Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 601 - 625 of 7106

Information and Knowledge Modeling for Computer Supported Micro Electro-Mechanical Systems Design and Development

July 1, 2005
Author(s)
XuanFang Zha, Ram D. Sriram, Satyandra K. Gupta
… present a preliminary research effort towards an effective computer support environment for the design and development … processes and examine the state-of-the-art of MEMS Computer-aided Design (CAD) and simulation systems. We then … collaborative framework, computer support, information model, knowledge modeling, …

Ephemera

January 11, 2010
Author(s)
Isabel M. Beichl
Computing in Science & Engineering … data processing, scientific computing, soft errors, software …

I Can't Type That! P@$$w0rd Entry on Mobile Devices

June 22, 2014
Author(s)
Kristen Greene, Melissa A. Gallagher, Brian C. Stanton, Paul Y. Lee
… complex passwords — an already burdensome task on desktop computing systems —becomes nearly unbearable on small mobile …

Smoldering Propensity in Upholstered Furniture: Using Computational and Experimental Methods to Aid the Selection of an Appropriate Smoldering Scenario

February 25, 2020
Author(s)
Jiuling Yang, Mauro Zammarano, Guillermo Rein, Haixiang Chen
… in residential upholstered furniture (RUF), a novel 2-D computational model is developed to predict the smoldering … Polyurethane foam, Smoldering propensity, Buoyant airflow, Computational model … Smoldering Propensity in Upholstered Furniture: Using Computational and Experimental Methods to Aid the Selection …

New Version: Grasp2K Relativistic Atomic Structure Package

February 19, 2013
Author(s)
P. Jonsson, G. Gaigalas, J Bieron, Charlotte F. Fischer, I. P. Grant
A revised version of Grasp2K [P. Jonsson, X. He, C. Froese Fischer, and I.P. Grant, Comput. Phys. Commun. 177 (2007) 597] is presented. It supports earlier non-block and block versions of codes as well as a new block version in which the njgraf library

Where the Rubber Meets the Road

September 1, 2009
Author(s)
Isabel M. Beichl
… This is an editorial on the importance of scientific computing. … Computing in Science & Engineering …

Computational Metrology

September 1, 1993
Author(s)
Ted Hopp
… and characteristics of the specific measurement task. By computational metrology we mean the study of how data … of a CMS. This paper describes research at NIST on computational metrology. Metrological questions fall into two … Computational Metrology …

A Framework for Control Architecture

January 1, 1996
Author(s)
M. K. Senehi, R Kramer
The development of architectures for control systems has been an active area of research for at least twenty years. This research has produced many different architectures which use different terminologies and address different issues. In order to analyze

Three-Dimensional Particle Shape Analysis Using X-ray Computed Tomography: Experimental Procedure and Analysis Algorithms for Metal Powder

November 23, 2019
Author(s)
Edward Garboczi, Nikolas Hrabe
… or measure the shape in two dimensions only. The X-ray computed tomography (XCT) based method presented here … metal, ceramic, cement, sand, shape, size, X-ray computed tomography, spherical harmonics, three dimensions … Three-Dimensional Particle Shape Analysis Using X-ray Computed Tomography: Experimental Procedure and Analysis …

Testing BIOS Interrupt 0x13 Based Software Write Blockers

March 1, 2005
Author(s)
James R. Lyle, Paul E. Black
We report observations and experience in the Computer Forensics Tool Testing (CFTT) project while developing methodologies to test interrupt 0x13 based software write block (SWB) tools. A write blocker allows access to all data on a storage device while

Watchdog Safety Computer Design and Implementation

June 7, 1984
Author(s)
R Kilmer, H Mccain, Maris Juberts, Steven Legowik
… providing equipment safety through the use of an auxiliary computer to be monitor operations in the workstation. Such a computer system can be used to check robot operations during … concepts, design and implementation of such an auxiliary computer on a robot operating in a machining workstation are …

NIST CFTT: Testing Computer Forensics Tools

February 1, 2004
Author(s)
James R. Lyle
… the law enforcement community to ensure the reliability of computer forensic tools. A capability is required to ensure … produce accurate and objective results. The goal of the Computer Forensic Tool Testing (CFTT) project at NIST is to establish a methodology for testing computer forensic software tools by development of general …

Direct Imaging of Highly Charged Ions in an Electron Beam Ion Trap

August 1, 2000
Author(s)
James V. Porto, I Kink, John D. Gillaspy
… We have directly observed the ion cloud distribution in an electron beam ion trap using visible … have the capability to measure both static and dynamic ion cloud distributions. The images provide infromation about the … which show that we can monitor the relaxation of the ion cloud toward equilibrium when the trapping conditions are …

Dystopia

November 1, 2010
Author(s)
Isabel M. Beichl
… This is an editorial for Computing in Science & Engineering on the subject of … Computing in Science & Engineering …

Establishing a Computer Security Incident Response Capability (CSIRC)

November 1, 1991
Author(s)
John P. Wack
… and other organizations have begun to augment their computer security efforts because of increased threats to computer security. Incidents involving these threats, including computer viruses, malicious user activity, and … Establishing a Computer Security Incident Response Capability (CSIRC) …

Phase Field Benchmark Problems for Dendritic Growth and Linear Elasticity

June 15, 2018
Author(s)
Andrea Jokisaari, P W. Voorhees, Jonathan E. Guyer, James A. Warren, O. G. Heinonen
We present the second set of benchmark problems for phase field models that are being jointly developed by the Center for Hierarchical Design (CHiMaD) and the National Insti- tute of Standards and Technology (NIST) along with input from other members in

A DATA FLOW IMPLEMENTATION OF AGENT-BASED DISTRIBUTED GRAPH SEARCH

November 4, 2009
Author(s)
Imad Hamchi, Mathieu Hoarau, Antoine Fillinger, Nicolas Crouzier, Lukas Diduch, Martial Michel, Vincent M. Stanford
… IASTED International Conference on Parallel and Distributed Computing Systems … International Conference on Parallel and Distributed Computing Systems …

Ten years of computer forensic tool testing

October 12, 2011
Author(s)
James R. Lyle, Barbara Guttman, Richard Ayers
… The Computer Forensic Tool Testing (CFTT) project at the National … since 2000. The project develops methodologies for testing computer forensic software tools by the creation of general … users to make informed choices about acquiring and using computer forensics tools, and for interested parties to …
Displaying 601 - 625 of 7106
Was this page helpful?