Sample records for abstract multiple vulnerabilities

  1. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  2. V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

  3. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  4. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  5. T-540: Sybase EAServer Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    and Remote Directory Traversal Vulnerability issues. Addthis Related Articles T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System U-198: IBM...

  6. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities...

    Broader source: Energy.gov (indexed) [DOE]

    T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-207: Pidgin 'mxitshowmessage()'...

  7. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  8. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  9. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBM Multiple

  10. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department Multiple

  11. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

  12. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  13. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  14. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

  15. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy

  16. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabiliti...

    Broader source: Energy.gov (indexed) [DOE]

    RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found...

  17. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  18. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOS MultipleWireshark

  19. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment ofEnergy Multiple

  20. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java Multiple

  1. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java MultipleDepartment of8:

  2. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacks |Multiple

  3. Towards CSP Model Reformulation at Multiple Levels of Abstraction

    E-Print Network [OSTI]

    Miguel, Ian

    Towards CSP Model Reformulation at Multiple Levels of Abstraction Alan M. Frisch 1 , Brahim Hnich 2Æcult at another. Therefore we argue that it is essential for a system for the auto- matic reformulation of CSPs individual CSP instances, could be augmented to reformulate models at various levels of abstraction and to re

  4. Demo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer

    E-Print Network [OSTI]

    Sinha, Prasun

    to install especially on existing vehicles and exhibit a tradeoff between accuracy and cost. Similarly, usingDemo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer Dong Li , Tarun Bansal , Zhixue Lu and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

  5. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | DepartmentMultiple

  6. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems forVulnerabilities ||

  7. V-080: Apple iOS Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOS Multiple

  8. ABSTRACT

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert SouthwestTechnologies |November 2011A FirstEMSLAEMSL341AACEii ABSTRACT This

  9. Abstract--A variable speed wind turbine is presented in this paper, where multiple permanent magnet synchronous

    E-Print Network [OSTI]

    Chen, Zhe

    1 Abstract--A variable speed wind turbine is presented in this paper, where multiple permanent magnet synchronous generators (MPMSGs) drive-train configuration is employed in the wind turbine of this variable speed wind turbine based on multiple generators drive-train configuration. Index Terms--Wind power

  10. T-550: Apache Denial of Service Vulnerability | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    1.2.8 Multiple Vulnerabilities U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability...

  11. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  12. V-125: Cisco Connected Grid Network Management System Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

  13. V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

  14. SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

  15. Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we

  16. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01T23:59:59.000Z

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  17. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  18. Ecosystem Vulnerability Assessment - Patterns of Climate Change...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

  19. TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity Govindarasu, Member, IEEE Abstract--Vulnerability assessment is a requirement of NERC's cybersecurity within the substation networks. Countermeasures are identified for improvement of the cybersecurity

  20. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  1. U-100: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  2. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01T23:59:59.000Z

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  3. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    NONE

    1995-03-01T23:59:59.000Z

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  4. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow...

    Broader source: Energy.gov (indexed) [DOE]

    Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities T-543: Wireshark 0.8.20 through...

  5. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01T23:59:59.000Z

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  6. Abstract--Much recent work in multiple input use scenarios for children's learning software has focused either on math or on

    E-Print Network [OSTI]

    Toronto, University of

    in static learning materials for children. With DISHA, we aim to supplement CAL programs, increasingly a narrative-interactive loop format of story-telling followed by multiple choice Q&A, DISHA uses MultiPoint technology [2, 3] for healthcare learning material. The Q&A enforces collaboration, competition and turn

  7. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...

    Office of Environmental Management (EM)

    51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am...

  8. U-174: Serendipity Unspecified SQL Injection Vulnerability |...

    Broader source: Energy.gov (indexed) [DOE]

    4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

  9. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

  10. Seismic vulnerability analysis of moderate seismicity areas using in situ experimental

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

  11. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01T23:59:59.000Z

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  12. Abstracting Preparation

    E-Print Network [OSTI]

    Allen, John F.

    Guidelines & Review Manuscript Preparation Submit Your Manuscript Book Reviews Movies & Videos Contact of Biological and Chemical Sciences. Queen Mary, University of London, Mile End Road, London, UK. Abstract Two motive force for energy conversion, providing for metabolism, for active transport, and for synthesis

  13. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  14. T-565: Vulnerability in Microsoft Malware Protection Engine Could...

    Broader source: Energy.gov (indexed) [DOE]

    5: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow...

  15. Generating Systems from Multiple Levels of Abstraction

    E-Print Network [OSTI]

    KĂŒhne, Thomas

    Klar Technische Universitšat Darmstadt, Germany {girschick,kuehne}@informatik.tu-darmstadt.de felix

  16. Climate Vulnerabilities | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group and Userof aChristinaCliff joins EMSLClimate Vulnerabilities

  17. Abstract--By penetrating the SCADA system, an intruder may remotely operate a power system using supervisory control

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1 Abstract-- By penetrating the SCADA system, an intruder may remotely operate a power system using vulnerability using attack trees. The attack tree formulation based on power system control networks is used to evaluate the system, scenario, and leaf vulnerabilities. The measure of vulnerabilities in the power system

  18. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27T23:59:59.000Z

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  19. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

  20. V-070: Apache CouchDB Multiple Vulnerabilities | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    access files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences. Only Microsoft Windows versions of Apache CouchDB are affected....

  1. V-059: MoinMoin Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary...

  2. ISSO Information Alert Multiple Vulnerabilities in Adobe Flash

    E-Print Network [OSTI]

    Dyer, Bill

    SHARING AND ANALYSIS CENTER CYBER SECURITY ADVISORY MS-ISAC ADVISORY NUMBER: 2012-014 DATE(S) ISSUED: 3 to take complete control of affected systems. Adobe Flash Player is a widely distributed multimedia or URL and distributes that file or URL to unsuspecting users via e-mail or some other means. When

  3. U-104: Adobe Flash Player Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and...

  4. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar PowerDepartmentOracle

  5. V-097: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBMMultiple

  6. V-105: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements

  7. V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple

  8. V-111: Multiple vulnerabilities have been reported in Puppet | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment ofof

  9. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentof

  10. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentofDepartment of

  11. V-121: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentofDepartmentGoogle

  12. V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment of Energy VMwareMozilla

  13. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:|

  14. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control2:

  15. T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems for

  16. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|| DepartmentU-162:

  17. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment

  18. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department

  19. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |

  20. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a

  1. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has

  2. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |

  3. U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |3:

  4. U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |3:9:

  5. U-273: Multiple vulnerabilities have been reported in Wireshark |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of

  6. V-083: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New12.'6/0.2Contract (UESC)Department ofDepartment

  7. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  8. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. Introduction Abstract reflection groups and abstract buildings

    E-Print Network [OSTI]

    Vogtmann, Karen

    Introduction Abstract reflection groups and abstract buildings Their geometric realizations Compactly supported cohomology L2 -cohomology Cohomology of Coxeter groups and buildings Mike Davis (work groups and buildings #12;Introduction Abstract reflection groups and abstract buildings Their geometric

  10. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01T23:59:59.000Z

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  11. Detecting Network Vulnerabilities Through Graph Theoretical Methods

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

  12. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  13. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  14. T-697: Google Chrome Prior to 13.0.782.107 Multiple Security...

    Broader source: Energy.gov (indexed) [DOE]

    Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Releases >> Chrome OS Beta: Channel Update Chromium Security >> Reporting Security Bugs IMPACT ASSESSMENT: High...

  15. Locating Climate Insecurity: Where Are the Most Vulnerable Places...

    Open Energy Info (EERE)

    disasters, (2) household and community vulnerability, (3) governance and political violence, and (4) population density. Each of these areas of vulnerability was given...

  16. aquifer contamination vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

  17. Common Cyber Security Vulnerabilities Observed in Control System...

    Broader source: Energy.gov (indexed) [DOE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  18. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

  19. abstracting code specific: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Poster: 4195B656 Abstract Title: Specification of Multiple Ganglion Cell Stimulation Codes for Engineering Websites Summary: ProgramPoster: 4195B656 Abstract Title:...

