Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 451 - 475 of 7106

A Computational Model of an Outward Leak from a Closed-Ciucuit Breathing Device

July 3, 2008
Author(s)
Kathryn M. Butler
… of outward leakage around the facepiece. This study uses computational fluid dynamics (CFD) to investigate the … during the breathing cycle. The physical boundary for the computational problem is defined by the combination of … closed-circuit SCBA, computational model, respirator leak, flammability, …

Psst, Can you Keep a Secret?

January 2, 2018
Author(s)
Apostol T. Vassilev, Nicky W. Mouha, Luis T. A. N. Brandao
The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables

Applied and Computational Mathematics Division, Summary of Activities for Fiscal Year 2014

June 2, 2015
Author(s)
Ronald F. Boisvert
… report summarizes the technical work of the Applied and Computational Sciences Division of NIST’s Information … mathematics, mathematical modeling, mathematical software, computational science, high performance computing, scientific … Applied and Computational Mathematics Division, Summary of Activities for …

ITL Forensic Science Program

June 5, 2014
Author(s)
Barbara Guttman, Martin Herman, Michaela Iorga, Larry Feldman, Kim Quill
cloud forensics, computer forensics, forensic science, …

Emergence, Creativity, and Computational Tractability in Shape Grammers

March 1, 1997
Author(s)
Scott Chase
… representations) which in be enacted toward the goal of computational tractability, can hopefully lead to computer … Proceedings of the Creativity and Computational Tractability in Shape Grammars in Preprints of … Emergence, Creativity, and Computational Tractability in Shape Grammers …

Design and Fabrication of an Operating Room Computer Assisted Orthopaedic Hip Surgery Artifact

August 17, 2007
Author(s)
Nicholas G. Dagalakis, Yong Sik Kim, Daniel S. Sawyer, Craig M. Shakarji
… mobility and even joint dislocation or impingement. Computer Assisted Surgery (CAS) systems have been developed … artifact, computer assisted surgery, hip arthroplasty, phantom … Design and Fabrication of an Operating Room Computer Assisted Orthopaedic Hip Surgery Artifact …

Computer Simulation of the Liquid Agent Spray Motion and Evaporation

July 18, 1994
Author(s)
G. Gmurczyk, Leonard Y. Cooper, William L. Grosshandler, William M. Pitts
… partially implicit scheme. The Conchas-Spray computer code of Los Alamos National Laboratory has been used … have been presented and the potential of the model and computer code have been discussed. … sprays, evaporation, computer simulation, fire extinguishing agents, halon 1301, …

Analysis of Different Computational Techniques for Calculating the Polarizability Tensors of Stem Cells with Realistic Three-Dimensional Morphologies

June 21, 2019
Author(s)
Edward Garboczi, Jack Douglas, Beatriz Pazmino, Ahmed M. Hassan, Somen Baidya
… Therefore, in this work we present three independent computational solvers for calculating the polarizability … dielectric permittivity of their environment. Using our computational results, we performed statistical analysis to … generates cells with similar electric properties. The computational techniques and the results reported herein can …

A Denial-of-Service Resistant Intrusion Detection Architecture

October 1, 2000
Author(s)
Peter M. Mell, D G. Marks, Mark McLarnon
As the capabilities of intrusion detection systems (IDS) advance, attackers may attempt to disable an organization's IDS before attempting to penetrate more valuable targets. As IDSs evolve into distributed systems withinterdependent components, they are

Trapped Ions, Entanglement, and Quantum Computing, ed. by B.L. Fearey

January 1, 1998
Author(s)
C J. Myatt, B E. King, D Kielpinski, Dietrich Leibfried, Q A. Turchette, Chris S. Wood, Wayne M. Itano, C Monroe, David J. Wineland
… quantum computing, quantum logic, ion traps, laser cooling and … Trapped Ions, Entanglement, and Quantum Computing, ed. by B.L. Fearey …

Trapped Highly Charged Ion Plasmas

January 1, 2002
Author(s)
E Takacs, John D. Gillaspy
… parameter, Brillouin radius, magnetic trapping mode, ion cloud shape, density, temperature, rotation, and evaporative … ion trap, evaporative cooling, highly charged ions, ion cloud imaging, magnetic trapping, non-neutral plasmas, …

Sketchnoting: An Analog Skill in the Digital Age

November 1, 2016
Author(s)
Robert M. Dimeo
In the last decade, a method of notetaking incorporating hand-drawn visual elements has become an increasingly popular technique for recording information from meetings and presentations at conferences. Why has it become so popular? Proponents and

Computer Security Division 2013 Annual Report

September 4, 2014
Author(s)
Patrick D. O'Reilly, Gregory A. Witte, Chris Johnson, Doug Rike
… responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s … Federal Information Security Management Act, FISMA, Computer Security Division, CSD, Information Security … Computer Security Division 2013 Annual Report …

Computer Security Division 2012 Annual Report

July 22, 2013
Author(s)
Patrick D. O'Reilly
… responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s … Federal Information Security Management Act, FISMA, Computer Security Division, CSD, Information Security … Computer Security Division 2012 Annual Report …
Displaying 451 - 475 of 7106
Was this page helpful?