Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 951 - 975 of 2763

Entanglement Routing in Quantum Networks: A Comprehensive Survey

February 11, 2025
Author(s)
Amar Abane, Michael Cubeddu, Van Sy Mai, Abdella Battou
… to and inspiration from classical network routing strategies where applicable. We draw comparisons between well-studied routing strategies, including reactive, proactive, opportunistic, …

A Roadmap for LIMS at NIST Material Measurement Laboratory

April 11, 2022
Author(s)
Gretchen Greene, Jared Ragland, Zachary Trautt, June W. Lau, Raymond Plante, Joshua Taillon, Adam Abel Creuziger, Chandler A. Becker, Joe Bennett, Niksa Blonder, Lisa Borsuk, Carelyn E. Campbell, Adam Friss, Lucas Hale, Michael Halter, Robert Hanisch, Gary R. Hardin, Lyle E. Levine, Samantha Maragh, Sierra Miller, Chris Muzny, Marcus William Newrock, John Perkins, Anne L. Plant, Bruce D. Ravel, David J. Ross, John Henry J. Scott, Christopher Szakal, Alessandro Tona, Peter Vallone
… therefore compel our organization to adopt advanced strategies for research data management. Laboratory …

Nano-opto-electro-mechanical switches operated at CMOS-level voltages

November 15, 2019
Author(s)
Christian Haffner, Andreas Joerg, Michael Doderer, Daniel Chelladurai, Felix Mayor, Comsin Ioan Roman, Yuriy Fedoryshyn, Mikael Mazur, Maurizio Burla, Henri J. Lezec, Vladimir A. Aksyuk, Juerg Leuthold
Reprogrammable optical networks that operate in symbiosis with CMOS electronics promise to advance technologies such as optical neural networks. However, current electro-optical switching technologies fail to combine CMOS-voltages, micrometer-scale

Constraint Handling In Combinatorial Test Generation Using Forbidden Tuples

April 13, 2015
Author(s)
Raghu N. Kacker, David R. Kuhn, Yu Lei
Constraint handling is a challenging problem in combinatorial test generation. In general, there are two ways to handle constraints, i.e., constraint solving and forbidden tuples. In our early work we proposed a constraint handling approach based on

Indoor Air Quality in Sustainable, Energy Efficient Buildings

May 15, 2012
Author(s)
Andrew K. Persily, Steven J. Emmerich
… sometimes viewed as incompatible, there are in fact many strategies than can achieve both ends. This paper discusses … air ventilation being the primary connection. A number of strategies that are currently being used or proposed to …

Toward Energy Efficient Manufacturing Enterprises

February 2, 2011
Author(s)
Kevin W. Lyons, Alexander Weissman, Ram D. Sriram, Lalit Chordia
… enterprises. In this chapter, we outline several different strategies for improving the energy efficiency in … process level energy efficiency and the other two strategies. … Kevin W. Lyons , Alexander Weissman, Ram D. …

Guidelines for the Secure Deployment of IPv6

December 29, 2010
Author(s)
Sheila E. Frankel, Richard Graveman, John Pearce, Mark Rooks
… now to understand the risks of deploying IPv6, as well as strategies to mitigate such risks. Detailed planning will …
Displaying 951 - 975 of 2763
Was this page helpful?