NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 941 to 950 of 995 records.
Resort by: Date / Title


941. Using S-Check ML Version 3 (supersedes NISTIR 5789)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 578
Topic: Information Technology
Published: 2/1/1999
Authors: Robert D Snelick, N Drouin, J Antonishek, Michael D Indovina, M M Courson
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900781

942. Using Security Configuration Checklists and the National Checklist Program
Series: ITL Bulletin
Topic: Information Technology
Published: 5/25/2011
Author: Shirley M. Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-70 Rev. 2, National Checklist Program for IT Products,Guidelines for Checklist Users and Developers: Recommendations of the National Institute of Standards and Te ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908647

943. Using Self-Organizing Recognition as a Mechanism for Rejecting Segmentation Errors
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4938
Topic: Information Technology
Published: 10/1/1992
Authors: R A Wilkinson, Michael D Garris, Charles L. Wilson
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900657

944. Using Simulation To Assess The Effectiveness of Pallet Stacking Methods
Topic: Information Technology
Published: 11/19/2010
Authors: Stephen B. Balakirsky, Frederick M Proctor, Thomas Rollin Kramer, Pushkar Kolhe, Henrik I. Christensen
Abstract: Stacking objects onto pallets is the most widely used method of bulk shipping, accounting for over 60% of the volume of goods shipped worldwide. Due in part to the wide variation in size, shape and weight of objects to be palletized, successful stack ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906569

945. Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5139
Topic: Information Technology
Published: 3/1/1993
Authors: Robert D Snelick, J Ja' ja', Raghu N Kacker, Gordon E Lyon
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900679

946. Using clock accuracy to guide model synthesis in distributed systems: An application in power grid control
Topic: Information Technology
Published: 9/27/2010
Authors: Dhananjay Anand, Jeffrey Fletcher, YaShian Li-Baboud, Julien Marc Amelot, James Moyne
Abstract: Practical implementations in distributed model based control face a fundamental trade-off between model complexity and the number of modeled nodes. For linear systems, higher order models better capture the behavior of the system at higher frequencie ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906257

947. Using the EAP Framework for Fast Media Independent Handover Authentication
Topic: Information Technology
Published: 11/17/2008
Authors: Antonio Izquierdo Manzanares, Nada T Golmie, Katrin Hoeper, Lidong Chen
Abstract: In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication.  We provide a detailed analysis of each mechanis ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152094

948. Using the Information Resource Dictionary System Command Language
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 85-3165
Topic: Information Technology
Published: 4/1/1985
Author: Alan Howard Goldfine
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900054

949. Using the Information Resource Dictionary System Command Language (Second Edition)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 88-3701
Topic: Information Technology
Published: 2/1/1988
Author: Alan Howard Goldfine
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900529

950. Valid Affine Domain Extensions: Improving upon Security Bound of PRP-based PRFs
Topic: Information Technology
Published: 8/17/2009
Author: Mridul Nandi
Abstract: This paper provides an improved security analysis of popular pseudorandom functions (PRF) based on an $n$-bit pseudorandom permutation (PRP). In CRYPTO-05, an improved security analysis of \tx{CBC} (with prefix-free message space) was shown. The simi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901742



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series