NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 91 to 100 of 961 records.
Resort by: Date / Title

91. Combined Issue on High Efficiency Video Coding (HEVC) Standard and Research
Topic: Information Technology
Published: 12/3/2012
Author: Hamid Gharavi
Abstract: Following the seminal success of the H.264/MPEG-4 advanced video coding (AVC) and its significant commercial impact on the IT industry, ISO/IEC SC29/WG11 (MPEG) and ITU-T SG16/Q6 (VCEG) began working together to develop the next generation video co ...

92. A Credential Reliability and Revocation Model for Federated Identities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7817
Topic: Information Technology
Published: 11/29/2012
Author: Hildegard Ferraiolo
Abstract: A large number of Identity Management Systems (IDMSs) are being deployed worldwide that use different technologies for the population of their users. With the diverse set of technologies, and the unique business requirements for organizations to fede ...

93. Smart Networked Systems and Societies: Research Challenges
Topic: Information Technology
Published: 11/20/2012
Author: Ram D Sriram
Abstract: We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utili ...

94. Fast Sequential Importance Sampling fo Estimate the Graph Reliability Polynomial
Topic: Information Technology
Published: 11/5/2012
Authors: David G. Harris, Francis Sullivan, Isabel M Beichl
Abstract: The reliability polynomial of a graph measures the number of its connected subgraphs of various sizes. Algortihms based on sequential importance sampling (SIS) have been proposed to estimate a graph's reliahbility polynomial. We develop an improved ...

95. Ave Atque Vale
Topic: Information Technology
Published: 11/1/2012
Author: Isabel M Beichl

96. The New Golden Age of Algorithms and Data Structures
Topic: Information Technology
Published: 10/29/2012
Author: Paul E Black
Abstract: Before 1976 Communications of the ACM printed (and numbered!) new algorithms every issue. Quicksort was invented in 1960, Boyer-Moore string search in 1977, and combsort in 1980. I haven't seen a new, general sorting algorithm in over a decade. The l ...

Topic: Information Technology
Published: 10/26/2012
Authors: Ronnie R Fesperman, Shawn P Moylan, M Alkan Donmez
Abstract: Standards committees are actively working to develop standard test methods for the performance evaluation of 5-axis machining centers through the direct and indirect measurement of simultaneous motions of all five axes [1-2]. However, the compound ef ...

98. Conducting Security-Related Risk Assessments: Updated Guidelines for Comprehensive Risk Management Programs
Series: ITL Bulletin
Topic: Information Technology
Published: 10/25/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-30 Rev.1, Guide to Conducting Risk Assessments. This publication was developed by the Joint Task Force Transformation Initiative, a joint partnership among the D ...

99. Comparing Face Recognition Algorithms to Humans on Challenging Tasks
Topic: Information Technology
Published: 10/17/2012
Authors: P Jonathon Phillips, Alice O'Toole, Xiaobo An, Joseph Dunlop, Vaidehi Natu
Abstract: We compared face identifcation by humans and machines using images taken under a variety of uncontrolled illumination conditions in both indoor and outdoor settings. Natural variations in a person's day-to-day appearance (e.g., hair style, facial e ...

100. Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics
Topic: Information Technology
Published: 10/11/2012
Authors: Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Abstract: A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing app ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series