Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 51826 - 51850 of 74189

Document Image Coding for Processing and Retrieval

October 30, 1998
Author(s)
O E. Kia, D Doermann
Document images belong to a unique class of images where the information content is contained in the language represented by a series of symbols on the page rather than in the visual objects themselves. From this, a new image coding strategy can be

Role-Based Access Control for the Web

October 29, 1998
Author(s)
John Barkley, David R. Kuhn, Lynne S. Rosenthal, Mark Skall, Anthony V. Cincotta
Establishing and maintaining a presence on the World Wide Web (Web), once a sideline for U.S. industry, has become a key strategic aspect of marketing and sales. Many companies have demonstrated that a well designed Web site can have a positive effect on

Blind Men and Elephants: Six Approaches to TREC Data

October 28, 1998
Author(s)
D L. Banks, Paul D. Over, Nien F. Zhang
The paper reviews six recent efforts to better understand performance measurements on information retrieval (IR) within the framework of the Text REtrieval Conferences (TREC): analysis of variance, cluster analyses, rank correlations, beadplots

Fire-Emulator Detector-Evaluation

October 28, 1998
Author(s)
Artur A. Chernovsky, William L. Grosshandler, Thomas G. Cleary, Michael D. Anderson
The performance of a fire detection system is determined as much by its ability to recognize correctly the non-fire state as to sense the presence of a real fire. Common fire detectors respond to particulate matter in the form of smoke from a flaming or

1998 TREC-7 Spoken Document Retrieval Track Overview and Results

October 26, 1998
Author(s)
John S. Garofolo, Ellen M. Voorhees, C G. Auzanne, Vincent M. Stanford, B A. Lund
This paper describes the 1998 TREC-7 Spoken Document Retrieval (SDR) Track which implemented an evaluation of retrieval of broadcast news excerpts using a combination of automatic speech recognition and information retrieval technologies. The motivations

Managing Role/Permission Relationships Using Object Access Types

October 23, 1998
Author(s)
John Barkley, Anthony V. Cincotta
The role metaphor in Role Based Access Control (RBAC) is particularly powerful in its ability to express access policy in terms of the way in which administrators view organizations. Much of the effort in providing administrative tools for RBAC has been

Role Based Access Control on MLS Systems Without Kernel Changes

October 23, 1998
Author(s)
David R. Kuhn
Role based access control (RBAC) is attracting increasing attention as a security mechanism for both commercial and many military systems. This paper shows how RBAC can be implemented using the mechanisms available on traditional multi-level security

Software Standards

October 22, 1998
Author(s)
D. Richard Kuhn, Thomas R. Rhodes, Christopher E. Dabrowski
This article describes software standards and their characteristics. Development considerations for programmers using standards are explained as well.

Vibrationally-Resolved Sum-Frequency Generation With Broad Bandwidth Infrared Pulses

October 15, 1998
Author(s)
Lee J. Richter, T Petralli-Mallow, John C. Stephenson
We present a novel procedure for vibrationally-resolved sum-frequency generation (SFG) in which a broad-bandwidth IR pulse is mixed with a narrow-bandwidth visible pulse. The resultant SFG spectrum is dispersed with a spectrograph and detected in parallel

A Wavelength Availability Restriction Protocol for Improved WDM Network Access

October 13, 1998
Author(s)
M R. Frey, T D. Ndousse, David H. Su
Future broadband communication networks are intended to accommodate dissimilar traffic classes with different negotiated qualities of service. A family of network access protocols is introduced whose members artificially restrict the number of calls from

Microwave Power Handling in Engineered Yba 2 Cu 3 O^d6-d Grain Boundaries

October 12, 1998
Author(s)
Y. M. Habib, D. E. Oates, G. Dresselhaus, M. Dresselhaus, Leila R. Vale, Ronald H. Ono
Microwave-frequency (rf) power-dependence measurements performed on thin-film Yba 2Cu 3O^d7-δ grain boundaries engineered on sapphire bicrystal substrates with misorientation angles of θ=20, 50, 100, and 240 are presented. The data are compared to

Inheritance Properties of Role Hierarchies

October 9, 1998
Author(s)
Wayne Jansen
Role Based Access Control (RBAC) refers to a class of security mechanisms that mediate access to resources through organizational identities called roles. A number of models have been published that formally describe the basic properties of RBAC. One
Displaying 51826 - 51850 of 74189
Was this page helpful?