Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Conferences

Microscopy (Big and Small) Data Analysis With the Open Source Software Package HyperSpy

Author(s)
Francisco de la Pena, Tomas Ostasevicius, Vidar T. Fauske, Pierre Burdet, Petras Jokubauskas, Magnus Nord, Mike Sarahan, Eric Prestat, Joshua Taillon, Jan Caron, Tom Furnival, Katharine E. MacArthur, Alberto Eljarrat, Stefano Mazzucco, Vadim Migunov, Thomas Aarholt, Michael Walls, Florian Winkler, Gael Donval, Ben Martineau, Andreas Garmannslund, Luiz-Fernando Zagonel, Ilya Iyengar

Modeling Performance Measurement of Mobile Manipulators

Author(s)
Roger V. Bostelman, Sebti Foufou, Tsai H. Hong
Mobile manipulators are being marketed around the world as single manufacturer systems (i.e., robot arm and vehicle manufactured by the same organization) and

An Analysis of Vulnerability Trends, 2008 - 2016

Author(s)
David R. Kuhn, Mohammad Raunak, Raghu N. Kacker
This analysis reviews trends within the different vulnerability types and subsidiary weaknesses, with a goal of identifying practices that may have the

Analysis, Comparison, and Assessment of Latent Fingerprint Preprocessing

Author(s)
Haiying Guan, Paul Y. Lee, Curtis L. Lamp, Andrew Dienstfrey, Mary Frances Theofanos, Brian Stanton, Matthew Schwarz
Latent fingerprints obtained from crime scenes are rarely immediately suitable for identification purposes. Instead, most latent fingerprint images must be
Was this page helpful?