  20. Transforming Abstract Interpretations by Abstract Interpretation

    E-Print Network [OSTI]

    Giacobazzi, Roberto

    an instance of the same abstract interpretation frame- work lifted to higher types, i.e. where the objectsTransforming Abstract Interpretations by Abstract Interpretation New Challenges in Language - Verona, Italy (roberto.giacobazzi|isabella.mastroeni)@univr.it Abstract. In this paper we exploit

  1. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  2. Cancer Vulnerabilities Unveiled by Genomic Loss

    E-Print Network [OSTI]

    Nijhawan, Deepak

    Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

  3. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

  4. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

  5. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  6. Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port hierarchy

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port@parisgeo.cnrs.fr Sung-Woo LEE Korea Maritime Institute Shipping, Port & Logistics Research Department KBS media Center: revisiting the Northeast Asian port hierarchy Abstract This paper is essentially an empirical investigation

  7. V-025: Bugzilla Multiple Cross Site Scripting and Information...

    Broader source: Energy.gov (indexed) [DOE]

    to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

  8. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  9. Analysis of complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin. [New Mexico Institute of Mining and Technology, Socorro, NM; Willard, Gerald [Department of Defense, Ft. Meade, MD

    2008-10-01T23:59:59.000Z

    This paper presents a new methodology for analyzing complex networks in which the network of interest is first abstracted to a much simpler (but equivalent) representation, the required analysis is performed using the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit abstractions that are simultaneously dramatically simplifying and property preserving - we call these aggressive abstractions -- and which can therefore be analyzed using the proposed approach. We then introduce and develop two forms of aggressive abstraction: 1.) finite state abstraction, in which dynamical networks with uncountable state spaces are modeled using finite state systems, and 2.) onedimensional abstraction, whereby high dimensional network dynamics are captured in a meaningful way using a single scalar variable. In each case, the property preserving nature of the abstraction process is rigorously established and efficient algorithms are presented for computing the abstraction. The considerable potential of the proposed approach to complex networks analysis is illustrated through case studies involving vulnerability analysis of technological networks and predictive analysis for social processes.

  10. AbstractAbstract Improving efficiency of thermoelectric

    E-Print Network [OSTI]

    Walker, D. Greg

    -classical transport models used to predict ZT can effectively predict thermoelectric performance of bulk materials Material PerformanceThermoelectric Material Performance 0 0.5 1 1.5 2 2.5 3 1950 1960 1970 1980 1990 2000AbstractAbstract · Improving efficiency of thermoelectric energy conversion devices is a major

  11. Cyber Security via Minority Games with Epistatic Signaling (Extended Abstract)

    E-Print Network [OSTI]

    Mishra, Bud

    Cyber Security via Minority Games with Epistatic Signaling (Extended Abstract) W. Casey, L. Metcalf occurs when deceptions are employed in order to breach the security of the system, thus making the entire profiles (e.g., the distribution of players employing various kinds of vulnerability and threat predictions

  12. Statistical Abstract 2013

    E-Print Network [OSTI]

    Kansas Statistical Abstract 2013 published exclusively online by Institute for Policy & Social,chapters,or the full Kansas Statistical Abstract are permitted on the condition that sources are cited. Kansas Statistical Abstract 2013 2 #12;Table of Contents Foreword

  13. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  14. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  15. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced

  16. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  17. Power System Extreme Event Detection: The Vulnerability Frontier

    E-Print Network [OSTI]

    Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

    2007-01-01T23:59:59.000Z

    Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

  18. Monadic Regions [Extended Abstract

    E-Print Network [OSTI]

    Fluet, Matthew

    to manage particular data by one scheme or the other. Cyclone [12] offers multiple forms of memory collection and a simple type system. A separate line of research has investigated mechanisms by which

  19. Energy Research Abstracts. [DOE abstract journal

    SciTech Connect (OSTI)

    Not Available

    1981-01-01T23:59:59.000Z

    Energy Research Abstracts (ERA) provides abstracting and indexing coverage of all scientific and technical reports, journal articles, conference papers and proceedings, books, patents, theses, and monographs originated by the US Department of Energy, its laboratories, energy centers, and contractors. ERA also covers other energy information prepared in report form by federal and state government organizations, foreign governments, and domestic and foreign universities and research organizations. ERA coverage of non-report literature is limited to that generated by Department of Energy activity. ERA is comprehensive in its subject scope, encompassing the DOE's research, development, demonstration, and technological programs resulting from its broad charter for energy sources, conservation, safety, environmental impacts, and regulation. Corporate, author, subject, report number, and contract number indexes are included. ERA is available on an exchange basis to universities, research intitutions, industrial firms, and publishers of scientific information. Federal, state, and municipal agencies concerned with energy development, conservation, and usage may obtain ERA free of charge. Inquiries should be directed to the Technical Information Center, P.O. Box 62, Oak Ridge, Tennessee 37830. ERA is available to the public on a subscription basis for 24 semimonthly issues including a semiannual index and an annual index. All citations announced in ERA exist as separate records in the DOE Energy Data Base.

  20. BEMS: Abstract book

    SciTech Connect (OSTI)

    NONE

    1995-06-01T23:59:59.000Z

    This volume provides abstracts of presentations made at the Sixteenth Meeting of The Bioelectromagnetics Society held June 12-17, 1994 in Copenhagen, Denmark.

  1. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15T23:59:59.000Z

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  2. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  3. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  5. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

  6. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

  7. areas vulnerabilities impacts: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

  8. assessing infrastructure vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

  9. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

  10. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Broader source: Energy.gov (indexed) [DOE]

    for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security...

  11. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  12. Antioch University and EPA Webinar: Assessing Vulnerability of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing Vulnerability of Water Conveyance...

  13. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency planning of the energy grids and energy plants considering also the ICT systems used in...

  14. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  15. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  16. Computer Abstractions and Technology

    E-Print Network [OSTI]

    Huang, Chun-Hsi

    & wheel Supersedes roller-ball mechanical mouse #12;Chapter 1 -- Computer Abstractions and Technology to building sized Embedded computers Hidden as components of systems Stringent power of machine instructions executed per operation Processor and memory system Determine how fast instructions

  17. Abstracts of contributed papers

    SciTech Connect (OSTI)

    Not Available

    1994-08-01T23:59:59.000Z

    This volume contains 571 abstracts of contributed papers to be presented during the Twelfth US National Congress of Applied Mechanics. Abstracts are arranged in the order in which they fall in the program -- the main sessions are listed chronologically in the Table of Contents. The Author Index is in alphabetical order and lists each paper number (matching the schedule in the Final Program) with its corresponding page number in the book.

  18. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14T23:59:59.000Z

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  19. RAMP: RESEARCH ACCELERATOR FOR MULTIPLE PROCESSORS Abstract for Hotchips 2006

    E-Print Network [OSTI]

    Wawrzynek, John

    ), Derek Chiou (UT Austin), James C. Hoe (CMU), Christoforos Kozyrakis (Stanford), Shih-Lien Lu (Intel a qualitative leap in the quality and range of future computer architecture re- search. Furthermore, since

  20. Half & Half: Multiple Dispatch and Retroactive Abstraction for Java

    E-Print Network [OSTI]

    Baumgartner, Gerald

    Jansche Konstantin Lšaufer Dept. of Computer and Information Science The Ohio State University Columbus jansche.1@osu.edu Dept. of Computer Science Loyola University of Chicago Chicago, IL 60626 laufer

  1. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  2. FROM THE BLOGOSPHERE Abstractions

    E-Print Network [OSTI]

    Wu, Zhigang

    .com/nautilus and see Peer-to-Peer for news for peer-reviewers and about peer review http://blogs.nature in semi- natural field conditions over 3 years was a lot of work. I was worried something might go wrongFROM THE BLOGOSPHERE Abstractions Visit Nautilus for regular news relevant to Nature authors http://blogs.nature

  3. Programme, Abstracts, Presentations & Proceedings

    E-Print Network [OSTI]

    Programme, Abstracts, Presentations & Proceedings 24th IAEA Fusion Energy Conference October 8. #12;QR Codes for Smartphone Conference App Scan relevant QR to download the conference app QR code for Android QR code for iPhone The Conference4me application provides a digital, mobile copy of the confer

  4. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01T23:59:59.000Z

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  5. Benjamin Livshits and Monica S. Lam 1. PHPList Admin Page SQL Injection Vulnerability

    E-Print Network [OSTI]

    Livshits, Ben

    Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability 9. Zlib Local Race Condition Privilege Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary

  6. EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE: AN APPLICATION OF

    E-Print Network [OSTI]

    EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE development aid is more effective in reducing vulnerability than is emission abatement. The hypothesis, vulnerability, adaptive capacity, development #12;EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE

  7. EBS Radionuclide Transport Abstraction

    SciTech Connect (OSTI)

    J. Prouty

    2006-07-14T23:59:59.000Z

    The purpose of this report is to develop and analyze the engineered barrier system (EBS) radionuclide transport abstraction model, consistent with Level I and Level II model validation, as identified in Technical Work Plan for: Near-Field Environment and Transport: Engineered Barrier System: Radionuclide Transport Abstraction Model Report Integration (BSC 2005 [DIRS 173617]). The EBS radionuclide transport abstraction (or EBS RT Abstraction) is the conceptual model used in the total system performance assessment (TSPA) to determine the rate of radionuclide releases from the EBS to the unsaturated zone (UZ). The EBS RT Abstraction conceptual model consists of two main components: a flow model and a transport model. Both models are developed mathematically from first principles in order to show explicitly what assumptions, simplifications, and approximations are incorporated into the models used in the TSPA. The flow model defines the pathways for water flow in the EBS and specifies how the flow rate is computed in each pathway. Input to this model includes the seepage flux into a drift. The seepage flux is potentially split by the drip shield, with some (or all) of the flux being diverted by the drip shield and some passing through breaches in the drip shield that might result from corrosion or seismic damage. The flux through drip shield breaches is potentially split by the waste package, with some (or all) of the flux being diverted by the waste package and some passing through waste package breaches that might result from corrosion or seismic damage. Neither the drip shield nor the waste package survives an igneous intrusion, so the flux splitting submodel is not used in the igneous scenario class. The flow model is validated in an independent model validation technical review. The drip shield and waste package flux splitting algorithms are developed and validated using experimental data. The transport model considers advective transport and diffusive transport from a breached waste package. Advective transport occurs when radionuclides that are dissolved or sorbed onto colloids (or both) are carried from the waste package by the portion of the seepage flux that passes through waste package breaches. Diffusive transport occurs as a result of a gradient in radionuclide concentration and may take place while advective transport is also occurring, as well as when no advective transport is occurring. Diffusive transport is addressed in detail because it is the sole means of transport when there is no flow through a waste package, which may dominate during the regulatory compliance period in the nominal and seismic scenarios. The advective transport rate, when it occurs, is generally greater than the diffusive transport rate. Colloid-facilitated advective and diffusive transport is also modeled and is presented in detail in Appendix B of this report.

  8. U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

  9. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  10. E-Print Network 3.0 - attitudes perceived vulnerability Sample...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    vulnerability Page: << < 1 2 3 4 5 > >> 1 ORIGINAL ARTICLE Perceived Stress and Cognitive Vulnerability Mediate the Summary: ORIGINAL ARTICLE Perceived Stress and Cognitive...

  11. ABSTRACTS OF PAPERS PUBLISHED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert SouthwestTechnologies |November 2011A FirstEMSLAEMSL341AACEii ABSTRACT This4 -

  12. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

    2012-01-01T23:59:59.000Z

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  13. Energy Research Abstracts; (USA)

    SciTech Connect (OSTI)

    Rutkowski, R.W.; Henline, D.M. (eds.)

    1991-01-01T23:59:59.000Z

    Energy Research Abstracts (ERA) provides abstracting and indexing coverage of all scientific and technical reports and patent applications originated by the US Department of Energy, its laboratories, energy centers, and contractors, as well as theses and conference papers and proceedings issued by these organizations in report form. Audiovisual materials, computer media (magnetic tapes, diskettes, etc.), and engineering drawings are included in this definition. ERA also covers other energy information prepared in report form by federal and state government organizations, foreign governments, and domestic and foreign universities and research organizations, provided that the full text of the document has been received by OSTI. Foreign report information is obtained through the International Energy Agency's fourteen nation Energy Technology Data Exchange, the International Atomic Energy Agency's International Nuclear Information System, or nation-to-nation agreements. The purpose of this publication is to announce documents produced or obtained by DOE that are not so readily available as journal articles, books, or patents. ERA does not cover nonreport literature. The scope of ERA encompasses DOE's research, development, demonstration, and technology programs resulting from its broad charter for energy sources, supplies, safety, environmental impacts, and regulation.

  14. EBS Radionuclide Transport Abstraction

    SciTech Connect (OSTI)

    J.D. Schreiber

    2005-08-25T23:59:59.000Z

    The purpose of this report is to develop and analyze the engineered barrier system (EBS) radionuclide transport abstraction model, consistent with Level I and Level II model validation, as identified in ''Technical Work Plan for: Near-Field Environment and Transport: Engineered Barrier System: Radionuclide Transport Abstraction Model Report Integration'' (BSC 2005 [DIRS 173617]). The EBS radionuclide transport abstraction (or EBS RT Abstraction) is the conceptual model used in the total system performance assessment for the license application (TSPA-LA) to determine the rate of radionuclide releases from the EBS to the unsaturated zone (UZ). The EBS RT Abstraction conceptual model consists of two main components: a flow model and a transport model. Both models are developed mathematically from first principles in order to show explicitly what assumptions, simplifications, and approximations are incorporated into the models used in the TSPA-LA. The flow model defines the pathways for water flow in the EBS and specifies how the flow rate is computed in each pathway. Input to this model includes the seepage flux into a drift. The seepage flux is potentially split by the drip shield, with some (or all) of the flux being diverted by the drip shield and some passing through breaches in the drip shield that might result from corrosion or seismic damage. The flux through drip shield breaches is potentially split by the waste package, with some (or all) of the flux being diverted by the waste package and some passing through waste package breaches that might result from corrosion or seismic damage. Neither the drip shield nor the waste package survives an igneous intrusion, so the flux splitting submodel is not used in the igneous scenario class. The flow model is validated in an independent model validation technical review. The drip shield and waste package flux splitting algorithms are developed and validated using experimental data. The transport model considers advective transport and diffusive transport from a breached waste package. Advective transport occurs when radionuclides that are dissolved or sorbed onto colloids (or both) are carried from the waste package by the portion of the seepage flux that passes through waste package breaches. Diffusive transport occurs as a result of a gradient in radionuclide concentration and may take place while advective transport is also occurring, as well as when no advective transport is occurring. Diffusive transport is addressed in detail because it is the sole means of transport when there is no flow through a waste package, which may dominate during the regulatory compliance period in the nominal and seismic scenarios. The advective transport rate, when it occurs, is generally greater than the diffusive transport rate. Colloid-facilitated advective and diffusive transport is also modeled and is presented in detail in Appendix B of this report.

  15. Abstract adiabatic charge pumping

    E-Print Network [OSTI]

    A. Joye; V. Brosco; F. Hekking

    2010-02-05T23:59:59.000Z

    This paper is devoted to the analysis of an abstract formula describing quantum adiabatic charge pumping in a general context. We consider closed systems characterized by a slowly varying time-dependent Hamiltonian depending on an external parameter $\\alpha$. The current operator, defined as the derivative of the Hamiltonian with respect to $\\alpha$, once integrated over some time interval, gives rise to a charge pumped through the system over that time span. We determine the first two leading terms in the adiabatic parameter of this pumped charge under the usual gap hypothesis. In particular, in case the Hamiltonian is time periodic and has discrete non-degenerate spectrum, the charge pumped over a period is given to leading order by the derivative with respect to $\\alpha$ of the corresponding dynamical and geometric phases.

