Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 151 - 175 of 7105

Hybrid quantum edge computing network

October 4, 2022
Author(s)
Lijun Ma, Leah Ding
… Edge computing network and quantum network are two emerging … technologies in current communication fields. Edge computing has emerged to support the computational demand of delay-sensitive applications in which substantial computing and storage are deployed at the network edge close …

Confirmation of Interstellar Methycyanodiacetylene (CH3C5N)

April 11, 2006
Author(s)
Lewis E. Snyder, J M. Hollis, P R. Jewell, Francis J. Lovas, A J. Remijan
… m Green Bank Telescope (GBT) toward the Taurus molecular cloud TMC-1. Both K=0 and K=1 components of the 12K-11K, … with an ?10 K kinetic temperature for the TMC-1 dark dust cloud, no higher K components were detected. The CH3C5N …

Computer Development at the National Bureau of Standards

September 1, 2000
Author(s)
Russell A. Kirsch
… The first fully operational, automatic, electronic computer in the United States was built at the National … Bureau of Standards. The Standards Electronic Automatic Computer (SEAC) began productive computation in May 1950. Although originally intended as an interim computer, it had a productive life of 14 years with a …

Intelligent-Fabric Computing: Challenges and Opportunities

November 8, 2022
Author(s)
Min Chen, Jia Liu, Pan Li, Hamid Gharavi, Yixue Hao, Jingyu Ouyang, Long Hu, Chong Hou, Iztok Humar, Lei Wei, Guang-Zhong Yang, Guangming Tao
… with their environments immersively. The idea of pervasive computing is becoming a reality, but due to the inconvenience … technology in the post-Moore era, we propose a novel computing approach that creates a paradigm shift driven by intelligent-fabric computing and advocate a new concept of non-chip sensing in …

The Computational Complexity of Enforceability Validation for Generic Access Control Rules

June 14, 2006
Author(s)
Chung Tong Hu, David R. Kuhn, David F. Ferraiolo
… is the efficiency of such systems, i.e., what is the computational complexity for the enforceability validation of … both of these problems are NP-Complete by using some basic computational theorems applied to the components of the … access control, computational complexity, enforceability validation …

Building Quantum Computers

December 1, 2008
Author(s)
Emanuel H. Knill
… In theory, quantum computers can be used to efficiently factor numbers, … appeared to be too fragile for implementing large quantum computers. Fortunately, because of theoretical advances in … are now no fundamental obstacles to realizing quantum computers. However, building quantum computers is difficult. …

A Diner's Guide to Evaluating a Framework for Ubiquitous Computing Applications

October 1, 2005
Author(s)
Mary F. Theofanos, Jean C. Scholtz
… evaluation methodologies specifically suited to ubiquitous computing applications. Here we investigate a user evaluation … evaluation framework, measures, metrics, ubiquitous computing … A Diner's Guide to Evaluating a Framework for Ubiquitous Computing Applications …

Guidelines for Automatic Data Processing Physical Security and Risk Management

June 1, 1974
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
… and information relevant to physical security of computer data and facilities and references many applicable … Institute for Computer Sciences and Technology National Bureau of Standards … ADP security, computer reliability, contingency plans, Federal Information …

Standards Electronic Automatic Computer (SEAC)

November 1, 2004
Author(s)
Russell A. Kirsch
… The Standards Electronic Automatic Computer (SEAC) was the first programmable computer in the United States. The development of SEAC was a … between the National Bureau of Standards (NBS) team of computer engineers and world-class mathematicians. SEAC came … programmable computer, SEAC, Standards Electronic Automatic Computer

Quantum Computing

January 28, 2010
Author(s)
Emanuel H. Knill
… cryptography. Such a quantum computer would revolutionize computing technology while teaching us about fundamental … decoherence, quantum computing, quantum error correction, qubits … Quantum Computing

Semantic Preserving Bijective Mappings of Mathematical Formulae between Word Processors and Computer Algebra Systems

June 28, 2017
Author(s)
Howard S. Cohl, Bonita V. Saunders, Marjorie A. McClain, Moritz Schubotz, Joon Bang, Juergen Gerhardt, Andre Greiner Petter
… LaTeX) is achieved by using a semantic macro set. Computer algebra systems (CAS) such as Maple and Mathematica … LaTeX, Computer Algebra Systems, Representation Translation … Conference on Intelligent Computer Mathematics 2017 … of Mathematical Formulae between Word Processors and Computer Algebra Systems …

Using Intelligent Agents to Assess Pervasive Computing Technologies

January 1, 2001
Author(s)
L P. Ciarletta, Alden A. Dima, V P. Iordanov
… Pervasive Computing (a.k.a. Ubiquitous or Ambient Computing) is a new field of computer science generally considered to lie at the intersection of desktop computing, networking, and embedded systems. Related to … ambient computing, cognitive agent, intelligent agent, pervasive …

Quantum Computing With Realistically Noisy Devices

March 3, 2005
Author(s)
Emanuel H. Knill
… problems. One of the main problems of experimental quantum computing is to preserve fragile quantum states in the … fault-tolerance thresholds, fault-tolerant quantum computing, postselected quantum computing, quantum computing, quantum error-correcting codes, …

Quantum Computing with Very Noisy Devices

March 3, 2005
Author(s)
Emanuel H. Knill
… problems. One of the main problems of experimental quantum computing is to preserve fragile quantum states in the … fault-tolerance thresholds, fault-tolerant quantum computing, postselected quantum computing, quantum computing, quantum error-correcting codes, …

Metrics for spin-based computing

February 27, 2026
Author(s)
Advait Madhavan
… Spin-based computing is emerging as a powerful approach for … probabilistic-bits to broader frameworks such as reservoir computing and magnetic Ising machines. We provide … and task-dependent metrics to evaluate the computing performance of spin-based components to compare …

Towards a Reconfigurable Distributed Testbed to Enable Advanced Research and Development of Timing and Synchronization in Cyber-Physical Systems

December 8, 2015
Author(s)
Aviral Shrivastava, J C. Eidson, Marc A. Weiss, Ya-Shian Li-Baboud, Hugo Andrade, Patricia Derler, Kevin Stanton
… International Conference on Reconfigurable Computing and FPGAs … Systems, Timing and Synchronization, Reconfigurable computing, Distributed Testbed, Correct-by-construction … 2015 International Conference on Reconfigurable Computing and FPGAs …

Computer Attacks: What They Are and How to Defend Against Them

May 26, 1999
Author(s)
Peter M. Mell
… efforts on enabling system administrators to respond to computer breaches. We focus our recent and future work on three major areas:* The Federal Computer Incident Response Capability (FedCIRC) Pilot,* A guide to create computer security incident response capabilities, and* …

An Algorithm for Computing the Minimum Covering Sphere in any Dimension

January 1, 1989
Author(s)
Ted Hopp, C Reeve
… An algorithm is presented for computing the minimum covering sphere for a set of n points … with all the points near the sphere surface, the expected computing time is estimated to be 0(nd2.3). … SIAM Journal of Computing … An Algorithm for Computing the Minimum Covering Sphere in any Dimension …

Hardware-Enabled Security: Container Platform Security Prototype

June 17, 2021
Author(s)
Murugiah Souppaya, Michael Bartock, Karen Scarfone, Jerry Wheeler, Tim Knoll, Uttam Shetty, Ryan Savino, Joseprabu Inbaraj, Stefano Righi
… In today's cloud data centers and edge computing, attack surfaces have significantly increased, … for safeguarding container deployments in multi-tenant cloud environments. It also describes a proof-of-concept …
Displaying 151 - 175 of 7105
Was this page helpful?