Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 3501 - 3525 of 9854

Cut it out!

May 1, 2009
Author(s)
Isabel M. Beichl, Francis Sullivan
Computing in Science & Engineering …

Ciao: Developing an Architecture for User Profile Management

October 16, 2008
Author(s)
K Broun
The Office of Information Services is responsible for NIST's research library and publications program. In the course of developing new electronic and print versions of one of those publications, the Technicalendar, we realized we had an opportunity to

Web Thermo Tables an On-Line Version of the TRC Thermodynamic Tables

July 14, 2008
Author(s)
Andrei F. Kazakov, Chris D. Muzny, Robert D. Chirico, Vladimir Diky, Michael D. Frenkel
It has long been understood that availability of thermophysical and thermochemical property data is vital to scientific research and industrial design. For over 65 years, the Thermodynamics Research Center (TRC) has been publishing tables of critically

An Efficient Algorithm for Solving the Phase Field Crystal Model

June 1, 2008
Author(s)
Mowei Cheng, James A. Warren
We present and discuss the development an unconditionally stable algorithm to solving the evolution equations for the Phase Field Crystal (PFC) model. This algorithm allows for an arbitrarily large algorithmic time step. As the basis for our analysis of

A Relational Approach to the Interactive Analysis of Attack Graphs

April 2, 2008
Author(s)
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
The analysis of attack graphs has played an important role in defending against network intrusions. This paper presents a relational approach. We devise a relational approach to model necessary inputs and network configurations to generate attack graphs.

Our Plan for a Wireless Loan Service

March 1, 2003
Author(s)
Nancy Allmang
The article would describe, from a librarian's standpoint, what one library has done to gear up for a wireless LAN. It would discuss specific steps the library has taken to get a Wireless Equipment Loan Service up and running.It would explain a dual

Earning the Stamp of Approval: How to Achieve Optimal Usability

January 1, 2003
Author(s)
Susan L. Makar
Since the NIST Virtual Library (NVL) was first launched in 1994, scientists and engineers at the National Institute of Standards and Technology have relied on it for their research needs. The NVL offers access to valuable scientific databases and

Haptics in Virtual Nanoscale Assembly

August 1, 2002
Author(s)
Kevin W. Lyons, Yung-Tsun Lee
Assembly operations at the nanometer scale differ from the conventional scale (greater than millimeter)assembly operations in two important aspects. Firstly, the continuium assumption in the assembly components does not apply. We clearly have to account

Nonreflecting Boundary Conditions for the Time-Dependent Wave Equation

July 1, 2002
Author(s)
Bradley K. Alpert, L Greengard, T Hagstrom
We describe a new, efficient approach to the imposition of exact nonreflecting boundary conditions for the scalar wave equation. We compare the performance of our approach with that of existing methods by coupling the boundary conditions to finite

The New Homeland Security: Challenges for a Great Nation

January 9, 2002
Author(s)
Ronald S. Ross
This article reiterates the importance of homeland security in light of the events of September 11th and the necessity to integrate information technology security into enterprise security. Now, more than ever, the challenges of homeland security require a
Displaying 3501 - 3525 of 9854
Was this page helpful?