Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 31 - 40 of 2147995 documents for pjka na smnku znojmo 40000 Navtivte web na WWWLOAN24HXYZ pujky pred vplatou 1000 rizikov pjky pjky pro nezamstnan bez pjmu konsolidace nebankovnich pujcek bez zastavy pujcky do 6000 kc do vyplaty online pujcky ihned Hrdek nad Nisou online pujcka ihned na cet Uhersk Brod pujcka online ihned Vysok Mto pujcky a uvery nezamestnane bruntal pujky bez pjmu ostrava pujcka ihned do 2tisic ihned rychla pujcka online Tnit nad Orlic pujcka online ihned bez registru Tel
Relevance
Date
  1. Search Results

    https://webbook.nist.gov/cgi/cbook.cgi?Author=Tarhanen%2C+J.&Mask=2000&Units=CAL
    Search Results Search criteria: Author: Tarhanen, J. You may also wish to search for items by Tarhanen. 3 matching references were found. Humppi, T.; Laitinen, R.; Kantolahti, E.; Knuutinen, J.; Paasivirta, J.; Tarhanen, J.; Lahtipera, M.; Virkki, L., Gas Chromatographic-Mass Spectrometric Analysis of Chlorinated Phenoxyphenols in the Technical Chlorophenol Formulation Ky-5, J. Chromatogr., 1984, 291, 135-144. [doi:10.1016/S0021-9673(00)95014-3] [all data] Kainulainen, P.; Tarhanen, J.; Tiilikkala, K.; Holopainen, J.K., Foliar and emission composition of essential oil in two carrot varieties, J. Agric. Food Chem., 1998, 46, 9, 3780-3784. [doi:10.1021/jf980108m] [all data] Knuutinen, J.S.; Tarhanen, J.T., Limited Methylation of CHlorinated 1,2-Benzenediols to Chlorinated 2-Methoxyphenols, J. Chem. Eng. Data, 1981, 26, 347. [all data]...
  2. https://pages.nist.gov/scatmech/code/jmatrix.cpp

    https://pages.nist.gov/SCATMECH/code/jmatrix.cpp
    https://pages.nist.gov/SCATMECH/code/jmatrix.cpp //****************************************************************************** //** SCATMECH: Polarized Light Scattering C++ Class Library //** //** File: jmatrix.cpp //** //** Thomas A. Germer //** Sensor Science Division, National Institute of Standards and Technology //** 100 Bureau Dr. Stop 8443; Gaithersburg, MD 20899-8443 //** Phone: (301) 975-2876 //** Email: thomas.germer@nist.gov //** //****************************************************************************** #include   "scatmech.h" #include   "mueller.h" #include   "vector3d.h" using   namespace  std ; namespace  SCATMECH  {      //******************************************************************************      //**      //...
  3. Community College of the Northwest Case Study

    https://www.nist.gov/system/files/documents/2021/07/15/2021-community-college-northwest-case-study.pdf
    2021 education Community College of the Northwest Case Study www.nist.gov/baldrige Baldrige Performance Excellence Program National Institute of Standards and Technology (NIST) • United States Department of Commerce July 2021 To order copies of this publication or obtain other Baldrige Program products and services, contact Baldrige Performance Excellence Program Administration Building, Room A600, 100 Bureau Drive, Stop 1020, Gaithersburg, MD 20899-1020 www.nist.gov/baldrige | 301.975.2036 | baldrige@nist.gov The Baldrige Program welcomes your comments on the case study and other Baldrige products and services. Please direct your comments to the address above. The Community College of the Northwest Case Study is a fictitious Baldrige Award application prepared for use in the 2021 Malcolm Baldrige National Quality Award Examiner Preparation Course. The fictitious case study orga...
  4. Combinatorial Testing Presentation May 2010

    https://csrc.nist.gov/CSRC/media/Presentations/Combinatorial-Testing-Presentation-May-2010/images-media/aberdeen.pdf
    Combinatorial Testing Rick Kuhn (NIST) Raghu Kacker (NIST) Sreedevi Sampath (UMBC) Aberdeen Proving Grounds Tutorial May 17, 2010 What is NIST and why are we doing this? • A US Government agency • The nation’s measurement and testing laboratory – 3,000 scientists, engineers, and support staff including 3 Nobel laureates Analysis of engineering failures, including buildings, materials, and software. This work applies knowledge gained to improve testing. Research in physics, chemistry, materials, manufacturing, computer science Tutorial Overview 1. What is combinatorial testing? 2. Why are we doing this? 3. How is it used and how long does it take? 4. What tools are available? 5. What's next? What is combinatorial testing? THIS PART IS BASED ON PROF ADITYA P. MATHUR’S SLIDES BASED ON HIS BOOK Foundations of Software Tes...
  5. https://www.nist.gov/system/files/documents/2018/04/25/swgmdi_workplace_locations_of_board_certified_forensic_pathologists_in_the_us_who_perform_medicolegal_autopsies.pdf

