An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
https://www.nist.gov/publications/search
Search Publications
NIST Authors in Bold
Displaying 2001 - 2025 of 7108
Sohyoung Kim, Mirit I. Aladjem, Geoffrey B. McFadden, Kurt W. Kohn
Tumor suppressor protein p53 is negatively regulated by two structurally homologous proteins, Mdm2 and MdmX. In contrast to Mdm2, MdmX lacks ubiquitin ligase activity. Although the essential interactions of MdmX are known, it is not clear how they function
The Office of Information Services is responsible for NIST's research library and publications program. In the course of developing new electronic and print versions of one of those publications, the Technicalendar, we realized we had an opportunity to
Andrei F. Kazakov, Chris D. Muzny, Robert D. Chirico, Vladimir Diky, Michael D. Frenkel
It has long been understood that availability of thermophysical and thermochemical property data is vital to scientific research and industrial design. For over 65 years, the Thermodynamics Research Center (TRC) has been publishing tables of critically
We present and discuss the development an unconditionally stable algorithm to solving the evolution equations for the Phase Field Crystal (PFC) model. This algorithm allows for an arbitrarily large algorithmic time step. As the basis for our analysis of
The analysis of attack graphs has played an important role in defending against network intrusions. This paper presents a relational approach. We devise a relational approach to model necessary inputs and network configurations to generate attack graphs.
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
The article would describe, from a librarian's standpoint, what one library has done to gear up for a wireless LAN. It would discuss specific steps the library has taken to get a Wireless Equipment Loan Service up and running.It would explain a dual