NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 961 to 970 of 987 records.
Resort by: Date / Title


961. Vertical Handoff Decision Algorithms for Providing Optimized Performance in Heterogeneous Wireless Networks
Topic: Information Technology
Published: 2/3/2009
Authors: SuKyoung Lee, Kotikalapudi Sriram, Kyungsoo Kim, JongHyup Lee, YoonHyuk Kim, Nada T Golmie
Abstract: There are currently a large variety of wireless access networks, including the emerging Vehicular Adhoc Networks (VANETs). A large variety of applications utilizing these networks will demand features such as real-time, high-availability and even ins ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51141

962. Videoconferencing Procurement and Usage Guide
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5485
Topic: Information Technology
Published: 8/1/1994
Authors: Michael A. Wallace, D E Rorrer
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900725

963. View subspaces for indexing and retrieval of 3D models
Topic: Information Technology
Published: 1/21/2010
Authors: Helin Dutagaci, Afzal A Godil, Bulent Sankur, Yucel Yemez
Abstract: View-based indexing schemes for 3D object retrieval is gaining popularity since they provide good retrieval results. These schemes are coherent with the theory that humans recognize objects based on their 2D appearances. The view-based techniques als ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904752

964. Virtual Environments for Health Care
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5740
Topic: Information Technology
Published: 11/1/1995
Author: J A Moline
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900774

965. Vulnerability of Selfish Routing to Attacks: Game-theoretic Models and Initial Results
Topic: Information Technology
Published: 6/30/2010
Authors: Daniel Ilya Genin, Vladimir V Marbukh, Anastase Nakassis
Abstract: This paper reports on work in progress on assessing and mitigating selfish routing vulnerability to strategic attacks. We explain mechanisms leading to this vulnerability, propose the corresponding game-theoretic model, solve this model for some par ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905644

966. Watchful Waiting
Topic: Information Technology
Published: 3/31/2011
Author: Isabel M Beichl
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908462

967. WebSubmit: Web-Based Applications with Tcl
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6165
Topic: Information Technology
Published: 6/1/1998
Authors: R P McCormack, J E Koontz, J E Devaney
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900847

968. What's Special About Cloud Security?
Topic: Information Technology
Published: 7/16/2012
Author: Peter M Mell
Abstract: While cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it is not clear what security issues are special with respect to cloud computing. To approach this question, we attempt to derive cloud security is ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910569

969. Where in the Internet is Congestion?
Topic: Information Technology
Published: 7/26/2013
Author: Daniel Ilya Genin
Abstract: Understanding distribution of congestion in the Internet is a long-standing problem. Using data from the SamKnows US broadband access network measurement study, commissioned by the FCC, we explore patterns of congestion distribution in DSL and cable ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911796

970. Who is Who? Biometrics provides answers for public and private sectors
Topic: Information Technology
Published: 2/10/2011
Author: Fernando L Podio
Abstract: One of the critical issues related to secured Information Technology (IT) systems and applications is the verification of the users identity. Biometrics provides for secure transactions, positive identification and augmentation to human judgment. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907550



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series