NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 851 to 860 of 979 records.
Resort by: Date / Title


851. The Fourth PASCAL Recognizing Textual Entailment Challenge
Topic: Information Technology
Published: 10/30/2009
Authors: Hoa Trang Dang, Danilo Giampiccolo, Bernardo Magnini, Ido Dagan, Elena Cabrio, Bill Dolan
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902260

852. The Hilbert-Huang Transform in Time-Frequency Analysis: Implications for Machine Prognostics
Topic: Information Technology
Published: 1/1/2002
Author: Gary G Leisk
Abstract: The Hilbert-Huang Transform (HHT) is a relatively new entrant into the field of time-frequency analysis. Despite its youthfulness, HHT is quickly growing in acceptance as an every-increasing volume of successful applications becomes known. One key to ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=821896

853. The History of IDF and its Influences on IR and Other Fields
Topic: Information Technology
Published: 12/21/2005
Author: Donna K. Harman
Abstract: The surprisingly simple IDF measure developed in 1972 by Karen Sparck Jones has continued to dominate the term weighting metrics used in information retrieval, despite several efforts to develop more complex measures of term distribution. It has bee ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150250

854. The Importance of Focused Evaluations: A Case Study of TREC and DUC
Topic: Information Technology
Published: 3/1/2001
Author: Donna K. Harman
Abstract: Evaluation has always been an important part of scientific research, and in information retrieval, this evaluation has mostly been done using test collections. In 1992, a new test collection was built at the National Institute of Standards and Techn ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150251

855. The Internet of Things: A Reality Check
Topic: Information Technology
Published: 6/11/2012
Authors: George Hurlburt, Jeffrey Mark Voas, Keith Miller
Abstract: The short persepctive explains the concept behind Internet of Things (IoT). The publication is a perspectives piece for an IEEE magazine and not intended to be technical. This is intended to be published in a specific column in the magazine.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910478

856. The Keyed-Hash Message Authentication Code (HMAC)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 198-1
Topic: Information Technology
Published: 7/16/2008
Author: Quynh H Dang
Abstract: This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901614

857. The Matrix Market Exchange Formats: Initial Design
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5935
Topic: Information Technology
Published: 12/1/1996
Authors: Ronald F Boisvert, Roldan Pozo, K Remington
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900799

858. The Naming Forum: Proceedings of the IRDS Workshop on Data Entity Naming Conventions
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4374
Topic: Information Technology
Published: 7/1/1990
Author: J J Newton
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900572

859. The National Institute of Standards and Technology: NIST Contributions to Biometrics Technology
Topic: Information Technology
Published: 8/1/2013
Author: Bradford J Wing
Abstract: NIST has been at the forefront of information technology in its application to biometrics for almost 50 years. Early work revolved around developing hardware and software to perform automated analysis of fingerprint images and development of voice ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914337

860. The National Strategy for Trusted Identities in Cyberspace (Enhancing Online Choice, Efficiency, Security, and Privacy through Standards)
Topic: Information Technology
Published: 11/1/2011
Author: Jeremy A Grant
Abstract: Dear Password, It‰s time for you to retire. You‰ve served us well, but the reality is that you‰re woefully outdated and fundamentally insecure. Moreover, our reliance on you is making it difficult to move some very interesting and valuable types of ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909550



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series