An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This handbook, which can be used as both a tutorial and a reference, describes practical techniques for frequency stability analysis. It covers the definitions
The Optical Technology Division at the National Institute of Standards and Technology (NIST) has developed a new instrument designed to measure the surface
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow
The definitive international reference on the SI is a booklet published by the International Bureau of Weights and Measures (BIPM, Bureau International des
This 2007 edition of SP811 updates International System of Units (SI) usage as implemented in the 8th edition of the SI Brochure, incorporates a significant
The primary goal of the Terabyte Track is to develop an evaluation methodology for terabyte-scale document collections. In addition, we are interested in
S Arepalli, Stephen W. Freiman, Stephanie A. Hooker, Kalman D. Migler
Recommended Practice Guide for Single Wall Carbon Nanotube Characterization consisting of five chapters: Introduction; Thermogravimetric Analysis (TGA) ; Near
Wayne Jansen, Theodore Winograd, Karen A. Scarfone
Active content technologies allow code, in the form of a script, macro, or other kind of portable instruction representation, to execute when the document is
The goal of the enterprise track is to conduct experiments with enterprise data --- intranet pages, email archives, document repositories --- that reflect the
Paul E. Black, Elizabeth N. Fong, Vadim Okun, Romain Gaucher
Software assurance tools are a fundamental resource for providing an assurance argument for today's software applications throughout the software development
NIST Standard Reference materials (SRMs) are used by industry, government and academia to ensure the highest quality measurements. This catalog lists over 1300
This document, SP250-71 (2007), NIST Measurements Services: 0:45 Surface Color, describes the instrumentation, standards, and techniques used to measure the
Chiara F. Ferraris, William F. Guthrie, Max A. Peltz, Robin K. Haupt
The standard reference material (SRM) for fineness of cement, SRM 114, is an integral part of the calibration material routinely used in the cement industry to
This document describes the current Framework models of the overall Autonomy Levels for Unmanned Systems Framework, or ALFUS. ALFUS addresses the autonomy
The 2007 Performance Metrics for Intelligent Systems (PerMIS'07) Workshop is the seventh installment in the series that started in 2000 targeted at defining
The National Institute of Standards and Technology (NIST) is in charge of realizing, maintaining, and disseminating the international Scale of 1990 (ITS-90)
In its decade of systematic research (1997-2006), the NGP revitalized the field of fire suppression science. The NGP arose as a result of a discovery that
The Advanced Fire Service Technologies (AFST) Program objectives are to (*) Provide the science and performance metrics for development and implementation of
Rodney A. Bryant, Kathryn M. Butler, R Vettori, P Greenberg
This workshop brought together members of the fire service, particulate detector manufacturers, public health professionals, airborne particulate researchers
This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for
The 92nd Annual Meeting of the National Conference on Weights and Measures was held in Salt Lake City, Utah, July 8 - 13, 2007. The theme of the conference was
This report provides an overview of the fifteenth Text REtrieval Conference, TREC 2006. TREC 2006 was held at NIST on November 16-19, 2006. The conference was
Karen A. Scarfone, Murugiah P. Souppaya, Matt Sexton
Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause