Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 7776 - 7800 of 9859

Development of the Advanced Encryption Standard

August 16, 2021
Author(s)
Miles E. Smid, James Foti
Strong cryptographic algorithms are essential for the protection of stored and transmitted data throughout the world. This publication discusses the development of Federal Information Processing Standards Publication (FIPS) 197, which specifies a

Compositional Models for Complex Systems

January 19, 2019
Author(s)
Spencer J. Breiner, Ram D. Sriram, Eswaran Subrahmanian
In this chapter we argue for the use of representations from category theory to support better models for complex systems, and provide an example of such an application might look like. Our approach rests on the well known observation that complex system

Polymer Informatics: Opportunities and Challenges

September 15, 2017
Author(s)
Debra J. Audus, Juan J. de Pablo
We are entering an era where large volumes of scientific data, coupled with algorithmic and computational advances, can reduce both the time and cost of developing new materials. This emerging field known as materials informatics has gained acceptance for

User's Guide to Telework and Bring Your Own Device (BYOD) Security

July 29, 2016
Author(s)
Murugiah P. Souppaya, Karen Scarfone
Many people telework, and they use a variety of devices, such as desktop and laptop computers, smartphones, and tablets, to read and send email, access websites, review and edit documents, and perform many other tasks. Each telework device is controlled by

Towards a Systematic Threat Modeling Approach for Cyber-physical Systems

December 15, 2015
Author(s)
Goncalo Martins, Sajal Bhatia, Xenofon Koutsoukos, Keith A. Stouffer, CheeYee Tang, Rick Candell
Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computational and networking components. These systems can potentially have an impact on the physical components, hence it is critical to safeguard them against a wide range of

Operation of gamma-ray microcalorimeters at elevated count rates using filters with constraints

May 15, 2013
Author(s)
Bradley K. Alpert, Robert D. Horansky, Douglas A. Bennett, William B. Doriese, Joseph W. Fowler, Andrew Hoover, Michael W. Rabin, Joel N. Ullom
We introduce a filter construction method for pulse processing that differs in two respects from that in standard optimal filtering, in which the average pulse shape and noise power spectral density are combined to create a convolution filter for

Disassembly Process Information Model for Remanufacturing

April 22, 2013
Author(s)
Shaw C. Feng, Hanmin Lee, Thomas R. Kramer, Che B. Joung, Parisa Ghodous, Ram D. Sriram
The disassembly process is an essential activity performed on out-of-service products for remanufacturing. A disassembly process includes many subprocesses, such as separation, cleaning, repair, replacement, and inspection. The main purpose of performing

Significance Test in Speaker Recognition Data Analysis with Data Dependency

October 17, 2012
Author(s)
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker, Vincent M. Stanford
To evaluate the performance of speaker recognition systems, a detection cost function defined as a weighted sum of the probabilities of type I and type II errors is employed. The speaker datasets may have data dependency due to multiple uses of the same

Recommendation for Applications Using Approved Hash Algorithms

August 24, 2012
Author(s)
Quynh H. Dang
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when

Structure-property relationships for methyl-terminated alkyl self-assembled monolayers

July 20, 2011
Author(s)
Frank W. DelRio, Dave Rampulla, Cherno Jaye, Gheorghe Stan, Richard S. Gates, Daniel A. Fischer, Robert F. Cook
Structure-property relationships for methyl-terminated alkyl self-assembled monolayers (SAMs) are developed using near-edge X-ray absorption fine structure spectroscopy (NEXAFS) and atomic force microscopy (AFM). NEXAFS C K-edge spectra are used to compute

Contact and Stress Anisotropies in Start Up Flows of Collodial Suspensions

September 11, 2009
Author(s)
Nicos Martys, William L. George, Didier Lootens, Pascal Hebraud
Spatio-temporal correlations in start-up flows of attractive colloids are explored by numerical simulations. The suspension is first allowed to flocculate during a time tw, then the stress necessary to induce its flow is computed. Whereas at low volume

Proceedings of the Dynamic Measurement and Control for Autonomous Manufacturing Workshop

May 29, 2009
Author(s)
Tsai H. Hong, Roger D. Eastman, Roger V. Bostelman, Hui-Min Huang, B. McMorris
The Dynamic Measurement workshop was held on October 10 - 11, 2007 at the Columbia Graduate Center of Loyola College in Maryland. Forty-eight people attended the one-day-and-a-half event which was moderated by Roger Bostelman and Tsai Hong of National

Bifurcations, Center Manifolds, and Periodic Solutions

January 15, 2009
Author(s)
David E. Gilsinn
Nonlinear time delay differential equations are well known to have arisen in models in physiology, biology, and population dynamics. They have also arisen in models of metal cutting processes. Machine tool chatter, from a process called regenerative
Displaying 7776 - 7800 of 9859
Was this page helpful?