NIST logo

Publications Portal

You searched on:
Topic Area: Modeling
Sorted by: title

Displaying records 131 to 140 of 143 records.
Resort by: Date / Title


131. The Date-Time Vocabulary
Topic: Modeling
Published: 7/28/2012
Authors: Mark H Linehan, Edward J Barkmeyer, Stan Hendryx
Abstract: The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911074

132. The OOF Manual: Version 1.0
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 6256
Topic: Modeling
Published: 11/1/1998
Authors: W C Carter, Stephen A Langer, Lin-Sien H Lum
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900862

133. The Solidification of an Ideal Ternary Alloy in a Mushy Layer
Topic: Modeling
Published: 3/24/2010
Authors: Daniel M Anderson, Geoffrey B McFadden, Sam Ray Coriell, Bruce Murray
Abstract: We consider a model for the solidification of an ideal ternary alloy in a mushy layer that incorporates the effects thermal and solutal diffusion, convection and solidification. Our results reveal that although the temperature and solute fields are ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902866

134. The Structure of Optimal and Near Optimal Target Sets in Consensus Models
Series: Special Publication (NIST SP)
Report Number: 500-303
Topic: Modeling
Published: 12/19/2014
Author: Fern Y Hunt
Abstract: We consider the problem of identifying a subset of nodes in a network that will enable the fastest spread of information in a decentralized environment. In a model of communication based on a random walk on an undirected graph, the optimal set ov ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916342

135. Theoretical Analysis and Modeling of Link Adaptation Schemes in Body Area Networks
Topic: Modeling
Published: 11/23/2012
Authors: Wen-Bin Yang, Kamran Sayrafian
Abstract: Considering the medical nature of the information carried in Body Area Networks (BAN), interference from coexisting wireless networks or even other nearby BANs could create serious problems on their operational reliability. As practical implement ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911820

136. Thin Film Dynamics on a Prolate Ellipsoid with Application to the Cornea
Topic: Modeling
Published: 6/9/2011
Authors: Richard J Braun, R. Usha, Geoffrey B McFadden, T. A. Driscoll, L. P. Cook, P. E. King-Smith
Abstract: We study the flow of a thin fluid film on a prolate ellipsoid that is a good approximation to the shape of the human cornea. Two lubrication models for the dynamics of the film are studied in prolate spheroidal coordinates which are appropriate for ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903442

137. Threshold Digraphs
Topic: Modeling
Published: 12/5/2012
Authors: Brian Dale Cloteaux, Michael Drew LaMar, Elizabeth R Moseman, James Shook
Abstract: A digraph whose degree sequences have a unique vertex labeled realization is called threshold. In this paper we present several characterizations of threshold digraphs and show them to be equivalent. One of the characterizations is new, and allow ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912690

138. Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach
Topic: Modeling
Published: 5/25/2012
Authors: Assane Gueye, Vladimir V Marbukh, Jean C Walrand
Abstract: In this paper, we propose a quantification of the vulnerability of a communication network when links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between an at ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910930

139. Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach
Topic: Modeling
Published: 2/13/2012
Authors: Assane Gueye, Vladimir V Marbukh
Abstract: In this paper, we propose a quantification of the vulnerability of a communication network when links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between a net ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910926

140. Transient Convection-Diffusion Modelling of Peak Temperature in Orthogonal Cutting
Topic: Modeling
Published: 8/19/2012
Authors: Timothy J Burns, Steven P Mates, Richard L. Rhorer, Eric Paul Whitenton, Debasis Basak
Abstract: Numerical finite-difference simulations of a two-dimensional transient fast convection-slow diffusion model of the temperature field in orthogonal cutting, due to Tlusty, have been shown to provide better predictions of the peak temperature during or ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910514



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series