Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1701 - 1725 of 7108

Simulating Enclosure Fire Dynamics

February 19, 2017
Author(s)
Howard R. Baum
At least three different physics based approaches to fire dynamics simulations have evolved over the years; lumped parameter or ''zone models'', computational fluid dynamics models based on classical trubulence modeling techniques, and large eddy

Guide to Storage Encryption Technologies for End User Devices

November 15, 2007
Author(s)
Karen A. Scarfone, Murugiah P. Souppaya, Matt Sexton
Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause information stored on the devices to be accessed by unauthorized parties. To prevent such disclosures

FFT-based Alignment of 2d Closed Curves with Application to Elastic Shape Analysis

September 10, 2015
Author(s)
Gunay Dogan, Javier Bernal, Robert Hagwood
For many shape analysis problems in computer vision and scientific imaging (e.g., computational anatomy, morphological cytometry), the ability to align two closed curves in the plane is crucial. In this paper, we concentrate on rigidly aligning pairs of

Improving the TENOR of Labeling: Re-evaluating Topic Models for Content Analysis

March 23, 2024
Author(s)
Zongxia Li, Andrew Mao, Jordan Boyd-Graber, Daniel Stephens, Emily Walpole, Alden A. Dima, Juan Fung
Topic models are a popular tool for understanding text collections, but their evaluation has been a point of contention. Automated evaluation metrics such as coherence are often used, however, their validity has been questioned for neural topic models

Cell Phone Forensics Tools: An Overview and Analysis

October 19, 2005
Author(s)
Richard Ayers, Wayne Jansen, Nicolas Cilleros, Ronan Daniellou
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistants (PDAs) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message

Defining Flashover for Fire Hazard Calculations

June 1, 1999
Author(s)
Richard D. Peacock, Paul A. Reneke, Richard W. Bukowski, Vyto Babrauskas
As the use of performance-based methods for evaluating the fire behavior of materials and systems becomes more widespread, objective criteria to judge fire behavior become more important. This paper reviews techniques for predicting the most common of

Comparison of Photovoltaic Module Performance Measurements

May 2, 2006
Author(s)
Arthur H. Fanney, Mark W. Davis, Brian P. Dougherty, D L. King, W E. Boyson, J A. Kratochvil
Computer simulation tools used to predict the energy production of photovoltaic systems are needed in order to make informed economic decisions. These tools require input parameters that characterize module performance under various operational and
Displaying 1701 - 1725 of 7108
Was this page helpful?