  16. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01T23:59:59.000Z

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  17. Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    .215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating to the Department's review and approval of Security Vulnerability Assessments and Site Security Plans, including

  18. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  19. Assessing the vulnerability of the fiber infrastructure to disasters

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

  20. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  1. Assessing node risk and vulnerability in epidemics on networks

    E-Print Network [OSTI]

    Rogers, Tim

    2015-01-01T23:59:59.000Z

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  2. Abstraction of Drift Seepage

    SciTech Connect (OSTI)

    J.T. Birkholzer

    2004-11-01T23:59:59.000Z

    This model report documents the abstraction of drift seepage, conducted to provide seepage-relevant parameters and their probability distributions for use in Total System Performance Assessment for License Application (TSPA-LA). Drift seepage refers to the flow of liquid water into waste emplacement drifts. Water that seeps into drifts may contact waste packages and potentially mobilize radionuclides, and may result in advective transport of radionuclides through breached waste packages [''Risk Information to Support Prioritization of Performance Assessment Models'' (BSC 2003 [DIRS 168796], Section 3.3.2)]. The unsaturated rock layers overlying and hosting the repository form a natural barrier that reduces the amount of water entering emplacement drifts by natural subsurface processes. For example, drift seepage is limited by the capillary barrier forming at the drift crown, which decreases or even eliminates water flow from the unsaturated fractured rock into the drift. During the first few hundred years after waste emplacement, when above-boiling rock temperatures will develop as a result of heat generated by the decay of the radioactive waste, vaporization of percolation water is an additional factor limiting seepage. Estimating the effectiveness of these natural barrier capabilities and predicting the amount of seepage into drifts is an important aspect of assessing the performance of the repository. The TSPA-LA therefore includes a seepage component that calculates the amount of seepage into drifts [''Total System Performance Assessment (TSPA) Model/Analysis for the License Application'' (BSC 2004 [DIRS 168504], Section 6.3.3.1)]. The TSPA-LA calculation is performed with a probabilistic approach that accounts for the spatial and temporal variability and inherent uncertainty of seepage-relevant properties and processes. Results are used for subsequent TSPA-LA components that may handle, for example, waste package corrosion or radionuclide transport.

  3. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

    1995-12-31T23:59:59.000Z

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  4. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  5. Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material

    SciTech Connect (OSTI)

    Nicholson, Lary G.; Purvis, James W.

    1999-07-21T23:59:59.000Z

    The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

  6. Memory abstractions for parallel programming

    E-Print Network [OSTI]

    Lee, I-Ting Angelina

    2012-01-01T23:59:59.000Z

    A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly ...

  7. Abstracts

    E-Print Network [OSTI]

    2012-05-26T23:59:59.000Z

    cus on the classification of ancient solutions in the curve shortening flow and the Ricci flow on ... has applications in heat control at the boundary of a domain.

  8. ABSTRACT

    E-Print Network [OSTI]

    Manfred Mauntz; Jürgen Gegner

    A new online diagnostics system for the continuous condition monitoring of lubricating oils in industrial gearboxes is presented. Characteristic features of emerging component damage, such as wear, contamination or chemical aging, are identified in an early stage. The OilQSens ź sensor effectively controls the proper operation conditions of bearings and cogwheels in gears. Also, the condition of insulating oils in transformers can be monitored. The online diagnostics system measures components of the specific complex impedance of oils. For instance, metal abrasion due to wear debris, broken oil molecules, forming acids or oil soaps result in an increase of the electrical conductivity, which directly

  9. ABSTRACT

    Broader source: Energy.gov (indexed) [DOE]

    Conference on Building Commissioning Whitepaper on: Commissioning of Combined Heat and Power Systems Information was compiled with support from the U. S. Department of Energy and...

  10. Abstract

    Office of Scientific and Technical Information (OSTI)

    One such site is SASOL in South Africa, which uses ATRs licensed by Lurgi out of Germany. As stated above, KBR-designed ATRs have been installed in ammonia plants in Kitimat,...

  11. Abstracts

    E-Print Network [OSTI]

    2013-11-13T23:59:59.000Z

    Nov 16, 2013 ... Moreover, various stability results for these waves will be addressed, .... Lewis and coauthors when the measure is p-harmonic and also for p ...

  12. Abstract

    E-Print Network [OSTI]

    2008-07-23T23:59:59.000Z

    excite seismic body waves in the earth. One detects these waves at seismic stations distributed over the earth's surface. Wave-equation tomography is derived ...

  13. abstract

    E-Print Network [OSTI]

    1910-00-82T23:59:59.000Z

    this environment. To find and ... offers researchers an environment where the entire problem ... ware architecture for the FFT”, Proceedings of ICASSP. 1998, vol ...

  14. Abstracts

    E-Print Network [OSTI]

    2014-10-27T23:59:59.000Z

    Nov 1, 2014 ... The purpose of Wabash Seminar talks is to present surveys of interest to all analysts, including graduate students and scholars working in ...

  15. Abstract:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAbout ScienceAbout OakMeasurement of the Μ

  16. Abstract

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office About theofAbout SHAREHands on

  17. Abstract

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office About theofAbout SHAREHands onThis

  18. Abstract:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office About theofAbout SHAREHandsJohn

  19. Abstract:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office About theofAbout SHAREHandsJohnNew

  20. ABSTRACT

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience4AJ01) (See95TI07) (See4AJ01)59AJ76)74AJ01)

  1. ABSTRACT

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience4AJ01) (See95TI07) (See4AJ01)59AJ76)74AJ01)BROWNE, MICHAEL CHARLES.

  2. Multiple Critical Vulnerabilities in Blackboard due to persistent Cross Site Scripting and Authorization bugs

    E-Print Network [OSTI]

    Sekar, R.

    and Authorization bugs Tung Tran ­ tunghack@gmail.com Alireza Saberi - saberi.alireza@gmail.com The current version

  3. U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control2: Apple QuickTime

  4. T-597: WordPress Multiple Security Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7: WordPress

  5. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:|7: Adobeof

  6. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian update

  7. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|

  8. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of

  9. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA documentRed Hat

  10. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | DepartmentDepartment of

  11. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacksService onApple

  12. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address Bar,Department of

  13. Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters

    E-Print Network [OSTI]

    Anlage, Steven

    Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters Agis A. Iliadis effects on single CMOS inverters, the fundamental building block of logic ICs, consisting of an NMOS and a PMOS transistor. The inverters were designed in our group and fabricated in the AMI-1.5”m MOSIS line

  14. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

  15. NV: Nessus Vulnerability Visualization for the Web Lane Harrison

    E-Print Network [OSTI]

    Kaiser, Gail E.

    NV: Nessus Vulnerability Visualization for the Web Lane Harrison Oak Ridge National Laboratory Oak Ridge TN, USA harrisonlt@ornl.gov Riley Spahn Oak Ridge National Laboratory Oak Ridge TN, USA spahnrb1@ornl.gov Mike Iannacone Oak Ridge National Laboratory Oak Ridge TN, USA iannaconemd@ornl.gov Evan

  16. Vulnerability of Hydropower Projects to Climate Change Revision: 20th

    E-Print Network [OSTI]

    Harrison, Gareth

    Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

  17. Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability

    E-Print Network [OSTI]

    Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

  18. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed of critical and complex vulnerabilities. In addition, frequently middleware systems bases their security are safe. Therefore, security of distributed systems have been placed under the watchful eye of security

  19. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  20. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies for Prioritizing Management #12;Low-Energy Ecoregions: Greater Yellowstone Energy Richness Conservation Category systems may be vulnerable to human activities. #12;-difficult for managers to crystallize key conservation

  1. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  2. Mechanical Engineering Department technical abstracts

    SciTech Connect (OSTI)

    Denney, R.M. (ed.)

    1982-07-01T23:59:59.000Z

    The Mechanical Engineering Department publishes listings of technical abstracts twice a year to inform readers of the broad range of technical activities in the Department, and to promote an exchange of ideas. Details of the work covered by an abstract may be obtained by contacting the author(s). Overall information about current activities of each of the Department's seven divisions precedes the technical abstracts.

  3. ECOAS 2011 Titles and Abstracts

    E-Print Network [OSTI]

    2011-10-11T23:59:59.000Z

    sociated to other families of representations, according to the so-called .... Abstract: We use the technology of linking algebras and linking groupoids to show.

  4. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  5. Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment

    E-Print Network [OSTI]

    Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores baseline and greater climate change vulnerability than did alien species. Fifty percent of California

  6. ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS

    E-Print Network [OSTI]

    Habib, Ayman

    ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

  7. Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to

    E-Print Network [OSTI]

    Melcher, Peter

    Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels 02318 (M.A.Z., N.M.H.) The relation between xylem vessel age and vulnerability to cavitation of sugar-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure

  8. Clara Aldana (Nantes) Abstract: TBA

    E-Print Network [OSTI]

    Baer, Christian

    Program Clara Aldana (Nantes) TBA Abstract: TBA Ubertino Battisti (Torino) "Fourier integral operators on manifolds with boundary and index of symplectomorphisms on manifolds with boundary" Abstract using Egorov Theorem, that U is always Fredholm and set i() = i(U ). In a joint work with S. Coriasco

  9. Technical abstracts: Mechanical engineering, 1990

    SciTech Connect (OSTI)

    Broesius, J.Y. (comp.)

