Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1351 - 1375 of 7107

A Shape Modeling Application Program Interface (API) for the STEP Standard

November 1, 2000
Author(s)
Mike Pratt, B D. Anderson
The international standard ISO 10303 for the exchange of product models and associated data between different computer aided design (CAD) and other engineering systems was first issued in 1994. This paper reports on current work on extending the standard

Guide to Selecting Information Technology Security Products

October 9, 2003
Author(s)
Timothy Grance, Marc Stevens, Marissa Myers
The selection of IT security products is an integral part of the design, development and maintenance of an IT security infrastructure that ensures confidentiality, integrity, and availability of mission critical information. The guide seeks to assist in

Estimating Volumes of Near-spherical Molded Artifacts

May 3, 2010
Author(s)
David E. Gilsinn, Bruce R. Borchardt, Amelia Tebbe
The Food and Drug Administration (FDA) is conducting research on developing reference lung cancer cancer lesions, called phantoms, to test computed tomography (CT) scanners and their software. FDA loaned two semi-spherical phantoms to the National

TOWARDS INDUSTRIAL IMPLEMENTATION OF EMERGING SEMANTIC TECHNOLOGIES

August 31, 2011
Author(s)
Paul W. Witherell
In this paper, we identify five main obstacles in the development of an industry-ready application of semantic knowledge management systems and discuss how each of these challenges can be addressed. These obstacles include the ease of new knowledge

Virtual Assembly Design Environment

September 1, 1995
Author(s)
Kevin W. Lyons
Virtual reality is a technology which is often regarded as a natural extension to 3D computer graphics with advanced input and output devices. This technology has only recently matured enough to warrant serious engineering applications. The integration of

Modeling the Microstructure and Elastic Properties of Complex Materials

May 1, 2000
Author(s)
A P. Roberts, Edward Garboczi
This document is derived from three reviewed papers by the same authors: (1)Elastic properties of a tungsten-silver composite by reconstruction and computation; (2)Elastic properties of model porous ceramics; and (3)Elastic properties of model random three

IDENTIFYING THE FLUID-TO-SOLID TRANSITION IN CEMENTITIOUS MATERIALS AT EARLY AGES USING ULTRASONIC WAVE VELOCITY AND COMPUTER SIMULATION

February 1, 2009
Author(s)
G Sant, Dale P. Bentz, W Weiss
… when laboratory testing can begin, and for assessing when computer simulations of shrinkage stress should begin. This … occurs during the fluid-to-solid transition. Results of computer modeling (using CEMHYD3D) indicate that … MATERIALS AT EARLY AGES USING ULTRASONIC WAVE VELOCITY AND COMPUTER SIMULATION …

A Lexical Analogy to Feature Matching and Pose Estimation

January 1, 2002
Author(s)
John A. Horst
We relate the problem of finding a correspondence between sensed and model features to that of finding a match between a random set of letters and words in a dictionary. The process is equivalent to hashing and the linguistic perspective is added to

All-optical Generation of States for "Encoding a Qubit in an Oscillator"

October 1, 2010
Author(s)
Hilma M. Vasconcelos, Liliana Sanz, Scott Glancy
Both discrete and continuous signals are used to carry classical information. Analogously, discrete and continuous systems can be used to encode quantum information. Most quantum computation schemes propose enconding qubits using two level systems, such a

Air-Side Velocity Distribution in Finned-Tube Heat Exchangers

December 17, 2007
Author(s)
David A. Yashar, Hong H. Cho
The performance of finned tube heat exchangers is greatly affected by the distribution of the air that passes through it. The air side velocity distribution is largely left unknown because it is difficult to measure accurately. In this study, we examined

Data Guardians: Behaviors and Challenges While Caring for Others' Personal Data

July 23, 2023
Author(s)
Julie Haney, Sandra Prettyman, Mary Frances Theofanos, Susanne M. Furman
Many professional domains require the collection and use of personal data. Protecting systems and data is a major concern in these settings, necessitating that workers who handle personal data under- stand and practice good security and privacy habits

Limiting The Impact of Stealthy Attacks on Industrial Control Systems

October 28, 2016
Author(s)
David Urbina, Alvaro Cardenas, Niles O. Tippenhauer, Junia Valente, Mustafa Faisal, Justin Ruths, Rick Candell, Heinrik Sandberg
While attacks on information systems have for most practical purposes binary outcomes information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to

A Cognitive-Behavioral Framework of User Password Management Lifecycle

June 22, 2014
Author(s)
Yee-Yin Choong
Passwords are the most commonly used mechanism in controlling users’ access to information systems. Little research has been established on the entire user password management lifecycle from the start of generating a password, maintaining the password

Development of a Scale to Assess the Linguistic and Phonological Difficulty of Passwords

June 22, 2014
Author(s)
Jennifer R. Bergstrom, Stefan A. Frisch, David C. Hawkins, Joy Hackenbracht, Kristen K. Greene, Mary Theofanos, Brian Griepentrog
Increasingly, institutions are requiring or recommending that their employees use secure, system-generated passwords. It is not clear how well linguistic and phonological language properties map onto complex, randomly-generated passwords. Passwords
Displaying 1351 - 1375 of 7107
Was this page helpful?