An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
David E. Cypher, Dongjin Lee, M Martin-Villalba, C A. Prins, David H. Su
This paper presents an effort to use formal tools to model, validate,and generate test suites for the ATM network routing protocol calledPrivate Network-Network
G Kim, C L. Jackson, V Balsamo, M Libera, R Stadler, Charles C. Han
The morphological behavior of (PS)0.35(PB)0.15(PCL)0.5 semicrystalline block copolymers as a function of annealing conditions are discussed. For this study, the
This work presents calculations of the optical absorption spectra of semiconductors and insulators. The background and underlying physics are discussed, and the
Jay H. Hendricks, M I. Aquino-Class, Michael R. Zachariah
In this paper, we present a process which has the benefits of operating at lower temperatures than conventional CVD, that uses low cost precursors, and produces
Our laboratory has developed a highly precise, automated apparatus for measuring sound speeds, viscosity, and thermal conductivity in hazardous and/or corrosive
The development of the NIST Super Shaker permits calibration of accelerometers by two independent and absolute methods on the same shaker. Minimizing the
We apply a model checker to the problem of test generation using a new application of mutation analysis. We define syntactic operators, each of which produces a
John A. Tesk, C E. Johnson, Drago Skrtic, Ming S. Tung, Stephen M. Hsu
Amorphous metal alloys have properties and structures unlike those of theircrystalline counterparts. For example, a multiphase crystalline structure may exhibit
John Barkley, David R. Kuhn, Lynne S. Rosenthal, Mark Skall, Anthony V. Cincotta
Establishing and maintaining a presence on the World Wide Web (Web), once a sideline for U.S. industry, has become a key strategic aspect of marketing and sales
Artur A. Chernovsky, William L. Grosshandler, Thomas G. Cleary, Michael D. Anderson
The performance of a fire detection system is determined as much by its ability to recognize correctly the non-fire state as to sense the presence of a real
Role based access control (RBAC) is attracting increasing attention as a security mechanism for both commercial and many military systems. This paper shows how
V D. Kleiman, Edwin J. Heilweil, D McMorrow, Joseph S. Melinger
Chirped ultrafast laser pulses in the mid-Infrared and visible are used to experimentally control population transfer in condensed-phase systems and molecules.
Future broadband communication networks are intended to accommodate dissimilar traffic classes with different negotiated qualities of service. A family of
Role Based Access Control (RBAC) refers to a class of security mechanisms that mediate access to resources through organizational identities called roles. A
This paper analyzes and compares role-based access control (RBAC) features supported in the most recent versions of three popular commercial database management
This work describes a methodology for designing and evaluating web sites and web applications. Our methodology is based on the premise that tools and techniques
Two defect types have been identified in the buried oxide of low dose SIMOX: conductive silicon paths through the buried oxide (pipes) and silicon precipitates
Role Based Access Control (RBAC), an access control mechanism, reduces the cost of administering access control policies as well as making the process less
Buildings significantly alter the environment. According to Worldwatch Institute (1), building construction consumes 40 percent of the raw stone, gravel, and
The rapid growth of computer-based systems such as simulation models, databases, and artificial intelligence decision-support systems, coupled with developments
Over time, in order to improve functionality or efficiency, new features have been added to the basic framework of public key infrastructures (PKIs). While
This paper describes the concept and design of an Authentication Proxy, a network service that bridges the security environments (specifically authentication)
The NIST WebBook is an Internet site that provides access to physical property data from the NIST Standard Reference Data Program. It was designed as a general