    1991-03-01T23:59:59.000Z

    This document is a compilation of the published, unclassified abstracts produced by mechanical engineers at Lawrence Livermore National Laboratory (LLNL) during the calendar year 1990. Many abstracts summarize work completed and published in report form. These are UCRL-JC series documents, which include the full text of articles to be published in journals and of papers to be presented at meetings, and UCID reports, which are informal documents. Not all UCIDs contain abstracts: short summaries were generated when abstracts were not included. Technical Abstracts also provides descriptions of those documents assigned to the UCRL-MI (miscellaneous) category. These are generally viewgraphs or photographs presented at meetings. An author index is provided at the back of this volume for cross referencing.

  10. Multiple-Source and Multiple-Destination Charge Migration in Hybrid Electrical Energy Storage Systems*

    E-Print Network [OSTI]

    Pedram, Massoud

    Multiple-Source and Multiple-Destination Charge Migration in Hybrid Electrical Energy Storage massimo.poncino@polito.it Abstract-- Hybrid electrical energy storage (HEES) systems consist of multiple banks of heterogeneous electrical energy storage (EES) elements that are connected to each other through

  11. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30T23:59:59.000Z

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  12. Vulnerability assessment of water supply systems for insufficient fire flows

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15T23:59:59.000Z

    VULNERABILITY ASSESSMENT OF WATER SUPPLY SYSTEMS FOR INSUFFICIENT FIRE FLOWS A Thesis by LUFTHANSA RAHMAN KANTA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Kelly Brumbelow Committee Members, Francisco Olivera Sergiy Butenko Head of Department...

  13. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  14. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  15. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed JumpCartagena Vulnerability

  16. Report to Congress on Insular Area energy vulnerability

    SciTech Connect (OSTI)

    Not Available

    1994-05-01T23:59:59.000Z

    This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

  17. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01T23:59:59.000Z

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  18. Abstract Algebra I Course Page

    E-Print Network [OSTI]

    Abstract Algebra I. MW 4:35-5:55, Skiles 246. OFFICE HOURS: Tues 11-12 or by appointment. Textbook: Topics in Algebra by I.M. Herstein. Topics covered:.

  19. International Pharmaceutical Abstracts (IPA) What is International Pharmaceutical Abstracts?

    E-Print Network [OSTI]

    Saskatchewan, University of

    topic into the search box. #12;2 2. Click on Search to continue. 3. Enter terms to describe another in your search results. "Or" broadens your search by letting you search for related terms or synonyms. #12-related health topics. Searching International Pharmaceutical Abstracts The example below illustrates a step

  20. Online Search Aids Petroleum Abstracts

    E-Print Network [OSTI]

    Reynolds, Albert C.

    to enter the words for the query. The center frame will display the list of terms resulting from the queryOnline Search Aids User Guide Petroleum AbstractsÂź A Division of The University of Tulsa July 1. A compilation of relevant E&P technical index terms and their relationships, covering the areas of geology

  1. Resources Abstracts Input Transaction Form

    E-Print Network [OSTI]

    District of Columbia, University of the

    #12;Resources Abstracts Input Transaction Form 4. Title 5. Report Date 6.Urban Aquaculture Covered The University of the District of Columbia 12. Sponsoring Organization Water Resources Research of the rainbow trout (Salmo gairdneri) in a closed recycling water system in an urban environment is described

  2. Rank Modulation with Multiplicity Anxiao (Andrew) Jiang

    E-Print Network [OSTI]

    Jiang, Anxiao "Andrew"

    Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

  3. Multiple criteria minimum spanning trees Pedro Cardoso

    E-Print Network [OSTI]

    Coello, Carlos A. Coello

    Multiple criteria minimum spanning trees Pedro Cardoso MÂŽario Jesus ÂŽAlberto MÂŽarquez Abstract The NP multiple criteria minimum spanning tree as several applications into the network design problems criteria minimum spanning trees. There are several geometric network design and application problems

  4. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19T23:59:59.000Z

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  5. Poly(dimethylsiloxane) microchip-based immunoassay with multiple...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

  6. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  7. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  8. Correlates of vulnerability among arthropod species threatened by invasive ants

    E-Print Network [OSTI]

    Krushelnycky, Paul D.; Gillespie, Rosemary G.

    2010-01-01T23:59:59.000Z

    declines and extinctions of native species worldwide.and even extinctions, of native species through variousG (2004) How species respond to multiple extinction threats.

  9. T-625: Opera Frameset Handling Memory Corruption Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    security and stability enhancements. Opera Download Addthis Related Articles V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-105: Google Chrome...

  10. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01T23:59:59.000Z

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  11. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  12. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  13. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Broader source: Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  14. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  15. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  16. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  17. Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion

    SciTech Connect (OSTI)

    Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

    2010-05-21T23:59:59.000Z

    In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

  18. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    process termination, the PDF rendering process will restart automatically but will not resume processing the same PDF file. Successful exploitation of this vulnerability requires a...

  19. Using vulnerability assessments to design facility safeguards and security systems

    SciTech Connect (OSTI)

    Snell, M.; Jaeger, C.

    1994-08-01T23:59:59.000Z

    The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

  20. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04T23:59:59.000Z

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  1. Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California

    E-Print Network [OSTI]

    the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

  2. Finding Semantic Vulnerabilities in PHP Applications The University of Texas at Austin

    E-Print Network [OSTI]

    Shmatikov, Vitaly

    SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Sooel Son The University of Texas the first characterization of these types of vulner- abilities in PHP applications, develop novel inter-procedural algorithms for discovering them in PHP source code, and implement these algorithms as part of SAFERPHP

  3. Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley

    E-Print Network [OSTI]

    Richner, Heinz

    Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu-cream vendors of Kathmandu valley, Case study of Jawalakhel, Ratnapark area and Balaju area' explores

  4. Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data

    E-Print Network [OSTI]

    Mitasova, Helena

    Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

  5. Impact of relief accuracy on flood simulations and road network vulnerability analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

  6. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  7. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  8. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

  9. Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant

    SciTech Connect (OSTI)

    HERZOG, K.R.

    1999-09-01T23:59:59.000Z

    A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

  10. VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN

    E-Print Network [OSTI]

    Richner, Heinz

    VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

  11. Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii

    E-Print Network [OSTI]

    Herrera, Carlos M.

    vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

  12. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  13. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    SciTech Connect (OSTI)

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

    2011-04-08T23:59:59.000Z

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

  14. A Guide to the Petroleum Abstracts

    E-Print Network [OSTI]

    Reynolds, Albert C.

    Petroleum Abstracts A Guide to the Petroleum Abstracts Information Service Serving the Exploration Conferences Covered #12;Petroleum Abstracts . . . your global information partner. Statement of Purpose Petroleum Abstracts is an abstracting and indexing service conducted as a not-for-profit operation

  15. U-109: Bugzilla Cross-Site Request Forgery Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Bugzilla. PLATFORM: Bugzilla 4.x ABSTRACT: The application's web interface allows users to perform certain actions via HTTP requests without performing...

  16. APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation

    E-Print Network [OSTI]

    Brownstone, Rob

    1 APPENDIX A: Climate Change Vulnerability Literature Review Purpose The purpose of this discussion is to review the existing literature surrounding climate change adaptation and vulnerability with a focus thought surrounding methods for conducting climate change vulnerability assessments. The review

  17. Abstract Scalable Performance Engineering Notation | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Abstract Scalable Performance Engineering Notation May 01, 2013 Aspen (Abstract Scalable Performance Engineering Notation) is a domain specific language for performance modeling...

  18. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  19. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03T23:59:59.000Z

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

  20. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

    1998-01-01T23:59:59.000Z

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  1. A graph-based system for network-vulnerability analysis

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.

    1998-06-01T23:59:59.000Z

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  2. The Abstract Domain of Segmented Ranking Functions

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    function by abstract in- terpretation. We build our work on their proposed general framework, and we designThe Abstract Domain of Segmented Ranking Functions Caterina Urban ÂŽEcole Normale SupÂŽerieure - CNRS - INRIA, Paris, France urban@di.ens.fr Abstract. We present a parameterized abstract domain for proving

  3. IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 15, NO. 3, AUGUST 2000 909 Transmission Loss Compensation in Multiple

    E-Print Network [OSTI]

    Gross, George

    in Multiple Transaction Networks Shu Tao and George Gross, Fellow, IEEE Abstract--We develop and apply

  4. Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard

    E-Print Network [OSTI]

    Leal, Manuel S.

    Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

  5. A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

  6. USE OF COMPOSITE MATERIALS TO REPAIR STEEL STRUCTURES VULNERABLE TO FATIGUE DAMAGE

    E-Print Network [OSTI]

    Alemdar, Fatih

    2010-01-01T23:59:59.000Z

    This study investigates mainly two different topics related to the use of CFRP's for strengthening and repair of steel bridges: the use of CFRP's to prevent damage in fatigue vulnerable welded connections prior to fatigue-crack initiation...

  7. Seismic vulnerability of older reinforced concrete frame structures in Mid-America

    E-Print Network [OSTI]

    Beason, Lauren Rae

    2004-09-30T23:59:59.000Z

    This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

  8. Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems

    E-Print Network [OSTI]

    Michaud, David, 1975-

    2005-01-01T23:59:59.000Z

    The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

  9. A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress

    E-Print Network [OSTI]

    Covington, Herbert E.

    Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

  10. Detection of morphological markers of vulnerable atherosclerotic plaque using multimodal spectroscopy

    E-Print Network [OSTI]

    Fitzmaurice, Maryann

    Vulnerable plaques, which are responsible for most acute ischemic events, are presently invisible to x-ray angiography. Their primary morphological features include a thin or ulcerated fibrous cap, a large necrotic core, ...

  11. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  12. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E. [and others

    1996-02-15T23:59:59.000Z

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  13. Abstraction Layers for Scalable Microfluidic Biocomputers

    E-Print Network [OSTI]

    Amarasinghe, Saman

    Abstraction Layers for Scalable Microfluidic Biocomputers William Thies1 , John Paul Urbanski2 Hatsopoulos Microfluids Laboratory Massachusetts Institute of Technology {thies, urbanski, thorsen, saman}@mit.edu Abstract. Microfluidic devices are emerging as an attractive technol- ogy for automatically orchestrating

  14. abstract newtonian frameworks and their applications

    E-Print Network [OSTI]

    2012-12-05T23:59:59.000Z

    Key words: generalized equation, abstract Newton scheme, augmented Lagrangian, multiplier me- thod, local ... Specifically, in this work we concentrate on.

  15. Stone Age Distributed Computing (Extended Abstract)

    E-Print Network [OSTI]

    on the first page. Copyrights for components of this work owned by others than ACM must be honored. AbstractingStone Age Distributed Computing (Extended Abstract) Yuval Emek Distributed Computing Group ETH wattenhofer@ethz.ch ABSTRACT A new model that depicts a network of randomized finite state machines operating

  16. Hybrid Abstractions that Preserve Timed Languages

    E-Print Network [OSTI]

    Pappas, George J.

    Hybrid Abstractions that Preserve Timed Languages Paulo Tabuada1 and George J. Pappas2 1 Instituto@ee.upenn.edu Abstract. In this paper we consider the problem of extracting an ab- straction from a hybrid control system that determine when trajectories of the original hybrid system can be generated by the abstracted hybrid system

  17. Integrated Water Management and Modeling at Multiple Spatial Scales David Ezechiel Rosenberg

    E-Print Network [OSTI]

    Lund, Jay R.

    Integrated Water Management and Modeling at Multiple Spatial Scales Abstract Water shortages from actions that minimize costs or maximize benefits across a variety of water shortage conditions, describe interdependencies when adopting multiple actions together. Fourth, list the shortage or water

  18. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple |Department of Energy

  19. T-731:Symantec IM Manager Code Injection Vulnerability | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthenticationEnergy

  20. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java MultipleDepartment of

  1. Automation of Termination: Abstracting CCG through MWG Automation of Termination: Abstracting Calling

    E-Print Network [OSTI]

    Ayala-Rincón, Mauricio

    Automation of Termination: Abstracting CCG through MWG Automation of Termination: Abstracting of Termination: Abstracting CCG through MWG Motivation Termination analysis is a fundamental topic in computer science. While classical results state the undecidability of various termination problems, automated

  2. Multiple Aphid Resistance from Alien Sources and its Chromosomal Location

    E-Print Network [OSTI]

    Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

  3. SUPPORTING END-TO-END SECURITY ACROSS PROXIES WITH MULTIPLE-

    E-Print Network [OSTI]

    SUPPORTING END-TO-END SECURITY ACROSS PROXIES WITH MULTIPLE- CHANNEL SSL Yong Song, Victor C Columbia, 2356 Main Mall, Vancouver, BC V6T 1Z4, Canada Abstract: Secure Socket Layer (SSL) has functional used by clients to communicate with servers. This paper introduces Multiple-Channel SSL (MC-SSL

  4. Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance

    E-Print Network [OSTI]

    Hanson, Floyd B.

    Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

  5. Coordinated Output Regulation of Multiple Heterogeneous Linear Systems

    E-Print Network [OSTI]

    Dimarogonas, Dimos

    , the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

  6. CURVES OF GENUS 2 WITH p 2 MULTIPLICATION

    E-Print Network [OSTI]

    thesis, which looks at curves of genus 2 whose jacobians have p 2 multiplication, with the generalisedCURVES OF GENUS 2 WITH p 2 MULTIPLICATION PETER R. BENDING Abstract We give a universal family, and let f be a newform on \\Gamma 1 (N) whose field of Fourier coefficients is F (F is a totally real field

  7. Indigenous climate knowledge in southern Uganda: the multiple components of a dynamic regional system

    E-Print Network [OSTI]

    Orlove, Ben; Roncoli, Carla; Kabugo, Merit; Majugu, Abushen

    2010-01-01T23:59:59.000Z

    knowledge in southern Uganda: the multiple components of aAbstract Farmers in southern Uganda seek information toMakerere University, Kampala, Uganda A. Majugu Department of

  8. Abstract Forest-dwelling mammals such as primates could be particularly vulnerable to habitat fragmentation; however, the definition and quantification of

    E-Print Network [OSTI]

    Arroyo RodrĂ­guez, VĂ­ctor

    -Hurtado Investigador Titular A, ECOSUR-Campeche, Avenida Rancho s/n, Poligono 2, Lerma, Campeche 24500El, Mexico L

  9. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  10. Virtual Sensors: Abstracting Data from Physical Sensors

    E-Print Network [OSTI]

    Julien, Christine

    Virtual Sensors: Abstracting Data from Physical Sensors TR-UTEDGE-2006-001 Sanem Kabadayi Adam Pridgen Christine Julien © Copyright 2006 The University of Texas at Austin #12;Virtual Sensors: Abstracting Data from Physical Sensors Sanem Kabadayi, Adam Pridgen, and Christine Julien The Center

  11. Semi-Autonomous Intersection Management (Extended Abstract)

    E-Print Network [OSTI]

    Au, Tsz-Chiu

    Semi-Autonomous Intersection Management (Extended Abstract) Tsz-Chiu Au School of Electrical@cs.utexas.edu ABSTRACT Autonomous Intersection Management (AIM) is a reservation-based intersection control protocol. AIM was designed for the time when all, or most, of the vehicles on the road are fully autonomous

  12. Call for Abstracts-- 2014 National Environmental Justice Conference and Training Program, Deadline for Submission of Abstracts

    Broader source: Energy.gov [DOE]

    Course Title:   Call for Abstracts--2014 National Environmental Justice Conference and Training Program

  13. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, T.W.

    1994-09-06T23:59:59.000Z

    A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

  14. Multiple density layered insulator

    DOE Patents [OSTI]

    Alger, Terry W. (Tracy, CA)

    1994-01-01T23:59:59.000Z

    A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

  15. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  16. 06241 Abstracts Collection Human Motion -Understanding, Modeling,

    E-Print Network [OSTI]

    06241 Abstracts Collection Human Motion - Understanding, Modeling, Capture and Animation. 13th Summary Human Motion - Understanding, Modeling, Capture and Animation. 13th Workshop Reinhard Klette 06241 Human Motion - Understanding, Modeling, Capture and Animation. 13th Workshop "Theoretical

  17. Pulmonary toxicology of respirable particles. [Lead abstract

    SciTech Connect (OSTI)

    Sanders, C.L.; Cross, F.T.; Dagle, G.E.; Mahaffey, J.A. (eds.)

