Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 551 - 575 of 7106

Consolidated Compartment Fire Model (CCFM) Computer Code Application CCFM.VENTS. Part 1. Physical Basis (NISTIR 4342)

July 1, 1990
Author(s)
Leonard Y. Cooper, Glenn P. Forney
… a new-generation, multi-room, compartment fire model computer code, called the Consolidated Compartment Fire Model (CCFM) computer code. The idea was that such a code would … computer models, building fires, compartment fires, fire … Consolidated Compartment Fire Model (CCFM) Computer Code Application CCFM.VENTS. Part 1. Physical Basis …

Reconciliation of Experimental and Computed Thermodynamic Properties for Methyl-Substituted 3-Ring Aromatics. Part 1: 9 Methylanthracene

March 8, 2022
Author(s)
Andrei F. Kazakov, Eugene Paulechka, Robert D. Chirico
… the B3LYP/def2-QZVPD basis set. Excellent accord between computed and experimentally derived ideal-gas entropies is … of formation for 9-methylanthracene in the gas phase was computed with an atom-equivalent based protocol described … Reconciliation of Experimental and Computed Thermodynamic Properties for Methyl-Substituted …

A General Methodology for Deriving Network Propagation Models of Computer Worms

February 14, 2019
Author(s)
Shuvo Bardhan, Douglas C. Montgomery, James J. Filliben, Nathanael A. Heckert
… Externally-launched computer worms which maliciously propagate within networks … Networking, Computer Network, Network Propagation Models, Propagation … Methodology for Deriving Network Propagation Models of Computer Worms …

Adiabatic optimization without local minima

March 1, 2015
Author(s)
Stephen P. Jordan, Michael Jarret
Several previous works have investigated the circumstances under which quantum adiabatic optimization algorithms can tunnel out of local energy minima that trap simulated annealing or other classical local search algorithms. Here we investigate the even

High-Performance Computing Security Architecture, Threat Analysis, and Security Posture

February 9, 2024
Author(s)
Yang Guo, Ramaswamy Chandramouli, Lowell Wofford, Rickey Gregg, Gary Key, Antwan Clark, Catherine Hinton, Andrew Prout, Albert Reuther, Ryan Adamson, Aron Warren, Purushotham Bangalore, Erik Deumens, Csilla Farkas
… Security is essential component of high-performance computing (HPC). HPC systems often differ based on the … high-performance computing, HPC reference architecture, HPC security, HPC … High-Performance Computing Security Architecture, Threat Analysis, and …

Evaluation of the Computer Fire Model DETACT-QS

March 20, 2002
Author(s)
Morgan J. Hurley, Daniel M. Madrzykowski
… may be introduced. The potential for uncertainty in computer models is greater than within basic closed form … based codes, fire safety, case histories, fire models, computer models, evaluation, sensitivity analysis, scenarios, … Evaluation of the Computer Fire Model DETACT-QS …

Graphical Evaluation of Certainty of Smokeless PowderPopulation Association Using Computer-Intensive Statistics

October 16, 2008
Author(s)
William MacCrehan, J D. Secl, David L. Duewer
… Visual display of this comparison using both classical and computer-intensive statistics can be used to determine … boxes. The Monte Carlo Bootstrap (MCB) method of computer-intensive statistics was used to evaluate the two … classical statistics, computer-intensive statistics, forensic science, graphical …

An Efficient Large Eddy Simulation Algorithm for Computational Wind Engineering: Application to Surface Pressure Computations on a Single Building.

August 1, 1999
Author(s)
Ronald G. Rehm, Kevin B. McGrattan, Howard R. Baum, Emil Simiu
… Two incoming mean wind profiles are considered in these computations, one uniform with height and the other … building, a cubical building and a flat building. These computational results are compared with wind tunnel measurements and computations performed by other investigators. The agreement …

The Network Security Center: a System Level Approach to Computer Network Security

January 1, 1978
Author(s)
Frank Heinrich
… This report describes a unique approach to the solution of computer network security problems, and provides guidance in … access authorization, access control, authentication, computer network security, cryptography, end-to-end encryption, inter-computer network, internetting, NBS Data Encryption Standard, …

Closed Loop CNC Manufacturing -- Connecting the CNC to the Enterprise

November 26, 2007
Author(s)
Sid Venkatesh, Rich Morihara, John L. Michaloski, Frederick M. Proctor
Closed Loop manufacturing describes the use of feedback from a Computer Numerical Control (CNC) to the Enterprise Resource Planning (ERP) to help in business operations. Although conceptually simple, many obstacles make CNC-ERP connectivity difficult -

Investigating Multi-Tier and QoS-Aware Caching Based on ARC

October 16, 2023
Author(s)
Lydia Ait Oucheggou, Abdella Battou, Jalil Boukhobza, Stephane Rubini
… requirements. This concept is well established in Cloud environment with Service Level Agreement (SLA). In this … through the concept of penalty borrowed from the Cloud. QM-ARC is generic, as it can be applied whatever the …

Grid Computing

October 1, 2004
Author(s)
Christopher E. Dabrowski
… of large numbers of files in a loose, heterogeneous computing cluster. We go on to suggest that the framework is … Grid Computing
Displaying 551 - 575 of 7106
Was this page helpful?