Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 2426 - 2450 of 7109

Evaluation of Low-Contrast Detectability of Iterative Reconstruction across Multiple Institutions, CT Scanner Manufacturers, and Radiation Exposure Levels

February 19, 2015
Author(s)
Adele P. Peskin, Ganesh Saiprasad, James J. Filliben, Alden A. Dima
Purpose: To evaluate the impact of Iterative Reconstruction (IR) compared with Filtered Back Projection (FBP) using low-contrast objects in phantom images across vendors and exposure levels. Materials and Methods: Randomized repeat scans of the Gammex 464

The Resonant Exchange Qubit

July 31, 2013
Author(s)
Jacob M. Taylor, Medford Jim, Johannes Beil, Emmanuel Rashba, H Lu, A. C. Gossard, C. M. Marcus
… Quantum dots, quantum computing

Connecting the Discrete and Continuous-Time Quantum Walks

October 16, 2008
Author(s)
Frederick Strauch
Recently, quantized versions of random walks have been explored as effective elements for quantum algorithms. In the simplest case of one dimension, the theory has remained divided into the discrete-time quantum walk and the continuous-time quantum walk

A Quantum Algorithm Detecting Concentrated Maps

November 1, 2007
Author(s)
Isabel M. Beichl, Stephen Bullock, David Song
We consider an arbitrary mapping for , some number of quantum bits. Using calls to a classical oracle evaluating and an classical bit data store, it is possible to determine whether is one-to-one. For some radian angle , we say is -concentrated iff for

Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls

December 1, 1994
Author(s)
John P. Wack, Lisa J. Carnahan
This document provides an overview of the Internet and security-related problems. It then provides an overview of firewall components and the general reasoning behind firewall usage. Several types of network access policies are described, as well as

Implementation of the semiclassical quantum Fourier transform in a scalable system

May 13, 2005
Author(s)
J Chiaverini, Joseph W. Britton, Dietrich G. Leibfried, Emanuel H. Knill, Murray D. Barrett, Brad R. Blakestad, Wayne M. Itano, John D. Jost, C. Langer, R Ozeri, Tobias Schaetz, David J. Wineland
One of the most interesting future applications of quantum computers is Shor's factoring algorithm, which provides an exponential speedup compared to known classical algorithms. The crucial final step in Shor's algorithm is the quantum Fourier transform

Statistics and Measurements

January 1, 2001
Author(s)
C M. Croarkin
… methods, Standard Reference Materials, statistical computing, and dissemination of measurementtechnology. A … methods, standard reference materials, statistical computing, unertainty analysis …

Some Properties of Irregular 3-D Particles

October 12, 2021
Author(s)
Michael A. Taylor, Edward Garboczi, S T. Erdogan, D Fowler
This paper discusses some of the properties of irregular particles that are of interest to engineers, including volume, density, & surface area. Numerical and statistical information on these properties is essential (a) for a better understanding of

Security Requirements for Cryptographic Modules

March 22, 2019
Author(s)
National Institute of Standards and Technology (NIST), Michael J. Cooper, Kim B. Schaffer
The selective application of technological and related procedural safeguards is an important responsibility of every federal organization in providing adequate security in its computer and telecommunication systems. This standard is applicable to all

Modeling a Supply Chain Reference Ontology Based on a Top-Level Ontology

August 19, 2019
Author(s)
Boonserm Kulvatunyou, Farhad Ameri
Several ontologies have been introduced in the domain of supply chain over the past decade with the promise of enabling a true supply chain interoperability. However, the existing supply chain ontologies have several gaps with respect to completeness
Displaying 2426 - 2450 of 7109
Was this page helpful?