Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 29051 - 29075 of 73697

Property Verification for Generic Access Control Models

December 20, 2008
Author(s)
Chung Tong Hu, David R. Kuhn, Tao Xie
To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general

A Threat Analysis on UOCAVA Voting Systems

December 19, 2008
Author(s)
Andrew R. Regenscheid, Nelson E. Hastings
This report contains the results of NIST s research into technologies to improve the voting process for United States citizens living overseas. It splits the overseas voting process into three stages: voter registration and ballot request, blank ballot

Fiducial Intervals for the Magnitude of a Complex-Valued Quantity

December 19, 2008
Author(s)
Chih-Ming Wang, Hariharan K. Iyer
This paper discusses a fiducial approach for constructing uncertainty intervals for the distance between k normal means and the origin. When k=2 this distance is equivalent to the magnitude of a complex-valued quantity. Uncertainty intervals for the

Particle Motion During the Compaction of Granular Matter

December 19, 2008
Author(s)
Steven Slotterback, Masahiro Toiya, Leonard Goff, Jack F. Douglas, Wolfgang Losert
We track particle motions in a granular material subjected to compaction using a laser scattering based imaging method where compaction is achieved through thermal cycling. Particle displacements in this jammed fluid correlate strongly with rearrangments

Guide to Information Security Testing and Assessment

December 18, 2008
Author(s)
Shirley M. Radack
This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-115, Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and Technology, which was written by Karen

Matter-wave self-imaging by atomic center-of-mass motion induced interference

December 18, 2008
Author(s)
Ke Li, Lu Deng, Edward W. Hagley, M.S. Zhan, Marvin G. Payne
We demonstrate matter-wave self-imaging in a stationary light field in the non-Raman-Nath limit. We show that in a non-instantaneous pulsed standing wave grating significant contributions due to the non-negligible atomic center of mass motion and

Elastic Modulus of Faceted Aluminum Nitride Nanotubes Measured by Contact Resonance Atomic Force Microscopy

December 17, 2008
Author(s)
Gheorghe Stan, C Ciobanu, Timothy Thayer, George Wang, Randall Creighton, Premsagar P. Kavuri, Leonid A. Bendersky, Robert F. Cook
A new methodology for determining the radial elastic modulus of a one-dimensional nanostructure laid on a substrate has been developed. The methodology consists of the combination of contact resonance atomic force microscopy (AFM) with finite element

Impact of Adhesive Modulus on Humidity Induced Failure

December 17, 2008
Author(s)
Kar T. Tan, Christopher C. White, Kristen Hamilton, Nicholas Wagman, Joshua E. Goldman, Alper Karul, Jessica M. Torres, Sushil K. Satija, Cyril Clerici, Donald L. Hunston, Bryan D. Vogt

Neutron-Diffraction Measurements of Magnetic Order and a Structural Transition in the Parent BaFe2As2 Compound of FeAs-Based High-Temperature Superconductors

December 17, 2008
Author(s)
Qingzhen Huang, Yiming Qiu, Wei Bao, Mark Green, Jeffrey Lynn, Y. C. Gasparovic, T. Wu, G. Wu, X. H. Chen
The recent discovery of superconductivity in (Ba,K)Fe2As2, which crystallizes in the ThCr2Si2 (122) structure as compared with the LnFeAsO (Ln is lanthanide) systems that possess the ZrCuSiAs (1111) structure, demonstrates the exciting potential of the

Overview of the TREC 2007 Blog Track

December 17, 2008
Author(s)
Ian Soboroff, Craig Macdonald, Iadh Ounis
The goal of the Blog track is to explore the information seeking behaviour in the blogosphere. It aims to create the required in- frastructure to facilitate research into the blogosphere and to study retrieval from blogs and other related applied tasks

Overview of the TREC 2007 Enterprise Track

December 17, 2008
Author(s)
Ian M. Soboroff, Peter Bailey, Nick Craswell, Arjen de Vries
The goal of the enterprise track is to conduct experiments with enterprise data that reflect the experiences of users in real organizations. This year, the track has introduced a new corpus with the goal to be more representative of real-world enterprise

SRM Spotlight

December 17, 2008
Author(s)
Regina R. Montgomery
The SRM Spotlight is a newsletter published by the Measurement Services Division for users of NIST standard reference materials. The Spotlight announces new reference materials and provides information about their use. In addition, this newsletter contains

Technique for Monitoring Environmentally Induced Changes in Polymeric Sealants

December 17, 2008
Author(s)
Donald L. Hunston, Kar T. Tan, Christopher C. White
A new procedure was developed to utilize stress relaxation tests to monitor damage induced in sealant materials exposed to environmental variables and changing strains. By combining tension and compression tests, it was possible to monitor both molecular

Two New Efficient CCA-Secure Online Ciphers : MHCBC and MCBC

December 17, 2008
Author(s)
Mridul Nandi
Online ciphers are those ciphers whose ciphertexts can be computed in an online manner. HCBC1 and HCBC2 are two known examples of Hash Cipher Block Chaining online ciphers. HCBC1 is secure against chosen plaintext adversary (or called CPA-secure) whereas

NDRProfile Schema Version 1.0 User Guide

December 16, 2008
Author(s)
Joshua Lubell, Betty Harvey, Puja Goyal, Katherine C. Morris
The NDRProfile schema provides a common syntax for exchanging, managing, and reusing XML Schema naming and design rules (NDRs). NDRProfile, used by NIST's Quality of Design (QOD) application as a format for import and export of rule sets, is also useful

Measurement of formamidopyrimidines in DNA

December 15, 2008
Author(s)
Pawel Jaruga, Guldal Kirkali, Miral M. Dizdar
Formamidopyrimidines, 4,6-diamino-5-formamidopyrimidine (FapyAde) and 2,6-diamino-4-hydroxy-5-formamidopyrimidine (FapyGua), are among major lesions in DNA generated by hydroxyl radical attack, UV radiation or photosensitization in vitro and in vivo
Displaying 29051 - 29075 of 73697
Was this page helpful?