Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 51326 - 51350 of 73697

Synthesis, Characterization, and Crystal Structure of Dicalcium Glutarylbisphosphonate Dihydrate - Covalently Pillared Layer Structure with the Potential for Epitaxial Growth on Hydroxyapatite.

November 1, 1998
Author(s)
M Mathew, Bruce O. Fowler, E Breuer, G Golomb, I S. Alferiev, Naomi Eidelman
A new bisacylphosphonate, glutarylbisphosphonate (GlBP) was synthesized. Sodium and calcium salts of the GlBP, disodium dihydrogenglutarylbisphosphonate, NaHO 3P-C(O)-(CH 2) 3C(O)-PO 3Hna and dicalcium glutarylbisphosphonate dihydrate, Ca 2[O 3P-C(O)-(CH 2

The High-Resolution Raman Spectrum of the N 4 Band of Diborane

November 1, 1998
Author(s)
J L. Domenech, D Bermejo, J.- M. Flaud, Walter J. Lafferty
The high resolution Raman spectra of the Ņ 4 bands of 11B 2H 6 and 11B 10BH 6 have been recorded and analyzed. The recordings have been made using a high resolution spectrometer based on the inverse Raman effect, with an instrumental resolution of 0.007 cm

The OOF Manual: Version 1.0

November 1, 1998
Author(s)
W C. Carter, Stephen A. Langer, Lin-Sien H. Lum
OOF and PPM200F are programs developed at NIST to investigate the properties of microstructures. The user starts with an image of a real or simulated microstructure, assigns material properties to the features in the image, and performs virtual experiments

Theory of Optical Absorption with Electron-Hole Attraction

November 1, 1998
Author(s)
Eric L. Shirley, L Benedict, Robert B. Bohn
This work presents calculations of the optical absorption spectra of semiconductors and insulators. The background and underlying physics are discussed, and the efficient computational method used is sketched. Results for eight solids are presented and

Toward a National Standards Strategy Conference Summary Report

November 1, 1998
Author(s)
K J. Leuteritz, W G. Leight
On September 23, 1998, the National Institute of Standards and Technology (NIST) and the American National Standards Institute (ANSI) co-hosted a summit conference, Toward a National Standards Strategy To meet Global Needs. NIST Director Ray Kammer and

Turbidity, Light Scattering, and Coexistence Curve Data for the Ionic Binary Mixture Triethyl N-Hexyl Ammonium Triethyl N-Hexyl Borate in Diphenyl Ether

November 1, 1998
Author(s)
S. Wiegand, M E. Briggs, M Kleemeier, W Schroer, Johanna Levelt Sengers
We report turbidity, light scattering, and coexistence curve data for a solution of triethyl n-hexyl ammonium triethyl n-hexyl borate in diphenyl ether. We recently reported that the present sample shows much higher turbidity than that of K. S. Zhang, M. E

Using Model Checking to Generate Tests From Specifications

November 1, 1998
Author(s)
P E. Ammann, Paul E. Black, William J. Majurski
We apply a model checker to the problem of test generation using a new application of mutation analysis. We define syntactic operators, each of which produces a slight variation on a given model. The operators define a form of mutation analysis at the

Document Image Coding for Processing and Retrieval

October 30, 1998
Author(s)
O E. Kia, D Doermann
Document images belong to a unique class of images where the information content is contained in the language represented by a series of symbols on the page rather than in the visual objects themselves. From this, a new image coding strategy can be

Role-Based Access Control for the Web

October 29, 1998
Author(s)
John Barkley, David R. Kuhn, Lynne S. Rosenthal, Mark Skall, Anthony V. Cincotta
Establishing and maintaining a presence on the World Wide Web (Web), once a sideline for U.S. industry, has become a key strategic aspect of marketing and sales. Many companies have demonstrated that a well designed Web site can have a positive effect on

Blind Men and Elephants: Six Approaches to TREC Data

October 28, 1998
Author(s)
D L. Banks, Paul D. Over, Nien F. Zhang
The paper reviews six recent efforts to better understand performance measurements on information retrieval (IR) within the framework of the Text REtrieval Conferences (TREC): analysis of variance, cluster analyses, rank correlations, beadplots

Fire-Emulator Detector-Evaluation

October 28, 1998
Author(s)
Artur A. Chernovsky, William L. Grosshandler, Thomas G. Cleary, Michael D. Anderson
The performance of a fire detection system is determined as much by its ability to recognize correctly the non-fire state as to sense the presence of a real fire. Common fire detectors respond to particulate matter in the form of smoke from a flaming or

1998 TREC-7 Spoken Document Retrieval Track Overview and Results

October 26, 1998
Author(s)
John S. Garofolo, Ellen M. Voorhees, C G. Auzanne, Vincent M. Stanford, B A. Lund
This paper describes the 1998 TREC-7 Spoken Document Retrieval (SDR) Track which implemented an evaluation of retrieval of broadcast news excerpts using a combination of automatic speech recognition and information retrieval technologies. The motivations

Managing Role/Permission Relationships Using Object Access Types

October 23, 1998
Author(s)
John Barkley, Anthony V. Cincotta
The role metaphor in Role Based Access Control (RBAC) is particularly powerful in its ability to express access policy in terms of the way in which administrators view organizations. Much of the effort in providing administrative tools for RBAC has been

Role Based Access Control on MLS Systems Without Kernel Changes

October 23, 1998
Author(s)
David R. Kuhn
Role based access control (RBAC) is attracting increasing attention as a security mechanism for both commercial and many military systems. This paper shows how RBAC can be implemented using the mechanisms available on traditional multi-level security
Displaying 51326 - 51350 of 73697
Was this page helpful?