Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Soil-Structure Interaction for Building Structures

Author(s)
Jonathan Stewart, C.B. Crouse, Tara C. Hutchinson, Bret Lizundia, Farzad Naeim, Farhang Ostadan
The purpose of this project was to develop consensus guidance for implementing soil-structure interaction in response history analyses, and to identify areas of

Big Data Issues in Quantitative Imaging

Author(s)
Mary C. Brady, Alden A. Dima, Charles D. Fenimore, James J. Filliben, John Lu, Adele Peskin, Mala Ramaiah, Ganesh Saiprasad, Ram D. Sriram

New International Formulation for the Thermal Conductivity of H2O

Author(s)
Marcia L. Huber, Richard A. Perkins, Daniel G. Friend, Jan V. Sengers, Marc J. Assael, Ifigenia N. Metaxa, Kiyoshi Miyagawa, Robert Hellmann, Eckhard Vogel
The International Association for the Properties of Water and Steam (IAPWS) encouraged an extensive research effort to update the IAPS Formulation 1985 for the

Model Based Enterprise / Technical Data Package Summit Report

Author(s)
Joshua Lubell, Kenway K. Chen, John A. Horst, Simon P. Frechette, Paul J. Huang
This report summarizes the presentations, discussions and recommendations of a workshop held at the National Institute of Standards and Technology in December

Computer Security Incident Handling Guide

Author(s)
Paul R. Cichonski, Thomas Millar, Timothy Grance, Karen Scarfone
Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only
Was this page helpful?