Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 501 - 525 of 1498

Nano-opto-electro-mechanical switches operated at CMOS-level voltages

November 15, 2019
Author(s)
Christian Haffner, Andreas Joerg, Michael Doderer, Daniel Chelladurai, Felix Mayor, Comsin Ioan Roman, Yuriy Fedoryshyn, Mikael Mazur, Maurizio Burla, Henri J. Lezec, Vladimir A. Aksyuk, Juerg Leuthold
Reprogrammable optical networks that operate in symbiosis with CMOS electronics promise to advance technologies such as optical neural networks. However, current electro-optical switching technologies fail to combine CMOS-voltages, micrometer-scale

Constraint Handling In Combinatorial Test Generation Using Forbidden Tuples

April 13, 2015
Author(s)
Raghu N. Kacker, David R. Kuhn, Yu Lei
Constraint handling is a challenging problem in combinatorial test generation. In general, there are two ways to handle constraints, i.e., constraint solving and forbidden tuples. In our early work we proposed a constraint handling approach based on

Indoor Air Quality in Sustainable, Energy Efficient Buildings

May 15, 2012
Author(s)
Andrew K. Persily, Steven J. Emmerich
… sometimes viewed as incompatible, there are in fact many strategies than can achieve both ends. This paper discusses … air ventilation being the primary connection. A number of strategies that are currently being used or proposed to …

Toward Energy Efficient Manufacturing Enterprises

February 2, 2011
Author(s)
Kevin W. Lyons, Alexander Weissman, Ram D. Sriram, Lalit Chordia
… enterprises. In this chapter, we outline several different strategies for improving the energy efficiency in … process level energy efficiency and the other two strategies. …

Guidelines for the Secure Deployment of IPv6

December 29, 2010
Author(s)
Sheila E. Frankel, Richard Graveman, John Pearce, Mark Rooks
… now to understand the risks of deploying IPv6, as well as strategies to mitigate such risks. Detailed planning will …

Multizone Modeling Approaches to Contaminant-Based Design

June 1, 2002
Author(s)
A L. Musser, Andrew K. Persily
… buildup during an overnight shutdown is also studied, and strategies for a pre-occupancy purge are developed. The model … or design conditions that must be addressed, and discusses strategies that could be used to meet them with …

Template synthesis of gold nanoparticles with an organic molecular cage

January 16, 2014
Author(s)
Ryan McCaffrey, Hai Long, Yinghua Jin, Aric Sanders, Wounjhang Park, Wei Zhang
We report a novel strategy for the controlled synthesis of gold nanoparticles (AuNPs) with narrow size distribution (1.9 plus or minus} 0.4 nm) through NP nucleation and growth inside the cavity of a well-defined three-dimensional, shape-persistent organic

Quest for a Highly Connected Robust Porous Metal-Organic Framework on the Basis of a Bifunctional Linear Linker and a Rare Heptanuclear Zinc Cluster

November 18, 2013
Author(s)
Wen-Yang Gao, Rong Cai, Le Meng, Lukasz Wojtas, Wei Zhou, Taner N. Yildirim, Xiaodong Shi, Shengqian Ma
A strategy for achieving high-connected robust MOFs by linear ligands is exemplified by the construction of MTAF-4, a rare (6, 9)-connected 10 MOF based upon the custom-designed bifunctional linear ligand, 4-(1,2,3-triazol-4-yl)-benzoate that connects two

Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

September 30, 2011
Author(s)
Kelley L. Dempsey, L A. Johnson, Matthew A. Scholl, Kevin M. Stine, Alicia Clay Jones, Angela Orebaugh, Nirali S. Chawla, Ronald Johnston
The purpose of this guideline is to assist organizations in the development of a continuous monitoring strategy and the implementation of a continuous monitoring program providing visibility into organizational assets, awareness of threats and

Free and Open Source Software

December 13, 2010
Author(s)
Keith Miller, Jeff Voas, Tom Costello
In this paper, free and open source software are discussed. Open source is an intellectual property destroyer. Nothing could be worse than this for the software business and the intellectual-property business. Microsoft has an official open source presence

Quantum information processing with trapped ions,

January 1, 2003
Author(s)
David J. Wineland, Murray D. Barrett, Joseph W. Britton, J Chiaverini, B. L. DeMarco, Wayne M. Itano, Branislav M. Jelenkovic, Christopher Langer, Dietrich G. Leibfried, Till P. Rosenband, T Schaetz
Experiments directed towards the development of a quantum computer based on trapped atomic ions are described briefly. We discuss the implementation of single-qubit operations and gates between qubits. A geometric phase gate between two ion qubits is

Dehydrogenation Tuning of Ammine Borohydrides using Double-Metal Cations

March 10, 2011
Author(s)
Yanhui Guo, Hui Wu, Wei Zhou, Xuebin Yu
The strategy of using double-cation to tune the temperature and purity of dehydrogenation of ammine borohydrides is reported. The first double-cation ammine borohydride, Li 2Al(BH 4) 5¿6NH 3, which forms a novel structure with ordered arrangement of Al(NH
Displaying 501 - 525 of 1498
Was this page helpful?