    1980-09-01T23:59:59.000Z

    Separate abstracts were prepared for the 44 papers presented in these proceedings. The last paper (Stannard) in the proceedings is an historical review of the field of inhalation toxicology and is not included in the analytics. (DS)

  18. Kansas Statistical Abstract 2005 (40th Edition)

    E-Print Network [OSTI]

    Policy Research Institute

    2008-10-21T23:59:59.000Z

    The Kansas Statistical Abstract contains state, county, and city-level data for Kansas on population, vital statistics and health, housing, elections, education, business and manufacturing, exports, employment, income, ...

  19. Kansas Statistical Abstract 2007 (42nd Edition)

    E-Print Network [OSTI]

    Policy Research Institute

    2008-10-21T23:59:59.000Z

    The Kansas Statistical Abstract contains state, county, and city-level data for Kansas on agriculture, banking and finance, business and exports, climate, communications and information, crime, education, employment and ...

  20. Kansas Statistical Abstract 2001 (36th Edition)

    E-Print Network [OSTI]

    2002-12-01T23:59:59.000Z

    The Kansas Statistical Abstract contains state, county, and city-level data for Kansas on population, vital statistics and health, housing, elections, education, business and manufacturing, exports, employment, income, ...

  1. Kansas Statistical Abstract 2008 (43rd Edition)

    E-Print Network [OSTI]

    Policy Research Institute

    2009-09-21T23:59:59.000Z

    The Kansas Statistical Abstract contains state, county, and city-level data for Kansas on agriculture, banking and finance, business and exports, climate, communications and information, crime, education, employment and ...

  2. Kansas Statistical Abstract 2009 (44th Edition)

    E-Print Network [OSTI]

    Policy Research Institute

    2011-03-02T23:59:59.000Z

    The Kansas Statistical Abstract contains state, county, and city-level data for Kansas on agriculture, banking and finance, business and exports, climate, communications and information, crime, education, employment and ...

  3. Kansas Statistical Abstract 2004 (39th Edition)

    E-Print Network [OSTI]

    Policy Research Institute

    2006-01-31T23:59:59.000Z

    The Kansas Statistical Abstract contains state, county, and city-level data for Kansas on population, vital statistics and health, housing, elections, education, business and manufacturing, exports, employment, income, ...

  4. Kansas Statistical Abstract 2003 (38th Edition)

    E-Print Network [OSTI]

    Policy Research Institute

    2004-09-01T23:59:59.000Z

    The Kansas Statistical Abstract contains state, county, and city-level data for Kansas on population, vital statistics and health, housing, elections, education, business and manufacturing, exports, employment, income, ...

  5. Kansas Statistical Abstract 2012 (47th Edition)

    E-Print Network [OSTI]

    Institute for Policy & Social Research

    2014-05-27T23:59:59.000Z

    The Kansas Statistical Abstract 2012, contains the latest available state, county, and city-level data for Kansas on population, vital statistics and health, housing, education, business and manufacturing, exports, employment, ...

  6. Kansas Statistical Abstract 2002 (37th Edition)

    E-Print Network [OSTI]

    2003-09-01T23:59:59.000Z

    The Kansas Statistical Abstract contains state, county, and city-level data for Kansas on population, vital statistics and health, housing, elections, education, business and manufacturing, exports, employment, income, ...

  7. Sandia National Laboratories: Online Abstracts and Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Page Abstract (16.KB PDF) Report (2.0MB PDF) "Simulation and Testing of Resin Infusion Manufacturing Processes for Large Composite Structures" D.B. Mastbergen October 2007...

  8. Earth Sciences Division collected abstracts: 1980

    SciTech Connect (OSTI)

    Henry, A.L.; Hornady, B.F. (eds.)

    1981-10-15T23:59:59.000Z

    This report is a compilation of abstracts of papers, reports, and talks presented during 1980 at national and international meetings by members of the Earth Sciences Division, Lawrence Livermore National Laboratory. The arrangement is alphabetical (by author). For a given report, a bibliographic reference appears under the name of each coauthor, but the abstract itself is given only under the name of the first author (indicated in capital letters) or the first Earth Sciences Division author.

  9. 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Approved October 1, 2002 Revised review: August 14, 2016 Statement and Reason for Standard Administrative Procedure The purpose

  10. A Multiple Procedure DDT

    E-Print Network [OSTI]

    Knight, Thomas

    1968-01-01T23:59:59.000Z

    This Memo. Describes a version of DDT used as the command level of the A.I. Group PDP-6 Time Sharing System (ITS). Special features include capability to handle multiple jobs, ability to stop open read or write references ...

  11. Photoinduced Hydrogen Abstraction from Phenols by Aromatic Ketones. A New Mechanism for Hydrogen Abstraction by

    E-Print Network [OSTI]

    Leigh, William J.

    Photoinduced Hydrogen Abstraction from Phenols by Aromatic Ketones. A New Mechanism for Hydrogen carried out of the kinetics of inter- and intramolecular phenolic hydrogen abstraction phenolic hydrogen, which yields the corresponding phenoxyl-hemipinacol biradical. The biradicals have also

  12. Vulnerability of the New York City Metropolitan Area to Coastal Hazards,

    E-Print Network [OSTI]

    Trade Center site in Lower Manhattan, and of the Brooklyn water- front, long home to the former Brooklyn-Level Rise: Inferences for Urban Coastal Risk Management and Adaptation Policies Klaus Jacob, Vivien Gornitz at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

  13. educating | innovating | transforming | advocating | strengthening vulnerable families social workuniversity of illinois at urbana-champaign

    E-Print Network [OSTI]

    Gilbert, Matthew

    educating | innovating | transforming | advocating | strengthening vulnerable families social innovative efforts and collaborations are having on the lives of people in need. Whose lives? Those of · Low to work through the social barriers hindering the project. "We needed to gain trust from the local

  14. Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities

    E-Print Network [OSTI]

    Qin, Xiao

    Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities Yun--There is a growing demand for large-scale dis- tributed storage systems to support resource sharing and fault attention has yet been paid to security solutions designed for distributed storage systems

  15. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  16. Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste

    E-Print Network [OSTI]

    Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

  17. Vulnerability of national economies to the impacts of climate change on fisheries

    E-Print Network [OSTI]

    Reynolds, John D.

    economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

  18. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

  19. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

  20. Seismic vulnerability assessment to slight dam-age based on experimental modal parameters

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

  1. PHS 650-section 052: Healthcare Quality Improvement and Evaluation for Vulnerable Populations

    E-Print Network [OSTI]

    Sheridan, Jennifer

    can contribute to global health system reform and realization of the Millennium Development Goals. II. Learning Objectives To understand how quality health care has been defined and implemented with vulnerable health care quality" BMJ 2004; 328: 1124-9 Bloom BS. "Crossing the quality chasm: a new health system

  2. Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory

    E-Print Network [OSTI]

    Mutlu, Onur

    Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

  3. American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE

    E-Print Network [OSTI]

    Pockman, William T.

    1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

  4. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  5. Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    (river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

  6. 1900 CROP SCIENCE, VOL. 44, NOVEMBERDECEMBER 2004 Reducing the Genetic Vulnerability of Cotton

    E-Print Network [OSTI]

    Chee, Peng W.

    1900 CROP SCIENCE, VOL. 44, NOVEMBER­DECEMBER 2004 Reducing the Genetic Vulnerability of Cotton. Lloyd May, and C. Wayne Smith change in cotton yields has steadily declined since 1985. The u.s. cotton (Gossypium spp.) production system By 1998, absolute cotton yields (not just the rate ofexemplifies

  7. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

  8. Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1

    E-Print Network [OSTI]

    and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

  9. Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass

    E-Print Network [OSTI]

    '. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3·ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

  10. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    Experimental Studies of Vulnerabilities in Devices and On-Chip Protection Agis A. Iliadis effects on the fundamental units of IC circuits, ie individual devices (MOSFETs) and gates (CMOS Inverters MOSFET devices as on-chip sensing and protecting elements. · Develop on-chip sensing, registration

  11. Pyrochemical multiplicity counter development

    SciTech Connect (OSTI)

    Langner, D.G.; Dytlewski, N.; Krick, M.S.

