An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
https://www.nist.gov/publications/search
Search Publications
NIST Authors in Bold
Displaying 3501 - 3525 of 9854
The Office of Information Services is responsible for NIST's research library and publications program. In the course of developing new electronic and print versions of one of those publications, the Technicalendar, we realized we had an opportunity to
Andrei F. Kazakov, Chris D. Muzny, Robert D. Chirico, Vladimir Diky, Michael D. Frenkel
It has long been understood that availability of thermophysical and thermochemical property data is vital to scientific research and industrial design. For over 65 years, the Thermodynamics Research Center (TRC) has been publishing tables of critically
We present and discuss the development an unconditionally stable algorithm to solving the evolution equations for the Phase Field Crystal (PFC) model. This algorithm allows for an arbitrarily large algorithmic time step. As the basis for our analysis of
The analysis of attack graphs has played an important role in defending against network intrusions. This paper presents a relational approach. We devise a relational approach to model necessary inputs and network configurations to generate attack graphs.
The article would describe, from a librarian's standpoint, what one library has done to gear up for a wireless LAN. It would discuss specific steps the library has taken to get a Wireless Equipment Loan Service up and running.It would explain a dual
Since the NIST Virtual Library (NVL) was first launched in 1994, scientists and engineers at the National Institute of Standards and Technology have relied on it for their research needs. The NVL offers access to valuable scientific databases and
Assembly operations at the nanometer scale differ from the conventional scale (greater than millimeter)assembly operations in two important aspects. Firstly, the continuium assumption in the assembly components does not apply. We clearly have to account
We describe a new, efficient approach to the imposition of exact nonreflecting boundary conditions for the scalar wave equation. We compare the performance of our approach with that of existing methods by coupling the boundary conditions to finite
This article reiterates the importance of homeland security in light of the events of September 11th and the necessity to integrate information technology security into enterprise security. Now, more than ever, the challenges of homeland security require a