NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 931 to 940 of 992 records.
Resort by: Date / Title


931. User-Centered Processes for Studying Human Interaction with Virtual Environments and Human-Human Interaction in Virtual Environments
Topic: Information Technology
Published: Date unknown
Authors: Theresa O'Connell, Kevin Workman, Wyatt Wong
Abstract: This paper sets out a usability engineering framework of processes that were applied to user-centered studies of digital natives interacting with virtual environments (VE) and with each other while playing cooperative and competitive serious games in ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905645

932. Users Manual for Version 2.1.5 of the NIST DMIS Test Suite (for DMIS 5.1)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7603
Topic: Information Technology
Published: 8/19/2009
Authors: Thomas Rollin Kramer, John A Horst
Abstract: The NIST DMIS Test Suite, version 2.1.5, is described. The test suite is intended to serve two purposes, 1) to help users and vendors use version 5.1 of DMIS (the Dimensional Measuring Interface Standard) and 2) to provide utilities and test files fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903026

933. Users Manual for Version 2.2.1 of the NIST DMIS Test Suite
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7735
Topic: Information Technology
Published: 10/25/2010
Authors: Thomas Rollin Kramer, John A Horst
Abstract: This manual is a users manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual d ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905756

934. Using Attack Graphs in Forensic Examinations
Topic: Information Technology
Published: 1/16/2013
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911518

935. Using Markov Chain Analysis to Study Dynamic Behaviour in Large-Scale Grid Systems
Topic: Information Technology
Published: 1/21/2009
Authors: Christopher E Dabrowski, Fern Y Hunt
Abstract: In large-scale grid systems with decentralized control, the interactions of many service providers and consumers will likely lead to emergent global system behaviours that result in unpredictable, often detrimental, outcomes. This possibility argues ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=890095

936. Using Model Checking to Generate Tests from Specifications
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6166
Topic: Information Technology
Published: 11/1/1998
Authors: P E Ammann, Paul E Black, William J Majurski
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900848

937. Using Personal Identity Verification (PIV) Credentials in Physical Access Control Systems (PACS)
Series: ITL Bulletin
Topic: Information Technology
Published: 2/26/2009
Author: Shirley M. Radack
Abstract: This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-116, A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS), written by William MacGregor of NIST, Ketan Mehta of Mehta, Inc., a ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901953

938. Using S-Check ML Version 3 (supersedes NISTIR 5789)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 578
Topic: Information Technology
Published: 2/1/1999
Authors: Robert D Snelick, N Drouin, J Antonishek, Michael D Indovina, M M Courson
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900781

939. Using Security Configuration Checklists and the National Checklist Program
Series: ITL Bulletin
Topic: Information Technology
Published: 5/25/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-70 Rev. 2, National Checklist Program for IT Products,Guidelines for Checklist Users and Developers: Recommendations of the National Institute of Standards and Te ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908647

940. Using Self-Organizing Recognition as a Mechanism for Rejecting Segmentation Errors
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4938
Topic: Information Technology
Published: 10/1/1992
Authors: R A Wilkinson, Michael D Garris, Charles L. Wilson
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900657



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series