Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 6501 - 6525 of 9857

NNI Workshop Instrumentation and Metrology for Nanotechnology

November 1, 2004
Author(s)
Michael T. Postek, J J. Pellegrino
The NNI Interagency Workshop on Instrumentation and Metrology for Nanotechnology Grand Challenges was held on January 27-29, 2004 in Gaithersburg, Maryland, and was cosponsored by the National Institute of Standards and Technology (NIST), an agency of the

Forensic Software Testing Support Tools: Test Summary Report

April 1, 2004
Author(s)
Elizabeth N. Fong, Serban I. Gavrila
The Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and Technology (NIST), an agency of the United States Department of Commerce, provides a measure of confidence in the software tools used in computer forensic

Standards for Bullets and Casings

November 1, 2002
Author(s)
Jun-Feng Song, Theodore V. Vorburger, Robert A. Clary, Eric P. Whitenton, Li Ma, Susan M. Ballou
The National Institute of Standards and Technology is developing reference standards through its Office of Law Enforcement Standards with funding provided by the National Institute of Justice. The standard reference materials are used by crime laboratories

Requirements Analysis: Process Plan Specification - Workstation Level

June 1, 1998
Author(s)
Kimberley Ellis, Albert T. Jones, Yung-Tsun Lee
The Computer-Aided Manufacturing Engineering (CAME) program is developing a number of integrated software toolkits for design, manufacturing engineering, and production operations. One of these toolkits is the Manufacturing Engineering ToolKit (METK). The

Chapter 6: Virtual Environments for Design and Manufacture

October 1, 1997
Author(s)
Kevin W. Lyons, Scott Angster, Sankar Jayaram
The technology of computer-aided design and computer aided manufacturing (CAD/CAM) has progressed significantly from the two-dimensional wireframe drafting systems of the 1970''s to the parametric and feature-based solid modelers of the 1990''s. There are

MODELING OF HYDROGEN FLUORIDE FORMATION FROM FLAME SUPPRESSANTS DURING COMBUSTION

January 1, 1995
Author(s)
Valeri I. Babushok, Donald R. Burgess Jr., Gregory T. Linteris, Wing Tsang, A W. Miziolek
We have completed an initial computational study related to acid gas formation for two of the leading near-term Halon substitutes, FE-13 (CF,H) and HFC-125 (C,F,H), and compared these results with Halon 1301 (CF,Br). Our goal is to determine whether we can

Exppp - An EXPRESS Pretty Printer

January 1, 1993
Author(s)
Donald E. Libes
EXPRESS is a data modeling language. EXPRESS is relatively new having only been standardized in 1993. Today, few tools exist that automatically generate EXPRESS and correspondingly most EXPRESS is hand-written. In the future, we predict that all but a tiny

PRODUCT DATA EXCHANGE: The PDES Project--Status and Objectives

January 1, 1989
Author(s)
Bradford Smith
… companies are using an increasingly larger number of computing systems in all phases of design, analysis, … widely, a common factor among these systems is that each computing application has its own internal mathematical model …

DIGITAL SOLUTIONS FOR INTEGRATED AND COLLABORATIVE ADDITIVE MANUFACTURING

August 23, 2016
Author(s)
Yan Lu, Paul Witherell, Felipe F. Lopez, Ibrahim Assouroko
Software tools, knowledge of materials and process models, and data provide three pillars on which Additive Manufacturing (AM) lifecycles and value chains can be supported. These pillars leverage efforts dedicated to the development of AM databases, high

Poster:A Logic Based Network Forensics Model for Evidence Analysis

October 15, 2015
Author(s)
Anoop Singhal, Changwei Liu, Duminda Wijesekera
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack

Password policy languages: usable translation from the informal to the formal

July 21, 2015
Author(s)
Michelle P. Steves, Mary F. Theofanos, Celia Paulsen, Athos Ribeiro
Password policies – documents which regulate how users must create, manage, and change their passwords – can have complex and unforeseen consequences on organizational security. Since these policies regulate user behavior, users must be clear as to what is

Persistence-based Structural Recognition

June 28, 2014
Author(s)
Chunyuan Li
This paper presents a framework for object recognition using topological persistence. In particular, we show that the so-called persistence diagrams built from functions defined on the objects can serve as compact and informative descriptors for images and

Adaptive Representations for Video-based Face Recognition Across Pose

March 25, 2014
Author(s)
P. Jonathon Phillips, Yi-Chen Chen, Vishal M. Patel, Rama Chellappa
n this paper, we address the problem of matching faces across changes in pose in unconstrained videos. We pro- pose two methods based on 3D rotation and sparse representation that compensate for changes in pose. The first is Sparse Representation-based

Merging 3-D Symbolic Descriptions Obtained from Multiple Views of a Scene

October 31, 1986
Author(s)
Martin Herman
An algorithm is presented for merging three-dimensional symbolic descriptions of static polyhedral scenes obtained from multiple viewpoints. The 3-D descriptions are assumed to be partial because of occulusions. The merging algorithms treats the topology
Displaying 6501 - 6525 of 9857
Was this page helpful?