NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 961 to 970 of 987 records.
Resort by: Date / Title


961. Videoconferencing Procurement and Usage Guide
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5485
Topic: Information Technology
Published: 8/1/1994
Authors: Michael A. Wallace, D E Rorrer
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900725

962. View subspaces for indexing and retrieval of 3D models
Topic: Information Technology
Published: 1/21/2010
Authors: Helin Dutagaci, Afzal A Godil, Bulent Sankur, Yucel Yemez
Abstract: View-based indexing schemes for 3D object retrieval is gaining popularity since they provide good retrieval results. These schemes are coherent with the theory that humans recognize objects based on their 2D appearances. The view-based techniques als ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904752

963. Virtual Environments for Health Care
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5740
Topic: Information Technology
Published: 11/1/1995
Author: J A Moline
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900774

964. Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories AND Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories
Series: Special Publication (NIST SP)
Report Number: 800-60 Rev1
Topic: Information Technology
Published: 8/1/2008
Authors: Kevin Mcguire Stine, Richard L Kissel, J Fahlsing, Jessica Gulick
Abstract: Title III of the E-Government Act, titled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST to develop (1) standards to be used by all Federal agencies to categorize information and information systems collected or maintain ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=152106

965. Vulnerability of Selfish Routing to Attacks: Game-theoretic Models and Initial Results
Topic: Information Technology
Published: 6/30/2010
Authors: Daniel Ilya Genin, Vladimir V Marbukh, Anastase Nakassis
Abstract: This paper reports on work in progress on assessing and mitigating selfish routing vulnerability to strategic attacks. We explain mechanisms leading to this vulnerability, propose the corresponding game-theoretic model, solve this model for some par ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905644

966. Watchful Waiting
Topic: Information Technology
Published: 3/31/2011
Author: Isabel M Beichl
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908462

967. WebSubmit: Web-Based Applications with Tcl
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6165
Topic: Information Technology
Published: 6/1/1998
Authors: R P McCormack, J E Koontz, J E Devaney
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900847

968. What's Special About Cloud Security?
Topic: Information Technology
Published: 7/16/2012
Author: Peter M Mell
Abstract: While cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it is not clear what security issues are special with respect to cloud computing. To approach this question, we attempt to derive cloud security is ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910569

969. Where in the Internet is Congestion?
Topic: Information Technology
Published: 7/26/2013
Author: Daniel Ilya Genin
Abstract: Understanding distribution of congestion in the Internet is a long-standing problem. Using data from the SamKnows US broadband access network measurement study, commissioned by the FCC, we explore patterns of congestion distribution in DSL and cable ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911796

970. Who is Who? Biometrics provides answers for public and private sectors
Topic: Information Technology
Published: 2/10/2011
Author: Fernando L Podio
Abstract: One of the critical issues related to secured Information Technology (IT) systems and applications is the verification of the users identity. Biometrics provides for secure transactions, positive identification and augmentation to human judgment. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907550



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series