Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 5276 - 5300 of 9857

Performance of Multiplexed SQUID Readout for Cryogenic Sensor Arrays

December 31, 2000
Author(s)
James A. Chervenak, Erich N. Grossman, Kent D. Irwin, John M. Martinis, Carl D. Reintsema, C. A. Allen, David I. Bergman, S. H. Mosely, Rick A. Shafer
… implementation of a multiplexer that users superconducting quantum interference devices (SQUIDs) to read out …

An Accurate Measurement of Planck's Constant

July 1, 1998
Author(s)
Edwin R. Williams, Richard L. Steiner, David B. Newell
… electric power measured in terms of the Josephson and quantum Hall effects is compared with mechanical power …

Inverse Transform Sampling for Efficient Doppler-Averaged Spectroscopy Simulations

July 14, 2023
Author(s)
Drew Rotunno, Nik Prajapati, Samuel Berweger, MATTHEW SIMONS, Aly Artusio-Glimpse, Amy Robinson, chris holloway
We present a thermal velocity sampling method for calculating Doppler-broadened atomic spectra, which more efficiently reaches a smooth limit than regular velocity weighted sampling. The method uses equal-population sampling of the 1-D thermal distribution

IoT Non-Technical Supporting Capability Core Baseline

August 25, 2021
Author(s)
Michael Fagan, Katerina N. Megas, Jeffrey Marron, Kevin Gerard Brady, Barbara Bell Cuthill, Rebecca Herold
… cybersecurity baseline, Internet of Things (IoT), securable computing devices …

Measurement and Modeling Needs for Next-Generation Concrete Binders

July 1, 2017
Author(s)
Jeffrey W. Bullard, Edward J. Garboczi, Paul E. Stutzman, Pan Feng, Alexander S. Brand, John G. Hagedorn, Wesley N. Griffin, Judith E. Terrill
Cementitious binders have become increasingly complex in their variety, mineralogical and chemical compositions, and structure over the past several decades, and there is no sign that the trend will stop or reverse in the future. Strategies for handling

Privacy and Security in the Brave New World: The Use of Multiple Mental Models

July 21, 2015
Author(s)
Susanne M. Furman, Mary F. Theofanos, Brian C. Stanton, Sandra S. Prettyman
We live in a world where the flow of electronic information and communication has become a ubiquitous part of our everyday life. While our lives are enhanced in many ways, we also experience a myriad of challenges especially to our priva-cy and security

Beyond the International Year of Crystallography

February 1, 2015
Author(s)
Andrew J. Allen, Janos Hajdu, Anke R. Kaysser-Pyzalla
It is now one year since all International Union of Crystallography (IUCr) journals became online only, and this is just one of the developments during the International Year of Crystallography, IYCr 2014. Perhaps, most conspicuously, IUCr’s new flagship

ITL Forensic Science Program

June 5, 2014
Author(s)
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
Forensic science provides the methodologies for understanding crime scenes. It is used for analyzing evidence, identifying suspects, and prosecuting and convicting criminals while exonerating innocent people. To maintain the integrity of the U.S. criminal

Holographic Radius Test Plates

September 7, 2013
Author(s)
Quandou (. Wang, Johannes A. Soons, Ulf Griesmann
We evaluate a method for testing the radius of spheres with a hologram that consists of a pair of nested Fresnel zone lenses. The hologram is positioned in the collimated test beam of a Fizeau interferometer. The inner zone lens generates a focus at the

A public randomness service

July 21, 2011
Author(s)
Michael J. Fischer, Michaela Iorga, Rene Peralta
We argue for the deployment of sources of randomness on the Internet for promoting and enhancing electronic commerce. We describe, in rough detail, our planned implementation of such a source.

Glossary of Key Information Security Terms

February 17, 2011
Author(s)
Richard L. Kissel
This glossary of key information security terms has been extracted from NIST Federal Information Processing Standards (FIPS), Special Publication (SP) 800 series, NIST Interagency Report (NIST IR) series, and the Committee for National Security Systems

Forensic Filtering of Cell Phone Protocols

August 27, 2008
Author(s)
Aurelien M. Delaitre, Wayne Jansen
Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are sometimes

An Overview and Analysis of PDA Forensic Tools

April 2, 2005
Author(s)
Wayne Jansen, Richard Ayers
Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidence
Displaying 5276 - 5300 of 9857
Was this page helpful?