An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
https://www.nist.gov/publications/search
Search Publications
NIST Authors in Bold
Displaying 1026 - 1050 of 7107
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes essential components
Allan H. Harvey, Konrad Patkowski, Wojciech Cencek, Piotr Jankowski, Krzysztof Szalewicz, Giovanni Garberoglio
Nonrelativistic clamped-nuclei energies of interaction between two ground-state hydrogen molecules with intramolecular distances fixed at their average value in the lowest rovibrational state have been computed. The calculations applied the supermolecular
The white paper provides an overview of NIST Special Publication (SP) 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations, which was published April 30, 2013.
Dimensional tolerancing is a language used to communicate product specifications. Effective communication using this language relies on there being a common, shared meaning for tolerances. By this measure, the language relies on there being a common
Prashanth Jaganmohan, Bala Muralikrishnan, Meghan Shilling, Ed Morse
… parts and those with complex internal features, X-ray computed tomography (XCT) has transitioned from a medical … analysis, single-point ray tracing method, X-ray computed tomography … X-ray Computed Tomography Instrument Performance Evaluation, Part …
Michael Majurski, Parniyan Farvardin, Sumeet Menon, David Chapman
Discriminative deep learning models with a linear+softmax final layer have a problem: the latent space only predicts the conditional probabilities $p(y|x)$ but not the full joint distribution $p(y,x)$, which necessitates a generative approach. The
Michael P. Majurski, Petru S. Manescu, Sarala Padi, Nicholas J. Schaub, Nathan A. Hotaling, Carl Simon Jr., Peter Bajcsy
We address the problem of segmenting cell contours from microscopy images of human induced pluripotent Retinal Pigment Epithelial stem cells (iRPE) using Convolutional Neural Networks (CNN). Our goal is to compare the accuracy gains of CNN-based
We apply genetic programming in conjunction with other machine learning methods to obtain concise rules that accurately identify scientifically meaningful components in hydrating plaster over multiple time periods. Genetic programming enables the
Theodore(Ted) Camus, David Coombs, Martin Herman, Tsai Hong Hong
This paper describes a real-time robot vision system which uses only the divergence of the optical flow field for both steering control and collision detection. The robot has wandered about the lab at 20 cm/s for as long as 26 minutes without collision
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel
… formally define the metric, analyze the complexity of computing the metric, devise heuristic algorithms for … IEEE Transactions on Dependable and Secure Computing …
Mylene Simon, Joe Chalfoun, Peter Bajcsy, Mary C. Brady
The paper addresses the problem of traceability and variability of image features used in a plethora of image-based scientific studies. Image features are extracted using software packages that vary in terms of programming languages, theoretical formulas
… of large numbers of files in a loose, heterogeneous computing cluster. We go on to suggest that the framework is … IEEE International Conference on Services Computing …
… of large numbers of files in a loose, heterogeneous computing cluster. We go on to suggest that the framework is … IEEE International Conference on Services Computing …
There are several computational approaches for predicting gas-phase, molecular thermochemistry. For common organic compounds, empirical methods are quick to compute and have been effectively parameterized. For uncommon compounds, the relative robustness of
Heather H. Chen-Mayer, Ronald Tosh, Fred B. Bateman, Paul Bergstrom, Brian E. Zimmerman
… for direct realization of absorbed dose in medical computed tomography (CT) procedures was constructed and … Calorimetry in Computed Tomography Beams …
M Nashman, Billibon H. Yoshimi, Tsai H. Hong, William G. Rippey, Martin Herman
This paper describes a real-time hierarchical system that combines (fuses) data from vision and touch sensors to simplify and improve the operation of a coordinate measuring machine (CMM) used for dimensional inspection tasks. Our emphasis is on sensory
… used for supporting enterprise IT resources as well as cloud services. The components of this virtualized server … resources, such as CPU, memory, and devices (c) Multiple computing stacks called VMs, each with its own OS, …
… Wide Web also provides a convenient format for executing computer programs over the Internet, for example through the … A Prototype Computer-Integrated Knowledge System: Predicting Service Life …
James R. Lyle, Barbara Guttman, John Butler, Kelly Sauerwein, Christina Reed, Corrine Lloyd
This document is an assessment of the scientific foundations of digital forensics. We examined descriptions of digital investigation techniques from peer-reviewed sources, academic and classroom materials, technical guidance from professional organizations
This presentation provides information about the proposed SSPC Coatings Knowledge Center and activities of a national program for a computer integrated knowledge systems network administered by the National Institute of Standards and Technology.