Tag: Computer Technology

IEEE Recommended Practice for Verification, Validation, and Accreditation of a Federation – an Overlay to the High Level Architecture Federation Development and Execution Process

This recommended practice defines the processes and procedures that should be followed to implement Verification, Validation, and Accreditation (VV&A) for federations being developed using the High Level Architecture (HLA) Federation…

ISO/IEC/IEEE International Standard – Systems and Software Engineering – Life Cycle Processes – Risk Management

A process for the management of risk in the life cycle is defined. It can be added to the existing set of software life cycle processes defined by the ISO/IEC…

IEEE Standard for a High Performance Serial Bus – Amendment 3

Supplemental Information for a high-speed serial bus that integrates well with most IEEE standard 32-bit and 64-bit parallel buses is specified. It is intended to extend the usefulness of a…

IEEE Standard for Test Methods for the Characterization of Organic Transistors and Materials

This standard describes a method for characterizing organic electronic devices, including measurement techniques, methods of reporting data, and the testing conditions during characterization. Adopted by IEC as IEC 62860 Edition…

IEEE Standard for Learning Technology-Data Model for Reusable Competency Definitions

This Standard defines a data model for describing, referencing, and sharing competency definitions, primarily in the context of online and distributed learning. This Standard provides a way to represent formally…

IEEE Standard for Information Technology – Portable Operating System Interface (POSIX(™))

This standard is simultaneously ISO/IEC 9945, IEEE Std 1003.1, and forms the core of the Single Unix Specification, Version 3. This 2004 edition includes IEEE Std 1003.1-2001/Cor 1-2002 and IEEE…

IEEE Standard for System and Software Verification and Validation

Verification and validation (V&V) processes are used to determine whether the development products of a given activity conform to the requirements of that activity and whether the product satisfies its…

IEEE Recommended Practice for Local and Metropolitan Area Networks Coexistence of Fixed Broadband Wireless Access Systems

This recommended practice provides recommendations for the design and coordinated deployment of fixed broadband wireless access systems in order to control interference and facilitate coexistence. It analyzes appropriate coexistence scenarios…

IEEE Standard for Wide-Block Encryption for Shared Storage Media

EME2-AES and XCB-AES wide-block encryption with associated data (EAD) modes of the NIST AES block cipher, providing usage guidelines and test vectors, are described. A wide-block encryption algorithm behaves as…
Subscribe to our Newsletter

Sign up for our monthly newsletter to learn about new developments, including resources, insights and more.