Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 501 - 525 of 7106

Superconducting Optoelectronic Circuits for Neuromorphic Computing

March 23, 2017
Author(s)
Jeffrey M. Shainline, Sonia M. Buckley, Richard P. Mirin, Sae Woo Nam
… of neural networks and large-scale neuromorphic computing. The platform combines semiconducting few-photon … single-flux quantum, neural networks, neuromorphic computing … Superconducting Optoelectronic Circuits for Neuromorphic Computing

Quantum materials for energy-efficient neuromorphic computing: Opportunities and challenges

July 19, 2022
Author(s)
Axel Hoffmann, Shriram Ramanathan, Julie Grollier, Andrew Kent, Marcelo Rozenberg, Ivan Schuller, Oleg Shpyrko, Robert Dynes, Yeshaiahu Fainman, Alex Frano, Eric Fullerton, Giulia Galli, Vitaliy Lomakin, Shyue Ping Ong, Amanda K. Petford-Long, Jonathan A. Schuller, Mark Stiles, Yayoi Takamura, Yimei Zhu
… Neuromorphic computing approaches become increasingly important as we … Neuromorphic computing, spintronics, quantum materials, memristor, … Quantum materials for energy-efficient neuromorphic computing: Opportunities and challenges …

Consolidated Compartment Fire Model (CCFM) Computer Code Application CCFM.VENTS. Part 3. Catalog of Algorithms and Subroutines (NISTIR 4344)

July 1, 1990
Author(s)
Leonard Y. Cooper, Glenn P. Forney
… a new-generation, multi-room, compartment fire model computer code, called the Consolidated Compartment Fire Model (CCFM) computer code. The ideas was that such a code would … is a catalog of all the modular algorithms and associated computer subroutines used to simulate the physical phenomena …

Development of Computational Framework for Titanium Alloy Phase Transformation Prediction in Laser Powder-bed Direct Energy Additive Manufacturing

October 16, 2020
Author(s)
Zhi Liang, Ivan Zhirnov, Fan Zhang, Kevontrez K. Jones, David C. Deisenroth, Maureen E. Williams, Ursula R. Kattner, Kil-Won Moon, Wing-Kam Liu, Brandon M. Lane, Carelyn E. Campbell
… bare metal single laser track validation experiments, a computational framework is proposed to accelerate the design … (AM) specific alloys. Specifically, Additive Manufacturing-Computational fluid dynamics (AM- CFD) and Calculation of … CALPHAD, Computational fluid dynamics, Additive manufacturing, …

Computer Security Division 2015 Annual Report

August 10, 2016
Author(s)
Patrick D. O'Reilly, Gregory A. Witte, Larry Feldman
… responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s … annual report, Computer Security Division, CSD, cybersecurity, information … Computer Security Division 2015 Annual Report …

Computer Security Division 2014 Annual Report

August 20, 2015
Author(s)
Patrick D. O'Reilly, Gregory A. Witte, Larry Feldman
… responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s … annual report, Computer Security Division, CSD, cybersecurity, information … Computer Security Division 2014 Annual Report …

Using Nonoscillatory Splines to Model Urban Environments

January 15, 2004
Author(s)
David E. Gilsinn, Marjorie A. McClain, Christoph J. Witzgall
… case. We also discuss some of the details involved with computing these splines on irregularly spaced data. … 8th SIAM Conference on Geometric Design and Computing … of the 8th SIAM Conference on Geometric Design and Computing

Security Guidelines for Storage Infrastructure

October 26, 2020
Author(s)
Ramaswamy Chandramouli, Doron Pinhas
… Storage technology, just like its computing and networking counterparts, has evolved from … accessed through various interfaces and protocols to cloud-based storage resource access, which provides a … storage, hyper-converged storage, data protection, cloud storage, backup, replication. …

Guide to a Secure Enterprise Network Landscape

November 17, 2022
Author(s)
Ramaswamy Chandramouli
… Access to multiple cloud services, the geographic spread of enterprise … security functions (e.g., application/services security, cloud services access security, device or endpoint security), … cloud access security broker (CASB), firewall, …

Computational Thermochemistry

February 1, 1998
Author(s)
Karl K. Irikura
Computational Thermochemistry: Prediction and Estimation of … Computational Thermochemistry …
Displaying 501 - 525 of 7106
Was this page helpful?