Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1601 - 1625 of 5421

Topological surface states of MnBi2Te4 at finite temperatures and at domain walls

February 24, 2021
Author(s)
Kevin F. Garrity, Sugata Chowdhury, Francesca Tavazza
… aspects of this picture, but several experiments have seen zero-gap surfaces states at low temperature, in conflict with … the electronic structure, and we find that the domain wall zero-gap states extend over many unit-cells. These domain …

Fermi-Fermi Mixtures in the Strong Attraction Limit

January 31, 2008
Author(s)
Menderes Iskin, Carlos Sa de Melo
… masses and equal or unequal populations are described at zero and finite temperatures in the strong attraction limit. … and non-condensed molecular bosons, and excess fermions at zero and finite temperatures, and discuss possible …

Magnetic Anisotropy and Thermal Stability of Ta-pinned Spin Valves

January 1, 2001
Author(s)
R A. Fry, Robert D. McMichael, John E. Bonevich, P J. Chen, William F. Egelhoff Jr., Chang H. Lee
… anneals at 25 C intervals up to 300 C; GMR decreases to zero upon further anneals up to 450 C. Measurements taken at … GMR decreases linearly with temperature, extrapolating to zero atapproximately 425 C, while the anisotropy field is …

Modeling Approach for the Design of the NIST Neutron Source

April 16, 2023
Author(s)
Abdullah Weiss, Osman Celikten, Anil Gurgen, Joy Shen, Dagistan Sahin, Yaniv Shaposhnik
… preliminary safety analysis report and provides a level of trust for the engineers proposing the design that goes beyond …

PSCR 2021: Social Media Incident Streams

October 1, 2021
Author(s)
Ian Soboroff
Monitoring social media for public safety is incredibly challenging. The TREC Social Media Incident Streams project collects social media during emergency events, annotates and labels it for public safety use, and provides a metrics-focused environment

The NIST Calibration Services Virtual Library

July 11, 1999
Author(s)
Sally S. Bruce, W Trefzger
… NIST calibration services are described in official NIST publications as part of the NIST Special Publications Series SP 250. These documents are available so … with convenient access to the NIST calibration service publications, the NIST Office of Information Services (OIS) …

Simulated inter-filament fusion in embedded 3D printing

November 15, 2024
Author(s)
Leanne Friedrich, Ross Gunther
… the interfacial tension between the ink and support is non-zero. Moreover, because support can become trapped between filaments at zero interfacial tension, the spacing between filaments must … in the old filament. While ink-support combinations at non-zero interfacial tension have better inter-filament fusion, …

Stopping Malware and Unauthorized Software through Application Whitelisting

December 15, 2015
Author(s)
Adam Sedgewick, Murugiah Souppaya, Karen Scarfone, Larry Feldman
This bulletin summarizes the information presented in NIST Special Publication 800-167, "Guide to Application Whitelisting," written by Adam Sedgewick, Murugiah Souppaya and Karen Scarfone. The publication is intended to assist organizations in

IoT Device Cybersecurity Capability Core Baseline

May 29, 2020
Author(s)
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device hardware and software). This publication defines an Internet of Things (IoT) device cybersecurity

Guide for Developing Security Plans for Information Technology Systems

February 24, 2006
Author(s)
Marianne M. Swanson, Joan Hash, Pauline Bowen
The objective of system security planning is to improve protection of information system resources. All federal systems have some level of sensitivity and require protection as part of good management practice. The protection of a system must be documented
Displaying 1601 - 1625 of 5421
Was this page helpful?