NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 941 to 950 of 992 records.
Resort by: Date / Title

941. Using Simulation To Assess The Effectiveness of Pallet Stacking Methods
Topic: Information Technology
Published: 11/19/2010
Authors: Stephen B. Balakirsky, Frederick M Proctor, Thomas Rollin Kramer, Pushkar Kolhe, Henrik I. Christensen
Abstract: Stacking objects onto pallets is the most widely used method of bulk shipping, accounting for over 60% of the volume of goods shipped worldwide. Due in part to the wide variation in size, shape and weight of objects to be palletized, successful stack ...

942. Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5139
Topic: Information Technology
Published: 3/1/1993
Authors: Robert D Snelick, J Ja' ja', Raghu N Kacker, Gordon E Lyon

943. Using clock accuracy to guide model synthesis in distributed systems: An application in power grid control
Topic: Information Technology
Published: 9/27/2010
Authors: Dhananjay Anand, Jeffrey Fletcher, YaShian Li-Baboud, Julien Marc Amelot, James Moyne
Abstract: Practical implementations in distributed model based control face a fundamental trade-off between model complexity and the number of modeled nodes. For linear systems, higher order models better capture the behavior of the system at higher frequencie ...

944. Using the EAP Framework for Fast Media Independent Handover Authentication
Topic: Information Technology
Published: 11/17/2008
Authors: Antonio Izquierdo Manzanares, Nada T Golmie, Katrin Hoeper, Lidong Chen
Abstract: In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication.  We provide a detailed analysis of each mechanis ...

945. Using the Information Resource Dictionary System Command Language
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 85-3165
Topic: Information Technology
Published: 4/1/1985
Author: Alan Howard Goldfine

946. Using the Information Resource Dictionary System Command Language (Second Edition)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 88-3701
Topic: Information Technology
Published: 2/1/1988
Author: Alan Howard Goldfine

947. Valid Affine Domain Extensions: Improving upon Security Bound of PRP-based PRFs
Topic: Information Technology
Published: 8/17/2009
Author: Mridul Nandi
Abstract: This paper provides an improved security analysis of popular pseudorandom functions (PRF) based on an $n$-bit pseudorandom permutation (PRP). In CRYPTO-05, an improved security analysis of \tx{CBC} (with prefix-free message space) was shown. The simi ...

948. Validadated Products List 1993 No. 4
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5274
Topic: Information Technology
Published: 10/1/1993
Author: Judy B. Kailey

949. Validated Processor List 1992, No. 1 (Supersedes NISTIR 4690)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4739
Topic: Information Technology
Published: 1/1/1992
Author: Judy B. Kailey

950. Validated Products List 1992 No.4
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4951
Topic: Information Technology
Published: 10/1/1992
Author: Judy B. Kailey

Search NIST-wide:

(Search abstract and keywords)

Last Name:
First Name:

Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series