An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Paul Patrone, Qing Hai Li, Gregory A. Cooksey, Anthony J. Kearsley
A class of non-linear integro-differential equations characterizing microfluidic measurements is considered. Under reasonable conditions, these non-linear integro-differential equations admit solutions that are convex functions of an interesting flow-rate
In recent years, combinatorial testing methods have been successfully applied to test systems with a large number of input parameters. Generating combinatorial test sets for such complex systems is still a challenging task as it requires a lot of time and
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang, John M. Kelsey, Yi-Kai Liu, Carl A. Miller, Rene C. Peralta, Ray A. Perlner, Angela Y. Robinson, Daniel C. Smith-Tone, Jacob Alperin-Sheriff
The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify one or more additional
Somayeh Mosleh, Yao Ma, Jake D. Rezac, Jason B. Coder
Dynamic spectrum access (DSA) to achieve spectrum sharing in unlicensed bands is a promising approach for meeting the growing demands of forthcoming and deployed wireless networks, such as long-term evolution license-assisted access (LTE-LAA) and IEEE 802
This report summarizes recent technical work of the Applied and Computational Sciences Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST). Part I (Overview) provides a high-level overview of the
Kevin J. Coakley, Jolene D. Splett, Dave K. Walker, Mustafa Aksoy, Paul E. Racette
We directly quantify the effect of infrequent calibration on the stability of microwave radiometer temperature measurements (where a power measurement for the unknown source is acquired at a fixed time but calibration data are acquired at variable earlier
Dustin Moody, Ray A. Perlner, Daniel C. Smith-Tone, Daniel C. Apon, Javier Verbel
In 2013, Tao et al. introduced the ABC Simple Matrix Scheme for Encryption, a multivariate public key encryption scheme. The scheme boasts great efficiency in encryption and decryption, though it suffers from very large public keys. It was quickly noted
Howard S. Cohl, Andre Greiner Petter, Moritz Schubotz, Corinna Breitinger, Fabian Muller, Akiko Aizawa, Bela Gipp
Mathematical notation, i.e., the writing system used to communicate concepts in mathematics, encodes valuable information for a variety of information search and retrieval systems. Yet, mathematical notations remain mostly unutilized by today's systems. In
Spencer J. Breiner, Blake S. Pollard, Eswaran Subrahmanian
This report presents the summary of a workshop held at NIST on March 15-16, 2018 on the topic of applied category theory (ACT). The meeting had two main goals: (i) mapping the current ACT landscape and (ii) developing a roadmap for transitioning the field
Tim LAI, Alicia Marino, Angela Robinson, Daqing Wan
The k-subset sum problem over finite fields is a classical NP-complete problem. Motivated by coding theory applications, a more complex problem is the higher m-th moment k-subset sum problem over finite fields. We show that there is a deterministic
Abstract. This paper constructs an unconditionally stable explicit difference scheme, marching backward in time, that can solve an interesting, but limited class of ill-posed, time-reversed 2D incompressible Navier-Stokes initial value problems. Stability
Jolene D. Splett, Felix M. Jimenez, Amanda A. Koepke
In ordinary least-squares regression, independent variables are assumed to be known without error. However, in many real-life situations this assumption is not valid. Both orthogonal distance regression and Bayesian errors-in-variables regression can be
Felix Kim, Adam L. Pintar, Shawn P. Moylan, Edward Garboczi
X-ray computed tomography (XCT) is a promising non-destructive evaluation technique for additively manufactured (AM) parts with complex shapes. Industrial XCT scanning is a relatively new development, and XCT has several acquisition parameters a user can