An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
For plate-like sample geometries, a line-focus transducer can be used to detect back-reflected echoes through the thickness of the sample. The interaction of...
The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through...
David E. Cypher, Dongjin Lee, M Martin-Villalba, C A. Prins, David H. Su
This paper presents an effort to use formal tools to model, validate,and generate test suites for the ATM network routing protocol calledPrivate Network-Network...
G Kim, C L. Jackson, V Balsamo, M Libera, R Stadler, Charles C. Han
The morphological behavior of (PS)0.35(PB)0.15(PCL)0.5 semicrystalline block copolymers as a function of annealing conditions are discussed. For this study, the...
This work presents calculations of the optical absorption spectra of semiconductors and insulators. The background and underlying physics are discussed, and the...
Jay H. Hendricks, M I. Aquino-Class, Michael R. Zachariah
In this paper, we present a process which has the benefits of operating at lower temperatures than conventional CVD, that uses low cost precursors, and produces...
Our laboratory has developed a highly precise, automated apparatus for measuring sound speeds, viscosity, and thermal conductivity in hazardous and/or corrosive...
We apply a model checker to the problem of test generation using a new application of mutation analysis. We define syntactic operators, each of which produces a...
John A. Tesk, C E. Johnson, Drago Skrtic, Ming S. Tung, Stephen M. Hsu
Amorphous metal alloys have properties and structures unlike those of theircrystalline counterparts. For example, a multiphase crystalline structure may exhibit...
John Barkley, David R. Kuhn, Lynne S. Rosenthal, Mark Skall, Anthony V. Cincotta
Establishing and maintaining a presence on the World Wide Web (Web), once a sideline for U.S. industry, has become a key strategic aspect of marketing and sales...
Artur A. Chernovsky, William L. Grosshandler, Thomas G. Cleary, Michael D. Anderson
The performance of a fire detection system is determined as much by its ability to recognize correctly the non-fire state as to sense the presence of a real...
Role based access control (RBAC) is attracting increasing attention as a security mechanism for both commercial and many military systems. This paper shows how...
V D. Kleiman, Edwin J. Heilweil, D McMorrow, Joseph S. Melinger
Chirped ultrafast laser pulses in the mid-Infrared and visible are used to experimentally control population transfer in condensed-phase systems and molecules.
Future broadband communication networks are intended to accommodate dissimilar traffic classes with different negotiated qualities of service. A family of...
Role Based Access Control (RBAC) refers to a class of security mechanisms that mediate access to resources through organizational identities called roles. A...
This paper analyzes and compares role-based access control (RBAC) features supported in the most recent versions of three popular commercial database management...
This work describes a methodology for designing and evaluating web sites and web applications. Our methodology is based on the premise that tools and techniques...
Two defect types have been identified in the buried oxide of low dose SIMOX: conductive silicon paths through the buried oxide (pipes) and silicon precipitates...
Role Based Access Control (RBAC), an access control mechanism, reduces the cost of administering access control policies as well as making the process less...
Buildings significantly alter the environment. According to Worldwatch Institute (1), building construction consumes 40 percent of the raw stone, gravel, and...
The rapid growth of computer-based systems such as simulation models, databases, and artificial intelligence decision-support systems, coupled with developments...
Abstract: This paper assesses certain systematic high frequency measurement errors inherent in the procedures described in the JEDEC 123 Guideline for...
Over time, in order to improve functionality or efficiency, new features have been added to the basic framework of public key infrastructures (PKIs). While...
This paper describes the concept and design of an Authentication Proxy, a network service that bridges the security environments (specifically authentication)...
The NIST WebBook is an Internet site that provides access to physical property data from the NIST Standard Reference Data Program. It was designed as a general...