Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 251 - 275 of 7105

Computational Materials Science on the Internet

December 1, 1997
Author(s)
Dale P. Bentz, Edward J. Garboczi
… of the monograph, and how the monograph describes the computational materials science of concrete. Monograph is … building technology, computational, concrete, materials science, modelling … Computational Materials Science on the Internet …

The Advances of Computer-Aided Process Planning

January 1, 1983
Author(s)
Tommy Chang
… process planners and the desire to automate manufacturing, computer-aided process planning systems have been developed. … industry. This report first focuses on an introduction to computer-aided process planning approaches. Two approaches … implementation of each approach is shown. Several current computer- aided process planning systems (both variant and …

Computer Security Incident Handling Guide

August 6, 2012
Author(s)
Paul R. Cichonski, Thomas Millar, Timothy Grance, Karen Scarfone
Computer security incident response has become an important … This publication assists organizations in establishing computer security incident response capabilities and handling … and effectively. Topics covered include organizing a computer security incident response capability, handling …

Quantum computational advantage with a programmable photonic processor

June 1, 2022
Author(s)
L.S. Madsen, F. Laudenbach, M.F. Askarani, F. Rortais, T. Vincent, J.F.F. Bulmer, F.M. Miatto, L. Neuhaus, L.G. Helt, Matthew Collins, Adriana Lita, Thomas Gerrits, Sae Woo Nam, V.D. Vaidya, M. Menotti, I. Dhand, Zachary Vernon, N. Quesada, J. Lavoie
… The demonstration of quantum computational advantage is a key milestone in the race to … a particular quantum device can perform a well-defined computational task in a manner that exceeds the best … circuits [1, 2], and photonics [3, 4]. In both, the computational task involved sampling from a probability …

Computer Viruses and Related Threats: A Management Guide

August 1, 1989
Author(s)
John P. Wack, Lisa J. Carnahan
… for technical managers for the reduction of risk to their computer systems and networks from attack by computer viruses, unauthorized users, and related threats. … computer security, system administration, threats and … Computer Viruses and Related Threats: A Management Guide …

NIST 101. Computational Chemistry Comparison and Benchmark Database

November 1, 1999
Author(s)
Russell D. Johnson III
… of molecules and reactions for the evaluation of ab initio computational methods and to allow the comparison between different ab initio computational methods and experiment for the prediction of … and then the level of theory. The experimental and computational data is available as is (heats of formation in …

Entangling Superconducting Qubits over Optical Fiber - Towards Optimization and Implementation

November 22, 2022
Author(s)
Curtis Rau, Akira Kyle, Alexander Kwiatkowski, Will Warfield, Jacob Davidson, Maxime Nurwubusa, John Teufel, Ezad Shojaee, Konrad Lehnert, Tasshi Dennis
… sought-after applications such as distributed quantum computing. Optical photons are the natural way of encoding … IEEE International Conference on Quantum Computing and Engineering - QCE22 … Proceedings of IEEE International Conference on Quantum Computing and Engineering …

Computer Security Incident Handling Guide

March 7, 2008
Author(s)
Karen A. Scarfone, Timothy Grance, Kelly Masone
Computer security incident response has become an important … This publication assists organizations in establishing computer security incident response capabilities and handling … and effectively. Topics covered include organizing a computer security incident response capability, handling …

Computation of Fresnel Integrals. II

August 1, 2000
Author(s)
Klaus Mielenz
computation, Fresnel integrals, numerical approximations, … Computation of Fresnel Integrals. II …

Computer Security Division 2010 Annual Report

May 31, 2011
Author(s)
Patrick D. O'Reilly
… the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It … annual report, computer security, Computer Security Division, CSD, cyber security, FISMA, … Computer Security Division 2010 Annual Report …

Overcoming device unreliability with continuous learning in a population coding based computing system

