Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 5426 - 5450 of 9857

Feshbach resonances in ultracold gases

April 29, 2010
Author(s)
Chin P. Cheng, R Grimm, Paul S. Julienne, Eite Tiesinga
… tool to control the interaction between atoms in ultracold quantum gases. They have found manifold experimental …

Terahertz Spectroscopy of Short-Chain Polypeptides

July 1, 2003
Author(s)
M R. Kutteruf, Craig Brown, L K. Iwaki, M B. Campbell, Timothy M. Korter, Edwin J. Heilweil
… can potentially be extracted from these spectra using quantum mechanical solid-state modeling and theories. …

Scaling the Phish: Advancing the NIST Phish Scale

July 3, 2021
Author(s)
Fernando Barrientos, Jody Jacobs, Shanee Dawkins
Organizations use phishing training exercises to help employees defend against the phishing threats that get through automatic email filters, reducing potential compromise of information security for both the individual and their organization. These

Estimating t-way Fault Profile Evolution During Testing

August 25, 2016
Author(s)
David R. Kuhn, Raghu N. Kacker, Lei Yu
Empirical studies have shown that most software interaction faults involve one or two variables interacting, with progressively fewer triggered by three or more, and no failure has been reported involving more than six variables interacting. This paper

Framework for Cloud Usability

August 2, 2015
Author(s)
Brian C. Stanton, Mary F. Theofanos, Karun P. Joshi
Organizations are increasingly adopting cloud-based services to meet their business needs. However, due to the complexity and diversity of cloud systems it is important to evaluate the user experience using within a framework that encompasses the

Digital Repository of Mathematical Formulae

October 17, 2014
Author(s)
Howard S. Cohl, Marjorie A. McClain, Bonita V. Saunders, Moritz Schubotz, Janelle Williams
The purpose of the NIST Digital Repository of Mathematical Formulae (DRMF) is to create a digital compendium of mathematical formulae for orthogonal polynomials and special functions (OPSF) and of associated mathematical data. The DRMF addresses needs of

Preliminary Studies on the Good, the Bad, and the Ugly Face Recognition Challenge Problem

November 26, 2012
Author(s)
P J. Phillips, J. R. Beveridge, David Bolme, Bruce A. Draper, Yui M. Lui
Face recognition has made significant advances over the last twenty years. State-of-the-art algorithms push the performanceenvelope to near perfect recognition rates on many face databases. Recently, the Good, the Bad, and the Ugly (GBU) face challenge

Division Polynomials for Jacobi Quartic Curves

June 13, 2011
Author(s)
Dustin Moody
In this paper we fi nd division polynomials for Jacobi quartics. These curves are an alternate model for elliptic curves to the more common Weierstrass equation. Division polynomials for Weierstrass curves are well known, and the division polynomials we fi

Does Habituation Affect Fingerprint Quality?

February 20, 2007
Author(s)
Mary F. Theofanos, R J. Michaels, Jean C. Scholtz, Emile L. Morse, Peter May
Interest in the environmental factors that affect biometric image quality is increasing as biometric technologies are currently being implemented in various business applications. This study aims to determine, through repeated trials, the effects of

The Policy Machine for Security Policy Management

July 17, 2001
Author(s)
Chung Tong Hu, Deborah A. Frincke, David F. Ferraiolo
Many different access controls policies and models have been developed to suit a variety of goals: these include Role-Based Access Control, One-directional Information Flow, Chinese Wall, Clark-Wilson, N-person Control, and DAC, in addition to more

The Role of Choice in Discovery

January 1, 2000
Author(s)
J E. Devaney
The discovery of functional forms can be divided into three tasks:1 - choosing a search technique to find the set of best equationswithin the limitations of finite precision arithmetic and noise;2 - choosing from among the best equations based on some

Formalizing ISA-95 Level 3 Control with Smart Manufacturing System Models

December 23, 2019
Author(s)
Leon F. McGinnis
Achieving the vision of "smart manufacturing and "Industrie 4.0" requires building on successes in computational control of processes to create generic approaches for management of manufacturing operations, or smart manufacturing operations management
Displaying 5426 - 5450 of 9857
Was this page helpful?