NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 91 to 100 of 995 records.
Resort by: Date / Title


91. CM-BOF: Visual Similarity based 3D Shape Retrieval Using Clock Matching and Bag-of-Features
Topic: Information Technology
Published: 6/6/2013
Authors: Afzal A Godil, Zhouhui Lian
Abstract: Content-based 3D object retrieval has be- come an active topic in many research communities. In this paper, we propose a novel visual similarity based 3Dshaperetrievalmethod(CM-BOF)usingClockMatch- ing and Bag-of-Features. Specifically, pose normal ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913606

92. SHREC‰13 Track: Large Scale Sketch-Based 3D Shape Retrieval
Topic: Information Technology
Published: 6/6/2013
Authors: Afzal A Godil, Bo Li , Yijuan Lu, Tobias Schreck
Abstract: Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods based on a large scale hand-draw ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913607

93. Metrics and Test Methods for Industrial Kit Building
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7942
Topic: Information Technology
Published: 6/5/2013
Authors: Stephen B. Balakirsky, Thomas Rollin Kramer, Zeid Kootbally, Anthony Pietromartire
Abstract: The IEEE RAS Ontologies for Robotics and Automation Working Group is dedicated to developing a methodology for knowledge representation and reasoning in robotics and automation. As part of this working group, the Industrial Robots sub-group is ta ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912776

94. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56A Rev 2
Topic: Information Technology
Published: 6/5/2013
Authors: Elaine B Barker, Lidong Chen, Allen L Roginsky, Miles Smid
Abstract: This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu- Vanstone(MQV) key establishment schemes. [Supers ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913431

95. Modeling a Nationwide Public Safety Broadband Network
Topic: Information Technology
Published: 6/1/2013
Authors: Richard Antoine Rouil, Antonio Izquierdo Manzanares, Michael R Souryal, Camillo A Gentile, David Wesley Griffith, Nada T Golmie
Abstract: As governments plan nationwide, interoperable broadband networks for their public safety services, the challenge arises of determining how and where to invest limited resources to meet demanding requirements. The United States is at the early st ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912716

96. Perron-Frobenius Measure of Systemic Risk of Cascading Overload in Complex Clouds: Work in Progress
Topic: Information Technology
Published: 5/27/2013
Author: Vladimir V Marbukh
Abstract: Dynamic resource sharing has both positive and negative effects on the system performance. Current research mostly concentrates on the positive effect resulting from the statistical multiplexing gain. However, the negative effect resulting from ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913471

97. A case study of performance degradation attributable to run-time bounds checks on C++ vector access
Series: Journal of Research (NIST JRES)
Report Number: 118.012
Topic: Information Technology
Published: 5/22/2013
Authors: David W Flater, William F Guthrie
Abstract: Programmers routinely omit run-time safety checks from applications because they assume that these safety checks would degrade performance. The simplest example is the use of arrays or array-like data structures that do not enforce the constrain ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910871

98. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Information Technology
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913775

99. Guide to Industrial Control Systems (ICS) Security
Series: Special Publication (NIST SP)
Report Number: 800-82 Rev 1
Topic: Information Technology
Published: 5/14/2013
Authors: Keith A Stouffer, Joseph A Falco, Karen Ann Scarfone
Abstract: This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913905

100. Writing Guidelines to Develop an Memorandum of Understanding for Interoperable Automated Fingerprint Identification Systems
Series: Special Publication (NIST SP)
Report Number: 1156
Topic: Information Technology
Published: 5/14/2013
Authors: Susan M Ballou, Michael D Garris, Anthony Clay, Joi Dickerson, Peter T Higgins, Lisa Jackson, Joe Morrissey, Beth Owens, Joe Polski, Janet Hoin, Leo Norton, Melissa K Taylor
Abstract: This is one of a series of documents prepared by the Latent Print Automated Fingerprint Identification System (AFIS) Interoperability Working Group. The purpose of these documents is to provide guidance and a framework to those involved in the id ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913325



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series