Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 451 - 473 of 473

On The Reversion of an Asymptotic Expansion and the Zeros of the Airy Functions

January 15, 1999
Author(s)
Bruce R. Fabijonas, Frank W. Olver
The general theories of the derivation of inverses of functions from their power series and asymptotic expansions are discussed and compared. The asymptotic theory is applied to obtain asymptotic expansions of the zeros of the Airy functions and their

Active Multimedia Documents for Mobile Services

December 7, 1998
Author(s)
O E. Kia
Multimedia content is designed for many purposes and the services that are associated with them rely heavily on technologies that address representation, processing, and transmission of that content. This paper presents a new model that refines the

Finite Precision Representation of the Conley Decomposition

December 1, 1998
Author(s)
Fern Y. Hunt
We present the theoretical basis for a novel way of studying and representing the long time behavior of finite dimensional maps. It is based on the sample paths of a Markov chain. Applications of the method to the approximation of attractors of maps and to

Moment-Preserving Modeling With Image Applications

July 6, 1998
Author(s)
Anastase Nakassis, Abdou S. Youssef
Linear least-square modeling is a powerful modeling approach. Optimal piece-wise constant modeling is an important special case. In this paper we will develop a piece-wise constant modeling method that preserves the regional means and regional first

Public-Key Cryptography

April 1, 1991
Author(s)
James R. Nechvatal
This publication presents a state-of-the-art survey of public-key cryptography, circa 1988-1990, and covers the following topics: 1) the theory of public-key cryptography; 2) comparisons to conventional (secret-key) cryptography; 3) a largely self
Displaying 451 - 473 of 473
Was this page helpful?