Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 12751 - 12775 of 73697

Local field effect on charge-capture/emission dynamics

October 30, 2017
Author(s)
Kin P. Cheung, Dmitry Veksler, Jason P. Campbell
Charge-capture/emission is ubiquitous in solid state devices. Its dynamics often play critical roles in device operation and reliability. Treatment of this basic process is found in many text books and is considered well understood. As in many solid state

Phase Competition in the Palmer-Chalker XY Pyrochlore Er 2 Pt 2 O 7

October 30, 2017
Author(s)
A. M. Hallas, J. Gaudet, Nicholas Butch, Guangyong Xu, M. Tachibana, C. R. Wiebe, Graeme M. Luke, Bruce D. Gaulin
We report neutron scattering measurements on Er 2Pt 2O 7, a new addition to the XY family of frustrated pyrochlore magnets. Symmetry analysis of our elastic scattering data shows that Er 2Pt 2Od7^ is the first XY pyrochlore to order into the κ = 0,Γ 7

Strength of Brittle Materials in Moderately Corrosive Environments

October 30, 2017
Author(s)
Robert F. Cook
The strengths of four brittle materials―cordierite glass ceramic, fused silica, silicon, and polycrystalline alumina were measured after exposure to weakly-corrosive water and moderately- corrosive buffered HF (BHF) solution. Exposure to water did not

Propagation of orientation uncertainty of 3D rigid object to its points

October 28, 2017
Author(s)
Marek Franaszek, Geraldine Cheok
If a CAD model of a rigid object is available, the location of any point on an object can be derived from the measured 6DOF pose of the object. However, the uncertainty of the measured pose propagates to the uncertainty of the point in an anisotropic way

Genome Replication in Thermococcus kodakarensis Independent of Cdc6 and an Origin of Replication

October 27, 2017
Author(s)
Alexandra Gehring, David Astling, Rie Matsumi, Brett Burkhart, Zvi Kelman, John Reeve, Kenneth Jones, Thomas J. Santangelo
The initiation of DNA replication is typically tightly regulated by proteins that form initiation complexes at specific sequences known as replication origins. In Archaea and Eukaryotes, Cdc6, a near-universally conserved protein binds and facilitates the

The odd-even invariant and Hamiltonian circuits in tope graphs

October 27, 2017
Author(s)
Yvonne Kemper, James F. Lawrence
Questions of the existence of Hamiltonian circuits in the tope graphs of central arrangements of hyperplanes are considered. Connections between the existence of Hamiltonian circuits in the arrangement and the odd-even invariant of the arrangement are

Strategies and Considerations for the Trace Detection of Fentalogs

October 26, 2017
Author(s)
Edward Sisco
Fentanyl and fentanyl analogs pose a significant and ever changing threat in the United States as both pure compounds and in complex mixtures. While commonly considered detection techniques require visible amounts of powder (i.e. color tests or GC/MS

NIST Guidance on Application Container Security

October 25, 2017
Author(s)
Ramaswamy Chandramouli, Murugiah Souppaya, Karen Scarfone
This bulletin summarizes the information found in NIST SP 800-190, Application Container Security Guide and NISTIR 8176, Security Assurance Requirements for Linux Application Container Deployments. The bulletin offers an overview of application container

Studying Water and Solute Transport through Desalination Membranes via Neutron Radiography

October 25, 2017
Author(s)
Devin L. Shaffer, Jacob M. LaManna, David L. Jacobson, Daniel S. Hussey, Menachem Elimelech, Edwin P. Chan
Neutron radiography, a non-destructive imaging technique, is applied to study water and solute transport through desalination membranes. Specifically, we use neutron radiography to quantify lithium chloride draw solute concentrations across a thin-film

Perspectives for a new realization of the pascal by optical methods

October 24, 2017
Author(s)
Jay H. Hendricks, Karl Jousten, Jack A. Stone Jr., Patrick F. Egan, Tom Rubin, Christof Gaiser, Rene Schodel, James A. Fedchak, Jacob E. Ricker, Jens Fluegge, Stephen P. Eckel, Julia K. Scherschligt, Daniel S. Barker, Kevin O. Douglass, Gregory F. Strouse, Uwe Sterr, Waldimir Sabuga
Since the beginning of measurement of pressure in the 17th century, the unit of pressure has been defined by the relationship of force per unit area. The present state of optical technology now offers the possibility of using a thermodynamic definition

Process Document for the NIST List of Certified Devices

October 24, 2017
Author(s)
Jason D. Kahn
The Middle Class Tax Relief and Job Creation Act of 2012 defined responsibilities for the National Institute of Standards and Technology (NIST) in regards to the Nationwide Public Safety Broadband Network (NPSBN) and FirstNet (FN). AT&T was awarded to be a

Towards Probabilistic Identification of Zero-day Attack Paths

October 24, 2017
Author(s)
Xiaoyan Sun, Dai Jun, Peng Liu, Anoop Singhal, John Yen
Zero-day attacks continue to challenge the enterprise network security defense. A zero-day attack path is formed when a multi- step attack contains one or more zero-day exploits. Detecting zero-day attack paths in time could enable early disclosure of zero

2016 NIST/ITL Cybersecurity Program: Annual Report

October 23, 2017
Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry

NSRL Kaspersky dataset documentation

October 23, 2017
Author(s)
Alexander J. Nelson
The National Institute of Standards and Technology (NIST) National Software Reference Library (NSRL) has created curated releases of the Reference Data Set (RDS) consisting of hashes of Kaspersky products. This is in response to the DHS directive on
Displaying 12751 - 12775 of 73697
Was this page helpful?