An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Ward L. Johnson, Sudook A. Kim, Zhandos Utegulov, B. T. Draine
Electric-field distributions in two-dimensional arrays of gold nanodisks on Si3N4 membranes are modeled, using the discrete-dipole approximation, as a function
One of the holy grail questions in computer security is how secure are my organization systems? This paper describes our new approach to answering this question
Steven D. Hudson, Jai A. Pathak, Jeffrey D. Martin
The kinetics of mass transfer from one phase to another is monitored in flow. The time-dependent interfacial tension between water and oil (determined from drop
A new self-excited micro-oscillator is proposed as a velocity reference that could aid the dissemination of nanonewton-level forces that are traceable to the
Five manganin alloy Thomas-type 1 Ohm resistors serve as primary working standards at the National Institute of Standards and Technology (NIST) in the precision
A direct Josephson Voltage Standard (JVS) comparison between NIST and Lockheed Martin Mission Services (LMMS) is carried out in March 2008 by using the NIST
Kotikalapudi Sriram, Young-Tak Kim, Douglas C. Montgomery
In this paper, we present a discussion of some architectural ideas pertaining to the mapping distribution protocol. The efficiency of this protocol in terms of
Roni Reuven, Christopher N. McCowan, Elizabeth S. Drexler, Avigdor Shtechman, Philippe P. Darcis, John M. Treinen, R. Smith, J. Merritt, Thomas A. Siewert, Joseph D. McColskey
The toughness and plasticity of steel generally decreases with increasing testing rate. The crack tip opening angle (CTOA) was measured on two types of
Dean G. Jarrett, Marlin E. Kraft, Isabel Castro, Brett Degler, Mark Evans
The Metrology of the Ohm Project in the Quantum Electrical Metrology Division (QEMD) at the National Institute of Standards and Technology (NIST) routinely
Christopher W. Meyer, W Wyatt Miller, Dean C. Ripple, Gregory E. Scace
A new humidity generator has been constructed at the National Institute of Standards and Technology. Once fully operational, the NIST Hybrid Humidity Generator
Avigdor Shtechman, Christopher N. McCowan, Roni Reuven, Elizabeth S. Drexler, Philippe P. Darcis, John M. Treinen, R. Smith, J. Merritt, Thomas A. Siewert, Joseph D. McColskey
When a crack initiates and propagates in a pressurized pipe the only thing that might stop this high-velocity event is the release of internal pressure
This paper reports on the design and implementation of thin film multilayer dielectric reflectors on the sidewalls of micromachined reflector cells. Due to
Qiliang Li, Xiaoxiao Zhu, Yang Yang, D. E. Ioannou, Hao Xiong, John S. Suehle, Curt A. Richter
We report the fabrication and characterization of double-gated Si nanowire field effect transistors with excellent current-voltage characteristics, low
We investigate the behavior of a distributed server loss network with mobile users.While the Markov model provides an accurate ¿microscopic¿ model of the
Kenneth G. Kroenlein, Ralf Loewner, Willa Wang, Vladimir Diky, Thomas Smith, Chris D. Muzny, Robert D. Chirico, Andrei F. Kazakov, E. D. Sloan, Michael D. Frenkel
Gas Hydrates Markup Language (GHML) has been under development since 2003 by CODATA Task Group Data for Natural Gas Hydrates as an international standard for
Jeffrey T. Fong, James J. Filliben, Nathanael A. Heckert, Roland deWit, Barry Bernstein
To advance the state of the art of engineering design, we introduce a new concept on the "robustness" of a structure by measuring its ability to sustain a
Jeffrey T. Fong, Owen F. Hedden, James J. Filliben, Nathanael A. Heckert
Recent advances in computer technology, intemet communication networks, and fmite element modeling and analysis capability have made it feasible for engineers
Charles G. Interrante, Jeffrey Fong, James J. Filliben, N. Alan Heckert
Scatter in laboratory data with duplicates on Charpy impact tests is analyzed by identifying several sources of variability such as temperature, manganese
This paper presents an evaluation of the failure probability and cost of high energy piping (HEP) failures. Using a conventional definition of risk as the
Phone managers are non-forensic tools sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available for
Kar T. Tan, Christopher C. White, Cyril Clerici, Donald L. Hunston, Bryan D. Vogt, Sushil K. Satija, Joshua E. Goldman, Kristen L. Steffens
Studies have show that certain adhesive joints exhibit a dramatic loss of strength when exposed to humidities above a certain critical value. Although much is
Adriaan C. Carter, Raju V. Datla, Timothy Jung, Solomon Woods
The Low Background Infrared (LBIR) facility at the National Institute of Standards and Technology (NIST) is responsible for absolute IR radiometric calibrations
Ian M. Soboroff, Peter Bailey, Nick Craswell, Alan Smeaton, Emine Yilmaz, Paul Thomas
We investigate to what extent people making relevance judgments for a reusable IR test collection are exchangeable. We consider three classes of judge: gold
Ian M. Soboroff, Craig Macdonald, Ben He, Iadh Ounis
In opinion-finding, the retrieval system is tasked with re- trieving not just relevant documents, but which also express an opinion towards the query target
Web services-based computing is currently an important driver for the software industry. While several standards bodies (such as W3C and OASIS) are laying the
In this paper, we describe the mobile robot and sensor research and development toward assistive devices ongoing at the National Institute of Standards and
Gavin W. O\'Brien, Robert D. Snelick, Lynne S. Rosenthal
The discipline of software engineering establishes a set of principles for designing and developing software. Organizations have applied these principles to
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia
To protect critical resources in today's networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine
We introduce an algorithm for maximizing utility through congestion control and random allocation of routes to users. The allocation is defined by a probability