Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 3226 - 3250 of 5423

Better IAQ using ASHRAE Guide

May 3, 2010
Author(s)
Andrew K. Persily, Martha Hewett
… IAQ in buildings, including Standard 62.1 and other publications (EPA and NIOSH 1991; SMACNA 2007). In addition, …

Creating a web-scale video collection for research

October 23, 2009
Author(s)
Paul D. Over, George M. Awad, Alan Smeaton, Colum Foley, James Lanagan
This paper begins by considering a number of important design questions for a web-scale, widely available, multimedia test collection intended to support long-term scientific evaluation and comparison of content-based video analysis and exploitation

An Independent Measurement System for Testing Automotive Crash Warning Systems

April 2, 2009
Author(s)
Sandor S. Szabo, Joseph A. Falco, Richard J. Norcross
This report describes the National Institute of Standards and Technology's role in the Integrated Vehicle-Based Safety Systems (IVBSS) program, a four-year safety initiative sponsored by the United States Department of Transportation (U.S. DOT) to develop

Security of Cell Phones and PDAs

January 29, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information disseminated in NIST Special Publication (SP) 800-124, Guidelines on Cell Phone and PDA Security: Recommendations of the National Institute of Standards and Technology, which was written by Wayne Jansen and Karen

Advancing Automated Demand Response Technology

January 28, 2009
Author(s)
Steven T. Bushby, David G. Holmberg
For several years electric utilities have implemented a wide variety of programs to curtail load in times of stress on the electricity distribution grid or on generating capacity. Although these programs have shared a common goal of reducing peak

Guide to Information Security Testing and Assessment

December 18, 2008
Author(s)
Shirley M. Radack
This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-115, Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and Technology, which was written by Karen

A New Shape Benchmark for 3D Object Retrieval

December 3, 2008
Author(s)
Rui Fang, Afzal A. Godil, Xiaolan Li, Asim Wagan
Recently, content based 3D shape retrieval has drawn more and more attention by researchers. How to properly evaluate the result of shape searching algorithms is important. Benchmarking is one answer to this question. Due to the limitations of current

NIST 31. Phase Equilibria Diagrams Database: Version 2.1

October 16, 2008
Author(s)
Stephen W. Freiman
Version 2.1 of this PC Windows(TM)-based CD-ROM package provides improved access to the well-known and widely distributed Phase Equilibria Diagrams Database (PED).The software permits searches for diagrams by chemical system, author, or year of publication

Status of NIST Thermal Insulation Reference Materials

September 1, 2008
Author(s)
Robert R. Zarr
The current status of thermal insulation reference materials at the National Institute of Standards and Technology (NIST) is presented. This paper describes an ongoing thermal insulation measurement program that provides the public with Calibrated Transfer

The History of Instrumented Impact Testing

December 15, 2005
Author(s)
M. P. Manahan, Thomas A. Siewert
Pendulum impact testing is widely known to have a history that extends back to the turn of the last century. To many researchers today, instrumentation of the impact test to acquire a load-time history, and thereby provide important data in addition to

Building Regulatory Systems in a Post-September 11 World.

October 6, 2004
Author(s)
Richard W. Bukowski
The September 11, 2001 attacks in the United States have initiated a significant discussion and rethinking among building regulators not only in the U.S., but also around the world. While most quickly state that regulations should not require that

Fingerprint Image Quality

April 13, 2004
Author(s)
Elham Tabassi, Charles Wilson, Craig I. Watson
In this report, we propose a new definition of quality of fingerprint impressions and present detailed algorithms to measure image quality for fingerprints. We define fingerprint image quality as a predictor of matcher performance before a matcher

TREC-2001 Interactive Track Report

April 15, 2002
Author(s)
William Hersh, Paul D. Over
In the TREC 2001 Interactive Track six research teams carried out observational studies which increased the realism of the searching by allowing the use of data and search systems/tools publicly accessible via the Internet. To the extent possible

TREC-2001 Interactive Track Report

April 1, 2002
Author(s)
William Hersh, Paul D. Over
In the TREC 2001 Interactive Track six research teams carried out observational studies which increased the realism of the searching by allowing the use of data and search systems/tools publicly accessible via the Internet. To the extent possible

Development of Combustion and Radiation Models for Large Scale Fire Simulation

September 13, 2001
Author(s)
Kevin B. McGrattan, J E. Floyd, Glenn P. Forney, Simo A. Hostikka, Howard R. Baum
In cooperation with the fire protection engineering community, a numerical fire model, Fire DynamicsSimulator (FDS), is being developed at NIST to study fire behavior and to evaluate theperformance of fire protection systems in buildings. Version 1 of FDS

Advanced Technology Program's Healthcare Informatics Initiatives

September 1, 2000
Author(s)
R N. Spivack
This chapter illustrates how a bottom-up model of a civilian technology policy program works by recounting the story of the genesis and evolution of the Advanced Technology Program's (ATP) Information Infrastructure for Healthcare (IIH) focused program

Object Retrieval and Access Management in Electronic Commerce

September 1, 1999
Author(s)
S A. Wakid, John Barkley, Mark Skall
Electronic commerce over the Internet is now tens of billions of dollars per year and growing. This article describes how objects used in EC can be located and protected from unauthorized access. It discusses the three kinds of EC: customer interactions
Displaying 3226 - 3250 of 5423
Was this page helpful?