NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 841 to 850 of 981 records.
Resort by: Date / Title


841. The Case for Delivering the Infrastructure for Digital Building Regulations
Topic: Information Technology
Published: 5/19/2014
Authors: Mark E Palmer, James H Garrett
Abstract: The building industry uses numerous engineering standards, building codes, specifications and regulations and a diverse set of industry vocabularies to describe, assess, and deliver constructed facilities. As part of the expanding use of building in ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912456

842. The Challenge of Face Recognition From Digital Point-and-Shoot Cameras
Topic: Information Technology
Published: 6/25/2013
Authors: P Jonathon Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, G. H. Givens, Yui M. Lui, Hao Zhang, W T. Scruggs, Kevin W. Bowyer, Patrick J. Flynn, Su Lan Cheng
Abstract: Face recognition is appearing in personal and commercial products at an astonishing rate, yet reliable face recognition remains challenging. Users expect a lot; they want to snap pictures and have their friends, family and acquaintances recognized. T ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913139

843. The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7502
Topic: Information Technology
Published: 12/27/2010
Authors: Peter M Mell, Karen Scarfone
Abstract: The Common Configuration Scoring System (CCSS) is a set of measures of the severity of software security configuration issues. CCSS is derived from the Common Vulnerability Scoring System (CVSS), which was developed to measure the severity of vulnera ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906165

844. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7864
Topic: Information Technology
Published: 7/10/2012
Authors: Elizabeth LeMay, Karen Ann Scarfone, Peter M Mell
Abstract: The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910230

845. The Cryptographic Hash Algorithm Family: Revision of the Secure Hash Standard and Ongoing Competition for New Hash Algorithms
Series: ITL Bulletin
Topic: Information Technology
Published: 3/25/2009
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard; NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms, by Quynh Dang; SP ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902326

846. The Date-Time Vocabulary
Topic: Information Technology
Published: 7/28/2012
Authors: Mark H Linehan, Edward J Barkmeyer, Stan Hendryx
Abstract: The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911074

847. The Economic Benefits from Improved Cyber Security Infrastructure
Topic: Information Technology
Published: 5/22/2013
Author: Gregory C. Tassey
Abstract: Leading government officials have warned that a "cyber 9/11" could happen at any time. A coordinated terrorist cyber attack on a massive scale could potentially shut down the domestic economy. Even without such a pervasive assault, banks, utilities ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913775

848. The Effect of Training Dynamics on Neural Network Performance
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5696
Topic: Information Technology
Published: 8/1/1995
Authors: Charles L. Wilson, J L. Blue, O M Omidvar
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900764

849. The Exact Multiplicative Complexity of the Hamming Weight Function
Topic: Information Technology
Published: 9/13/2005
Authors: Rene C Peralta, Joan Boyar
Abstract: We consider the problem of computing the Hamming weight of an n-bit vector using a circuit with gates for addition and multiplication modulo 2 (alternatively, XOR and conjunction gates) only. The number of multiplications necessary and sufficient to ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150712

850. The Exchange of Health Care Information: Designing a Security Architecture to Protect Information Security and Privacy
Series: ITL Bulletin
Topic: Information Technology
Published: 11/23/2010
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NISTIR 7497, Security Architecture Design Process for Health Information Exchanges (HIEs). The publication describes a systematic approach to designing a technical security architecture for the ex ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907383



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series