An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
William L. Grosshandler, Nelson P. Bryner, Daniel M. Madrzykowski, K Kuntz
A fire occurred on the night of Feb. 20, 2003, in The Station nightclub at 211 Cowesett Avenue, West Warwick, Rhode Island. A band that was on the platform that...
William L. Grosshandler, Nelson P. Bryner, Daniel M. Madrzykowski, K Kuntz
A fire occurred on the night of Feb. 20, 2003, in The Station nightclub at 211 Cowesett Avenue, West Warwick, Rhode Island. A band that was on the platform that...
1. Table 23-2-1-(1.20203)-db, Pages db-5936.0 and db-5936. (New table for 2-pentanone containing the density for the real fluid at selected temperatures and...
This user s manual provides updated documentation and computer program listings for version 3.0 of the three-dimensional cement hydration and microstructure...
This bulletin describes the NIST security configuration checklists program and is based on NIST Special Publication 800-70: Security Configuration Checklists...
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology...
James R. Lawson, William D. Walton, Nelson P. Bryner, Francine K. Amon
A series of measurements has been carried out to quantify the thermal properties of materials used to fabricate fire fighters' thermal protective clothing. The...
This paper investigates the effect that the bulk lubricant concentration has on the non-adiabatic lubricant excess surface density on a roughened, horizontal...
Francine K. Amon, Nelson P. Bryner, Anthony P. Hamins
This workshop provided a forum to discuss the strategies, technologies, procedures, best practices, research and development that can significantly improve...
Gregory T. Linteris, L W. Gewuerz, Kevin B. McGrattan, Glenn P. Forney
Black PMMA was burned in the cone calorimeter in two orientations (horizontal and vertical), at imposed radiant heat fluxes of (0, 5, 10, 25, 50, and 75) kW/m2...
A series of measurements has been carried out to quantify the thermal properties of materials used to fabricate fire fighters' thermal protective clothing. The...
This report presents a simulation study of the energy impact and cost effectiveness of improving envelope airtightness in U.S. commercial buildings. Despite...
Michele M. Schantz, John R. Kucklick, Reenie M. Parris, Dianne L. Poster, Stephen A. Wise
In support of marine monitoring measurement programs, the National Institute of Standards and Technology (NIST) conducts yearly interlaboratory comparison...
A working group of investigators, who are characterizing and quantifying the organic compounds in particulate matter (PM) as part of the US EPA s PM 2.5...
J A. Ramirez-hernandez, H Li, E Fernandez, Charles R. McLean, Swee K. Leong
This paper presents the application of a framework, proposed by the National Institute of Standards and Technology (NIST), for standard modular simulation of...
The High Capacity Alongside Sea base Sustainment (HiCASS) program intends to generate substantial improvements in skin-to-skin at-sea replenishment. HiCASS...
This is the collection of papers presented at the Performance Metrics for Intelligent Systems Workshop, held at NIST on August 24, 25, and 26, 2004. This was...
The curve-based method was evaluated based on performance predictions for nine mixed systems, which were also tested by an independent testing laboratory...
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of...
The curve-based method was evaluated based on performance predictions for nine mixed systems, which were also tested by an independent testing laboratory...
This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called...
Christopher L. Holloway, Galen H. Koepke, Dennis G. Camell, Catherine A. Remley, Dylan F. Williams, Susan A. Schima, Seturnino Canales, Douglas T. Tamura
In this report we investigate communications problems faced by emergency responders (firefighters and police) in disaster situations (i.e., collapsed buildings)...
This ITL Bulletin summarizes NIST SP 800-53, Recommended Security Controls for Federal Information Systems and discusses the use of SP 800-53 within the context...
This report describes a semantic mapping between two extensible markup language (XML) specifications describing a single type of equipment that is used in...
This report analyzes circulation data for the NIST Research Library book collection to determine the most used subjects. Data collected covers the period...
Sensitive electronic record systems (ERSs) raise questions about their proper use. Insider-threat involves hidden, unknown and unanticipated activities that...