Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 44201 - 44225 of 143797

Comparing VM-Placement Algorithms for On-Demand Clouds

November 29, 2011
Author(s)
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
Much recent research has been devoted to investigating algorithms for allocating virtual machines (VMs) to physical machines (PMs) in infrastructure clouds. Many such algorithms address distinct problems, such as initial placement, consolidation, or

Environmental Analysis: Persistent Organic Pollutants

November 29, 2011
Author(s)
Lane C. Sander, Michele M. Schantz, Stephen A. Wise
The term “persistent organic pollutants” (POPs) describes a broad range of anthropogenic compounds that are present in the environment. Persistent organic pollutants can be grouped into subclasses based on their original intended uses or chemical

Fire Exposures of Fire Fighter Self-Contained Breathing Apparatus Facepiece Lenses

November 29, 2011
Author(s)
Amy E. Mensch, George G. Cajaty Barbosa Braga, Nelson P. Bryner
National Institute of Standards and Technology (NIST), conducted experiments which demonstrated a range of realistic thermal exposures and environmental conditions that firefighters could be exposed to. Self-contained breathing apparatus (SCBA) facepieces

Fundamental Solution of Laplace's Equation in Hyperspherical Geometry

November 29, 2011
Author(s)
Howard S. Cohl
Due to the isotropy of $d$-dimensional hyperspherical space, one expects there to exist a spherically symmetric fundamental solution for its corresponding Laplace-Beltrami operator. The $R$-radius hypersphere ${\mathbf S}_R^d$ with $R>0$, represents a

On the Differential Security of Multivariate Public Key Cryptosystems

November 29, 2011
Author(s)
Daniel C. Smith-Tone
Since the discovery of an algorithm for factoring and computing discrete logarithms in polynomial time on a quantum computer, the cryptographic community has been searching for an alternative for security in the approaching post-quantum world. One

VM Leakage and Orphan Control in Open-Source Clouds

November 29, 2011
Author(s)
Christopher E. Dabrowski, Kevin L. Mills
Computer systems often exhibit degraded performance due to resource leakage caused by erroneous programming or malicious attacks, and computers can even crash in extreme cases of resource exhaustion. The advent of cloud computing provides increased
Displaying 44201 - 44225 of 143797
Was this page helpful?