An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
… present a preliminary research effort towards an effective computer support environment for the design and development … processes and examine the state-of-the-art of MEMS Computer-aided Design (CAD) and simulation systems. We then … collaborative framework, computer support, information model, knowledge modeling, …
Joseph A. Main, Yihai Bao, Hai S. Lew, Fahim Sadek, Vincent P. Chiarito, Stephen D. Robert
… This report presents an experimental and computational study of two precast concrete moment-frame … buildings, computational model, computer simulation, design standards, … An Experimental and Computational Study of Precast Concrete Moment Frames under a …
… in residential upholstered furniture (RUF), a novel 2-D computational model is developed to predict the smoldering … Polyurethane foam, Smoldering propensity, Buoyant airflow, Computational model … Smoldering Propensity in Upholstered Furniture: Using Computational and Experimental Methods to Aid the Selection …
P. Jonsson, G. Gaigalas, J Bieron, Charlotte F. Fischer, I. P. Grant
A revised version of Grasp2K [P. Jonsson, X. He, C. Froese Fischer, and I.P. Grant, Comput. Phys. Commun. 177 (2007) 597] is presented. It supports earlier non-block and block versions of codes as well as a new block version in which the njgraf library
… and characteristics of the specific measurement task. By computational metrology we mean the study of how data … of a CMS. This paper describes research at NIST on computational metrology. Metrological questions fall into two … Computational Metrology …
The development of architectures for control systems has been an active area of research for at least twenty years. This research has produced many different architectures which use different terminologies and address different issues. In order to analyze
B Lindseth, P Schwindt, John E. Kitching, D Fischer, V Shusterman
The development of clinical applications of magnetocardiography has been impeded by the large size of the magnetic-field measurement systems. Here we present the first measurements of the cardiac electromagnetic field with an ultra-small (2mm), atomic
… or measure the shape in two dimensions only. The X-ray computed tomography (XCT) based method presented here … metal, ceramic, cement, sand, shape, size, X-ray computed tomography, spherical harmonics, three dimensions … Three-Dimensional Particle Shape Analysis Using X-ray Computed Tomography: Experimental Procedure and Analysis …
We report observations and experience in the Computer Forensics Tool Testing (CFTT) project while developing methodologies to test interrupt 0x13 based software write block (SWB) tools. A write blocker allows access to all data on a storage device while
… providing equipment safety through the use of an auxiliary computer to be monitor operations in the workstation. Such a computer system can be used to check robot operations during … concepts, design and implementation of such an auxiliary computer on a robot operating in a machining workstation are …
… the law enforcement community to ensure the reliability of computer forensic tools. A capability is required to ensure … produce accurate and objective results. The goal of the Computer Forensic Tool Testing (CFTT) project at NIST is to establish a methodology for testing computer forensic software tools by development of general …
… We have directly observed the ion cloud distribution in an electron beam ion trap using visible … have the capability to measure both static and dynamic ion cloud distributions. The images provide infromation about the … which show that we can monitor the relaxation of the ion cloud toward equilibrium when the trapping conditions are …
… International Performance Computing and Communications Conference … International Performance Computing and Communications Conference (IPCCC) | 26th IEEE | …
… and other organizations have begun to augment their computer security efforts because of increased threats to computer security. Incidents involving these threats, including computer viruses, malicious user activity, and … Establishing a Computer Security Incident Response Capability (CSIRC) …
Andrea Jokisaari, P W. Voorhees, Jonathan E. Guyer, James A. Warren, O. G. Heinonen
We present the second set of benchmark problems for phase field models that are being jointly developed by the Center for Hierarchical Design (CHiMaD) and the National Insti- tute of Standards and Technology (NIST) along with input from other members in
Imad Hamchi, Mathieu Hoarau, Antoine Fillinger, Nicolas Crouzier, Lukas Diduch, Martial Michel, Vincent M. Stanford
… IASTED International Conference on Parallel and Distributed Computing Systems … International Conference on Parallel and Distributed Computing Systems …
… The Computer Forensic Tool Testing (CFTT) project at the National … since 2000. The project develops methodologies for testing computer forensic software tools by the creation of general … users to make informed choices about acquiring and using computer forensics tools, and for interested parties to …