Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1676 - 1700 of 7108

VMEXT: A Visualization Tool for Mathematical Expression Trees

July 12, 2017
Author(s)
Moritz Schubotz, Howard Cohl, Bela Gipp, Norman Meuschke, Thomas Hepp
Mathematical expressions can be represented as a tree consisting of terminal symbols, such as identifiers or numbers (leaf nodes), and functions or operators (non-leaf nodes). Expression trees are an important concept to store and process mathematical

Enhancement of Rydberg Blockade via Microwave Dressing

March 27, 2025
Author(s)
Deniz Kurdak, Patrick Banner, Yaxin Li, Sean Muleady, Alexey Gorshkov, S. L. Roston, James Porto
… interactions in an atomic ensemble. By varying the cloud length relative to theblockade radius and measuring the …

Triangular Meshing and Volume Determination

July 1, 2004
Author(s)
Christoph J. Witzgall, Geraldine Cheok
Parametric studies are reported for investigating the feasibility and accuracy of calculating volumes from LADAR scans of artifacts. The TIN (=Triangulated Irregular Network) technique was employed to construct surfaces on which the volume calculation was

Temporal, Matter-Wave Dispersion Talbot Effect

December 1, 1999
Author(s)
Lu Deng, Edward W. Hagley, J Denschlag, J E. Simsarian, M Edwards, Charles W. Clark, Kristian Helmerson, S L. Rolston, William D. Phillips
… effect, where a pulsed phase grating is applied to a cloud of cold atoms (Bose-Einstein condensate). In contrast …

Internet-Based Delivery of CAD/CAM Capability: An Industry Case Study

September 1, 1998
Author(s)
Simon Szykman, Ram D. Sriram
This paper presents a case study in the use of the Internet as a medium for exchange of information and delivery of computer-aided design and computer-aided manufacturing (CAD/CAM) capability. The case study describes collaboration among researchers and

Time in Cyber-Physical Systems

October 2, 2016
Author(s)
Marc A. Weiss, YaShian Li-Baboud, Aviral Shrivastava, Mohammad Khayatian, Patricia Derlery, Hugo A. Andrade, Sundeep Chandhoke, Kevin Stanton, John Eidson
… Fundamental research is needed in synchronizing clocks of computing systems to a higher degree, and even if the clocks … Proceedings of the Association for Computing Machinery (ACM) International Conference on …

Cell Phone Forensic Tools: An Overview and Analysis Update

March 21, 2007
Author(s)
Richard Ayers, Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistant (PDA) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message

The Interdependent Networked Community Resilience Modeling Environment (IN-CORE): Science, Structure and Examples

January 1, 2001
Author(s)
John van de Lindt, Daniel Cox, Paolo Gardoni, Jong Lee, Jamie Padgett, Therese P. McAllister, Andre Barbosa, Harvey Cutler, Shannon van Zandt
ABSTRACT: Community resilience is the ability of a community to plan for, withstand, and recover from a natural hazard such as an earthquake or flood. Advancing community (or urban) resilience requires: (1) an understanding of how the physical

Simulating Enclosure Fire Dynamics

February 19, 2017
Author(s)
Howard R. Baum
At least three different physics based approaches to fire dynamics simulations have evolved over the years; lumped parameter or ''zone models'', computational fluid dynamics models based on classical trubulence modeling techniques, and large eddy

Guide to Storage Encryption Technologies for End User Devices

November 15, 2007
Author(s)
Karen A. Scarfone, Murugiah P. Souppaya, Matt Sexton
Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause information stored on the devices to be accessed by unauthorized parties. To prevent such disclosures

Computer-Aided Molecular Design and Selection of CO2 Capture Solvents Based on Thermodynamics, Reactivity and Sustainability

August 10, 2016
Author(s)
Alexandros Chremos, Athanasios Papadopoulos, Sara Badr, Esther Forte, Theodoros Zarogiannis, Panos Seferlis, Stavros Papadokonstantakis, Amparo Galindo, George Jackson, Claire Adjiman
… molecules. We propose an optimization-based computer- aided molecular design (CAMD) method to identify … Computer-Aided Molecular Design and Selection of CO2 Capture …

FFT-based Alignment of 2d Closed Curves with Application to Elastic Shape Analysis

September 10, 2015
Author(s)
Gunay Dogan, Javier Bernal, Robert Hagwood
For many shape analysis problems in computer vision and scientific imaging (e.g., computational anatomy, morphological cytometry), the ability to align two closed curves in the plane is crucial. In this paper, we concentrate on rigidly aligning pairs of
Displaying 1676 - 1700 of 7108
Was this page helpful?