Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 276 - 300 of 7105

The Need for Reliable Experimental Data in Computational Thermodynamics

February 28, 2020
Author(s)
Ursula R. Kattner
Computational methods have become indispensable tools for … and have led to the new discipline of integrated computational materials engineering (ICME). The CALPHAD … CALPHAD, computational thermodynamics, computational data, experimental data, phase equilibria data, …

Evolutionary Computation Approach to Heat Exchanger Design

June 26, 2010
Author(s)
David A. Yashar, Janusz Wojusiak, Kenneth Kaufman, Piotr A. Domanski
… of the tubes. This paper describes an evolutionary computation-based approach to designing an optimized … to generate designs, the knowledge-based evolutionary computation module and the symbolic learning-based evolutionary computation module. The optimization example presented in …

Design Alternatives for Computer Network Security

January 1, 1978
Author(s)
Gerald D. Cole, Dennis K. Branstad
… of computers are an extension of those of stand-alone computer systems, but require additional security controls … to the network security problems of a large class of computer networks , and that such security mechanisms should … access control, authentication, communication, computer networks, cryptography, encryption, security …

Spintronics

September 20, 2016
Author(s)
Hideo Ohno, Mark D. Stiles, Bernard Dieny
… for magnetic recording, which provides the basis of cloud systems; through nonvolatile memories; the low power … voltage-control of magnetism, spin-based quantum computing and sensing, and bioinspired computing. … MRAM, read head, magnetic sensor, bio-inspired computing, neuromorphic computing, three terminal device, …

Investigating Resource Allocation in a Standards-Based Grid Compute Economy

October 31, 2007
Author(s)
Christopher E. Dabrowski
… work investigating resource allocation in a simulated grid compute economy where consumers and providers employ software … distributed resource allocation, grid compute economy, grid computing standards, service level … Investigating Resource Allocation in a Standards-Based Grid Compute Economy …

Adaptive Grid Refinement and Multigrid on Cluster Computers

April 1, 2001
Author(s)
William F. Mitchell
… for solving partial differential equations on sequential computers. Recently, research has been performed on … multigrid process. This is particularly true on cluster computers, which have slow communication channels that … adaptive methods, cluster computers, multilevel, parallel algorithms …

Role of non-linear data processing on speech recognition task in the framework of reservoir computing

January 15, 2020
Author(s)
Flavio Abreu Araujo, Mathieu Riou, Jacob Torrejon, Sumito Tsunegi, Damien Querlioz, K. Yakushiji, Akio Fukushima, Hitoshi Kubota, Shinji Yuasa, Mark D. Stiles, Julie Grollier
… The reservoir computing neural network architecture is widely used to test hardware systems for neuromorphic computing. One of the preferred tasks for bench-marking such … the gain in word success rate provided by a reservoir computing device, which is an appropriate bench-mark for …

Analyzing Data Privacy for Edge Systems

July 14, 2022
Author(s)
Olivera Kotevska, Jordan Johnson, A. Gilad Kusne
… transitioning from IoT processing being performed on the cloud to the edge. While moving to the edge provides … significant networking efficiency benefits, IoT edge computing creates significant data privacy concerns. We … IEEE International Conference on Smart Computing

Computer Modelling of Interfacial Transition Zone: Microstructure and Properties.

January 1, 1999
Author(s)
Dale P. Bentz, Edward J. Garboczi
… been either initiated or accompanied by advances in the computer modelliug of ITZ microstructure and properties. In … models have been substantiated and further developed via computer simulations. This chapter provides a review of the … computer models, zone models, microstructure, concretes, …

NIST cloud computing forensic science challenges:

August 1, 2020
Author(s)
Martin Herman, Michaela Iorga, Ahsen Michael Salim, Robert H Jackson, Mark R Hurst, Ross Leo, Richard Lee, Nancy M Landreville, Anand Kumar Mishra, Yien Wang, Rodrigo Sardinas
… NIST cloud computing forensic science challenges: …

US Government Cloud Computing Technology Roadmap:

October 1, 2014
Author(s)
Lee Badger, David Bernstein, Robert Bohn, Frederic de Vaulx, Mike Hogan, Michaela Iorga, Jian Mao, John Messina, Kevin Mills, Eric Simmon, Annie Sokol, Jin Tong, Fred Whiteside, Dawn Leaf
… US Government Cloud Computing Technology Roadmap: …

The Use of Computer Simulations to Interpret and Understand Electrical Measurements

December 1, 1997
Author(s)
Edward J. Garboczi
… the electrical response of the microstructure. The use of computer simulations, both to generate material shape and … solve the electrical equations, is then required. Computer simulations allow the use of more complex hypotheses … Building technology, computer simulation, electrical properties, microstructure, …

Computing elastic moduli on 3-D X-ray computed tomography image stacks

December 10, 2014
Author(s)
Edward Garboczi, Volodymyr Kushch
… 3D digital image of the microstructure obtained via X-ray computed tomography (CT). The 3-D image is usually … important details of the random microstructure so that the computed moduli are accurate, and what boundary conditions … composite, analytical solutions, boundary conditions, X-ray computed tomography, elastic moduli, finite element …

Audit and Evaluation of Computer Security

October 1, 1977
Author(s)
Zella G. Ruthberg, Robert G. McKenzie
… an invitational workshop on "Audit and Evaluation of Computer Security," held in Miami Beach, Florida on March … for future research. Leading experts in the audit and computer communities were invited to discuss the subject in … audit tools, audit training, communications security, computer controls, computer security, data integrity, …

Variant Design for Mechanical Artifacts: A State-of-the-Art Survey

July 1, 1996
Author(s)
James E. Fowler
Variant design refers to the technique of adapting existing design^M specifications to satisfy new design goals and constraints. A survey of^M approaches supporting variant designs is presented. Capabilities used in^M current commercial computer aided

Modeling Quantum Information Systems

August 24, 2004
Author(s)
Paul E. Black, Andrew W. Lane
… real system. We illustrate with examples from our quantum computing simulator, QCSim. We model the [3,1} Hamming code … BB84, modeling, quantum computing, quantum simulation, teleportation …

Common Memory for the Personal Computer

January 1, 1988
Author(s)
Siefried Rybczynski
… accompanying software collection, and lists the personal computer (PC) configuration prerequisites of the PC common … computer, configuration, pc, programming, input/output … Common Memory for the Personal Computer

Computer Security Division 2009 Annual Report

March 23, 2010
Author(s)
Patrick D. O'Reilly
… the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2009. It … annual report, Computer Security Division, projects, highlights … Computer Security Division 2009 Annual Report …

Computer Security Division 2008 Annual Report

March 16, 2009
Author(s)
Patrick D. O'Reilly
… the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2008. It … annual report, Computer Security Division, projects, highlights … Computer Security Division 2008 Annual Report …
Displaying 276 - 300 of 7105
Was this page helpful?