NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology

Displaying records 11 to 20 of 988 records.
Resort by: Date / Title


11. SHREC‰14 Track: Large Scale Comprehensive 3D Shape Retrieval
Topic: Information Technology
Published: 6/12/2014
Authors: Afzal A Godil, Chunyuan Li
Abstract: The objective of this track is to evaluate the performance of 3D shape retrieval approaches on a large-sale com- prehensive 3D shape database which contains different types of models, such as generic, articulated, CAD and architecture models. The t ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915676

12. SHREC‰14 Track: Retrieval and classification on Textured 3D Models
Topic: Information Technology
Published: 6/12/2014
Author: Afzal A Godil
Abstract: This contribution reports the results of the SHREC 2014 track: Retrieval and classification on textured 3D models, whose goal is to evaluate the performance of retrieval algorithms when models vary either by geometric shape or texture, or both. The ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915675

13. SHREC‰14 Track: Shape Retrieval of Non-Rigid 3D Human Models
Topic: Information Technology
Published: 6/12/2014
Authors: Afzal A Godil, Chunyuan Li
Abstract: We have created a new benchmarking dataset for testing non-rigid 3D shape retrieval algorithms, one that is much more challenging than existing datasets. Our dataset features exclusively human models, in a variety of body shapes and poses. 3D model ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915674

14. Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach
Series: Special Publication (NIST SP)
Report Number: 800-37rev 1
Topic: Information Technology
Published: 6/10/2014
Author: Ronald S Ross
Abstract: This publication provides guidelines for applying the Risk Management Framework (RMF) to federal information systems. The six-step RMF includes security categorization, security control selection, security control implementation, security control as ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916094

15. ITL Forensic Science Program
Series: ITL Bulletin
Topic: Information Technology
Published: 6/5/2014
Authors: Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Abstract: Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. cri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916160

16. Supplemental Guidance on Ongoing Authorization: Transitioning to Near Real-Time Risk Management
Topic: Information Technology
Published: 6/3/2014
Authors: Kelley L Dempsey, Ronald S Ross, Kevin Mcguire Stine
Abstract: Office of Management and Budget (OMB) Memorandum M-14-03, Enhancing the Security of Federal Information and Information Systems, reminds Federal agencies that, "Our nation's security and economic prosperity depend on ensuring the confidentiality, int ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916095

17. NIST's Role in Improving Critical Infrastructure Cybersecurity: Public/Private Teamwork
Topic: Information Technology
Published: 6/2/2014
Author: William C Barker
Abstract: National security depends on the reliable functioning of critical infrastructures. Security mechanisms and controls for critical infrastructure protection aren‰t useful unless adopted, so NIST seeks, while fostering creation of effective cybersecuri ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916056

18. Overview of the TREC-2012 Microblog Track
Series: OTHER
Topic: Information Technology
Published: 6/2/2014
Authors: Ian M Soboroff, Iadh Ounis, Jimmy Lin, Craig Macdonald
Abstract: The Microblog track examines search tasks and evaluation meth- odologies for information seeking behaviours in microblogging en- vironments such as Twitter. It was first introduced in 2011, address- ing a real-time adhoc search task, whereby the user ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915700

19. Analysis of Protection Options for Virtualized Infrastructures in Infrastructure as a Service Cloud
Topic: Information Technology
Published: 5/29/2014
Author: Ramaswamy Chandramouli
Abstract: Infrastructure as a Service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of resources such as computing (Virtual Machines or VMs), virtual network, storage and utility programs (DBMS). Any larg ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915714

20. Correlation of anomalous write error rate and ferromagnetic resonance spectrum in spin-transfer-torque-magnetic-random-access-memory devices containing in-plane free layers
Topic: Information Technology
Published: 5/28/2014
Authors: Eric R Evarts, Ranko Heindl, William H Rippard, Matthew R Pufall
Abstract: In a small fraction of magnetic-tunnel-junction-based MRAM devices with in-plane free layers, the write error rates (WERs) are higher than expected on the basis of the macrospin or quasi-uniform magnetization reversal models. In devices with increase ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=915190



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series