NIST logo

Publications Portal

You searched on:
Topic Area: Math
Sorted by: title

Displaying records 161 to 170 of 227 records.
Resort by: Date / Title


161. Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH
Topic: Math
Published: 8/23/2010
Authors: Meltem Sonmez Turan, Erdener Uyan
Abstract: A hash function is near-collision resistant, if it is hard to find two messages with hash values that differ in only small number of bits. In this study, we used hill climbing methods to find near-collisions for some of the second round SHA-3 candida ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905988

162. Precession Axis Modification to a Semi-analytical Landau-Lifshitz Solution Technique
Topic: Math
Published: 2/25/2008
Authors: Donald G Porter, Michael J Donahue
Abstract: A recent article [1] presents a semianalytical method to solve the Landau Lifshitz (LL) equation. Spin motion is computed analytically as precession about the effective field H, where H is assumed fixed over the time step. However, the exchange field ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152140

163. Predicted Functions of MdmX in Fine Tuning the Response of p53 to DNA Damage
Topic: Math
Published: 2/1/2010
Authors: Sohyoung Kim, Mirit I Aladjem, Geoffrey B McFadden, Kurt W Kohn
Abstract: Tumor suppressor protein p53 is negatively regulated by two structurally homologous proteins, Mdm2 and MdmX. In contrast to Mdm2, MdmX lacks ubiquitin ligase activity. Although the essential interactions of MdmX are known, it is not clear how they fu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51271

164. Pseudo-Exhaustive Testing for Software
Topic: Math
Published: 4/28/2006
Authors: David R Kuhn, Vadim Okun
Abstract: Pseudo-exhaustive testing uses the empirical observation that, for broad classes of software, a fault is likely triggered by only a few variables interacting. The method takes advantage of two relatively recent advances in software engineering: algor ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917175

165. Quadratic Fermionic Interactions Yield Hamiltonians with Large Ground-state Energy Gaps
Topic: Math
Published: 3/24/2009
Authors: Dianne M O'Leary, Michael J. O'Hara
Abstract: Polynomially-large ground-state energy gaps are rare in many-body quantum systems, but required for adiabatic quantum computing. We show analytically that the gap is generically polynomially-large for quadratic fermionic Hamiltonians, first conside ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890014

166. Quantum Simulations of Classical Annealing Processes
Topic: Math
Published: 9/26/2008
Authors: Rolando Somma, S. Boixo, Howard Barnum, Emanuel H Knill
Abstract: We describe a quantum algorithm that solves combinatorial optimization problems by quantum simulation of a classical simulated annealing process. Our algorithm exploits quantum walks and the quantum Zeno effect induced by evolution randomization. It ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152119

167. Random-Effects Model for Meta-analysis of Clinical Trials: An Update
Topic: Math
Published: 1/1/2007
Authors: Rebecca DerSimonian, Raghu N Kacker
Abstract: The random-effects model is a useful approach for meta-analysis of clinical studies. It explicitly accounts for the heterogeneity of studies through a statistical parameter representing the inter-study variation. We discuss several iterative and non- ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51313

168. Rapid Monte Carlo SI Mulations Using Parallel Computing and a Client-server Model
Topic: Math
Published: 6/21/2011
Authors: Raghu N Kacker, Ruediger Kessel
Abstract: Processors with multiple CPU cores have become widely available. Therefore it is useful to parallelize the Monte Carlo simulation process in the context of metrology. Different approaches for parallel computing including Monte Carlo simulations are a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909264

169. Recommendation for Password-Based Key Derivation Part I: Storage Applications
Series: Special Publication (NIST SP)
Report Number: 800-132
Topic: Math
Published: 12/22/2010
Authors: Meltem Sonmez Turan, Elaine B Barker, William Edward Burr, Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of master keys from passwords or passphrases to protect stored electronic data or data protection keys.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907381

170. Reconstructing Images of Bar Codes for Construction Site Object Recognition
Topic: Math
Published: 9/1/2002
Authors: David E. Gilsinn, Geraldine S Cheok, Dianne M O'Leary
Abstract: This paper discusses a general approach to reconstructing ground truth intensity images of bar codes that have been distorted by LADARoptics. The first part of this paper describes the experimental data collection of several bar code images along w ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150859



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series