Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 2201 - 2225 of 9850

Algorithms for Fresnel Diffraction at Rectangular and Circular Apertures

September 1, 1998
Author(s)
Klaus Mielenz
This paper summarizes the theory of Fresnel diffraction by plane rectangular and circular apertures with a view toward numerical computations. Approximations found in the earlier leterature, and now obsolete, have been eliminated and replaced by algorithms

Individual qubit addressing of rotating ion crystals in a Penning trap

July 25, 2022
Author(s)
Anthony M. Polloreno, Ana Maria Rey, John J. Bollinger
… gate fidelities, making them a useful platform for quantum information processing. Scaling to larger numbers of … ion addressability, a capability desirable for general quantum information processing, a challenge. We propose a … deformable mirror, trapped-ion quantum information processing, Penning trap, wave front …

Introduction to Fire Hazard Modeling.

March 1, 1986
Author(s)
Richard W. Bukowski
An overview of the development and current capabilities of predictive methods for fire hazard analysis is provided. This includes a range of methods from simple, algebraic equations to complex, computer simulation models. In each case the form, major

The TRECVid 2008 Event Detection Evaluation

December 9, 2009
Author(s)
Jonathan G. Fiscus, John S. Garofolo, Paul D. Over, Martial Michel, Richard T. Rose
This paper is a summary of the 2008 TRECVid Event Detection evaluation. TRECVid is a laboratory-style evaluation that aims to model real world situations or significant component tasks. The event detection evaluation was organized to address detection of a

Separating OR, SUM, and XOR Circuits

August 23, 2016
Author(s)
Magnus G. Find, Mika Goos, Matti Jarvisalo, Petteri Kaski, Miko Koivisto, Janne Korhonen
… boolean n x n matrix A we consider arithmetic circuits for computing the transformation x 7! Ax over different …

Uncertainty Quantification of Atomistic (DFT and MD), Mesoscale (PFM) and Continuum (CALPHAD) Methods and the Impact on Thermodynamic Models of Metals: A Review

March 5, 2021
Author(s)
Gabriel Joshua, Noah Paulson, Thien Duong, Francesca Tavazza, Chandler Becker, Santanu Chaudhuri, Stan Marious
Design of improved metals relies on multi-scale computer simulations to provide thermodynamic properties when experiments are difficult to conduct. In particular, atomistic methods such as Density Functional Theory (DFT) and Molecular Dynamics (MD) have

Determining Forensic Data Requirements for Detecting Hypervisor Attacks

August 7, 2019
Author(s)
Changwei Liu, Anoop Singhal, Ramaswamy Chandramouli, Duminda Wijesekera
… is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to shared system … Cloud computing, hypervisors, Xen, KVM, vulnerabilities, forensics …

Mobile Agent Security

October 1, 1999
Author(s)
Wayne Jansen, Athanasios T. Karygiannis
… Mobile agent technology offers a new computing paradigm in which a program, in the form of a …

Conceptual Design for Assembly

September 1, 1999
Author(s)
V Lombeyda, William Regli
This paper presents an approach to support computer-aided conceptual design of mechatronic assemblies in a collaborative, multi-user environment. We describe a system, Conceptual Understanding and Prototyping (CUP), that allows a team of design engineers

Error and Transient Analysis of Stepwise-Approximated Sinewaves Generated by Programmable Josephson Voltage Standards

July 1, 2008
Author(s)
Charles J. Burroughs, Alain Rufenacht, Samuel Benz, Paul Dresselhaus, Bryan C. Waltrip, Thomas L. Nelson
… We are developing a quantum-based 60 Hz power standard that exploits the … a multibit digital-to-analog converter to produce accurate quantum-based dc voltages. Using step-wise approximation … Programmable Josephson Voltage Standard, Quantum Watt, PJVS, Josephson Systems …

Increased carrier mobility and lifetime in CdSe quantum dot thin films through surface passivation and doping

November 4, 2015
Author(s)
Daniel Straus, E. D. Goodwin, E. A. Gaulding, Shinichiro Muramoto, Murray B. Christopher, Cherie R. Kagan
… and controlling the carrier concentration and mobility in quantum dot (QD) thin films is a prerequisite to designing … surface states, dopes the QD thin films, and preserves quantum confinement, compared to QD thin films annealed in … Increased carrier mobility and lifetime in CdSe quantum dot thin films through surface passivation and doping …

Generation of optical Schrodinger cat states by number-resolved squeezed photon subtraction

May 31, 2009
Author(s)
Thomas Gerrits, Scott C. Glancy, Tracy S. Clement, Brice R. Calkins, Adriana E. Lita, Aaron J. Miller, Alan L. Migdall, Sae Woo Nam, Richard P. Mirin, Emanuel H. Knill
… negative features (without any correction), indicating quantum character. The Wigner distribution of the … of Lasers and Electro-optics (CLEO)and International Quantum Electronics Conference (IQEC) …

An MD/QM Study of the Chorismate Mutase-Catalyzed Claisen Rearrangement Reaction

July 1, 2001
Author(s)
S. E. Worthington, A. E. Roitberg, Morris Krauss
… by chorismate mutase, has been calculated with ab initio quantum chemistry. The calculation of a reaction path is … simulation leveraged from the x-ray structure. The quantum calculations employ effective fragment potentials … of the protein active site in with the substrate in the quantum Hamiltonian. The ability to leverage the X-ray …

Minimal Universal Two-Qubit Controlled-NOT-Based Circuits

March 10, 2004
Author(s)
V V. Shende, I L. Markov, Stephen Bullock
… which we match with an upper bound of three gates.Using quantum circuit identities, we improve an earlier lower bound … optimal, quantum circuit, two-qubit …

Mitigating Emerging Hacker Threats

June 28, 2000
Author(s)
Peter M. Mell, John P. Wack
[For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov] It seems that every week, computer security organizations are issuing press releases concerning the latest hacker attack. Some sound dangerous, like the
Displaying 2201 - 2225 of 9850
Was this page helpful?