An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Sarah Hesse, Kevin Fritz, Peter A. Beaucage, R. Paxton Thedford, Fei Yu, Francis Disalvo, Jin Suntivich, Ulrich Wiesner
… this trade-off, but success has remained limited when the strategies are employed individually. Here, the attributes of both strategies are combined and a scalable path to porous …
Yung-Tsun T. Lee, Max Ferguson, Kincho H. Law, Jinkyoo Park, Raunak Bhinge
… Engine. We compare the performance of the two deployment strategies with two predictive models, namely an energy … We describe how the response time of the two deployment strategies is related to the network latency and …
Daniel Cole, Stephen Erickson, Giorgio Zarantonello, Panyu Hou, Jenny Wu, Karl Horn, Daniel Slichter, Florentin Reiter, Christiane Koch, Dietrich Leibfried
… from photon scattering. We discuss this error source and strategies for its mitigation in detail. …
The U.S. federal agencies' strategy for research, development and deployment in support of the industries of construction has been developed with these industries by the Subcommittee on Construction and Building of the National Science and Technology
Pradeep Namboodiri, Jonathan Wyrick, Gheorghe Stan, Xiqiao Wang, Fan Fei, Ranjit Kashid, Scott Schmucker, Richard Kasica, Bryan Barnes, Michael Stewart, Richard M. Silver
Fabrication of quantum devices by atomic scale patterning with a Scanning Tunneling Microscope (STM) has led to the development of single/few atom transistors, few-donor/quantum dot devices for spin manipulation and arrayed few-donor devices for analog
David T. Butry, David H. Webb, Cheyney M. O'Fallon, Harvey Cutler
… could be used to determine optimal intervention strategies. Combined with intervention cost data and cost-effective risk mitigation strategies could be identified. …
Nicky W. Mouha, Mohammad Raunak, David R. Kuhn, Raghu N. Kacker
Cryptographic hash function implementations can be particularly difficult to test, and bugs can remain unnoticed for a very long time. We revisit the NIST SHA-3 hash function competition, and apply a new testing strategy to all available reference
The wide application of GPS carrier-phase (CP) time transfer is limited by the problem of boundary discontinuity (BD). The discontinuity has two categories. One is "day boundary discontinuity", which has been studied a lot and can be solved by a few
… purposes of the present paper are to (1) describe various strategies for locating these heaters so as to obtain the … computing the circular heater locations for the various strategies, (3) provide tabulated values for the desired …
Marianne M. Swanson, A Wohl, L Pope, Timothy Grance, Joan Hash, R Thomas
… specific contingency planning recommendations and provides strategies and techniques common to desktops and portable … (BIA), identify preventive controls, develop recovery strategies, develop an IT contingency plan, plan …
In the first stage of each run of a neutron lifetime experiment, a magnetic trap is filled with neutrons. In the second stage of each run, neutron decay events are observed. In a separate experiment of multiple runs, only background signals are measured
Varun Verma, Richard Mirin, Sae Woo Nam, Jan P. Hoepker, Maximilian Protte, Raimund Ricken, Victor Quiring, Christof Eigner, Christine Silberhorn, Tim J. Bartley
… characterization measurements. Furthermore, we describe strategies to improve the yield and efficiency of these …
The National Institute of Standards and Technologys Standards Coordination Office offers training to government agencies on standards, conformity assessment and related topics. One such course, Setting Standards: A Simulation Exercise in Strategy and
David F. Ferraiolo, Jeffrey M. Voas, George Hurlburt
This paper discusses system security policies. System policies are the set of rules that when implemented afford a strategy for the protection of information. The policy objectives are diverse and span the social-economic spectrum. System policies govern