September 25, 2018
Author(s)
Alice C. Mizrahi, Julie Grollier, Damien Querlioz, Mark D. Stiles
… Nanodevices have promising features for novel computing implementations, but also drawbacks like unreliability. The brain offers an example of a computing system working with unreliable components: neurons … synapses exhibit stochastic behavior and die regularly. Computing schemes inspired from biology may be able to take …

NIST ADVANCES IN COMPUTER-AIDED AND COMPUTATIONAL METHODS IN WIND ENGINEERING

October 19, 2012
Author(s)
Dong Hun Yeo, Franklin T. Lombardo, Dilip K. Banerjee, Eric J. Letvin, Emil Simiu, Marc L. Levitan, Florian A. Potra
… The paper summarizes recent research and development of computer-aided and computational methods in wind engineering at the National … turbulent winds inducing dynamic structural responses. 2. Computational Fluid Dynamics (CFD) estimates of aerodynamic … Wind engineering, Database-Assisted Design, Computational Fluid Dynamics, Extreme wind speed, …

MPInterfaces: A Materials Project based Python Tool for a High Throughput Computational Screening of Interfacial Systems

May 31, 2016
Author(s)
Arunima Singh, Kiran Mathew, Joshua Grabriel, Kamal Choudhary, Susan B. Sinnott, Albert Davydov, Francesca M. Tavazza, Richard G. Hennig
… has been developed to automate the high throughput computational screening and study of interfacial systems. The … of simple batch system agnostic workflows for in depth computational analysis using density functional theory or … interfacial systems. The package enables high-throughput computational screening of advanced materials, directly …

Head Tracking Using Stereo

December 6, 2000
Author(s)
D Russakoff, Martin Herman
Head tracking is an important primitive for smart environments and perceptual user interfaces where the poses and movements of body parts need to be determined. Most previous solutions to this problem are based on intensity images and, as a result, suffer

The Computational Materials Science of Concrete: Past-Present-Future

May 8, 2013
Author(s)
Edward Garboczi
… From its small beginnings back in the 1960s, computational materials science has come a long way. The … getting even more exciting with ideas like integrated computational materials engineering [1] being seriously … the Materials Genome Initiative [2]. The development of computational materials science has gone hand-in-hand with …

Computer Security and the Data Encryption Standard: Proceedings of the Conference on Computer Security and the Data Encryption Standard

February 1, 1978
Author(s)
Dennis K. Branstad
… the fifteen speakers who participated in the Conference on Computer Security and the Data Encryption Standard held at … technical information and guidance with respect to computer security and the Data Encryption Standard. Subjects … physical security, risk assessment, software security, computer network security, applications and implementation of …

Technology Assessment: Methods for Measuring the Level of Computer Security

October 1, 1985
Author(s)
William Neugent, John Gilligan, Lance Hoffman, Zella G. Ruthberg
… and assessment of methods for measuring the level of computer security in computer applications, systems, and installations. The … System Development Corporation (SDC) as part of the NBS Computer Security and Risk Management Standards Program. The … certification and accreditation, computer security, risk assessment, technology assessment …

They Know Your Weaknesses Do You?: Reintroducing Common Weakness Enumeration

May 1, 2016
Author(s)
Yan Wu, Yaacov Yesha, Irena Bojanova, Paul E. Black
Knowing what makes your software systems vulnerable to attacks will be exceptionally critical in the emerging future of interdependent clouds, cyber-physical systems, mobile apps, and big data sets. The Common Weakness Enumeration (CWE) is a respectable

A computational framework for designing Ni-based superalloy

August 31, 2017
Author(s)
Sheng Yen Li, Ursula R. Kattner, Carelyn E. Campbell
… A computational framework is proposed to provide an … Computational Materials Science … A computational framework for designing Ni-based superalloy …

Pictures as Primary Sources for Computer-Based Art History Data

September 1, 1984
Author(s)
Russell A. Kirsch
… paper is to call attention to tools drawn from parts of Computer Science, with which art historians are generally … art history data, computer science, automatic processing … Pictures as Primary Sources for Computer-Based Art History Data …
Displaying 251 - 275 of 7105
Was this page helpful?