An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Teresa T. Schwarzhoff, James F. Dray Jr., John P. Wack, Eric Dalci, Alan H. Goldfine, Michaela Iorga
This Government Smart Card Interoperability Specification (GSC-IS) provides solutions to a number of the interoperability challenges associated with smart card...
Peter M. Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous...
Curtis H. Parks, Gerard N. Stenbakken, Alexei Nikolaev
Measurement data are collected to characterize a production run of devices that can then be analyzed to identify a reduced set of measurement points. Such...
Stacy S. Vander-Pol, Steven J. Christopher, David G. Roseneau, Paul R. Becker, Russell D. Day, John R. Kucklick, Rebecca S. Pugh, K. S. Simac, G.W. York
This report summarizes work to date on a project for the U.S. Nuclear Regulatory Commission to develop guidelines for the chemical and material assessment of an...
This technical report addresses inter-networked building automation and control systems (BAS or BCS) using the BACnet protocol [ANSI/ASHRAE, 2001]. The report...
Six mattress and foundation designs were subjected to two modes of ignition: the NIST dual gas burners and burning bedclothes. All of the designs represent...
An experimental study of the bench-scale fire performance of 18 commercial polymeric materials was conducted by the National Institute of Standards and...
Charles L. Wilson, Craig I. Watson, Michael D. Garris, R. A. Hicklin
A series of fingerprint matching studies have been conducted on an experimental laboratory system called the Verification Test Bed (VTB). The VTB is a...
Anthony P. Hamins, Michelle K. Donnelly, Erik L. Johnsson, Alexander Maranghides, George W. Mulholland
As part of its Fire Risk Research Program, the NRC (Nuclear Regulatory Commission) and NIST (National Institute of Standards and Technology) are participating...
Wayne Jansen, Serban I. Gavrila, Vladimir Korolev, Richard P. Ayers, Ryan Swanstrom
Adequate user authentication is a persistent problem, particularly with handheld devices, which tend to be highly personal and at the fringes of an organization...
William D. Davis, Thomas G. Cleary, Michelle K. Donnelly, S. D. Hellerman
An algorithm for predicting smoke or carbon monoxide concentration in the ceiling jet in the presence of a smoke layer is developed. The analysis will be...
This technical report addresses inter-networked building automation and control systems (BAS or BCS) using the BACnet protocol [ANSI/ASHRAE, 2001]. The report...
Stephen Knight, Joaquin (. Martinez, Michele L. Buckley
The microelectronics industry supplies vital components to the electronics industry and to the U.S. economy, enabling rapid imporvements in productivity and in...
Utpal Roy, N Pramanik, Sudarsan Rachuri, Ram D. Sriram, Kevin W. Lyons
The objective of this report is to identify representations and issues for the generic assembly information model and its use in a proactive tolerance synthesis...
Anthony P. Hamins, Alexander Maranghides, George W. Mulholland
A series of experiments were conducted in order to determine the global combustion behavior of a number of liquid fuels burning in a 1 MW to 3 MW spray fire in...
Anthony P. Hamins, Alexander Maranghides, Erik L. Johnsson, Michelle K. Donnelly, Jiann C. Yang, George W. Mulholland
As part of its Fire Risk Research Program, the NRC (Nuclear regulatory Commission) and NIST (National Institute of Standards and Technology) are participating...
This document contains the descriptions, algorithms, user information and listings of the parallel Fortran90/MPI versions of the suite of programs found in...
Total variation (TV) image deblurring is a PDE-based technique that preserves edges, but often eliminates vital small-scale information or texture. This...
The report constitutes a survey of work directed towards the emergence of next-generation product development tools, specifically in the area of design-analysis...
P J. Deutsch, Diane Cunningham, L A. Greenhouse, Susan L. Makar, W F. Overman, Susan A. Sanders, Barbara P. Silcox
In 2002, the NIST Research Library of the Information Services Division, Technology Services, benchmarked itself against other science and technology libraries...
This document describes accreditation requirements for laboratories operating in the Construction Materials Testing (CMT) field. It was prepared by the...
This paper presents information gathered during a series of site visits conducted by National Institute of Standards and Technology (NIST) staff between...
Steven J. Fenves, Young Choi, Balan Gurumoorthy, Greg Mocko, Ram D. Sriram
In this report, we review current engineering practices and the research literature in the area of design - analysis integration in the product development...
This book describes the research programs, activities, and recent accomplishments of the Electricity Division organized by research project. After the project...
This document brings together the fundamental contents of application protocols (AP) developed by the Initial Graphics Exchange Specification (IGES)...
Representatives of the Nuclear Utilities Industry and the laboratory accreditation community met to discuss Nuclear Regulatory Commission (NRC) recognition of...
D W. Stroup, Daniel M. Madrzykowski, William D. Walton, W H. Twilley
Two fire tests were conducted in a warehouse located in Phoenix, Arizona to develop data for evaluation of a methodology for predicting structural collapse. A...
This report introduces technology adoption indicators (TAIs) that can be used to assess whether particular industries are likely to adopt new technologies. The...
Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. The...