    https://www.nist.gov/system/files/documents/2018/04/25/swgmdi_workplace_locations_of_board_certified_forensic_pathologists_in_the_us_who_perform_medicolegal_autopsies.pdf
    SWGMDI’s Infrastructure Committee: Board Certified Forensic Pathologist Workplace Locations Report Published December 12, 2013 Page 1 A Report Prepared by the System Infrastructure Committee of the Scientific Working Group for Medicolegal Death Investigation Workplace Locations of Board Certified Forensic Pathologists in the United States who Perform Medicolegal Autopsies for Medical Examiner/Coroner Systems: 2012 Executive Summary In follow up to the previous reports and recommendations, the Scientific Working Group for Medicolegal Death Investigation (SWGMDI) concluded it would be helpful to document the workplace locations of board certified forensic pathologists who conduct or oversee medicolegal autopsies for medical examiner or coroner systems in the United States. This documentation is done in two ways. First, tables and dot maps of work locations ar...
  6. Elephant Changelog

    https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/changelog-files/elephant-changelog.pdf
    Elephant v1.1 Submitters: Tim Beyne KU Leuven and imec-COSIC, Belgium Yu Long Chen KU Leuven and imec-COSIC, Belgium Christoph Dobraunig Radboud University, The Netherlands Bart Mennink Radboud University, The Netherlands Corresponding submitter: Bart Mennink elephant@cs.ru.nl +31 24 3652672 Radboud University, The Netherlands Toernooiveld 212 6525 EC Nijmegen The Netherlands February 25 :::::::::: September :::: 27, 2019 1 Introduction We introduce the Elephant authenticated encryption scheme. The mode of Elephant is a nonce-based encrypt-then-MAC construction, where encryption is performed using counter mode and message authentication using a variant of the Wegman-Carter-Shoup [10,82,92] MAC function. Both modes internally use a cryptographic permutation masked using LFSRs, akin to the masked Even- Mansour construction of Granger et al. [49]. The mode is permutation-based and only evalu...
  7. Elephant

    https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/elephant-spec.pdf
    Elephant v1 Submitters: Tim Beyne KU Leuven and imec-COSIC, Belgium Yu Long Chen KU Leuven and imec-COSIC, Belgium Christoph Dobraunig Radboud University, The Netherlands Bart Mennink Radboud University, The Netherlands Corresponding submitter: Bart Mennink elephant@cs.ru.nl +31 24 3652672 Radboud University, The Netherlands Toernooiveld 212 6525 EC Nijmegen The Netherlands February 25, 2019 1 Introduction We introduce the Elephant authenticated encryption scheme. The mode of Elephant is a nonce-based encrypt-then-MAC construction, where encryption is performed using counter mode and message authentication using a variant of the Wegman-Carter-Shoup [10,82,92] MAC function. Both modes internally use a cryptographic permutation masked using LFSRs, akin to the masked Even- Mansour construction of Granger et al. [49]. The mode is permutation-based and only evaluates this permutation in the for...
  8. Elephant Specification

    https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/elephant-spec-round2.pdf
    Elephant v1.1 Submitters: Tim Beyne KU Leuven and imec-COSIC, Belgium Yu Long Chen KU Leuven and imec-COSIC, Belgium Christoph Dobraunig Radboud University, The Netherlands Bart Mennink Radboud University, The Netherlands Corresponding submitter: Bart Mennink elephant@cs.ru.nl +31 24 3652672 Radboud University, The Netherlands Toernooiveld 212 6525 EC Nijmegen The Netherlands September 27, 2019 1 Introduction We introduce the Elephant authenticated encryption scheme. The mode of Elephant is a nonce-based encrypt-then-MAC construction, where encryption is performed using counter mode and message authentication using a variant of the Wegman-Carter-Shoup [10,82,92] MAC function. Both modes internally use a cryptographic permutation masked using LFSRs, akin to the masked Even- Mansour construction of Granger et al. [49]. The mode is permutation-based and only evaluates this permutation in the ...
Showing results 31 - 40 of 2147995 documents for pjka na smnku znojmo 40000 Navtivte web na WWWLOAN24HXYZ pujky pred vplatou 1000 rizikov pjky pjky pro nezamstnan bez pjmu konsolidace nebankovnich pujcek bez zastavy pujcky do 6000 kc do vyplaty online pujcky ihned Hrdek nad Nisou online pujcka ihned na cet Uhersk Brod pujcka online ihned Vysok Mto pujcky a uvery nezamestnane bruntal pujky bez pjmu ostrava pujcka ihned do 2tisic ihned rychla pujcka online Tnit nad Orlic pujcka online ihned bez registru Tel