Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 62426 - 62450 of 74239

Burning of Oil Spills.

October 19, 1989
Author(s)
William D. Walton, D D. Evans
This study is directed at understanding the oil spill combustion process and the smoke generated from the burning. Measurements of 1.2 m diameter Murban crude oil pool fires show an initial steady energy release rate of 840 kW/m2 which increases to 1860 kW

Carbon Monoxide Production and Prediction (NISTIR 4449)

October 19, 1989
Author(s)
William M. Pitts
A long-term research plan has been formulated which is designed to improve the understanding of and predictive capability for the formation of carbon monoxide in enclosure fires. The current understanding of the problem is briefly discussed. Goals

Concurrent Turbulent Flame Spread.

October 19, 1989
Author(s)
L Zhou, A C. Fernandez-Pello
The rate of flame spread over the surface of thick PMMA sheets has been measured as a function of the velocity and turbulence intensity of a forced air flow concurrent with the direction of flame propagation. It is shown that the flow turbulence has a

A Modular Architecture for a Process Planning Systems

October 1, 1989
Author(s)
M Browning
At the National Institute of Standards and Technology, the automation of small batch manufacturing has been a topic of research since 1981. The work has emphasized the integration of all activities required to produce a mechanical part, and the

Computer Users' Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
While excellent progress has been made in computer technology, very little has been done to inform users of the vulnerability of data and information to such threats as unauthorized modification, disclosure, and destruction, either deliberate or accidental

Executive Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
This guide is designed to help the policy maker address a host of questions regarding the protection and safety of computer systems and data processed within your agency. It introduces information systems security concerns, outlines the management issues
Displaying 62426 - 62450 of 74239
Was this page helpful?