Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1626 - 1650 of 7108

Trust-Based Multi-Agent Filtering for Increased Smart Grid Security

August 22, 2011
Author(s)
Ion Matei, John S. Baras, Vijay Srinivasan
… electrical grid is done by a network of agents with both computing and communication capabilities. We propose a … in addition to taking measurements, the agents are also computing local estimates based on their own measurements and … smart grid, electric system, digital computing, Supervisory Control and Data Acquisition (SCADA), …

Spectroscopy of atomic and molecular ions using quantum logic

June 25, 2006
Author(s)
Piet Schmidt, Till P. Rosenband, Jeroen Koelemeij, David Hume, Wayne M. Itano, James C. Bergquist, David J. Wineland
Recently developed techniques for quantum computation using trapped ions allow unprecedented coherent control of the internal and external states of single atoms. Here we report how these techniques can be employed to perform precision spectroscopy of

Comparison of Models for Heat Transfer in High-Density Fibrous Insulation

May 13, 2019
Author(s)
Sergio A. Carvajal, Edward Garboczi, Robert R. Zarr
This paper evaluates different models for calculating the effective thermal conductivity of fibrous insulation by comparing predicted values with certified values of Standard Reference Material 1450c, Fibrous Glass Board. The fiber diameter distribution

Guideline for the Use of Advanced Authentication Technology Alternatives

September 28, 1994
Author(s)
National Institute of Standards and Technology (NIST), James F. Dray Jr.
[Withdrawn October 19, 2015] This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which

Quantifying Network Topology Robustness Under Budget Constraints

June 24, 2013
Author(s)
Assane Gueye, Aron Lazska
To design robust network topologies that resist strategic attacks, one must first be able to quantify robustness. In a recent line of research, the theory of network blocking games has been used to derive robustness metrics for topologies. A network

Resilience and System Level Security

December 20, 2016
Author(s)
Mark L. Badger
One approach for reducing damage caused by software vulnerabilities is to take advantage of emerging systems architecture patterns to strategically improve assurance. Emerging systems architectures embody significant choices about where computation takes

Preparation of entangled states through Hilbert space engineering

September 28, 2016
Author(s)
Yiheng Lin, John P. Gaebler, Florentin Reiter, Ting R. Tan, Ryan S. Bowler, Yong Wan, Adam C. Keith, Emanuel Knill, Kevin Coakley, Dietrich Leibfried, David J. Wineland, Scott Glancy
Entangled states are a crucial resource for quantum-based technologies such as quantum computers and quantum communication systems. Exploring new methods for entanglement generation is important for diversifying and eventually improving current approaches

Defining Flashover for Fire Hazard Calculations: Part II

November 1, 2003
Author(s)
V Babrauskas, Richard Peacock
Comparison of available correlations and predictive models used to predict the minimum energy necessary to cause flashover show consistent estimates for a range of empirical data. Still, available experimental data show a wide range of heat release rates

Automated Password Generator (APG)

October 5, 1993
Author(s)
National Institute of Standards and Technology (NIST), Charles Dinkel
[Withdrawn on October 19, 2015] The Automated Password Generator Standard specifies an algorithm to generate passwords for the protection of computer resources. This standard is for use in conjunction with FIPS PUB 112, Password Usage Standard, which

CFD Modeling and Comparison with Data for the NIST Reference Spray Combustor

November 1, 2001
Author(s)
D S. Crocker, J F. Widmann, Cary Presser
Validation of computational fluid dynamics (CFD) predictions for spray combustion application has been a challenging task due to difficulties in both modeling and experimental measurements. However, validation is considered to be an essential exercise for

Fast Dynamic Programming for Elastic Registration of Curves

June 30, 2016
Author(s)
Javier Bernal, Gunay Dogan, Robert Hagwood
Curve registration problems in data analysis and com- puter vision can often be reduced to the problem of match- ing two functions defined on an interval. Dynamic Pro- gramming (DP) is an effective approach to solve this prob- lem. In this paper, we
Displaying 1626 - 1650 of 7108
Was this page helpful?