Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 51 - 75 of 2754

The Effect of Sampling Strategy on Inferred Measures

July 6, 2014
Author(s)
Ellen M. Voorhees
… regions of the ranked lists as defined by a sampling strategy. The sampling strategy is critically important to … the effect on collection quality of different sampling strategies within the inferred measures framework. The … a deep, very sparsely sampled stratum is a poor choice. Strategies that include a top-10 pool create better …

Strategies for hp-Adaptive Refinement

September 16, 2008
Author(s)
William F. Mitchell
… by h or p is still open. In this paper, we describe several strategies that have been proposed for making this … numerical example to illustrate the effectiveness of these strategies will be presented. … William F. Mitchell … Kos, …

NIST and Strategic Standardization

December 1, 2000
Author(s)
JoAnne R. Overman
NIST's Office of Standards Services coordinates Federal government standards activities under the National Technology Transfer and Advancement Act and chairs the Interagency Committee on Standards Policy. Through these and other Office activities, NIST

BACnet at Georgia Tech

November 1, 2007
Author(s)
Donald Alexander, Cornelius Ejimofor, David Holmberg
… cost to alter control parameters to allow more saving strategies in the future. Additional strategies are being studied that use the RTP pricing …

Technical and Economic Assessment of Internet Protocol Version 6 (IPv6)

January 31, 2006
Author(s)
Gregory C. Tassey, Douglas C. Montgomery, Alfred Lee, Tim Sloan
The President’s National Strategy to Secure Cyberspace (National Strategy) directed the Secretary of Commerce to form a task force to examine the most recent iteration of the Internet Protocol, IP version 6 (IPv6). The President charged the task force with

Economic Case Study: The Impact of NSTIC on the Internal Revenue Service

July 9, 2013
Author(s)
Gregory C. Tassey
The National Strategy for Trusted Identities in Cyberspace (NSTIC) offers a vision of more secure, efficient, and cost-effective authentication through widespread use of robust third-party credentials standardized to a national strategy. If successful

The international measurement system for radionuclide metrology: A strategy for the future

December 2, 2019
Author(s)
Lisa R. Karam, Steven Judge, Wynand Louw
… (CCRI) has coordinated the development of a long-term strategy to support the international measurement system for … (BIPM) and its associated institutional members, the CCRI strategy captures how an NMI/DI can demonstrate capability … that is available through the CCRI and the BIPM. The CCRI strategy, specifically the aspects with direct impact on …

Emergency Egress Strategies for Buildings

September 5, 2007
Author(s)
Richard W. Bukowski
… experts have called for a fundamental rethinking of egress strategies including all of the possible components that … | | 2007 | Interscience Communications … Emergency Egress Strategies for Buildings …

A Critical Analysis of Circular Product Attributes and Limitations of Product Circularity Assessment Methods

May 29, 2024
Author(s)
Junwon Ko, Gisele Bortolaz Guedes, Fazleena Badurdeen, I.S. Jawahir, KC Morris, Vincenzo Ferrero, Buddhika Hapuwatte, Ryan Bradley, Ardeshir Mashhadi
… derived from materials and products through value recovery strategies, and minimizing waste generation. However, … circular product, product circularity, value recovery strategies, product design … A Critical Analysis of Circular …
Displaying 51 - 75 of 2754