of the protocols that use hash functions as random functions. The rate of a hash mode is ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911449

19. The Radius of Attraction for Newton's Method and TV-Minimization Image Denoising
Topic: Math
Published: 12/1/2012
Authors: Luis A Melara, Anthony J Kearsley
Abstract: This paper presents an estimate of the radius of convergence for Newton‰s method applied to a regularized TV-minimization problem often employed to denoise images. Strong Fréchet differentiability of this iteration is established and an estimate of t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911907

20. Class Numbers via 3-Isogenies and Elliptic Surfaces
Topic: Math
Published: 11/6/2012
Authors: Cam McLeman, Dustin Moody
Abstract: We show that a character sum attached to a family of 3-isogenies defi ned on the fibers of a certain elliptic surface over Fp relates to the class number of the quadratic imaginary number field Q(\sqrt{p}). In this sense, this provides a higher-d ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911885



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series