Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 426 - 450 of 7106

Computer Model of the Smoldering Ignition of Furniture.

November 1, 1992
Author(s)
Henri E. Mitler, George Walton
… This paper describes a user-friendly computer model, TMPSUB2. This model calculates the … furniture, smoldering, ignition, computer models, mathematical models, pyrolysis … Computer Model of the Smoldering Ignition of Furniture. …

A Computable General Equilibrium Model of Cedar Rapids

September 27, 2018
Author(s)
Jennifer Helgeson, Juan Fung, Cheyney O'Fallon, David Webb, Harvey Cutler
… This report presents the development of a Computable General Equilibrium (CGE) model for the regional … dividend, Community resilience, Flooding, Cedar Rapids, Computable General Equilibrium, CGE, Spatial … A Computable General Equilibrium Model of Cedar Rapids …

Computer Security Incident Handling Guide

January 16, 2004
Author(s)
Timothy Grance, Karen Kent, Brian Kim
… NIST Special Publication 800-61, Computer Security Incident Handling Guide, assists … document discusses the following items: 1) establishing a computer security incident response capability, including … computer security incident, CSIRT/CIRT, denial of service, …

Cybertrust in the IoT Age

July 31, 2018
Author(s)
Jeff Voas, D. Richard Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis
… creates new challenges with respect to trustworthiness. Computing, architecture, and verification changes are … in IoT? And what new opportunities will IoT bring to the computing profession and to consumers? To better understand …

Adding Attributes to Role Based Access Control

June 1, 2010
Author(s)
David R. Kuhn, Edward Coyne, Timothy Weil
Role based access control (RBAC) is a popular model for information security. It helps reduce the complexity of security administration and supports the review of permissions assigned to users, a feature critical to organizations that must determine their

Some Difficult Problems in the Modeling of Fire Spread

July 16, 2006
Author(s)
Kathryn M. Butler, Thomas J. Ohlemiller
A fire and the objects involved in the fire form a highly complex dynamic system. Important processes occur over a wide range of spatial and temporal scales, from the microscales of thermodynamics and chemical kinetics, through the mesoscales of heat

Begin at the beginning

January 1, 2009
Author(s)
Isabel M. Beichl
Computing in Science & Engineering … high-performance computing, scientific computing

Acceleration and Parallelization of ZENO/Walk-on-Spheres

June 1, 2016
Author(s)
Derek Juba, Walid Keyrouz, Michael V. Mascagni, Mary C. Brady, Michael Mascagni
… tool based on Monte Carlo methods (MCMs), used for computing material properties at the nanoscale. ZENO employs …

Motion-Model-Based Boundary Extraction

November 1, 1995
Author(s)
H Liu, Tsai H. Hong, Martin Herman, Rama Chellappa
Motion boundary extraction and optical flow computation are two subproblems of the motion recovery problem that cannot be solved independently of each other. They represent the most common dilemma in motion research. A popular approach uses an iterative

A Decomposition-Based Approach to Layered Manufacturing

June 1, 2002
Author(s)
I Llinkin, R Janardan, J J. Majhi, J Schwerdt, Miles E. Smid, Ram D. Sriram
This paper introduces a new approach for improving the performance and versatility of Layered Manufacturing (LM), which is an emerging technology that makes it possible to build physical prototypes of 3D parts directly from their computer models using a

DEPAF: A Computer Model for Design and Performance Analysis of Furnaces

August 15, 1977
Author(s)
J. Chi
… The report covers the development of a computer simulation program DEPAF (Design and Performance … furnaces, computer models, transmission, computer simulation, heat transfer, combustion, experiments, … DEPAF: A Computer Model for Design and Performance Analysis of Furnaces …

A Method for Handling the Extrapolation of Solid Crystalline Phases to Temperatures far above their Melting Point

January 31, 2020
Author(s)
Bo Sundman, Ursula R. Kattner, Sedigeh Bigdeli, Qing Chen, Alan Dinsdale, Bengt Hallstedt, Zhangting He, Mats Hillert, Richard Otis, Malin Selleby
Thermodynamic descriptions in databases for applications in computational thermodynamics require a number of models to describe the Gibbs energy of stable as well as metastable phases of the pure elements as a basis to model compounds and solution phases

ALOFT-PC: A Smoke Plume Trajectory Model for Personal Computers

March 1, 2003
Author(s)
William D. Walton, Kevin B. McGrattan, J V. Mullin
… domain version of the model for windows based personal computers. The model inputs include wind speed and … ALOFT-PC: A Smoke Plume Trajectory Model for Personal Computers

Preface

September 2, 2012
Author(s)
Andrew M. Dienstfrey, Ronald F. Boisvert
… Conference on Uncertainty Quantification in Scientific Computing … uncertainty quantification, scientific computing, decision making … Conference on Uncertainty Quantification in Scientific Computing

A practical verification and validation approach for Computational Wind Engineering simulations using an experimental design technique

November 23, 2016
Author(s)
R?onn Mac R?oinn, DongHun Yeo
… Understanding the sensitivity of computational wind engineering (CWE) solutions to simulation … yielding more reliable results with the least computational effort. To this end the study uses the … technique and seeks to verify the optimal size of the computational domain and level of mesh refinement. …

Psst, Can you Keep a Secret?

January 2, 2018
Author(s)
Apostol T. Vassilev, Nicky W. Mouha, Luis T. A. N. Brandao
The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables
Displaying 426 - 450 of 7106
Was this page helpful?