NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 81 to 90 of 982 records.
Resort by: Date / Title


81. ITL Updates Glossary of Key Information Security Terms
Series: ITL Bulletin
Topic: Information Technology
Published: 6/12/2013
Author: Elizabeth B Lennon
Abstract: This ITL Bulletins describes the recent update of NISTIR 7298, Glossary of Key Information Security Terms. NISTIR 7298, Revision 2, provides a summary glossary of terms used in NIST publications and other relevant sources.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914099

82. CM-BOF: Visual Similarity based 3D Shape Retrieval Using Clock Matching and Bag-of-Features
Topic: Information Technology
Published: 6/6/2013
Authors: Afzal A Godil, Zhouhui Lian
Abstract: Content-based 3D object retrieval has be- come an active topic in many research communities. In this paper, we propose a novel visual similarity based 3Dshaperetrievalmethod(CM-BOF)usingClockMatch- ing and Bag-of-Features. Specifically, pose normal ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913606

83. SHREC‰13 Track: Large Scale Sketch-Based 3D Shape Retrieval
Topic: Information Technology
Published: 6/6/2013
Authors: Afzal A Godil, Bo Li , Yijuan Lu, Tobias Schreck
Abstract: Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods based on a large scale hand-draw ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913607

84. Metrics and Test Methods for Industrial Kit Building
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7942
Topic: Information Technology
Published: 6/5/2013
Authors: Stephen B. Balakirsky, Thomas Rollin Kramer, Zeid Kootbally, Anthony Pietromartire
Abstract: The IEEE RAS Ontologies for Robotics and Automation Working Group is dedicated to developing a methodology for knowledge representation and reasoning in robotics and automation. As part of this working group, the Industrial Robots sub-group is ta ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912776

85. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56
Topic: Information Technology
Published: 6/5/2013
Authors: Elaine B Barker, Lidong Chen, Allen L Roginsky, Miles Smid
Abstract: This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu- Vanstone(MQV) key establishment schemes.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913431

86. Modeling a Nationwide Public Safety Broadband Network
Topic: Information Technology
Published: 6/1/2013
Authors: Richard Antoine Rouil, Antonio Izquierdo Manzanares, Michael R Souryal, Camillo A Gentile, David Wesley Griffith, Nada T Golmie
Abstract: As governments plan nationwide, interoperable broadband networks for their public safety services, the challenge arises of determining how and where to invest limited resources to meet demanding requirements. The United States is at the early st ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912716

87. Perron-Frobenius Measure of Systemic Risk of Cascading Overload in Complex Clouds: Work in Progress
Topic: Information Technology
Published: 5/27/2013
Author: Vladimir V Marbukh
Abstract: Dynamic resource sharing has both positive and negative effects on the system performance. Current research mostly concentrates on the positive effect resulting from the statistical multiplexing gain. However, the negative effect resulting from ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913471

88. A case study of performance degradation attributable to run-time bounds checks on C++ vector access
Series: Journal of Research (NIST JRES)
Report Number: 118.012
Topic: Information Technology
Published: 5/22/2013
Authors: David W Flater, William F Guthrie
Abstract: Programmers routinely omit run-time safety checks from applications because they assume that these safety checks would degrade performance. The simplest example is the use of arrays or array-like data structures that do not enforce the constrain ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910871

89. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Information Technology
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913775

90. Guide to Industrial Control Systems (ICS) Security
Report Number: 800-82r1
Topic: Information Technology
Published: 5/14/2013
Authors: Keith A Stouffer, Joseph A Falco, Karen Ann Scarfone
Abstract: This document provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913905



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series