Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 8301 - 8325 of 13224

Causal Machine Learning: An Empirical Approach to Supply Chain Management

January 9, 2026
Author(s)
Alfredo Roa-Henriquez, Juan Fung, Ruhaimatu Abudu, Jennifer Helgeson, Douglas Thomas
… core. While ML has enhanced supply chain management (SCM) in efficiency and resilience, it often relies on … AI-driven pricing strategies. Despite its potential, CML in SCM remains nascent, with limited empirical research. This … chapter delves into the integration of causal inference in SCM, emphasizing methods that avoid pre-selecting …

Simulating Enclosure Fire Dynamics and Suppression

February 19, 2017
Author(s)
Howard R. Baum, Kevin B. McGrattan
… and combustion of fuel and air at elevated temperatures. In anenclosure fire these processes are complicated by the … building and itsfurnishings all influence the fire and are in turn changed by it.Numerical models of fire suppression … the use of highly simpified models of combsutionmechanisms in large-scale simulations. Models of solid phase suppression …

Determination of the Primary Sequence/ Structure

October 15, 2015
Author(s)
Catherine A. Mouchahoir, Mellisa Ly, Michaella Levy, Lisa E. Kilpatrick, Scott C. Lute, Karen W. Phinney, Lisa Marzilli, Kurt A. Brorson, Michael T. Boyne, Darryl Davis, John E. Schiel
… based primary structure determination is covered in this chapter. It also will address the question of what …

Securing Americas Digital Infrastructure Through Education

December 14, 2012
Author(s)
William D. Newhouse
… R&D thrust, Developing Scientific Foundations, described in "Trustworthy Cyberspace: Strategic Plan for the Federal … Cybersecurity Research and Development Program" published in December 2011 and NICE's awareness, education, and …

R-22 Replacement Status (in Russian)

June 25, 2008
Author(s)
J M. Calm, Piotr A. Domanski
… Since its initial recognition in 1928 and commercialization in 1936, R-22 has been applied in systems ranging from the smallest window air conditioners … R-22 Replacement Status (in Russian) …

Issues in Line Edge and Linewidth Roughness Metrology

January 1, 2005
Author(s)
John S. Villarrubia
In semiconductor electronics applications, line edge and … sampled and details of its roughness power spectrum. Noise in the microscope images from which roughness is computed results in both a random measurement error and a non-random … In: Characterization and Metrology for ULSI Technology: 2005, AIP Conference Proceedings …

Grain Boundary Crack Growth in Interconnects With an Electric Current

June 1, 1999
Author(s)
C Y. Liu, S K. Lee, Tze J. Chuang
… Failure of thin-film interconnects poses a great concern in semiconductor devices. Due to the high electric current density in interconnects, electromigration-induced atomic flux is … boundaries is believed to be the major failure mechanism. In situ transmission electron microscopy observations …

Kinetics of Polymer Phase Separation

October 16, 2008
Author(s)
Charles C. Han
… on this subject for Encyclopedia of Materials: Science and Technology. This section includes summary of sinodal …

Obituary: Jules Zeiser Klose

October 16, 2008
Author(s)
William R. Ott
… (NBS) and the National Institute of Standards and Technology (NIST), died Sunday, August 8, 2004 at the Annapolitan Care Center in Annapolis MD following a lengthy illness and complications …

Proceedings of the Biometric Consortium Conference 2003, Vol 1, No 2)

August 1, 2004
Author(s)
Fernando L. Podio, J S. Dunn
… Consortium Conference held September 22-24, 2003, in Arlington, Virginia. The conference provides a forum to … implementations and initiatives and recent advances in biometric technology. Biometrics are automated methods of recognizing a …

Timing Offset and Timing Stability for Dual-Clock Systems

May 4, 2021
Author(s)
Joshua Kast, Jeanne Quimby, Jake Rezac, Stefania Romisch
In this work, we describe a mathematical framework for evaluating timing offset and timing noise in channel sounders, based on a second-order deterministic … the transmitter and receiver. We study timing behavior in three clock-distribution configurations. In the …

Case Studies in Cyber Supply Chain Risk Management: Anonymous Consumer Electronics Company

February 4, 2020
Author(s)
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
… The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally … dependency risk management, information and communications technology supply chain risk management, ICT SCRM, …

Case Studies in Cyber Supply Chain Risk Management: Anonymous Consumer Goods Company

February 4, 2020
Author(s)
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
… The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally … dependency risk management, information and communications technology supply chain risk management, ICT SCRM, …

Case Studies in Cyber Supply Chain Risk Management: Anonymous Renewable Energy Company

February 4, 2020
Author(s)
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
… The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally … dependency risk management, information and communications technology supply chain risk management, ICT SCRM, …

Case Studies in Cyber Supply Chain Risk Management: Mayo Clinic

February 4, 2020
Author(s)
Jon M. Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, James Gimbi
… The Case Studies in Cyber Supply Chain Risk Management series engaged with several companies that are leaders in managing cyber supply chain risk. These case studies build on the Best Practices in Cyber Supply Chain Risk Management case studies originally … dependency risk management, information and communications technology supply chain risk management, ICT SCRM, …
Displaying 8301 - 8325 of 13224
Was this page helpful?