NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 91 to 100 of 961 records.
Resort by: Date / Title


91. Combined Issue on High Efficiency Video Coding (HEVC) Standard and Research
Topic: Information Technology
Published: 12/3/2012
Author: Hamid Gharavi
Abstract: Following the seminal success of the H.264/MPEG-4 advanced video coding (AVC) and its significant commercial impact on the IT industry, ISO/IEC SC29/WG11 (MPEG) and ITU-T SG16/Q6 (VCEG) began working together to develop the next generation video co ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912909

92. A Credential Reliability and Revocation Model for Federated Identities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7817
Topic: Information Technology
Published: 11/29/2012
Author: Hildegard Ferraiolo
Abstract: A large number of Identity Management Systems (IDMSs) are being deployed worldwide that use different technologies for the population of their users. With the diverse set of technologies, and the unique business requirements for organizations to fede ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912464

93. Smart Networked Systems and Societies: Research Challenges
Topic: Information Technology
Published: 11/20/2012
Author: Ram D Sriram
Abstract: We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utili ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912755

94. Fast Sequential Importance Sampling fo Estimate the Graph Reliability Polynomial
Topic: Information Technology
Published: 11/5/2012
Authors: David G. Harris, Francis Sullivan, Isabel M Beichl
Abstract: The reliability polynomial of a graph measures the number of its connected subgraphs of various sizes. Algortihms based on sequential importance sampling (SIS) have been proposed to estimate a graph's reliahbility polynomial. We develop an improved ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905927

95. Ave Atque Vale
Topic: Information Technology
Published: 11/1/2012
Author: Isabel M Beichl
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912298

96. The New Golden Age of Algorithms and Data Structures
Topic: Information Technology
Published: 10/29/2012
Author: Paul E Black
Abstract: Before 1976 Communications of the ACM printed (and numbered!) new algorithms every issue. Quicksort was invented in 1960, Boyer-Moore string search in 1977, and combsort in 1980. I haven't seen a new, general sorting algorithm in over a decade. The l ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912693

97. A VIRTUAL MACHINE TOOL FOR THE EVALUATION OF STANDARDIZED 5-AXIS PERFORMANCE TESTS
Topic: Information Technology
Published: 10/26/2012
Authors: Ronnie R Fesperman, Shawn P Moylan, M Alkan Donmez
Abstract: Standards committees are actively working to develop standard test methods for the performance evaluation of 5-axis machining centers through the direct and indirect measurement of simultaneous motions of all five axes [1-2]. However, the compound ef ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911899

98. Conducting Security-Related Risk Assessments: Updated Guidelines for Comprehensive Risk Management Programs
Series: ITL Bulletin
Topic: Information Technology
Published: 10/25/2012
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-30 Rev.1, Guide to Conducting Risk Assessments. This publication was developed by the Joint Task Force Transformation Initiative, a joint partnership among the D ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912722

99. Comparing Face Recognition Algorithms to Humans on Challenging Tasks
Topic: Information Technology
Published: 10/17/2012
Authors: P Jonathon Phillips, Alice O'Toole, Xiaobo An, Joseph Dunlop, Vaidehi Natu
Abstract: We compared face identifcation by humans and machines using images taken under a variety of uncontrolled illumination conditions in both indoor and outdoor settings. Natural variations in a person's day-to-day appearance (e.g., hair style, facial e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910638

100. Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics
Topic: Information Technology
Published: 10/11/2012
Authors: Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Abstract: A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing app ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911327



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series