Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 176 - 200 of 7105

Molecular Computers for Solving Computational Decision Problems

October 12, 2021
Author(s)
Z Amitay, R Kosloff, S R. Leone
… tailored molecular wave packets is implemented for solving computational decision problems. The current study involves graphs composed of vertices and edges, and the computational task is to determine the connectivity of a … computational problem, decision problem, pulse shaping, wave …

Simulating Concordant Computations

June 23, 2010
Author(s)
Bryan K. Eastin
… concordant computations, discord, simulation, two-qubit … Simulating Concordant Computations

Quantifying Variability in Microscopy Image Analyses for COVID-19 Drug Discovery

June 25, 2021
Author(s)
Peter Bajcsy, Mylene Simon, Sunny Yu, Nick Schaub, Jayapriya Nagarajan, Sudharsan Prativadi, Mohamed Ouladi, Nathan Hotaling
Microscopy image-based measurement variability in high-throughput imaging experiments for biological drug discoveries, such as COVID-19 therapies was addressed in this study. Variability of measurements came from (1) computational approaches (methods), (2)

BQP-completeness of Scattering in Scalar Quantum Field Theory

September 1, 2014
Author(s)
Stephen P. Jordan, Keith S. Lee, John Preskill
Recent work has shown that quantum computers can in polynomial time compute scattering probabilities in massive quantum field theories. One can translate this task into a corresponding formal problem in computational complexity theory. Here, we establish

Computers Viewing Artists at Work

January 1, 1988
Author(s)
Russell A. Kirsch, Sanford P. Ressler, J Kirsch
… suggests an Artificial Intelligence approach to the use of computers in the fine arts. We consider computers to have capabilities beyond the utilitarian ones of … art making. Rather, we will investigate the possibility of computers seeing, even understanding, significant form in …

Alexa, Can I Trust You?

September 29, 2017
Author(s)
Judy Chung, Michaela Iorga, Jeff Voas, Sangjin Lee
Security diagnostics expose vulnerabilities and privacy threats that exist in commercial Intelligent Virtual Assistants (IVA)-- diagnostics offer the possibility of securer IVA ecosystems. This paper explores security and privacy concerns with these

Software to Determine Sphere Center from Terrestrial Laser Scanner Data per ASTM Standard E3125- 17

July 12, 2018
Author(s)
Prem K. Rachakonda, Balasubramanian Muralikrishnan, Daniel S. Sawyer, Luc Cournoyer
… speed using a laser, resulting in high density 3D point cloud data. The Dimensional Metrology Group (DMG) at NIST … algorithm to determine the center of a sphere from point cloud data. This paper describes this algorithm and software … 3D point cloud, sphere fitting, terrestrial laser scanner data …

Security of Personal Computer Systems: A Management Guide

January 1, 1985
Author(s)
Dennis D. Steinauer
… The use of personal computer systems (often called desktop or professional … While providing many benefits, the use of such small computer systems may introduce serious potential information … considerations associated with the use of personal computer systems. The primary objective is to identify and …

Computer Security Training Guidelines

November 1, 1989
Author(s)
Mary A. Todd, Constance Guitian
… determining the training needs of employees involved with computer systems. It describes the learning objectives of agency computer security training programs. A focus on learning … acquiring, evaluating, and selecting training courses in computer security that fit the agency environment. This …

Computer Science in Education 2018

February 14, 2018
Author(s)
Jeff Voas, D. Richard Kuhn, Celia Paulsen, Kim B. Schaffer
… We surveyed six of our profession's best senior computer science educators for their views on the current state and trends in computer science education. … computer science education, ieee, software engineering … Computer Science in Education 2018 …

Discrete Combinatorial Investigation of Polymer Mixture Phase Boundaries

January 1, 2005
Author(s)
J Cabral, Alamgir Karim
… phase behavior. The technique consists of a parallel cloud point detection scheme using discrete composition … turbidity is detected by imaging the entire array and the cloud point curve is determined through automated parallel … critical solution temperature (UCST) phase behavior.The cloud point curves obtained closely approximate the bulk …

Internet-Enabled Computer-Aided Design

January 1, 1997
Author(s)
William Regli
Computer-Aided Design (CAD) software vendors are quickly … market trends in Internet-enabled ComputerAided Design and Computer-Aided Engineering (CAD/CAE). We describe several of … Internet-Enabled Computer-Aided Design …

Quantum Computer Architecture Using Nonlocal Interactions

May 1, 2003
Author(s)
G K. Brennen, D Song, Carl J. Williams
… requirements essential to building a scalable quantum computer. Because many physical implementation schemes for … overhead to connect distant memory nodes of the computer. In this paper we provide a solution to this problem … computer architectures, quantum information …

Microwaves in Quantum Computing

January 29, 2021
Author(s)
Joseph C. Bardin, Daniel Slichter, David J. Reilly
… The growing field of quantum computing relies on a broad range of microwave technologies, … review the use of microwave signals and systems in quantum computing, with specific reference to three leading quantum computing platforms: trapped atomic ion qubits, spin qubits …
Displaying 176 - 200 of 7105
Was this page helpful?