NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 71 to 80 of 992 records.
Resort by: Date / Title

71. RECON -- A Controlled English for Business Rules
Topic: Information Technology
Published: 7/13/2013
Authors: Fabian M. Neuhaus, Edward J Barkmeyer
Abstract: Capturing business rules in a formal logic representation supports the enterprise in two important ways: it enables the evaluation of logs and audit records for conformance to, or violation of, the rules; and it enables the conforming automation of s ...

72. Initial ACT-R Extensions for User Modeling in the Mobile Touchscreen Domain
Topic: Information Technology
Published: 7/12/2013
Authors: Kristen Greene, Franklin Tamborello
Abstract: Advances in mobile touchscreen computing offer new opportunities to test traditional cognitive architectures and modeling tools in a novel task domain. ACT-Touch, an extension of the ACT-R 6 (Adaptive Control of Thought- Rational) cognitive architect ...

73. IREX VI - Temporal Stability of Iris Recognition Accuracy
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7948
Topic: Information Technology
Published: 7/11/2013
Authors: Patrick J Grother, James R Matey, Elham Tabassi, George W Quinn, Michael Chumakov
Abstract: Background: Stability is a required definitional property for a biometric to be useful. Quantitative statements of stability are operationally important as they dictate re-enrollment schedules e.g. of a face on a passport. Ophthalmologists consider ...

74. Properties of magnetic barrier structures for superconducting-magnetic hybrid Josephson junctions
Topic: Information Technology
Published: 7/7/2013
Authors: Burm Baek, Samuel Paul Benz, William H Rippard, Stephen E Russek, Paul David Dresselhaus, Horst Rogalla, Matthew R Pufall
Abstract: If Josephson and spintronic technologies can be successfully integrated to produce a cryogenic memory that can be controlled with single-flux quantum pulses, then they may enable ultra-low-power, high-speed computing. We have developed hybrid Josephs ...

75. Overview of the TREC 2012 Medical Records Track
Series: Special Publication (NIST SP)
Report Number: 500-298
Topic: Information Technology
Published: 6/28/2013
Authors: Ellen M Voorhees, William Hersh
Abstract: The TREC Medical Records track fosters research that allows electronic health records to be retrieved based on the semantic content of free-text fields. The ability to find records by matching semantic content will enhance clinical care and support ...

76. The Challenge of Face Recognition From Digital Point-and-Shoot Cameras
Topic: Information Technology
Published: 6/25/2013
Authors: P Jonathon Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, G. H. Givens, Yui M. Lui, Hao Zhang, W T. Scruggs, Kevin W. Bowyer, Patrick J. Flynn, Su Lan Cheng
Abstract: Face recognition is appearing in personal and commercial products at an astonishing rate, yet reliable face recognition remains challenging. Users expect a lot; they want to snap pictures and have their friends, family and acquaintances recognized. T ...

77. A Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems
Topic: Information Technology
Published: 6/21/2013
Authors: Ray A Perlner, Daniel C Smith-Tone
Abstract: Multivariate Public Key Cryptography (MPKC) has become one of a few options for security in the quantum model of computing. Though a few multivariate systems have resisted years of effort from the cryptanalytic community, many such systems have fall ...

78. Enabling an Enterprise-wide, Data-centric Operating Environment
Topic: Information Technology
Published: 6/21/2013
Authors: David F Ferraiolo, Serban Ilie Gavrila, Wayne Jansen
Abstract: Although access control (AC) currently plays an important role in securing DSs, if properly envisaged and designed, access control can serve a more vital role in computing than one might expect. The Policy Machine (PM), a framework for AC developed a ...

79. Exposing Software Security and Availability Risks For Commercial Mobile Devices
Topic: Information Technology
Published: 6/21/2013
Authors: Ryan Johnson, Zhaohui Wang, Angelos Stavrou, Jeffrey Mark Voas
Abstract: In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including librar ...

80. Lessons Learned in Establishing the NIST Metal Additive Manufacturing Laboratory
Series: Technical Note (NIST TN)
Report Number: 1801
Topic: Information Technology
Published: 6/21/2013
Authors: Shawn P Moylan, John A. Slotwinski, April Cooke, Kevin K Jurrens, M Alkan Donmez
Abstract: This publication presents a summary of lessons learned by NIST staff during establishment of the NIST Metal Additive Manufacturing Laboratory and implementation of the metal additive manufacturing capability at NIST. These lessons learned result ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series