NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: date

Displaying records 21 to 30 of 980 records.
Resort by: Date / Title


21. Performance Testing and Evaluation of Transformative Apps Devices
Topic: Information Technology
Published: 4/16/2014
Authors: Anthony J Downs, Lisa Jean Fronczek, Emile L Morse, Brian A Weiss, Ian Patrick Bashor, Craig I Schlenoff
Abstract: Transformative Apps (TransApps) is a Defense Advanced Research Projects Agency (DARPA) funded program whose goal is to develop a range of militarily-relevant software applications ("apps") to enhance the operational effectiveness of military personne ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915161

22. Powder Bed Fusion Machine Performance Testing
Topic: Information Technology
Published: 4/16/2014
Authors: Shawn P Moylan, Joseph Drescher, M Alkan Donmez
Abstract: Unlike conventional machining where there is a near 1:1 correspondence of machine performance to the geometry of the workpiece, the accuracy of the machine components is only one of the contributors to the quality of a finished AM part. Rather, ther ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915792

23. Study of Accuracy of Parts Produced Using Additive Manufacturing
Topic: Information Technology
Published: 4/16/2014
Authors: Marcin Bauza, Shawn P Moylan, Robert Panas, Stephen Burke, Harry Martz, John S Taylor, Paul Alexander, Richard Knebel
Abstract: The purpose of this presentation is to focus discussion onto the issue of accuracy and uncertainty of parts made with additive manufacturing processes.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915785

24. NIST and Computer Security
Topic: Information Technology
Published: 4/4/2014
Authors: William Edward Burr, Hildegard Ferraiolo, David Anthony Waltermire
Abstract: The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and informa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914537

25. An Empirical Comparison of Combinatorial and Random Testing
Topic: Information Technology
Published: 4/1/2014
Authors: Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N Kacker, David R Kuhn
Abstract: Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the s ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915439

26. Estimating Fault Detection Effectiveness
Topic: Information Technology
Published: 4/1/2014
Authors: David R Kuhn, Raghu N Kacker, Yu Lei
Abstract: [Poster] A t-way covering array can detect t-way faults, however they generally include other combinations beyond t-way as well. For example, a particular test set of all 5-way combinations is shown capable of detecting all seeded faults in a test pr ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915440

27. Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report
Topic: Information Technology
Published: 4/1/2014
Authors: Jon Hagar, David R Kuhn, Raghu N Kacker, Thomas Wissink
Abstract: This poster gives an overview of the experience of eight pilot projects, over two years, applying combinatorial testing in a large aerospace organization. While results varied across the different pilot projects, overall it was estimated that CT wou ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915302

28. A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7849
Topic: Information Technology
Published: 3/5/2014
Author: Ramaswamy Chandramouli
Abstract: Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the ri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911836

29. Methods for improving visibility measurement standards of powered industrial vehicles
Topic: Information Technology
Published: 2/28/2014
Authors: Roger V Bostelman, Jochen Teizer, Soumitry J. Ray, Mike Agronin, Dominic Albanese
Abstract: Poor visibility of powered industrial vehicles, such as forklifts, used in industry is often the cause of accidents that include pedestrians. Current standards allow up to 20% non-visible regions for forklifts where measurement of these regions is p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912877

30. Framework for Improving Critical Infrastructure Cybersecurity
Series: ITL Bulletin
Topic: Information Technology
Published: 2/19/2014
Authors: Kevin Mcguire Stine, Kim Quill, Gregory Allen Witte
Abstract: Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It di ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915476



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series