An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Although the number of Christmas tree fires is low, the fires carry a higher level of hazard than other fires that occur in a residential structure. This study...
Gauge blocks have been the primary method for disseminating length traceability for over 100 years. Their longevity was based on two things: it was relatively...
This is the April 2008 edition of energy price indices and discount factors for performing life-cycle cost analyses of energy and water conservation and...
CFAST is a two-zone fire model used to calculate the evolving distribution of smoke, fire gases and temperature throughout compartments of a constructed...
J C. Chiao, Julian M. Goldman, David A. Heck, Peter Kazanzides, William J. Peine, James B. Stiehl, Dwight Yen, Nicholas Dagalakis
With rapid advances in meso, micro and nano scale technology devices and electronics a new generation of advance medical devices is emerging, which promises...
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow...
Xenia Fiorentini, Sudarsan Rachuri, Mahesh Mani, Steven J. Fenves, Ram D. Sriram
The languages and logical formalisms developed by information scientists and logicians concentrate on the theory of languages and logical theorem proving. These...
Mary F. Theofanos, Brian C. Stanton, Charles L. Sheppard
The Department of Homeland Security¿s (DHS) United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program is a biometrically-enhanced...
There are three digital forensic science projects: National Software Reference Library (NSRL), Computer Forensic Tool Testing (CFTT), Computer Forensic...
The Manufacturing Metrology and Standards for the Health Care Enterprise program was initiated in FY2005 as part of the overall reorganization of the...
A simple thermal model to predict the failure of electrical power, instrument, and control cables is described. The model is intended as a subroutine for...
This report describes a thermally-induced electrical failure (THIEF) model's ability to predict the behavior of power, instrument, and control cables during a...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public...
This report documents a preliminary investigation of the measurement of droplet sizes in the spray from four commercial fogger type pepper spray products...
Catherine A. Remley, Galen H. Koepke, Christopher L. Holloway, Chriss A. Grosvenor, Dennis G. Camell, John M. Ladbury, Robert Johnk, David R. Novotny, William F. Young, George Hough, Michael McKinley, Yann Becquet, John Korsnes
We report on measurements of parameters utilized for characterization of broadband wireless technologies proposed for use by emergency responders (firefighters...
The definitive international reference on the SI is a booklet published by the International Bureau of Weights and Measures (BIPM, Bureau International des...
The uncertainty analysis is presented for NIST measurements of noise parameters of amplifiers and transistors, in both connectorized (coaxial) and on-wafer...
This 2007 edition of SP811 updates International System of Units (SI) usage as implemented in the 8th edition of the SI Brochure, incorporates a significant...
This bulletin summarizes information disseminated in revised NIST Special Publication (SP) 800-61-1, Computer Security Incident Handling Guide: Recommendations...
This report summarizes the presentations, discussions and recommendations of a workshop held at the National Institute of Standards and Technology (NIST) on...
The primary goal of the Terabyte Track is to develop an evaluation methodology for terabyte-scale document collections. In addition, we are interested in...
S Arepalli, Stephen W. Freiman, Stephanie A. Hooker, Kalman D. Migler
Recommended Practice Guide for Single Wall Carbon Nanotube Characterization consisting of five chapters: Introduction; Thermogravimetric Analysis (TGA) ; Near...
Wayne Jansen, Theodore Winograd, Karen A. Scarfone
Active content technologies allow code, in the form of a script, macro, or other kind of portable instruction representation, to execute when the document is...
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) has been...
Patrick J. Grother, Wayne J. Salamon, Michael D. Indovina, Craig I. Watson
The MINEX II trial was conducted to evaluate the accuracy and speed of Match-on-Card verification algorithms. These run on ISO/IEC 7816 smart cards. They...
The Federal Desktop Core Configuration (FDCC) was jointly developed by the National Institute of Standards and Technology (NIST), the Department of Defense (DOD...