Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Conferences

Reproducibility of Liquid Micro-Flow Measurements

Author(s)
John D. Wright, James W. Schmidt
New applications in biology, medicine, and manufacturing require reliable measurements of liquid flows smaller than 100 υL/min. NIST addressed this requirement

FEA solver integration framework

Author(s)
Conrad E. Bock, Jerome Szarazi
Integrating finite element analysis (FEA) with systems engineering (SE) would improve traceability, consistency, and interoperability between SE and FEA

Manipulation Data Collection and Annotation Tool for Media Forensics

Author(s)
Eric Robertson, Haiying Guan, Mark Kozak, Yooyoung Lee, Amy Yates, Andrew Delgado, Daniel F. Zhou, Timothée N. Kheyrkhah, Jeff Smith, Jonathan G. Fiscus
With the increasing diversity and complexity of media forensics techniques, the evaluation of state-of-the-art detectors are impeded by lacking the metadata and

CASFinder: Detecting Common Attack Surface

Author(s)
Meng Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal
Code reusing is a common practice in software development due to its various benefits. Such a practice, however, may also cause large scale security issues
Was this page helpful?