Skip to main content

Publications

NIST Authors in Bold

Displaying 51 - 75 of 51382

Room-temperature skyrmions in strain-engineered FeGe thin films

Author(s)
Sujan Budhathoki, Arjun Sapkota, Ka M. Law, Smriti Ranjit, Bhuwan Nepal, Brian D. Hoskins, Arashdeep S. Thind, Albina Y. Borisevich, Michelle E. Jamer, Travis J. Anderson, Andrew D. Koehler, Karl D. Hobart, Gregory M. Stephen, Don Heiman, Tim Mewes, Rohan Mishra, James C. Gallagher, Adam J. Hauser
Skyrmion electronics hold great promise for low energy consumption and stable high information density, and stabilization of Skyrmion lattice (SkX) phase at or

Blind Measurement of Receiver System Noise

Author(s)
Daniel G. Kuester, Adam J. Wunderlich, Duncan A. McGillivray, Dazhen Gu, Audrey Puls
Tightly packaged receive systems pose a challenge for noise measurements. The only available receiver outputs are often user data: link benchmark or diagnostic

Recommendation for Cryptographic Key Generation

Author(s)
Elaine B. Barker, Allen L. Roginsky, Richard Davis
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to

Assembly and annotation of an Ashkenazi human reference genome

Author(s)
Justin M. Zook, Justin M. Wagner, Nathanael D. Olson, Steven L. Salzberg, Alaina Shumate, Aleksey V. Zimin, Daniela Puiu, Mihaela Pertea, Marc Salit
Thousands of experiments and studies use the human reference genome as a resource each year. This single reference genome, GRCh38, is a mosaic created from a

IFCC working group recommendations for correction of bias caused by non-commutability of a certified reference material used in the calibration hierarchy of an end-user measurement procedure

Author(s)
Johanna Camara, W. Greg Miller, Jeffrey R. Budd, Neil Greenberg, Weykamp Cas, Harald Althaus, Heinz Schimmel, Mauro Panteghini, Vincent Delatour, Ferruccio Ceriotti, Thomas Keller, Douglas Hawkins, Robert Rej, Finlay MacKenzie, Elina van der Hagen, Hubert W. Vesper
Establishing metrological traceability to a matrix-based certified reference material (CRM) that has been validated to be commutable among a group of

IoT Device Cybersecurity Capability Core Baseline

Author(s)
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device

Notes on Interrogating Random Quantum Circuits

Author(s)
Luis Brandao, Rene C. Peralta
Consider a quantum circuit that, when fed a constant input, produces a fixed-length random bit- string in each execution. Executing it many times yields a
Displaying 51 - 75 of 51382