NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 861 to 870 of 987 records.
Resort by: Date / Title

861. The Hilbert-Huang Transform in Time-Frequency Analysis: Implications for Machine Prognostics
Topic: Information Technology
Published: 1/1/2002
Author: Gary G Leisk
Abstract: The Hilbert-Huang Transform (HHT) is a relatively new entrant into the field of time-frequency analysis. Despite its youthfulness, HHT is quickly growing in acceptance as an every-increasing volume of successful applications becomes known. One key to ...

862. The History of IDF and its Influences on IR and Other Fields
Topic: Information Technology
Published: 12/21/2005
Author: Donna K. Harman
Abstract: The surprisingly simple IDF measure developed in 1972 by Karen Sparck Jones has continued to dominate the term weighting metrics used in information retrieval, despite several efforts to develop more complex measures of term distribution. It has bee ...

863. The Importance of Focused Evaluations: A Case Study of TREC and DUC
Topic: Information Technology
Published: 3/1/2001
Author: Donna K. Harman
Abstract: Evaluation has always been an important part of scientific research, and in information retrieval, this evaluation has mostly been done using test collections. In 1992, a new test collection was built at the National Institute of Standards and Techn ...

864. The Internet of Things: A Reality Check
Topic: Information Technology
Published: 6/11/2012
Authors: George Hurlburt, Jeffrey Mark Voas, Keith Miller
Abstract: The short persepctive explains the concept behind Internet of Things (IoT). The publication is a perspectives piece for an IEEE magazine and not intended to be technical. This is intended to be published in a specific column in the magazine.

865. The Keyed-Hash Message Authentication Code (HMAC)
Series: Federal Inf. Process. Stds. (NIST FIPS)
Report Number: 198-1
Topic: Information Technology
Published: 7/16/2008
Author: Quynh H Dang
Abstract: This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared ...

866. The Matrix Market Exchange Formats: Initial Design
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5935
Topic: Information Technology
Published: 12/1/1996
Authors: Ronald F Boisvert, Roldan Pozo, K Remington

867. The Naming Forum: Proceedings of the IRDS Workshop on Data Entity Naming Conventions
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4374
Topic: Information Technology
Published: 7/1/1990
Author: J J Newton

868. The National Institute of Standards and Technology: NIST Contributions to Biometrics Technology
Topic: Information Technology
Published: 8/1/2013
Author: Bradford J Wing
Abstract: NIST has been at the forefront of information technology in its application to biometrics for almost 50 years. Early work revolved around developing hardware and software to perform automated analysis of fingerprint images and development of voice ...

869. The National Strategy for Trusted Identities in Cyberspace (Enhancing Online Choice, Efficiency, Security, and Privacy through Standards)
Topic: Information Technology
Published: 11/1/2011
Author: Jeremy A Grant
Abstract: Dear Password, It‰s time for you to retire. You‰ve served us well, but the reality is that you‰re woefully outdated and fundamentally insecure. Moreover, our reliance on you is making it difficult to move some very interesting and valuable types of ...

870. The New Golden Age of Algorithms and Data Structures
Topic: Information Technology
Published: 10/29/2012
Author: Paul E Black
Abstract: Before 1976 Communications of the ACM printed (and numbered!) new algorithms every issue. Quicksort was invented in 1960, Boyer-Moore string search in 1977, and combsort in 1980. I haven't seen a new, general sorting algorithm in over a decade. The l ...

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series