An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Jason D. Averill, Lori Moore-Merrell, Kathy Notarianni, Robert Santos, Doug Wissoker
Effectively managing a fire department requires an understanding of and an ability to demonstrate how changes to resources will affect community outcomes. It is
Geraldine S. Cheok, Kamel S. Saidi, Marek Franaszek, James J. Filliben, Nicholas Scott
A 3D imaging instrument is a non-contact measurement instrument used to rapidly obtain 3D information about a scene or object. The use of and the applications
NIST Handbook 150-17 presents technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation
David Cooper, William Polk, Andrew Regenscheid, Murugiah Souppaya
This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized
NIST Handbook 150-8 presents technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation
Kenneth S. Butcher, Linda D. Crown, David Sefcik, Lisa Warfield
This handbook has been prepared as a procedural guide for the compliance testing of net contents statements on packaged goods. Compliance testing of packaged
This bulletin summarizes the information presented in NIST SP 800-125, Guide To Security for Full Virtualization Technologies: Recommendations of the National
Antoine Fillinger, Lukas Diduch, Imad Hamchi, Vincent M. Stanford
The need for very large fingerprint benchmarks to test the efficacy of emerging commercial technologies for fingerprint minutia detection, matching, compression
Disassembly process is an essential activity in the mid and end of a products service life cycle. Maintenance is a mid product life activity, which involves
This report defines version 2.0 of the Open Checklist Interactive Language (OCIL). The intent of OCIL is to provide a standardized basis for expressing
Michael C. Gibbons, Svetlana Z. Lowry, Matthew T. Quinn
HITECH Act's provisions to drive adoption and meaningful use of Electronic Health Records (EHRs) holds great promise in supporting improvements in the quality
Michael D. Indovina, R. A. Hicklin, G I. Kiebuzinski
ELFT-EFS Evaluation 1 is an evaluation of the accuracy of latent matching using features marked by experienced human latent fingerprint examiners. The purpose
Patrick J. Grother, Wayne J. Salamon, Craig I. Watson, Michael D. Indovina, Patricia A. Flanagan
The MINEX II trials have been conducted to evaluate the accuracy and speed of MATCH-ON-CARD verification algorithms. These run on ISO/IEC 7816 smartcards. They
Ram D. Sriram, Conrad E. Bock, Fabian M. Neuhaus, Evan K. Wallace, Mary C. Brady, Mark Musen, Joanne Luciano
The National Institute for Standards and Technology sponsored a workshop in October, 2007, on the subject of ontology evaluation. An international group of
This study examines the energy consumption of automatic ice makers installed in domestic refrigerators. The purpose of this research is to determine a method of
Jason D. Averill, Richard G. Gann, William F. Guthrie, Daniel Murphy
As part of the Consumer Product Safety Commission (CPSC) technical staff program to determine the effects of emissions from imported drywall on residential
Scott W. Rose, Anastase Nakassis, Ramaswamy Chandramouli
The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network
A series of experiments are described in which helium was released at constant rates into a 1.5 m 1.5 m 0.75 m enclosure designed as a -scale model of a two car
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-39, Integrated Enterprise-Wide Risk Management: Organization, Mission
Nelson P. Bryner, Stephen P. Fuss, Bryan W. Klein, Anthony D. Putorti Jr.
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
Nelson P. Bryner, Stephen P. Fuss, Bryan W. Klein, Anthony D. Putorti Jr.
A fire occurred on the evening of June 18, 2007, in the Sofa Super Store in Charleston, SC. NIST analyzed the fire ground, consulted with other experts, and
J. R. Beveridge, P. Jonathon Phillips, Geof H. Givens, Bruce A. Draper, Mohammad N. Teli, David Bolme
In face recognition, quality is typically thought of as a property of individual images, not image pairs. The implicit assumption is that high-quality images
Alice J. O'Toole, P. Jonathon Phillips, Xiaobo An, Joseph Dunlop
The intended applications of automatic face recognition systems include venues that vary widely in demographic diversity. Formal evaluations of algorithms do
David W. Allen, Edward A. Early, Benjamin K. Tsai, Catherine C. Cooksey
This document describes measurement services, instrumentation, and measurement techniques for regular spectral transmittance over the spectral range from 250 nm