Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 7351 - 7375 of 9858

A New Approach to Lattice Boltzmann Simulation

October 1, 2001
Author(s)
Nicos Martys
A new approach to lattice Boltzmann simulation is introduced which avoids the direct numerical determination of the single-particle distribution from the Boltzmann collision operator. Instead, one starts from the Chapman-Enskog expansion of the single

Evaluating Collaborative Enterprises - A Workshop Report

March 1, 2001
Author(s)
Robert Allen, Michelle P. Steves
As part of the WETICE 2001 conference, the workshop on Evaluating Collaborative Enterprises continued from its debut last year exploring the issues surrounding the evaluation of collaborative enterprises. This exploration included methods and tools for

Modes of Operation Validation System (MOVS): Requirements and Procedures

February 1, 1998
Author(s)
Sharon S. Keller, Miles E. Smid
The National Institute of Standards and Technology (NIST) Modes of Operation Validation System (MOVS) specifies the procedures involved in validating implementations of the DES algorithm in FIPS PUB 46-2 , The Data Encryption Standard (DES) and the

Transitioning Towards Circular Consumer Electronics Products

November 13, 2024
Author(s)
Junwon Ko, Gisele Bortolaz Guedes, Fazleena Badurdeen, I.S. Jawahir, Katherine Morris, Vincenzo Ferrero
The adoption of Circular Economy (CE) practices is continuing to gain momentum, driven by its potential to promote efficient use of resources, maximize the value of materials and products, and mitigate issues such as resource scarcity, environmental

Classifying Memory Bugs Using Bugs Framework Approach

September 9, 2021
Author(s)
Irena Bojanova, Carlos Galhardo
In this work, we present an orthogonal classification of memory corruption bugs, allowing precise structured descriptions of related software vulnerabilities. The Common Weakness Enumeration (CWE) is a well-known and used list of software weaknesses

Current Problems, Future Needs: Voices of First Responders about Communication Technology

July 27, 2021
Author(s)
Kerrianne Buchanan, Shanee Dawkins, Yee-Yin Choong, Mary Frances Theofanos, Kristen K. Greene, Susanne M. Furman, Sandra Spickard-Prettyman
With advances in network technologies, there has been increasing interest in developing new communication technology for first responders that utilizes wireless broadband networks. In order to develop new communication technology, user requirements are

System Level Evaluation of UE-to-Network Relays in D2D-enabled LTE Networks

September 13, 2019
Author(s)
Samantha M. Gamboa Quintiliani, Raghav Thanigaivel, Richard A. Rouil
The 3rd Generation Partnership Program (3GPP) introduced UE-to-Network Relays in Long Term Evolution (LTE) Release 13. This technology leverages Proximity Services (ProSe), i.e., the LTE Device-to-device (D2D) communication functionality, to provide user

Information Exposure (IEX): A New Class in the Bugs Framework (BF)

July 9, 2019
Author(s)
Irena Bojanova, Yaacov Yesha, Paul E. Black, Yan Wu
Exposure of sensitive information can be harmful on its own and in addition could enable further attacks. A rigorous and unambiguous definition of information exposure faults can help researchers and practitioners identify them, thus avoiding security

Towards Energy Efficiency in Ultra Dense Networks

December 11, 2016
Author(s)
Wei Yu, Hansong Xu, Amirshahram Hematian, David W. Griffith, Nada T. Golmie
… 2016 IEEE 34th International Performance Computing and Communications Conference (IPCCC) …

Infrared Spectra of Small Molecular Ions Trapped in Solid Neon

October 3, 2010
Author(s)
Marilyn E. Jacox
The infrared spectrum of a molecular ion provides a unique signature for that species, gives information on its structure, and is amenable to remote sensing. It also serves as a comparison standard for refining ab initio calculations. Experiments in this

ONTOLOGY-BASED CONTEXT-AWARE DATA ANALYTICS IN ADDITIVE MANUFACTURING

November 13, 2024
Author(s)
Yeun Park, Paul Witherell, Hyunbo Cho
Recent advances in Additive Manufacturing (AM), particularly in production scenarios, have been largely driven by insights achieved through data analytics. AM has greatly benefited from the increasingly large amounts of data generated during the design to
Displaying 7351 - 7375 of 9858
Was this page helpful?