Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 826 - 850 of 7107

Test Environment and Procedures for Testing dd Provided With FreeBSD 4.4

May 6, 2004
Author(s)
James R. Lyle
This document describes the testing of dd in the FreeBSD environment. The test cases that were applied are described in Disk Imaging Tool Specification, Version 3.1.6.The tests were run on test systems in the Computer Forensics Tool Testing Lab at the

Test Environment and Procedures for Testing EnCase 3.20

May 1, 2004
Author(s)
James R. Lyle
This document describes the testing of EnCase 3.20. The test cases that were applied are described in Disk Imaging Tool Specification, Version 3.1.6.The tests were run on test systems in the Computer Forensics Tool Testing Lab at the National Institute of

Foundations of a Security Policy for Use of the National Research and Educational Network

February 1, 1992
Author(s)
A Oldehoeft
… is an integral part of the planned High- Performance Computing and Communication (HPCC) infrastructure that will … access to services and resources such as high-performance computing systems, specialized software tools, databases, … computer security policy, High-Performance Computing and Communication, HPCC, National Research and …

Point-source atom interferometer gyroscope

December 1, 2021
Author(s)
Azure Hansen, Yun-Jhih Chen, John Kitching, Elizabeth Donley
… to interfere atomic wavepackets in an expanding cloud of laser-cooled atoms. The measurement is inherently … of minimizing the thermal expansion of the cold-atom cloud, PSI exploits the expansion to probe these three …

Repeated Measurements with Minimally Destructive Partial-Transfer Absorption Imaging

December 2, 2019
Author(s)
Ian B. Spielman, Ana Valdes Curiel, Dimitris Trypogeorgos, Erin Marshall, Nathan Lundblad
… ensemble with minimal perturbation. We prepare an atomic cloud in a state that is dark to the imaging light and then … state. By repeating this process we can image the atomic cloud many times before it is depleted; for small fractions …

Bose-Einstein Condensate in Optical Lattices

January 1, 2002
Author(s)
A Browaeys, James V. Porto, S P. Peil, B Laburthe, J Obrecht, C R. McKenzie
… lattice. The lattices are created by illuminating the cloud with the interference pattern created by two laser … We finally investigate the coherence properties of the cloud. …

Identifying Critical Patches With ICAT

July 1, 2000
Author(s)
Peter M. Mell
[For the latest information on vulnerabilities, see the National Vulnerability Database, nvd.nist.gov]The NIST computer security division has created a searchable index containing 700 of the most important computer vulnerabilities. This index, called the

Manufacturing Digital Twin Standards

September 24, 2024
Author(s)
Guodong Shao
… such as smart sensors, Internet of Things (IoT), cloud computing, machine learning, and artificial intelligence …

Post-Quantum Cryptography and 5G Security: Tutorial

May 15, 2019
Author(s)
T. Charles Clancy, Robert W. McGwier, Lidong Chen
… 5G is shifting its core network over to a microservices, cloud-first architecture and is heavily leveraging protocols … trust model. This shift is happening just as quantum computing threatens to unravel the security of traditional …

3D Part Identification Based on Local Shape Descriptors

August 19, 2008
Author(s)
Xiaolan Li, Afzal A. Godil, Asim Wagan
This paper explores 3D object recognition based on local shape descriptor. 3D object recognition is becoming an increasingly important task in modern applications such as computer vision, CAD/CAM, multimedia, molecular biology, robotics, and so on

Quantum gate teleportation between separated zones of a trapped-ion processor

May 31, 2019
Author(s)
Yong Wan, Daniel Kienzler, Stephen D. Erickson, Karl H. Mayer, Ting R. Tan, Jenny J. Wu, Hilma H. Macedo De Vasconcelos, Scott C. Glancy, Emanuel H. Knill, David J. Wineland, Andrew C. Wilson, Dietrich G. Leibfried
Large-scale quantum computers will inevitably require quantum gate operations between widely separated qubits, even within a single quantum information processing device. Nearly two decades ago, Gottesman and Chuang proposed a method for implementing such

Overcoming Impediments to Cell Phone Forensics

January 16, 2008
Author(s)
Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operation are quite different in certain areas. For example, most cell phones do not

Quantum Computation, Spectroscopy of Trapped Ions, and Schrodinger Cat

January 1, 1999
Author(s)
David J. Wineland, C Monroe, Wayne M. Itano, D Kielpinski, B E. King, C J. Myatt
… We summarize e orts at NIST to implement quantum computation using trapped ions, based on a scheme proposed by … Quantum Computation, Spectroscopy of Trapped Ions, and Schrodinger Cat …

Computer-Aided Manufacturing Engineering

September 1, 1995
Author(s)
Mike Smith, Swee K. Leong
… based on commercially available off-the shelf products. A Computer-Aided Manufacturing Engineering Forum held it''s … Computer-Aided Manufacturing Engineering …

Report from the 2nd International Workshop on FAIR Containerized Computational Software

April 30, 2024
Author(s)
Peter Bajcsy, Nathan Hotaling
… for achieving interoperability of containerized computational software. Adherence to a specification for … Interoperable, and Reusable (FAIR) Containerized Computational Software (FAIR–CCS) enables better reuse of … tools in complex data analyses by chaining tools into computational workflows. NIST requested information from the …

Energy Efficiency Scaling for 2 Decades (EES2) R&D Roadmap. V1.0 for Compute

April 3, 2025
Author(s)
Tina Kaarsberg, M Ahmed, A Paramonov, Amanda Petford-Long, Y Zhang, C Green, D Braga, F Fatim, F Musso, J Hoff, T Shah, P Nagapurkar, S Pawlowski, W Huang, C Gotama, P Klabbers, A Ziabari, Y Chen, T Wei, B Hirano, T McDonald, A Bhavnagarwala, S Misra, James Booth, Daniel Gopman, P Sharps, J Baniecki, E Salman, J Luo, S Shaheen, D Kudithipudi, J Atulasimha, J Ballard, I Lu, K Shimizu, N Johnson, E Taylor, R Jones, S Shankar
… for two decades (EES2) or less with an initial focus on compute. The scaling called for in the roadmap is biennial … Scaling for 2 Decades (EES2) R&D Roadmap. V1.0 for Compute
Displaying 826 - 850 of 7107
Was this page helpful?