An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Thomas H. Gnaeupel-Herold, Adam A. Creuziger, Mark A. Iadicola
The effects of crystallographic texture produced by biaxial deformation on the diffraction elastic constants (DEC) are discussed. Predictions of DEC values from...
Determining the absolute antenna efficiency has been a difficult task since the inception of the antenna itself. While there are methods that can measure an...
Through-focus scanning optical microscopy (TSOM) method provides three-dimensional information (i.e. the size, shape and location) about micro- and nanometer...
Deyan Ginev, Heinrich Stammerjohanns, Bruce R. Miller, Michael Kohlhase
The language of the \TeX/\LaTeX} typesetting system has become all-pervasive in scientific publications and has proven its stability, convenience and...
This paper applies methods for analyzing fault hierarchies to the analysis of relationships among vulnerabilities in misconfigured access control rule...
Kuldeep R. Prasad, William M. Pitts, Marco G. Fernandez, Jiann C. Yang
Increase in the number of hydrogen fueled applications in the marketplace will require a better understanding of the potential for fires and explosion...
Jason T. Ryan, Richard G. Southwick, Jason P. Campbell, Kin P. Cheung, Chadwin Young, John S. Suehle
We develop a simple experimental approach to remove bulk trap contributions from charge pumping data collected on devices which suffer from large amounts of...
Gregory T. Linteris, Fumiaki Takahashi, Viswanath R. Katta, Harsha K. Chelliah
Halon 1301 has been banned for most applications but it is still used in come critical applications for which suitable replacements have not yet been found. One...
Erik Lindskog, Linus Lundh, Jonatan K. Berglund, Yung-Tsun Lee, Anders Skoogh, Bjorn Johansson
Effective assessment and communication of environmental footprint is increasingly important to process development and marketing purposes. Traditionally, static...
Jonatan K. Berglund, John L. Michaloski, Swee K. Leong, Guodong Shao, Frank H. Riddick, Jorge Arinez, Stephan Biller
A growing number of manufacturing industries are initiating efforts to address sustainability issues. A study by the National Association of Manufacturers...
We study the problem of reconstructing an unknown matrix M of rank r and dimension d using O(rd poly log d) Pauli measurements. This has applications in quantum...
Relationships between entities in many complex systems, such as the Internet and social networks, have a natural hierarchical organization. Understanding these...
David G. Harris, Francis Sullivan, Isabel M. Beichl
The reliability polynomial of a graph gives the probability that a graph is connected as a function of the probability that each edge is connected. The...
Through-focus scanning optical microscopy (TSOM) is a new metrology method that achieves 3D nanoscale measurement sensitivity using conventional optical...
Randolph E. Elmquist, Felipe Hernandez-Marquez, Mariano Real, Tian T. Shen, David B. Newell, Colin J. Jacob, George R. Jones
The development of large-area graphene has direct application to electrical standards including the quantized Hall resistance because of unique characteristics...
Gregory T. Linteris, Viswanath R. Katta, Fumiaki Takahashi, Harsha K. Chelliah, Oliver Meier
A numerical investigation is performed for understanding the ignition behaviors of CF3Br and R- 125 fire-suppressing agents in propane-air-agent mixtures. Two...
A software for the calculation of diffraction elastic constants (DEC) for materials both with and without preferred orientation was developed. All grain...
Firebrands are a major cause of structural ignition in urban fires in Japan and Wildland-Urban Interface (WUI) fires in the USA, yet little research has been...
Peter Bajcsy, Antoine Vandecreme, Benjamin J. Long, Paul Khouri Saba, Joe Chalfoun, Luigi Marini, Devin Bonnie, Rob Kooper, Michal Ondrejcek, Kenton McHenry
AbstractWe present a framework for the execution and dissemination of customizable content-based file comparison methods. Given digital objects such as files...
A full-scale, proof-of-concept experiment was conducted to investigate firebrand production from a burning structure. In this experiment, NIST researchers were...
The mission of the International Council for Science : Committee on Data for Science and Technology (CODATA ) is to strengthen international science for the...
Efficient deployment strategies are proposed for a mobile sensor network, where the coverage priority of different points in the field is specified by a...
A genetic algorithm has been developed to generate circuit models from calibrated broadband measurements of coaxial and on-wafer devices under test (DUTs). The...
In this paper, we present a multi-gate mesh network architecture that has been developed to ensure high performance and reliability under emergency conditions...
Francine K. Amon, Dennis D. Leber, Nicholas Paulter
We describe a method by which the evaluation and characterization of the performance of an imager can be done objectively and scientifically, that is, without...
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
Much recent research has been devoted to investigating algorithms for allocating virtual machines (VMs) to physical machines (PMs) in infrastructure clouds...
Computer systems often exhibit degraded performance due to resource leakage caused by erroneous programming or malicious attacks, and computers can even crash...