An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Israel Lopez Coto, Kuldeep R. Prasad, James R. Whetstone
The Indianapolis Flux Experiment (INFLUX) aims to use a top-down inversion methodology to quantify sources of Greenhouse Gas (GHG) emissions over an urban...
Jason Allnutt, Dhananjay Anand, Douglas Arnold, Allen Goldstein, Ya-Shian Li-Baboud, Aaron Martin, Cuong Nguyen, Robert Noseworthy, Ravi Subramaniam, Marc Weiss
Lana Z. Lowry, Mala Ramaiah, Sandra S. Prettyman, Debora Simmons, David Brick, Ellen Deutsch, Lorraine B. Possanza, Ollie B. Gray, Betty A. Levine, Kinsey Gimbel, Kyle Andrews
Katie M. Schlatter, Julia Scherschligt, John S. Quintavalle, Robert G. Driver, Christina D. Cross
This report documents efforts to date to automate Piston Gage Calibration Services. This report includes an overview of the project, results for Phase I...
Nikolas W. Hrabe, Nicholas Barbosa, Steve Daniewicz, Nima Shamsaei
Valuable information was gathered from a broad representation of the additive manufacturing (AM) community (150 attendees from industry, government, academic...
A total of 432 registered participants from 11 countries contributed to a successful first-ever international symposium devoted exclusively to the topic of...
Jeanita Pritchett, Katrice A. Lippa, Mary Bedner, Carolyn Q. Burdette, Johanna Camara, Brian E. Lang, Michael A. Nelson, Lane C. Sander, Lorna T. Sniegoski
The one week NIST-SIM chemical metrology training opportunity was designed to provide SIM NMI/DI laboratory personnel with in-depth classroom and hands-on...
This Recommendation specifies four types of SHA-3-derived functions: cSHAKE, KMAC, TupleHash, and ParallelHash, each defined for a 128- and 256-bit security...
Michael Bartock, Jeffrey Cichonski, Murugiah Souppaya, Matthew C. Smith, Gregory Witte, Karen Scarfone
In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include...
This bulletin summarizes the information presented in NIST SP 800-160: Systems Security Engineering: Considerations for a Multidisciplinary Approach in the...
Research was conducted on the performance of currently available smoke alarms to the new fire and cooking nuisance source tests specified in ANSI/UL 217...
A series of fourteen experimental tests on six 9 ft. × 12 ft. (2.7 m × 3.7 m) shear wall specimens consisting of cold-formed steel framing sheathed on one side...
Robert A. Fletcher, Nicholas W. Ritchie, David S. Bright, James J. Filliben, William F. Guthrie
A new material has been certified to become Standard Reference Material (SRM) 2806b - Medium Test Dust in Hydraulic Fluid. SRM 2806b consists of a trace...
The report does not have an abstract, but the following is the Introduction: The pervasive application of wireless communications is well known. One such...
Under the authority of the Revitalize American Manufacturing and Innovation Act of 2014, the Secretary of Commerce shall establish the Network for Manufacturing...
As alternatives to refrigerants with a high global warming potential, blends of two or more refrigerants are being utilized as working fluids in heat-pumping...
These specifications and tolerances are recommended as minimum requirements for standards used by state and local weights and measures officials and others in...
A major aspect of characterizing the built environment is identifying key infrastructure dependencies that may exist. Some of these dependencies are obvious...
Alex Olivas, Michelle A. Helsel, Nicos Martys, Chiara C. Ferraris, William L. George, Raissa Ferron
The conclusion of international studies was that the optimal approach to calibrate concrete rheometers would be to develop a non-Newtonian standard reference...
Michael Garris, Mary T. Laamanen, Craig S. Russell, Lawrence D. Nadel
This document is a recommendation prescribing a data interchange format for the syntactic representation of information needed to achieve a base "Level 0" of...
Stephen D. Quinn, Murugiah P. Souppaya, Melanie R. Cook, Karen Scarfone
A security configuration checklist is a document that contains instructions or procedures for configuring an information technology (IT) product to an...