Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 126 - 150 of 7105

The ACBM/NIST Computer Modelling Workshop: 1990-1998

February 19, 2017
Author(s)
Edward Garboczi
… to, survey of, and advertisement for the ACBM/NIST Computer Modelling Workshop, over the years 1990-1998. This … The ACBM/NIST Computer Modelling Workshop: 1990-1998 … technology, cement-based, computational materials science, computer, materials, modelling, workshop …

Managing Digital Libraries for Computer-Aided Design

October 1, 2000
Author(s)
William Regli, V Cicirello
… our initial efforts to deploy a digital library to support computer-aided collaborative design. At present, this … Journal of Computer-Aided Design … Computer-Aided Design, Computer-Aided Engineering, Engineering Knowledge-bases, … Managing Digital Libraries for Computer-Aided Design …

Reliability in Grid Computing System

February 13, 2009
Author(s)
Christopher E. Dabrowski
… Grid computing, reliability, fault tolerance … Reliability in Grid Computing System …

An Analysis of Computer Security Safeguards for Detecting and Preventing Intentional Computer Misuse

January 1, 1978
Author(s)
Brian Ruder, J. D. Madden, Robert P. Blanc
… Research Institute (SRI) has an extensive file of actual computer misuse cases. The National Bureau of Standards asked … use these cases as a foundation to develop ranked lists of computer safeguards that would have prevented or detected the … This report provides a working definition of intentional computer misuse, a construction of a vulnerability taxonomy …

Guidelines for Implementing and Using the NBS Data Encryption Standard

April 1, 1981
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
… The DES specifies a cryptographic algorithm for protecting computer data. FIPS PUB 81 defines four modes of operation … how encryption protects against certain vulnerabilities of computer networks, and specific guidance on the DES modes of … a high level of cryptographic protection to data in computer systems and networks. …

Mobile Device Security: Cloud and Hybrid Builds

February 21, 2019
Author(s)
Christopher J. Brown, Spike E. Dog, Sallie P. Edwards, Neil C. McNab, Matt Steele, Joshua M. Franklin
… solution. This project contains two distinct builds: cloud and hybrid. The cloud build makes use of cloud-based services and solutions, while the hybrid build … Mobile Device Security: Cloud and Hybrid Builds …

Time Synchronized Measurements in Cluster Computing Systems

August 1, 2000
Author(s)
Alan Mink, Robert J. Carpenter, M M. Courson
… of Service characterization of parallel and distributed computing and of network communications. Using this … contributing to its performance for both local and remote computing clusters. We show that such software algorithms, … autolock cluster computing, GPS, multikron, NTP, time synchronization …

Point source atom interferometry with a cloud of finite size

August 19, 2016
Author(s)
Gregory W. Hoth, Bruno M. Pelle, Stefan Riedl, John E. Kitching, Elizabeth A. Donley
… use of light pulse atom interferometry with an expanding cloud of atoms in the regime where the cloud has expanded by 1.1 to 5 times its initial size during … in the atom population obtained by imaging the final cloud. The fringes arise from a correlation between an atom's …

Energy Efficiency Scaling for 2 Decades (EES2) Roadmap for Computing

July 14, 2024
Author(s)
Jim Booth
… crisis in global energy consumption required for advanced computing applications, the United States Department of … 28th Annual IEEE High Performance Extreme Computing Virtual Conference … energy efficient computing … Energy Efficiency Scaling for 2 Decades (EES2) Roadmap for Computing

A Dynamic Human Body Computational Phantom for RF Propagation Study

May 20, 2013
Author(s)
John G. Hagedorn, Kamran Sayrafian, Judith E. Terrill
… either difficult or in some cases impossible to carry out, computational phantoms offer an attractive alternative for researchers in this area. However, computational phantoms used in the literature to study such … between implants and wearable medical sensors, a dynamic computational phantom capable of emulating human motion would …

Can Economics-based Resource Allocation Prove Effective in a Computation Marketplace?

