Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1001 - 1025 of 7107

Precision and Accuracy in Scientific Imaging

May 18, 2010
Author(s)
Russell A. Kirsch
Digital images are commonly used to represent scientific data. Typically, high resolution images with many square pixels are considered to be necessary under the assumption that the increased precision of such images yields increased accuracy to the viewer

Mobile Device Forensics - Tool Testing

May 6, 2009
Author(s)
Richard Ayers
The goal of the Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and Technology (NIST) is to establish a methodology for testing computer forensic software tools. The results provide information necessary for toolmakers

Apparel Product Data Exchange Standard

January 1, 1992
Author(s)
Yung-Tsun T. Lee
The apparel industry is increasingly reliant on computer technologies to support activities throughout the product life cycle. As computers become more widely used in design, pattern making, grading, and automated manufacturing, the industry is becoming

Securing Voice Over IP Networks

May 27, 2005
Author(s)
T J. Walsh, D. Richard Kuhn
Voice over IP - the transmission of voice over traditional packet-switched IP networks - is one of the hottest trends in telecommunications. As with any new technology, VOIP introduces both opportunities and problems. Lower cost and greater flexibility are

Validation and Modification of the 4SIGHT Computer Program (NIST IR 6747)

May 1, 2001
Author(s)
Kenneth A. Snyder
… The original version of the 4sight computer program was written to facilitate the performance … the performance of the concrete structure.The resulting computer program is a state-of-the-art attempt to … is through continuous monitoring and periodic testing. The computer program, in these circumstances, can also serve as a …

Using 3D Head and Respirator Shapes to Analyze Respirator Fit

July 19, 2009
Author(s)
Kathryn M. Butler
A computational approach to analyzing respirator fit is demonstrated using geometries generated by laser scanning, mechanical drawings, and CAD files. Three fit-related problems that can be solved using computational tools are demonstrated: 1) The study of

Memory and Motor Processes of Password Entry Error

December 19, 2016
Author(s)
Frank Tamborello, Kristen K. Greene
Passwords are tightly interwoven with the digital fabric of our current society. Unfortunately, passwords that provide better security generally tend to be more complex, both in length and composition. Complex passwords are problematic both cognitively and

Calculating Available Safe Egress Time (ASET)--A Computer Program and User's Guide.

September 1, 1982
Author(s)
Leonard Y. Cooper, D W. Stroup
… of detection and onset of hazard. A user oriented computer program which carries out the required simulations … batch mode. It is written in ANSI Fortran and requires no computer specific subroutines. … Calculating Available Safe Egress Time (ASET)--A Computer Program and User's Guide. …

Programming Interfacial Porosity and Symmetry with Escherized Colloids

February 22, 2024
Author(s)
Nathan Mahynski, Vincent K. Shen
We simultaneously design the porosity and plane symmetry of self-assembling colloidal films by using isohedral tiles to determine the location and shape of enthalpically interacting surface patches on motifs being functionalized. The symmetries of both the

Determining Privileges of Mobile Agents

January 1, 2001
Author(s)
Wayne Jansen
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the access and use of computational resources and services by mobile agents. Our

An Object-oriented Representation of Product and Design

August 1, 1996
Author(s)
Gerard Kim, S Gorti, A Gupta, A Wong, Ram D. Sriram
We introduct a representation scheme for engineering design synthesis that includes not only a way to represent an evolving attifact but also the design process. The representation uses an object-oriented approach in order to model a wide range of design

Research Directions in Security Metrics

April 4, 2011
Author(s)
Wayne Jansen
More than 100 years ago, Lord Kelvin observed that measurement is vital to deep knowledge and understanding in physical science. During the last few decades, researchers have made various attempts to develop measures and systems of measurement for computer

Directions in Security Metrics Research

April 30, 2009
Author(s)
Wayne Jansen
More than 100 years ago, Lord Kelvin insightfully observed that measurement is vital to deep knowledge and understanding in physical science. During the last few decades, researchers have made various attempts to develop measures and systems of measurement
Displaying 1001 - 1025 of 7107
Was this page helpful?