Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1526 - 1550 of 7107

Adaptive Composite B-Spline Grid Generation for Interactive 3D Visualizations

January 22, 2014
Author(s)
Bonita V. Saunders, Qiming Wang, Brian Antonishek
We describe an adaptive grid generation technique based on the composition of tensor product B-spline mappings, T and Phi, where Phi maps the unit square onto itself and T maps the unit square onto the desired physical domain. Variational methods are used

An Access Control Scheme for Big Data Processing

November 11, 2014
Author(s)
Chung Tong Hu, Timothy Grance, David F. Ferraiolo, David R. Kuhn
… among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD … 2014 International Conference on Collaborative Computing: Networking, Applications and Worksharing …

Free Space Optics Communication System Testing in Smoke and Fire Environments

April 1, 2006
Author(s)
Alexander Maranghides, William E. Mell, William D. Walton, Erik L. Johnsson, Nelson P. Bryner
Free-Space Optics (also known as FSO , or Optical Wireless ) can be used to transmit optical data, voice and video information. These laser-based systems require unobstructed line of sight to properly operate. FSO system performance, signal intensity and

Partial-Transfer Absorption Imaging: A versatile technique for optimal imaging of ultracold gases

August 13, 2012
Author(s)
Gretchen K. Campbell, Sergio R. Muniz, Kevin Wright, Russell P. Anderson, William D. Phillips, Kristian Helmerson
Partial-transfer absorption imaging is a tool that enables optimal imaging of atomic clouds for a wide range of optical depths. In contrast to standard absorption imaging, the technique can be minimally-destructive and can be used to obtain multiple

Elastic and Viscoelastic Properties of Calcium Silicate Hydrate

May 15, 2012
Author(s)
Zachary Grasley, Jones Christopher, X Li, Edward Garboczi, Jeffrey W. Bullard
In order to effectively predict the mechanical properties of concrete and other cementitious materials, it is useful to understand the properties and deformation mechanisms on the nano-metric length scale. Through a combined analytical, experimental, and

Three-Dimensional Shape Analysis of Coarse Aggregates: Methodology and Preliminary Results on Several Different Coarse Aggregates

October 12, 2021
Author(s)
S T. Erdogan, P N. Quiroga, D Fowler, H A. Saleh, Richard A. Livingston, Edward Garboczi, Peter M. Ketcham, John G. Hagedorn, Steven G. Satterfield
The shape of aggregates used in concrete is an important parameter that helps determine many concrete properties. The mathematical technique of spherical harmonic analysis was recently demonstrated to be able to effectively analyze three dimensional

Parallel MPI image reconstructions in GPU using CUDA

March 19, 2023
Author(s)
Klaus Natorf Quelhas, Mark-Alexander Henn, Ricardo Farias, Weston L. Tew, Solomon I. Woods
… Imaging, MPI, Graphics Processing Unit, GPU, Parallel computing, CUDA, Image reconstruction …

Remote Record Access: Requirements, Implementation and Analysis

December 4, 1980
Author(s)
H M. Wood, Stephen R. Kimbleton
A key support component for network-wide data sharing is the ability of a process to access remotely stored data to be useful, a means of overcoming differences in data representation and format is necessary. Such a capability is termed remote record

Module-Lattice-Based Key-Encapsulation Mechanism Standard

August 13, 2024
Author(s)
National Institute of Standards and Technology (NIST), Gorjan Alagic, Quynh Dang, Dustin Moody, Angela Robinson, Hamilton Silberg, Daniel Smith-Tone
A key-encapsulation mechanism (KEM) is a set of algorithms that, under certain conditions, can be used by two parties to establish a shared secret key over a public channel. A shared secret key that is securely established using a KEM can then be used with
Displaying 1526 - 1550 of 7107
Was this page helpful?