September 15, 2008
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
… Several companies offer computation on demand for a fee. More companies are expected … over the next decade, leading to a marketplace for computation resources. Resources will be allocated through … computing power that will become available. Given such a computation marketplace, can economics-based resource …

Uncertainty Associated With Virtual Measurements From Computational Quantum Chemistry Models Using the Guide to the Expression of Uncertainty in Measurement

September 1, 2004
Author(s)
Karl K. Irikura, Russell D. Johnson III, Raghu N. Kacker
… with the predictions of the properties of molecules from computational quantum chemistry models. The proposed approach … Standards Organization (ISO) and makes use of the Computational Chemistry Comparison and Benchmark Database … ab initio, computational chemistry, computational chemistry comparison …

Computer Simulation and Percolation Theory Applied to Concrete.

January 1, 1999
Author(s)
Edward J. Garboczi, Dale P. Bentz
… properties like ionic diffusivity on the microstructure. Computer models have been developed to describe the … over six orders of magnitude of length scales, in terms of computer models, percolation theory, and composite ideas … concretes, computer simulation … Computer Simulation and Percolation Theory Applied to …

Quality Evaluation for Colored Point Clouds Produced by Autonomous Vehicle Sensor Fusion Systems

February 12, 2025
Author(s)
Colin Schaefer, Zeid Kootbally, Vinh Nguyen
… a proposed evaluation method to compare colored point clouds, a common fused data type, among two LiDAR-camera … suitable towards the comparison of generated colored point clouds by sensor fusion systems. … Quality Evaluation for Colored Point Clouds Produced by Autonomous Vehicle Sensor Fusion Systems …

Temporal State Machines: Using temporal memory to stitch time-based graph computations

May 11, 2021
Author(s)
Advait Madhavan, Matthew Daniels, Mark D. Stiles
… primitives of tropical algebra and generalized race logic computations, guiding the design of temporally coded tropical … memory, makes it possible to partition feed- forward computations into stages and organize them into a state … Machines: Using temporal memory to stitch time-based graph computations

Face Recognition by Computers and Humans

February 10, 2009
Author(s)
P J. Phillips, Rama Chellappa, Pawan Sinha
… faces is an effortless task for humans. Is this true for computers? This very question defines the field of automatic … Face Recognition by Computers and Humans …

DES Modes of Operation [includes Change Notice of May 31, 1996]

December 2, 1980
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
… cryptographic protection of sensitive, but unclassified, computer data. This FIPS defines four modes of operation for … Institute for Computer Sciences and Technology National Bureau of Standards … computer security, cryptography, data security, DES, …

A Data Protection Approach for Cloud-Native Applications

September 30, 2024
Author(s)
Ramaswamy Chandramouli, Wesley Hales
… data protection strategies in the evolving realm of cloud-native network architectures, including multi-cloud environments, service mesh networks, and hybrid … A Data Protection Approach for Cloud-Native Applications …

Building Quantum Computers

January 22, 2013
Author(s)
Emanuel H. Knill
… Abstract: In theory, quantum computers can be used to efficiently factor numbers, … appeared to be too fragile for implementing large quantum computers. Fortunately, because of theoretical advances in … are now no fundamental obstacles to realizing quantum computers. However, building quantum computers is difficult. …

Design of superconducting optoelectronic networks for neuromorphic computing

November 6, 2018
Author(s)
Sonia Buckley, Adam McCaughan, Jeff Chiles, Richard Mirin, Sae Woo Nam, Jeff Shainline
… proposed a novel hardware platform for neuromorphic computing based on superconducting optoelectronics that … neuromorphic computing, integrated photonics, superconducting electronics … 2018 IEEE International Conference on Rebooting Computing … superconducting optoelectronic networks for neuromorphic computing
Displaying 126 - 150 of 7105
Was this page helpful?