NIST logo

Publications Portal

You searched on:
Topic Area: Math
Sorted by: date

Displaying records 31 to 40 of 230 records.
Resort by: Date / Title


31. The TriTon Transformation
Topic: Math
Published: 8/27/2012
Author: Daniel C Smith-Tone
Abstract: Many new systems have been proposed which hide an easily invertible multivariate quadratic map in a larger structure by adding more variables and introducing some mixing of a random component to the structured system. While many systems which have b ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911681

32. Transient Convection-Diffusion Modelling of Peak Temperature in Orthogonal Cutting
Topic: Math
Published: 8/19/2012
Authors: Timothy J Burns, Steven P Mates, Richard L. Rhorer, Eric Paul Whitenton, Debasis Basak
Abstract: Numerical finite-difference simulations of a two-dimensional transient fast convection-slow diffusion model of the temperature field in orthogonal cutting, due to Tlusty, have been shown to provide better predictions of the peak temperature during or ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910514

33. Variable Projection for Nonlinear Least Squares Problems
Topic: Math
Published: 8/2/2012
Authors: Dianne M O'Leary, Bert W Rust
Abstract: The variable projection algorithm of Golub and Pereyra (1973) has proven to be quite valuable in the solution of nonlinear least squares problems in which a substantial number of the parameters are linear. Its advantages are efficiency and, more imp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906612

34. Arithmetic Progressions on Huff Curves
Topic: Math
Published: 7/23/2012
Author: Dustin Moody
Abstract: We look at arithmetic progressions on elliptic curves known as Huff curves. By an arithmetic progression on an elliptic curve, we mean that either the x or y-coordinates of a sequence of rational points on the curve form an arithmetic progression. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908329

35. Evolutionary Construction of de Bruijn Sequences
Topic: Math
Published: 7/20/2012
Author: Meltem Sonmez Turan
Abstract: A binary de Bruijn sequence of order n is a cyclic sequence of period 2^n, in which each n-bit pattern appears exactly once. These sequences are commonly used in applications such as stream cipher design, pseudo-random number generation, 3-D pattern ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909087

36. Reconstructing the past from imprecise knowledge of the present: Some examples of non uniqueness in solving parabolic equations backward in time.
Topic: Math
Published: 5/24/2012
Author: Alfred S Carasso
Abstract: Identifying sources of ground water pollution, and deblurring astronomical galaxy images, are two important applications generating growing interest in the numerical computation of parabolic equations backward in time. However, while backward uniquen ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908242

37. Applied and Computational Mathematics Division. Summary of Activities for Fiscal Year 2011
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7856
Topic: Math
Published: 5/18/2012
Author: Ronald F Boisvert
Abstract: This report summarizes the technical work of the Applied and Computational Sciences Division of NIST‰s Information Technology Laboratory.Part I (Overview) provides a high-level overview of the Division‰s activities, including highlights of technical ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910776

38. Isomorphism Classes of Edwards Curves over Finite Fields
Topic: Math
Published: 5/18/2012
Authors: Reza Farashahi, Dustin Moody, Hongfeng Wu
Abstract: Edwards curves are a new model for elliptic curves, which have attracted notice in cryptography. We give exact formulas for the number of F_q-isomorphism classes of Edwards curves and twisted Edwards curves. This answers a question recently asked ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908630

39. Improved Indifferentiability Security Bound for the JH Mode
Topic: Math
Published: 5/16/2012
Authors: Dustin Moody, Daniel C Smith-Tone, Souradyuti Paul
Abstract: Indi fferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function is one ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911448

40. Combinatorial Testing of ACTS: A Case Study
Topic: Math
Published: 4/21/2012
Authors: Mehra N. Borazjany, Linbin Yu, Yu Lei, Raghu N Kacker, David R Kuhn
Abstract: In this paper we present a case study of applying combinatorial testing to test a combinatorial test generation tool called ACTS. The purpose of this study is two-fold. First, we want to gain experience and insights about how to apply combinatorial t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911345



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series