Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 351 - 375 of 2757

Draft B Report on the Key Comparison CCM.P-K4.2012 in Absolute Pressure from 1 Pa to 10 kPa

December 7, 2016
Author(s)
Jacob E. Ricker, Jay H. Hendricks, Thomas Bock, Prazak Dominik, Tokihiko Kobata, Jorge Torres, Irina Sadkovskaya
This report summarizes the Consultative Committee for Mass (CCM) key comparison CCM.P-K4.2012 for absolute pressure spanning the range of 1 Pa to 10 000 Pa. The comparison was completed via calibration of a transfer standard carried out at six NMIs during

UNCERTAINTY IN MULTI-SCALE CREEP RUPTURE LIFE MODELING AND A NEW APPROACH TO ESTIMATING FREQUENCY OF IN-SERVICE INSPECTION OF COMPONENTS AT ELEVATED TEMPERATURES (*)

April 3, 2018
Author(s)
Jeffrey T. Fong, Nathanael A. Heckert, James J. Filliben, Marvin J. Cohn
Uncertainty in modeling the creep rupture life of a full-scale component using experimental data at microscopic (Level 1), specimen (Level 2), and full-size (Level 3) scales, is addressed by applying statistical theory of prediction intervals, and that of

Editorial: Editorial re. Associate Editors

August 1, 2010
Author(s)
Dylan F. Williams
Our editing team is key to the success of the Transactions. The Associate Editors who commit to a term of service are dedicated individual who work on a strictly voluntary basis to ensure the high quality of the manuscripts that are published. this is not

Executive Guide to ADP Contingency Planning

January 1, 1982
Author(s)
James K. Shaw, Stuart W. Katzke
… … Special Publication (NIST SP) - 500-85 … ADP security, backup operations, computer security, contingency planning, …

Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database records, system files, configurations, user files, applications, and customer data, are all

Strategy and Modeling for Building DR Optimization

October 17, 2011
Author(s)
Richard Lau, Sami Ayyorgun, Siun Chuon Mau, Archan Misra, David Holmberg, Steven T. Bushby
… International Conference on Smart Grid Communications … Strategy and Modeling for Building DR Optimization …

Strategies for Closing the ITRS Funding Gap

August 18, 2008
Author(s)
Yaw S. Obeng, Stephen Knight, Joaquin (. Martinez
… CMOS, EUV, roadmap, technology, funding … IEEE Nano 08 … Strategies for Closing the ITRS Funding Gap …
Displaying 351 - 375 of 2757
Was this page helpful?