Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Conferences

A comprehensive analysis of the spectrum of Fe II

Author(s)
Gillian Nave
A new analysis of the laboratory spectrum of Fe II is described. The aim is to produce a comprehensive list of Fe II lines, based on high-resolution grating and...

Atomic Spectroscopic Databases at NIST

Author(s)
Joseph Reader, Alexander Kramida, Yuri Ralchenko
We present recent work at NIST to develop and maintain databases for spectra, transition probabilities, and energy levels of atoms that are astrophysically...

SIM time scales

Author(s)
Michael A. Lombardi, J. Mauricio Lopez-Romero, Nelida Diaz-Munoz
This paper presents an analysis of the performance of some of the time scales generated in the Sistema Interamericano de Metrologia (SIM) region. We emphasize...

Vision Guided Multi-Probe Assembly of 3D Microstructures

Author(s)
John D. Wason, John T. Wen, Young M. Choi, Jason J. Gorman, Nicholas Dagalakis
This paper describes the operator assisted automated assembly of a 3-legged spatial platform by using a vision guided multi-probe assembly process. This is the...

Properties for Accurate Gas Flow Measurements

Author(s)
John D. Wright
Accurate gas properties are needed to take full advantage of the low uncertainties provided by NIST’s Gas Flow Calibration Services. If a flowmeter user and...

Link Relationship Measurements in Load-Modulated UHF RFID

Author(s)
Daniel G. Kuester, David R. Novotny, Jeffrey R. Guerrieri
This paper investigates the relative roles of the forward and reverse links in determining the operational range of passive UHF RFID systems. The relative...

An Inconvenient Truth About Tunneled Authentications

Author(s)
Katrin Hoeper, Lidong Chen
In recent years, it has been a common practice to execute client authentications for network access inside a protective tunnel. Man-in-the-middle (MitM) attacks...

Modeling Smart Grid Applications with Co-Simulation

Author(s)
Timothy Godfrey, Mullen Sara, Roger C. Dugan, Craig Rodine, David W. Griffith, Nada T. Golmie
Analysis of complex Smart Grid applications require simulation of communications networks and the power system. Analytical models of the communication systems...

Nanoslinky: DNA Entropophoresis Down a Nanofluidic Staircase

Author(s)
Elizabeth A. Strychalski, Laurie E. Locascio, Samuel M. Stavis, Michael Gaitan
Almost all nanofluidic devices for biopolymer analysis have been limited by one or two confining structural dimen-sions or the application of external forces...

On the privacy threats of electronic poll books

Author(s)
Stefan Popoveniuc, John M. Kelsey
Electronic poll books make the process of verifying that a voter is authorized to vote and issuing her a ballot faster and more convenient. However, they also...

A Methodology to Evaluate Wireless Technologies for the Smart Grid

Author(s)
Michael R. Souryal, Camillo A. Gentile, David W. Griffith, David E. Cypher, Nada T. Golmie
This paper presents a methodology for assessing the suitability of various wireless technologies for meeting the communication requirements of Smart Grid...
Was this page helpful?