Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 2551 - 2575 of 9852

They Know Your Weaknesses Do You?: Reintroducing Common Weakness Enumeration

May 1, 2016
Author(s)
Yan Wu, Yaacov Yesha, Irena Bojanova, Paul E. Black
Knowing what makes your software systems vulnerable to attacks will be exceptionally critical in the emerging future of interdependent clouds, cyber-physical systems, mobile apps, and big data sets. The Common Weakness Enumeration (CWE) is a respectable

Monte Carlo Simulation Algorithm for B-DNA

September 27, 2016
Author(s)
Steven C Howell, Xiangyun Qiu, Joseph E. Curtis
… between CG beads. Using this algorithm on commodity computing hardware, one can rapidly generate an ensemble of …

Fire Conditions for Smoke Toxicity Measurement

May 1, 1994
Author(s)
Richard G. Gann, V Babrauskas, Richard D. Peacock, J R. Hall
This paper identifies those fire conditions most often present when smoke toxicity is the cause of death. It begins with a review of the evidence that smoke-inhalation deaths are in the majority in fire fatalities in the United States. Next, there is an

A Benchmark Open-Source Implementation of COSMO-SAC

February 14, 2020
Author(s)
Ian H. Bell, Erik Mickoleit, Chieh-Ming Hsieh, Shiang-Tai Lin, Jadran Vrabec, Cornelia Breitkopf, Andreas J?ger
The COSMO-SAC modeling approach has found wide application in a range of industries due to its good predictive capabilities. While UNIFAC is in general more accurate than COSMO-SAC, the UNIFAC model contains many adjustable parameters and cannot be used if

U.S. Government Activities to Protect the Information Infrastructure

April 28, 1997
Author(s)
Dennis D. Steinauer, Shirley M. Radack, Stuart W. Katzke
This paper is a survey of recent activities of the legislative and executive branches of the U.S. Government (and of some joint activities of government and industry) that involve the security of the evolving information infrastructure. Over the past few

AC Metrology Applications of the Josephson Effect

July 31, 2024
Author(s)
Samuel Benz
… of programmable voltage signals that exploit the quantum behavior of superconducting Josephson junctions … for applications in metrology, communications, and quantum control. We present the state-of-the-art advances in … metrology, measurement units, quantum metrology, Standards, voltage standards, …

Formation and transfer of GaAsN nanostructure layers

September 27, 2011
Author(s)
Christopher L. Soles, Hyun W. Ro, A. Wood, N. Estrada, B. Dick, Y. Wang, Micheal Thouless, Rachel Goldman
… applications owing to the possibility of invoking quantum effects. However, the widespread application of such … thin film, layer transfer, quantum dots, galium nitride, organosilicates …

Simple Test Procedure for Image-Based Biometric Verification Systems

May 1, 1999
Author(s)
Charles L. Wilson, R. McCabe
This report discusses a simple test method for image-based biometric verification systems. A fingerprint based computer login system is used as an example of the process used in this test method. Ideally, these tests should be performed on standard

IPPS: An Integrated Process Planning System

May 4, 2004
Author(s)
Suber Huang, J Mei, Xuhang Tong, Steven R. Ray
The past two decades have witnessed the development of many CAPP (Computer-Aided Process Planning) systems. From variant process planning to generative process planning, great progress has been made. However, due to the complexity of the problems involved
Displaying 2551 - 2575 of 9852
Was this page helpful?