Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 5476 - 5500 of 74364

Comparison of primary laser spectroscopy and mass spectrometry methods for measuring mass concentration of gaseous elemental mercury

December 10, 2020
Author(s)
Abneesh Srivastava, Stephen E. Long, James E. Norris, Colleen E. Bryan Sallee, Jennifer Carney, Joseph Hodges
We present a direct comparison between two independent methods for the measurement of gaseous elemental mercury (GEM) mass concentration: isotope dilution cold-vapor inductively coupled plasma mass spectrometry (ID-CV-ICP-MS) and laser absorption

Hierarchical, grid-aware, and economically optimal coordination of distributed energy resources in realistic distribution systems

December 9, 2020
Author(s)
DJ Anand, Mads Almassalkhi, Sarnaduti Brahma, Nawaf Nazir, Hamid Ossareh, Pavan Racherla, Soumya Kundu, Sai Pushpak Nandanoori, Thiagarajan Ramachandran, Ankit Singhal, Dennice Gayme, Chengda Ji, Enrique Mallada, Yue Shen, Pengcheng You
Forward-looking renewable portfolio standards will lead to extreme levels of variable solar PV in electric distribution systems, which makes reliability more challenging to maintain for distribution system operators (DSOs). To facilitate reliability under

Security and Privacy Controls for Information Systems and Organizations

December 10, 2020
Author(s)
Ronald S. Ross, Victoria Y. Pillitteri
This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks

A Case Study for Modeling Machine Tool Systems Using Standard Representations

December 9, 2020
Author(s)
Maja V. Baerring, Guodong Shao, Moneer Helu, Bjorn Johansson
It is challenging to represent a complete machining tool system including geometric and kinematics information to support different decisions including purchasing, scheduling, and routing. A model of a fully assembled machining system in a neutral format

Lifetime-Limited Interrogation of Two Independent 27Al+ Clocks using Correlation Spectroscopy

December 9, 2020
Author(s)
Ethan Clements, May E. Kim, Kaifeng Cui, Aaron M. Hankin, Samuel M. Brewer, Jose Valencia, Jwo-Sy Chen, Chin-wen Chou, David Leibrandt, David Hume
Laser decoherence limits the stability of optical clocks by broadening the observable resonance linewidths and adding noise during the dead time between clock probes. Correlation spectroscopy avoids these limitations by measuring correlated atomic

Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files, application code, and

Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

December 8, 2020
Author(s)
Jennifer L. Cawthra, Michael R. Ekstrom, Lauren N. Lusty, Julian T. Sexton, John E. Sweetnam, Anne R. Townsend
Ransomware, destructive malware, insider threats, and even honest user mistakes present ongoing threats to organizations. Organizations' data, such as database records, system files, configurations, user files, applications, and customer data, are all

Multiscale Microstructure, Composition, and Stability of Surfactant/Polymer Foams

December 8, 2020
Author(s)
Stefania Perticaroli, Jana Herzberger, Yiping Sun, Jonathan D. Nickels, Ryan Murphy, Kathleen Weigandt, Paula J. Ray
Foam stability is a critical part of product performance and consumer experience in materials as diverse as beer or detergents. Inclusion of polymer additives is a known strategy to improve foam stability, but questions persist about the amount of polymer

Symmetry breaking and error correction in open quantum systems

December 8, 2020
Author(s)
Simon K. Lieu, Ron Belyansky, Jeremy T. Young, Rex Lundgren, Victor Albert, Alexey Gorshkov
Symmetry-breaking transitions are a well-understood phenomenon of closed quantum systems in quantum optics, condensed matter, and high energy physics. However, symmetry breaking in open systems is less thoroughly understood, in part due to the richer

Chromosome-scale, haplotype-resolved assembly of human genomes

December 7, 2020
Author(s)
Justin Zook, Shilpa Garg, Heng Li
Haplotype-resolved or phased genome assembly provides a complete picture of genomes and their complex genetic variations. However, current algorithms for phased assembly either do not generate chromosome-scale phasing or require pedigree information, which

Feedback Induced Magnetic Phases in Binary Bose-Einstein Condensates

December 7, 2020
Author(s)
Ian B. Spielman, Shangjie Guo, Hilary M. Hurst
Weak measurement in tandem with real-time feedback control is a new route toward engineering novel non-equilibrium quantum matter. Here we develop a theoretical toolbox for quantum feedback control of multicomponent Bose-Einstein condensates (BECs) using

Smart Home Consumers' Privacy and Security Perceptions & Practices

December 7, 2020
Author(s)
Julie Haney, Susanne M. Furman, Yasemine Acar
Smart home technologies may expose adopters to increased risk to network security, information privacy, and physical safety. However, consumers may lack understanding of the privacy and security implications, while devices fail to provide transparency and

Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems

December 6, 2020
Author(s)
Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier Verbel
In this paper, we show how to significantly improve algebraic techniques for solving the MinRank problem, which is ubiquitous in multivariate and rank metric code based cryptography. In the case of the structured MinRank instances arising in the latter, we

Measurements of the Most Significant Software Security Weaknesses

December 6, 2020
Author(s)
Carlos E. Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye
In this work, we provide a metric to calculate the most significant software security weaknesses as defined by an aggregate metric of the frequency, exploitability, and impact of related vulnerabilities. The Common Weakness Enumeration (CWE) is a well
Displaying 5476 - 5500 of 74364