NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 911 to 920 of 990 records.
Resort by: Date / Title

911. Uncertainty Analysis of Remote Sensing Optical Sensor Data Guiding Principles to Achieve Metrological Consistency
Topic: Information Technology
Published: 2/20/2010
Authors: Raju Vsnu Datla, Ruediger Kessel, Allan W. Smith, Raghu N Kacker, D. B. Pollock
Abstract: Climate change monitoring requires long time series radiometric measurements using multiple optical sensors in multiple platforms covering the globe over decades. The problem of achieving traceability to SI units for these measurements is discussed. ...

912. Uncertainty Analysis of a Simple Fringe Projection System
Topic: Information Technology
Published: 7/1/2009
Authors: Shawn P Moylan, Gregory W Vogl
Abstract: Fringe projection is an optical method of measuring the surface profile of a part. Most basic fringe projection processes require an initial calibration step to determine components of coordinate transformation matrices before the surface point co ...

913. Unconstrained Handprint Recognition Using A Limited Lexicon
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5310
Topic: Information Technology
Published: 12/1/1993
Author: Michael D Garris

914. Underlying Technical Models for Information Technology Security
Series: Special Publication (NIST SP)
Report Number: 800-33
Topic: Information Technology
Published: 12/1/2001
Author: G Stoneburner
Abstract: Underlying Technical Models for Information Technology Security provides a description of the technical foundations, termed models, that underlie secure information technology (IT). The intent is to provide, in a concise form, the models that should ...

915. Understanding Consistency Maintenance in Service Discovery Architectures During Communication Failure
Topic: Information Technology
Published: 7/1/2002
Authors: Christopher E Dabrowski, Kevin L Mills, J R Elder
Abstract: Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available softw ...

916. Understanding Insecure IT: Practical Risk Assessment
Topic: Information Technology
Published: 5/27/2009
Authors: Simon Liu, David R Kuhn, Hart Rossman
Abstract: IT systems have long been at risk from vulnerable software, malicious actions, or inadvertent user errors, in addition to run-of-the-mill natural and human-made disasters. As we discussed in the last issue ( Surviving Insecure IT: Effective Patch Man ...

917. Understanding Part Fabrication Errors in Closed-Loop Machining Systems
Series: Journal of Research (NIST JRES)
Report Number: 6876
Topic: Information Technology
Published: 6/1/2002
Authors: Herbert T Bandy, Lawrence A Welsch
Abstract: This paper presents an analysis of part fabrication errors (part dimension and form deviations) in closed-loop machining systems. Modeling methods are used to situate error components in the context of other error components to clarify the effects of ...

918. Unravel: A CASE Tool to Assist Evaluation of High Integrity Software Volume 1: Requirements and Design
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5691
Topic: Information Technology
Published: 8/1/1995
Authors: James R Lyle, D Wallace, J R Graham, K Gallagher, Joseph P. Poole, D W Binkley

919. Updated Digital Signature Standard Approved as Federal Information Processing Standard (FIPS)186-3
Series: ITL Bulletin
Topic: Information Technology
Published: 9/28/2009
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information in Federal Information Processing Standard (FIPS) Publication 186-3, Digital Signature Standard (DSS). Approved in June 2009 by the Secretary of Commerce for use by federal government agencies in protecting t ...

920. Use of ISO/IEC 24727
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7611
Topic: Information Technology
Published: 8/14/2009
Authors: Hildegard Ferraiolo, Teresa T. Schwarzhoff, William I. MacGregor, Hung Dang, Ketan Mehta
Abstract: This document describes the use of ISO/IEC 24727 in enabling client-applications to access identity credentials issued by different credential issuers.

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series