An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Richard D. Peacock, Kevin B. McGrattan, Bryan W. Klein, Walter W. Jones, Paul A. Reneke
This supplement to the CFAST Technical Reference Guide provides details of the software development process for CFAST and accompanying validation for the model
This report summarizes the results of NIST research on the use of elevators during fire emergencies conducted as part of a cooperative effort funded in part by
Richard D. Peacock, Paul A. Reneke, Glenn P. Forney, Walter W. Jones
CFAST is a two-zone fire model capable of predicting the environment in a multi-compartment structure subjected to a fire. It calculates the time evolving
Walter W. Jones, Richard Peacock, Glenn P. Forney, Paul A. Reneke
CFAST is a two-zone fire model capable of predicting the environment in a multi-compartment structure subjected to a fire. It calculates the time evolving
Walter W. Jones, Richard D. Peacock, Glenn P. Forney, Paul A. Reneke
CFAST is a two-zone fire model used to calculate the evolving distribution of smoke, fire gases and temperature throughout compartments of a constructed
Erica D. Kuligowski, Richard D. Peacock, Jason D. Averill, Richard W. Bukowski
This workshop provided a forum to discuss research and best practices regarding mass notification message creation and dissemination. The goal of the workshop
This document and NIST Special Publication 800-50, Building an Information Technology Security Awareness and Training Program describe the following key
NIST-approved digital signature algorithms require the use of an approved cryptographic hash function in the generation and verification of signatures. Approved
The 93rd Annual Meeting of the National Conference on Weights and Measures (NCWM) was held in Burlington, Vermont, July 13 - 17, 2008. The theme of the
The 2008 Performance Metrics for Intelligent Systems (PerMIS'08) Workshop is the eighth in the series that started in 2000 targeted at defining measures and
Jeff C. Gust, Robert M. Graham, Michael A. Lombardi
Stopwatch and timer calibrations are perhaps the most common calibrations performed in the field of time and frequency metrology. Hundreds of United States
Crystallographic texture has for many years been the fiefdom of metallurgists and geologists, who have developed elegant methodologies for the analysis of
Christina D. Cross, Dean C. Ripple, Gregory F. Strouse
Liquid-in-glass thermometers are pervasive in use throughout industry and provide a convenient method for measuring temperature over for a broad range of
Ian M. Soboroff, Peter Bailey, Nick Craswell, Arjen de Vries
The goal of the enterprise track is to conduct experiments with enterprise data that reflect the experiences of users in real organizations. This year, the
The goal of the Blog track is to explore the information seeking behaviour in the blogosphere. It aims to create the required in- frastructure to facilitate
Christopher W. Meyer, Joseph T. Hodges, Peter H. Huang, W Wyatt Miller, Dean C. Ripple, Gregory E. Scace
We describe here the calibration of customer hygrometers using a new humidity generator that has been commissioned at the National Institute of Standards and
This report constitutes the proceedings of the 2007 Text REtrieval Conference, TREC 2007, held in Gaithersburg, Maryland November 6-9, 2007. TREC 2007 is the
The TREC 2007 question answering (QA) track contained two tasks: the main task consisting of series of factoid, list, and ``Other'' questions organized around a
William I. MacGregor, Ketan L. Mehta, David A. Cooper, Karen A. Scarfone
This document provides best practice guidelines for integrating the PIV Card with the physical access control systems (PACS) that authenticate the cardholders
This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment
The TREC 2006 question answering track contained two tasks: a main task and a complex, interactive question answering (ciQA) task. As in 2005, the main task
Karen A. Scarfone, Murugiah P. Souppaya, Paul M. Johnson
This publication assists IT professionals in securing Windows XP workstations, mobile computers, and computers used by telecommuters within various environments
Matthew A. Scholl, Kevin Stine, Joan Hash, Pauline Bowen, L A. Johnson, Carla Dancy Smith, Daniel Steinberg
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Minsung Kim, Seok H. Yoon, William V. Payne, Piotr A. Domanski
Performance characteristics of a R410A residential unitary split heat pump equipped with a thermostatic expansion valve (TXV) were investigated in the cooling
The primary goal of the National Working Group is to develop recommendations (e.g., good weighing practices; new methods of sale of commodities requirements, or
The purpose of this publication is to present in a convenient form the weights and measures tables most useful for household purposes, together with associated
This publication is designed to assist those who use the NCWM Reports in finding information on specific subjects or Conference presentations. It contains a