Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1651 - 1675 of 2282

Micro-Time-Scale Network Measurements and Harmonic Effects

April 28, 2004
Author(s)
Mark E. Carson, Darrin J. Santay
As network transmission speeds increase, packet streams increasingly uncover fine details of the interior behavior of router hardware and software. This behavior reveals itself as a set of harmonic effects, as interior clocks periodically interrupt packet

Selecting Information Technology Security Products

April 28, 2004
Author(s)
Shirley M. Radack
This bulletin summarizes NIST Special Publication 800-36, "Guide to Selecting Information Technology Security Products." The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure

A Cross-Correlation Based Method for Spatial-Temporal Traffic Analysis

March 10, 2004
Author(s)
Kevin L. Mills, J Yuan
Analyzing spatial-temporal characteristics of traffic in large-scale networks requires both suitable analysis method and a means to reduce the amount of data that must be collected. Of particular interest would be techniques that reduce the amount of data

Segmentation for Robust Tracking in the Presence of Severe Occlusion

February 18, 2004
Author(s)
Camillo A. Gentile, M Sznaier, O Camps
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness to occlusion can be increased by tracking the object as a set of parts such that not all of these are occluded at the same time. However, successful

Computer Modeling of Crack Propagation in Biaxially-Stressed Glass Disks

February 1, 2004
Author(s)
George W. Quinn, Dianne M. O'Leary, Janet Quinn
A computer program was written to model the propagation of two-dimensional traveling cracks in a biaxially-stressed glass disk. This was accomplished by using a combination of known fractographic equations and empirical observations with generic algorithms

Testing: A Key to Building Trust and Confidence in IT Systems

February 1, 2004
Author(s)
S F. Zevin
The ubiquitous computer now touches nearly every aspect of human life. The promise of information technology is improvement to the quality of life. Maintaining trust and confidence in information technology is central to keeping that promise. This is

2003 Information Technology Laboratory (ITL) Technical Accomplishments

January 1, 2004
Author(s)
Elizabeth B. Lennon, Kristi G. Hawes
This report presents the achievements and highlights of NIST's Information Technology Laboratory during FY 2003. Following the Director's Foreword and the ITL overview, technical projects in ITL's research program are described, followed by selected cross

Security Considerations in the Information System Development Life Cycle

December 1, 2003
Author(s)
Shirley M. Radack
The need to provide protection for federal information systems has been present since computers were first used. Including security early in the acquisition process for an information system will usually result in less expensive and more effective security

Guide to Information Technology Security Services

October 13, 2003
Author(s)
Timothy Grance, Joan Hash, Marc Stevens, K O'Neal, N Bartol
Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security

Guide to Information Technology Security Services

October 9, 2003
Author(s)
Timothy Grance, Joan Hash, Marc Stevens, Kristofor O'Neal, Nadya Bartol
Organizations frequently must evaluate and select a variety of information technology (IT) security services in order to maintain and improve their overall IT security program and enterprise architecture. IT security services, which range from security

Guide to Selecting Information Technology Security Products

October 9, 2003
Author(s)
Timothy Grance, Marc Stevens, Marissa Myers
The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure that ensures confidentiality, integrity, and availability of mission critical information. The guide seeks to assist in

Backup Resource Pooling in (M : N) n Fault Recovery Schemes in GMPLS Optical Networks

October 1, 2003
Author(s)
Kotikalapudi Sriram, David W. Griffith, San-Nan K. Lee, Nada T. Golmie
In resilient optical networks, there is a tradeoff between the amount of resources allocated for protection versus the probability that a failed working path cannot be covered, known as protection blocking probability. Often the network topology permits
Was this page helpful?