NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 771 to 780 of 988 records.
Resort by: Date / Title


771. Self-Deployment Algorithms for Coverage Problem in a Network of Mobile Sensors with Unidentical Sensing Range
Topic: Information Technology
Published: 12/6/2009
Authors: Vladimir V Marbukh, Kamran Sayrafian, Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam
Abstract: In this paper, efficient sensor deployment algorithms are proposed to improve the coverage area in the target field. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. T ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906722

772. Sensor Location through Linear Programming with Arrival Angle Constraints
Topic: Information Technology
Published: 3/14/2007
Authors: Camillo A Gentile, J Shiu
Abstract: In previous work, we established a linear programming framework to determine sensor location from measured link distances between neighboring nodes in a network. Besides providing greater accuracy compared to other techniques, linear programs in part ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51155

773. Sequential Time-Bin Entanglement Generation Using Periodically Poled KTP Waveguide
Topic: Information Technology
Published: 1/7/2009
Authors: Lijun Ma, Oliver T Slattery, Xiao Tang, Tiejun Chang
Abstract: We demonstrated non-degenerate sequential time-bin entanglement using periodically poled KTP waveguide at a repetition rate of 1 GHz. The wavelengths of signal and idler are 895 and 1310 nm. The two-photon-interference-fringe visibility is 79%.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901108

774. Service Model Driven Variations in Security Measures for Cloud Environments
Topic: Information Technology
Published: 11/6/2011
Author: Ramaswamy Chandramouli
Abstract: With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has bec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909131

775. Sharing Information Via the Internet - An Infoserver Case Study
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5757
Topic: Information Technology
Published: 11/1/1995
Author: Robert H Bagwill
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900776

776. Signal Processing Techniques for Smart Grid: Scanning the Issue
Topic: Information Technology
Published: 9/2/2012
Author: Hamid Gharavi
Abstract: This is an editorial article for a special issue on Smart Grid. The main emphasis of this issue is the technical challenges of the Smart Grid from a signal processing perspective. Therefore, the selected articles aim at articulating signal processing ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911226

777. Simplified Analysis of Matcher Performance and Fusion
Topic: Information Technology
Published: 10/14/2009
Author: Vladimir N Dvornychenko
Abstract: Provides some first-order techniques for analyzing matcher performance. A novel argument is used to derive the power-law as a kind of baseline for analyzing matcher performance. The power-law is then applied to two situations: a) CMC curves, and b) f ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904193

778. Simulation Model for the IEEE 802.15.3/3b WPAN Standard
Topic: Information Technology
Published: 9/15/2010
Author: Kamran Sayrafian
Abstract: The1IEEE 802.15.3 is an emerging technology for high data rate wireless multimedia applications in Wireless Personal Area Networks (WPAN). In this paper, a discrete event simulation model has been implemented using OPNET2 Modeler to simulate the esse ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906075

779. Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense
Topic: Information Technology
Published: 6/11/2012
Authors: Riu Zhuang, Su Zhang, Scott DeLoach, Xinming Ou, Anoop Singhal
Abstract: Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network's configuration can increase the diffi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911408

780. Slap Fingerprint Segmentation Evaluation II - Procedures and Results
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7553
Topic: Information Technology
Published: 1/12/2009
Author: Craig I Watson
Abstract: In 2004, NIST conducted a fingerprint slap segmentation study [1] to assess the state-of-the-art in fingerprint segmentation technology. Given the development of new technology it has become necessary to reassess the current state-of-the-art of segm ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901467



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series