NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 821 to 830 of 961 records.
Resort by: Date / Title

821. The 1999 NIST Speaker Recognition Evaluation, Using Summed Two-Channel Telephone Data for Speaker Detection and Speaker Tracking
Topic: Information Technology
Published: 9/5/1999
Authors: Mark A. Przybocki, Alvin Martin
Abstract: The 1999 NIST Speaker Recognition Evaluation encompassed three tasks: one-speaker detection, two-speaker detection, and speaker tracking. All tasks were performed in the context of conversational telephone speech. The one-speaker task used single ...

822. The Biological Evidence Preservation Handbook: Best Practices for Evidence Handlers
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7928
Topic: Information Technology
Published: 4/23/2013
Authors: Susan M Ballou, Margaret C Kline, Mark David Stolorow, Melissa K Taylor, Shannan R Williams, Phylis S Bamberger, Burney Yvette, Larry Brown, Cynthia Jones, Ralph Keaton, William Kiley, Karen Lanning, Gerry LaPorte, Joseph Latta, Linda E Ledray, Randy Nagy, Linda Schwind, Stephanie Stoiloff, Brian Ostrom
Abstract: The report of the Technical Working Group on Biological Evidence Preservation offers guidance for individuals involved in the collection, examination, tracking, packaging, storing, and disposition of biological evidence. This may include crime sc ...

823. The Challenge of Face Recognition From Digital Point-and-Shoot Cameras
Topic: Information Technology
Published: 6/25/2013
Authors: P Jonathon Phillips, J. R. Beveridge, David Bolme, B Draper, G. H. Givens, Yui M. Lui, Hao Zhang, W T. Scruggs, Kevin W. Bowyer, Patrick J. Flynn, Su Lan Cheng
Abstract: Face recognition is appearing in personal and commercial products at an astonishing rate, yet reliable face recognition remains challenging. Users expect a lot; they want to snap pictures and have their friends, family and acquaintances recognized. T ...

824. The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7502
Topic: Information Technology
Published: 12/27/2010
Authors: Peter M Mell, Karen Scarfone
Abstract: The Common Configuration Scoring System (CCSS) is a set of measures of the severity of software security configuration issues. CCSS is derived from the Common Vulnerability Scoring System (CVSS), which was developed to measure the severity of vulnera ...

825. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7864
Topic: Information Technology
Published: 7/10/2012
Authors: Elizabeth LeMay, Karen Ann Scarfone, Peter M Mell
Abstract: The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in ...

826. The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms
Series: ITL Bulletin
Topic: Information Technology
Published: 3/25/2009
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard; NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms, by Quynh Dang; SP ...

827. The Date-Time Vocabulary
Topic: Information Technology
Published: 7/28/2012
Authors: Mark H Linehan, Edward J Barkmeyer, Stan Hendryx
Abstract: The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary ...

828. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Information Technology
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...

829. The Effect of Training Dynamics on Neural Network Performance
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5696
Topic: Information Technology
Published: 8/1/1995
Authors: Charles L. Wilson, J L. Blue, O M Omidvar

830. The Exact Multiplicative Complexity of the Hamming Weight Function
Topic: Information Technology
Published: 9/13/2005
Authors: Rene C Peralta, Joan Boyar
Abstract: We consider the problem of computing the Hamming weight of an n-bit vector using a circuit with gates for addition and multiplication modulo 2 (alternatively, XOR and conjunction gates) only. The number of multiplications necessary and sufficient to ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series