Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 676 - 700 of 7106

Computational Issues in the Kinematic Design

January 1, 1998
Author(s)
Walter W. Nederbragt, Bahram Ravani
… This paper discusses computational issues in kinematic design of tac- tile sensing … Computational Issues in the Kinematic Design …

ASET-B: Comparison of Model Predictions With Full-Scale Test Data.

February 1, 2003
Author(s)
M J. Hurley
The proper use of computer fire models requies an understanding of their applicability and limitations, since all computer models are, at least to a certain extent, empirically based. Equations or constants used within computer models are frequently based

Smart Card Technology: New Methods for Computer Access Control

September 1, 1988
Author(s)
Martha E. Haykin, Robert B. Warnar
… development. Possible roles for smart cards in modern computer security systems and research conducted at the … access control, authentication, biometrics, computer security, cryptography, Data Encryption Standard … Smart Card Technology: New Methods for Computer Access Control …

Firearm examination: Examiner judgments and computer-based comparisons

September 24, 2020
Author(s)
Erwin J. Mattijssen, Cilia Witteman, Charles Berger, Xiaoyu Alan Zheng, Johannes A. Soons, Reinoud Stoel
… cases. We assessed the validity of source decisions of a computer-based method and of 73 firearm examiners who … impressions of 48 comparisons sets. We also compared the computer-based method's comparison scores with the examiners' … of this study show that the source decisions of the computer-based method and the examiners were quite valid (TPR …

Quantum computing hardware for HEP algorithms and sensing

April 19, 2022
Author(s)
Corey Rae McRae
… quantum advantage in multiple domains, from quantum computing to communications, to sensing. The Superconducting … is dedicated to providing breakthroughs in quantum computing and sensing, mediating quantum engineering and HEP … Quantum computing hardware for HEP algorithms and sensing …

Strategies for Parallel Markup

July 12, 2015
Author(s)
Bruce R. Miller
Cross-referenced parallel markup for mathematics allows the combination of both presentation and content representations while associating the components of each. Interesting applications are enabled by such an arrangement, such as interaction with parts

A=B?

May 1, 2000
Author(s)
Isabel M. Beichl, F Sullivan
… IEEE Computing in Science and Engineering …

Phase Transitions in Random Circuit Sampling

October 9, 2024
Author(s)
Sergio Boixo, Rene Peralta
Undesired coupling to the surrounding environment destroys long-range correlations on quantum processors and hinders the coherent evolution in the nominally available computational space. This noise is an outstanding challenge to leverage the computation

A Distributed Database Architecture for an Integrated Manufacturing Facility

July 1, 1987
Author(s)
V Krishnamurthy, Stanley Su, H Lam, Mary Mitchell, Edward J. Barkmeyer Jr.
A typical manufacturing facility uses a set of heterogeneous computer systems to support various design, planning, and manufacturing activities. These systems usually consist of different hardware (computers, NC machines, robots and workstations), software

Design Modeling With Shape Algebras and Formal Logic

September 1, 1996
Author(s)
Scott Chase
A new method of describing designs by combining the paradigms of shape algebras and predicate logic representations is presented. Representing shapes and spatial relations in logic provides a natural, intuitive method of developing complete computer

Determining the Determinant

September 1, 2000
Author(s)
Isabel M. Beichl, F Sullivan
… you could combine this with the method in a previous Computing Prescription 1 on the Chinese Remainder theorem. … algorithm that is useful for exact computation. Computing a larger determinant exactly also arises in computing the Pfaffian, which is a matrix operation whose …

Computer Model Documentation Guide

January 7, 1981
Author(s)
Roger J. Martin
… provides guidelines for preparing documentation for computer models. Recommended structures for four types of … Computer Model Documentation Guide …

Combinatorial Testing: Theory and Practice

August 18, 2015
Author(s)
David R. Kuhn, Renee Bryce, Feng Duan, Laleh Ghandehari, Yu Lei, Raghu N. Kacker
Combinatorial testing has rapidly gained favor among software testers in the past decade as improved algorithms have become available, and practical success has been demonstrated. This article reviews the theory and application of this method, focusing

Computerized Fire Simulations For Use In Fatal Fire Investigations

February 1, 2003
Author(s)
Daniel M. Madrzykowski
Learning Objective: To develop a conceptual understanding of fire modeling, model capabilities and the application of fire models to investigations.In conjunction with the National Institute for Occupational Safety and Health (NIOSH), the National

Algorithm xxx: Airy Functions

December 15, 2004
Author(s)
Bruce R. Fabijonas, Daniel W. Lozier, Frank W. Olver
… Association for Computing Transactions on Mathematical Software …
Displaying 676 - 700 of 7106
Was this page helpful?