An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This guide addresses childrens furniture, upholstered furniture and other types of furniture. This document does NOT address mattresses or other home...
The Association of Public-Safety Communications (APCO), in cooperation with FirstNet and the Department of Commerce held a half-day workshop on June 2, 2015...
John L. Michaloski, Thomas D. Hedberg, Hui-Min Huang, Thomas R. Kramer
The goal of this paper is to understand how quality information characterizing the manufactured parts can be reported in a XML standardized format. The Quality...
Anthony P. Hamins, Thomas G. Cleary, Matthew F. Bundy
Elimination of particulate from fire exhaust streams is a common issue for fire labs. Two series of fire experiments were conducted in the National Fire...
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National...
Lidong Chen, Stephen P. Jordan, Yi-Kai Liu, Dustin Moody, Rene C. Peralta, Ray A. Perlner, Daniel C. Smith-Tone
In recent years, there has been a substantial amount of research on quantum computers - machines that exploit quantum mechanical phenomena to solve mathematical...
This guide describes how to use the STEP File Analyzer, a software tool that analyzes and generates a spreadsheet from a STEP (STandard for the Exchange of...
This guide describes how to use Baseline Tailor, a software tool for navigating the United States Government's Cybersecurity Framework and for tailoring the...
Kristen K. Greene, John M. Kelsey, Joshua M. Franklin
Password entry on mobile devices significantly impacts both usability and security, but there is a lack of usable security research in this area, specifically...
David A. Waltermire, Brant Cheikes, Larry Feldman, Gregory A. Witte
This report provides an overview of the capabilities and usage of software identification (SWID) tags as part of a comprehensive software lifecycle. As...
This guide addresses apparel, including childrens apparel, and household textiles. It does not include other textiles, such as sleeping bags, tents, sporting...
Nenad Ivezic, Boonserm Kulvatunyou, Yan Lu, Yunsu Lee, Jaehun Lee, Albert W. Jones, Simon P. Frechette
This report summarizes the results from the OAGi/NIST Workshop on Open Cloud Architecture for Smart Manufacturing, which was held at the National Institute of...
Jacolin A. Murray, Lane C. Sander, Stephen A. Wise, Christopher M. Reddy
Following an open meeting entitled, Hydrocarbon Chemistry QA/QC, at the 2014 Gulf of Mexico Oil Spill and Ecosystem Science Conference in Mobile, Alabama, the...
This document describes the principles, processes and procedures that drive cryptographic standards and guidelines development efforts at the National Institute...
Static analyzers examine the source or executable code of programs to find problems. Many static analyzers use some heuristics or approximations to handle...
Hui-Min Huang, John L. Michaloski, Daniel Campbell, Robert Stone, Thomas Kramer, Curtis Brown, Robert Brown, Gavrai Tatarliev, William Sobel, Lyle Fischer
The "Silos of Quality" in manufacturing can be described as the proliferation of customized quality languages for different stages of production. This quality...
Katerina N. Megas, Philip Lam, Ellen M. Nadeau, Colin Soutar
Pilots are an integral part of the National Strategy for Trusted Identities in Cyberspace (NSTIC), issued by the White House in 2011 to encourage enhanced...
This document, along with a supplementary poster and a set of instructional slides, provides best practice guidelines for the collection of good quality tattoo...
Perception systems are a very important component of automation and robotics. These systems localize objects in its local coordinate frame and the data has to...
The future of manufacturing lies in being able to optimize the use of resources to produce high quality product and adapt quickly to changing conditions. From...
Vijay Srinivasan, Jarek Rossignac, Vadim Shapiro, William Regli
We are witnessing the emergence of a new paradigm in the modeling of material structures. It stems from the digitization of manufacturing and is fueled by...
The first synchrophasor standard was published in 1995. The standard was revised in 2001, 2005, 2011, and 2014 with evolving performance requirements. In 2012...
Melanie Cook, Stephen D. Quinn, David A. Waltermire, Dragos Prisaca
This report defines the requirements and associated test procedures necessary for products or modules to achieve one or more Security Content Automation...
Michael J. Bartock, Jeffrey A. Cichonski, Murugiah P. Souppaya, Paul Fox, Mike Miller, Ryan Holley, Karen Scarfone
This report documents proof of concept research for Derived Personal Identity Verification (PIV) Credentials. Smart card-based PIV Cards cannot be readily used...
David W. Flater, Paul E. Black, Elizabeth N. Fong, Raghu N. Kacker, Vadim Okun, Stephen S. Wood, David R. Kuhn
Much software research and practice involves ostensible measurements of software, yet little progress has been made on an SI-like metrological foundation for...
Infrared thermography is a relatively mature measurement science, however systematic evaluation of measurement uncertainty for multi-point measurement (an...
In mathematics, computer science, and operations research, mathematical optimization is the process of finding best feasible values (oftentimes maxima or minima...
Joseph A. Falco, Jeremy A. Marvel, Richard J. Norcross, Karl Van Wyk
Metrics and test methods are needed to characterize the control capabilities of robots with both intrinsic and extrinsic force sensing. The availability of...