NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 851 to 860 of 998 records.
Resort by: Date / Title

851. Technology Trends in Telecommunications: An Overview
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5282
Topic: Information Technology
Published: 10/1/1993
Authors: S A. Wakid, David H Su, W H McCoy

852. Templated CDA:Key Concept for Interoperability
Series: Grant/Contract Reports (NISTGCR)
Report Number: 11-943
Topic: Information Technology
Published: 5/31/2011
Author: Liora Alschuler
Abstract: This document supplements information about ,templated CDAŠ in the context of the Healthcare Information Technology (HIT) Standards Analysis Project carried out by Lantana Consulting Group for the National Institute of Standards and Technology (NIST) ...

853. Testability Report for SCRIPT
Series: Grant/Contract Reports (NISTGCR)
Report Number: 11-944
Topic: Information Technology
Published: 8/31/2011
Author: Ioana Singureanu
Abstract: This document summarizes the major testability issues raised by the NCPDP SCRIPT Implementation Guide Version 10.6. The ELR Implementation Guide is intended as a means of testing and certifying Electronic Health System (EHRS) for Meaningful Use.

854. Testing: A Key to Building Trust and Confidence in IT Systems
Topic: Information Technology
Published: 2/1/2004
Author: S F Zevin
Abstract: The ubiquitous computer now touches nearly every aspect of human life. The promise of information technology is improvement to the quality of life. Maintaining trust and confidence in information technology is central to keeping that promise. This is ...

855. The 1999 NIST Speaker Recognition Evaluation, Using Summed Two-Channel Telephone Data for Speaker Detection and Speaker Tracking
Topic: Information Technology
Published: 9/5/1999
Authors: Mark Allan Przybocki, Alvin Martin
Abstract: The 1999 NIST Speaker Recognition Evaluation encompassed three tasks: one-speaker detection, two-speaker detection, and speaker tracking. All tasks were performed in the context of conversational telephone speech. The one-speaker task used single ...

856. The Biological Evidence Preservation Handbook: Best Practices for Evidence Handlers
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7928
Topic: Information Technology
Published: 4/23/2013
Authors: Susan M Ballou, Margaret C Kline, Mark David Stolorow, Melissa K Taylor, Shannan R Williams, Phylis S Bamberger, Burney Yvette, Larry Brown, Cynthia E. Jones, Ralph Keaton, William Kiley, Karen Thiessen, Gerry LaPorte, Joseph Latta, Linda E Ledray, Randy Nagy, Linda Schwind, Stephanie Stoiloff, Brian Ostrom
Abstract: The report of the Technical Working Group on Biological Evidence Preservation offers guidance for individuals involved in the collection, examination, tracking, packaging, storing, and disposition of biological evidence. This may include crime sc ...

857. The Case for Delivering the Infrastructure for Digital Building Regulations
Topic: Information Technology
Published: 5/19/2014
Authors: Mark E Palmer, James H Garrett
Abstract: The building industry uses numerous engineering standards, building codes, specifications and regulations and a diverse set of industry vocabularies to describe, assess, and deliver constructed facilities. As part of the expanding use of building in ...

858. The Challenge of Face Recognition From Digital Point-and-Shoot Cameras
Topic: Information Technology
Published: 6/25/2013
Authors: P Jonathon Phillips, J. Ross Beveridge, David Bolme, Bruce A. Draper, Geof H. Givens, Yui M. Lui, Hao Zhang, W T. Scruggs, Kevin W. Bowyer, Patrick J. Flynn, Su Lan (Su Lan) Cheng
Abstract: Face recognition is appearing in personal and commercial products at an astonishing rate, yet reliable face recognition remains challenging. Users expect a lot; they want to snap pictures and have their friends, family and acquaintances recognized. T ...

859. The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7502
Topic: Information Technology
Published: 12/27/2010
Authors: Peter M Mell, Karen Scarfone
Abstract: The Common Configuration Scoring System (CCSS) is a set of measures of the severity of software security configuration issues. CCSS is derived from the Common Vulnerability Scoring System (CVSS), which was developed to measure the severity of vulnera ...

860. The Common Misuse Scoring System (CMSS): Metrics for Software Feature Misuse Vulnerabilities
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7864
Topic: Information Technology
Published: 7/10/2012
Authors: Elizabeth LeMay, Karen Ann Scarfone, Peter M Mell
Abstract: The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series