Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 1482

Effect of Measurement and Sampling Strategy in Surface Analysis of Laser Powder Bed Fusion Additive Manufacturing of Nickel Superalloy 625

September 18, 2019
Author(s)
Jason C. Fox, Adam L. Pintar
… work is to better understand the measurement and sampling strategy to aid development of measurement routines for AM … surface topography, surface measurement, measurement strategy … Proceedings of the 2019 Special Interest Group … Additive Manufacturing … Effect of Measurement and Sampling Strategy in Surface Analysis of Laser Powder Bed Fusion …

The international measurement system for radionuclide metrology: A strategy for the future

December 2, 2019
Author(s)
Lisa Karam, Steven Judge, Wynand Louw
… (CCRI) has coordinated the development of a long-term strategy to support the international measurement system for … (BIPM) and its associated institutional members, the CCRI strategy captures how an NMI/DI can demonstrate capability … that is available through the CCRI and the BIPM. The CCRI strategy, specifically the aspects with direct impact on …

NIST and Strategic Standardization

December 1, 2000
Author(s)
JoAnne R. Overman
NIST's Office of Standards Services coordinates Federal government standards activities under the National Technology Transfer and Advancement Act and chairs the Interagency Committee on Standards Policy. Through these and other Office activities, NIST

Hierarachical Restoration Scheme for Multiple Failures in GMPLS Networks

May 12, 2003
Author(s)
Sanghun Lee, C Kim, David W. Griffith
… Risk Link Groups (SRLGs) are applied. We also introduce Backup Group Multiplexing (BGM) into our hierarchical scheme … all at once. Furthermore, the proposed scheme selects a backup path with enough resources to satisfy renegotiated Quality of Service (QoS) of each backup group, among M backup paths. Our simulation results …

Hierarchical Restoration Scheme for Multiple Failures in GMPLS Networks

May 1, 2003
Author(s)
San-Nan K. Lee, C Kim, David W. Griffith
… Risk Link Groups (SRLGs) are applied. We also introduce Backup Group Multiplexing (BGM) into our hierarchical scheme … all at once. Furthermore, the proposed scheme selects a backup path with enough resources to satisfy renegotiated Quality of Service (QoS) of each backup group, among M backup paths. Our simulation results …

Dynamic Expansion of M:N Protection Groups in GMPLS Optical Networks

May 1, 2002
Author(s)
David W. Griffith, Sanghun Lee
… that traffic can be switched from damaged working paths to backup paths that are disjoint from the working paths that … paths between two client edge nodes are protected by M backup paths. The set of working and protection paths forms … groups are allowed to evolve over time, with working and backup paths being set up or torn down individually, it may …

Emergency Egress Strategies for Buildings

September 5, 2007
Author(s)
Richard W. Bukowski
… experts have called for a fundamental rethinking of egress strategies including all of the possible components that … | | 2007 | Interscience Communications … Emergency Egress Strategies for Buildings …

Security of Personal Computer Systems: A Management Guide

January 1, 1985
Author(s)
Dennis D. Steinauer
… and data access control o Integrity of software and data o Backup and contingency planning o Auditability o … (NIST SP) - 500-120 … access control, auditability, backup, computer security, contingency planning, cryptology, …

Strategies for Standardizing EDS Measurements

January 1, 2001
Author(s)
Nicholas Ritchie
… beam measurements of composition. However, the optimal strategies for acquiring EDS standards differ from its … Energy Dispersive X-ray Spectrometry, Standardization … Strategies for Standardizing EDS Measurements …

Strategies for Improving Robot Registration Performance

January 26, 2018
Author(s)
Karl Van Wyk, Jeremy A. Marvel
… This effort builds upon previous work by investigating strategies for improving the registration accuracy between a … with new test methodology to characterize the effects of strategies to improve registration performance. In addition, …

A Combinatorial Testing Strategy for Concurrent Programs

June 7, 2007
Author(s)
Yu Lei, Richard Carver, Raghu N. Kacker, David Kung
… with a given input. In this paper, we present a new testing strategy, called a t-way reachability testing, that adopts … of the SYN-sequences is based on a combinatorial testing strategy called a t-way testing. We present an algorithm … t-way testing, software testing … A Combinatorial Testing Strategy for Concurrent Programs …

BACnet at Georgia Tech

November 1, 2007
Author(s)
Donald Alexander, Cornelius Ejimofor, David Holmberg
… cost to alter control parameters to allow more saving strategies in the future. Additional strategies are being studied that use the RTP pricing …

IPOG: A General Strategy for t-Way Software Testing

March 29, 2007
Author(s)
Yu Lei, Raghu N. Kacker, D. Richard Kuhn, Vadim Okun, James F. Lawrence
… two parameters. In this paper, we generalize an existing strategy, called In-Parameter-Order (IPO), from pairwise … enable an efficient implementation of the generalized IPO strategy. We also report several experiments that are … Testing, Software Testing, T-Way Testing … IPOG: A General Strategy for t-Way Software Testing …

Technical and Economic Assessment of Internet Protocol Version 6 (IPv6)

January 31, 2006
Author(s)
Gregory C. Tassey, Douglas C. Montgomery, Alfred Lee, Tim Sloan
The President’s National Strategy to Secure Cyberspace (National Strategy) directed the Secretary of Commerce to form a task force to examine the most recent iteration of the Internet Protocol, IP version 6 (IPv6). The President charged the task force with

Benchmarking Active Learning Strategies for Materials Optimization and Discovery

July 9, 2022
Author(s)
Alex Wang, Haotong Liang, Austin McDannald, Ichiro Takeuchi, A. Gilad Kusne
… As the number, diversity and uses for active learning strategies grow, there is an associated growing necessity for real-world reference datasets to benchmark strategies. We present a reference dataset and demonstrate …

Economic Case Study: The Impact of NSTIC on the Internal Revenue Service

July 9, 2013
Author(s)
Gregory C. Tassey
The National Strategy for Trusted Identities in Cyberspace (NSTIC) offers a vision of more secure, efficient, and cost-effective authentication through widespread use of robust third-party credentials standardized to a national strategy. If successful

Standards Classification Strategy and Methodology

October 1, 1999
Author(s)
Neil Christopher, Jim G. Nell
… to interoperate more effectively. A classification strategy is presetned to categorize the standards identified … model, standards classification … Standards Classification Strategy and Methodology …

Mitigation Strategies for Autogenous Shrinkage Cracking

August 1, 2004
Author(s)
O M. Jensen
… shrinkage and early-age cracking problem. Mitigation strategies which will be discussed in this paper include: … problems may be created by the application of each of these strategies. But, with careful attention to detail in the …
Displaying 26 - 50 of 1482
Was this page helpful?