    1991-01-01T23:59:59.000Z

    Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

  12. Environmental Tracers for Determining Water Resource Vulnerability to Climate Change

    SciTech Connect (OSTI)

    Singleton, M

    2009-07-08T23:59:59.000Z

    Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components to alpine stream baseflow. This research is showing that groundwater in alpine areas spends between a few years to several decades in the saturated zone below the surface, before feeding into streams or being pumped for use. This lag time may act to reduce the impact on water resources from extreme wet or dry years. Furthermore, our measurements show that the temperature of water when it reaches the water table during recharge is 4 to 9 degrees higher than would be expected for direct influx of snowmelt, and that recharge likely occurs over diffuse vegetated areas, rather than along exposed rock faces and fractures. These discoveries have implications for how alpine basins will respond to climate effects that lead to more rain than snow and earlier snow pack melting.

  13. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01T23:59:59.000Z

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  14. ABSTRACT / RESUME conomic Intelligence (EI) is a concept that is the

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 ABSTRACT / RESUME conomic Intelligence (EI) is a concept that is the subject of multiple of EI, as completed in "The Economic Intelligence: guide for beginners and practitioners - Programme, and then into knowledge and then into intelligence" [2]. The coordination actions are commonly admitted by EI

  15. Multiple stage multiple filter hydrate store

    DOE Patents [OSTI]

    Bjorkman, H.K. Jr.

    1983-05-31T23:59:59.000Z

    An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

  16. [0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,

    E-Print Network [OSTI]

    Tam, Tin-Yau

    , multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

  17. Bounds Analysis by Abstract Interpretation Xiaolei Qian Allen Goldberg

    E-Print Network [OSTI]

    Goldberg, Allen

    representations fo* *r these abstract types. In this work an abstract context, i.e. model, consists * Bounds Analysis by Abstract@csl.sri.com goldberg@kestrel.edu Abstract Abstract interpretation

  18. Earth Sciences Division collected abstracts: 1979

    SciTech Connect (OSTI)

    Henry, A.L.; Schwartz, L.L.

    1980-04-30T23:59:59.000Z

    This report is a compilation of abstracts of papers, internal reports, and talks presented during 1979 at national and international meetings by members of the Earth Sciences Division, Lawrence Livermore Laboratory. The arrangement is alphabetical (by author). For a given report, a bibliographic reference appears under the name of each coauthor, but the abstract iself is given only under the name of the first author or the first Earth Sciences Division author. A topical index at the end of the report provides useful cross references, while indicating major areas of research interest in the Earth Sciences Division.

  19. TreeRefiner: A Tool for Refining a Multiple Alignment on a Phylogenetic Tree

    E-Print Network [OSTI]

    Batzoglou, Serafim

    TreeRefiner: A Tool for Refining a Multiple Alignment on a Phylogenetic Tree Aswath Manohar@cs.stanford.edu, serafim@cs.stanford.edu Abstract We present TreeRefiner, a tool for refining multiple alignments of biological sequences. Given a multiple alignment, a phylogenetic tree, and scoring parameters as input, TreeRefiner

  20. IMPLEMENTING MULTIPLE CHANNELS OVER SSL Yong Song, Victor C.M. Leung, Konstantin Beznosov

    E-Print Network [OSTI]

    IMPLEMENTING MULTIPLE CHANNELS OVER SSL Yong Song, Victor C.M. Leung, Konstantin Beznosov:{yongs,vleung,beznosov}@ece.ubc.ca Keywords: Communication security, Mobile security, Multiple channels, SSL Abstract: Multiple-Channel SSL (MC-SSL) is our model and protocol for the security of client-server communication. In contrast to SSL

  1. Natural radiation environment III. [Lead Abstract

    SciTech Connect (OSTI)

    Gesell, T.F.; Lowder, W.M. (eds.)

    1980-01-01T23:59:59.000Z

    Separate abstracts were prepared for the 52 research papers presented at this symposium in April 1978. The major topics in this volume deal with penetrating radiation measurements, radiation surveys and population exposure, radioactivity in the indoor environment, and technologically enhanced natural radioactivity. (KRM)

  2. Book of Abstracts The Center for Nanoscience &

    E-Print Network [OSTI]

    Lifshitz, Ron

    Book of Abstracts 5th Workshop The Center for Nanoscience & Nanotechnology Tel Aviv University: 5TH Workshop The Center for Nanoscience & Nanotechnology Tel Aviv University February 22-24, 2009 Ha: ... " S.E.C. SCIENTIFIC EQUIPMENT CO. LTD. 5TH Workshop The Center for Nanoscience & Nanotechnology Tel

  3. Abstract AndParallel Machines Nachum Dershowitz

    E-Print Network [OSTI]

    Dershowitz, Nachum

    Abstract And­Parallel Machines Nachum Dershowitz University of Illinois Urbana, IL 61801 U are introduced. The first of them, the And­ Parallel Turing Machine, can be viewed as a generalization of the deterministic Turing machine in which the infinite tape is replaced by an infinite tree­like tape on which

  4. Equilibrium Pricing with Positive Externalities (Extended Abstract)

    E-Print Network [OSTI]

    Immorlica, Nicole

    a product in the presence of historical externalities? A low introductory price may attract early adoptersEquilibrium Pricing with Positive Externalities (Extended Abstract) Nima Anari1 , Shayan Ehsani1 an item to strategic buyers in the pres- ence of positive historical externalities, where the value

  5. Colorado Natural Heritage Program 2003 Project Abstracts

    E-Print Network [OSTI]

    Colorado Natural Heritage Program 2003 Project Abstracts #12;Cover photo: A CNHP researcher collects freshwater specimens (Pisidium spp.) at Long Slough Reservoir on the Grand Mesa of Colorado's West of Colorado's biodiversity, what efforts are underway to maintain it, and why more biological information

  6. Abstract explanations in science Christopher Pincock

    E-Print Network [OSTI]

    Pincock, Chris

    Introduction 2 2 A Case 3 3 Abstract and Causal Explanations 9 British Journal for the Philosophy of Science 22 1 Introduction In the philosophy of science discussions of explanation tend to assume that most of explanation.1 The risk of this approach is that it may turn out that explanations are not all of the same kind

  7. Transforming and Refining Abstract Constraint Specifications

    E-Print Network [OSTI]

    Walsh, Toby

    Transforming and Refining Abstract Constraint Specifications Alan M. Frisch1 , Brahim Hnich2 , Ian choose model transformations to reduce greatly the amount of effort that is required to solve a problem by systematic search. It is a consid- erable challenge to automate such transformations. A problem may be viewed

  8. Managed Data: Modular Strategies for Data Abstraction

    E-Print Network [OSTI]

    Cook, William R.

    these mechanisms to define specific kinds of data. Managed Data allows program- mers to take control of many management mechanism, not properties of individ- ual data types. It is possible to define such featuresManaged Data: Modular Strategies for Data Abstraction Alex Loh University of Texas at Austin

  9. Geophysical Research Abstracts Vol. 12, EGU2010-12118, 2010

    E-Print Network [OSTI]

    Boyer, Edmond

    will be influenced during the 21st century both by climate and related or anthro- pogenic land use changes. Many be particularly vulnerable to such global changes because of contrasted climate, low vegetation cover and specific within the Mediterranean basin. Specific drivers of soil erosion affected by the global change were

  10. THE DYNAMICS OF HYDROGEN ATOM ABSTRACTION FROM POLYATOMIC MOLECULES.

    SciTech Connect (OSTI)

    LIU,X.; SUITS,A.G.

    2002-11-21T23:59:59.000Z

    The hydrogen atom abstraction reaction is an important fundamental process that is extensively involved in atmospheric and combustion chemistry. The practical significance of this type of reaction with polyatomic hydrocarbons is manifest, which has led to many kinetics studies. The detailed understanding of these reactions requires corresponding dynamics studies. However, in comparison to the A + HX {radical} AH + X reactions, the study of the dynamics of A + HR {yields} AH + R reactions is much more difficult, both experimentally and theoretically (here and in the following, A stands for an atom, X stands for a halogen atom, and R stands for a polyatomic hydrocarbon radical). The complication stems from the structured R, in contrast to the structureless X. First of all, there are many internal degrees of freedom in R that can participate in the reaction. In addition, there are different carbon sites from which an H atom can be abstracted, and the dynamics are correspondingly different; there are also multiple identical carbon sites in HR and in the picture of a local reaction, there exist competitions between neighboring H atoms, and so on. Despite this complexity, there have been continuing efforts to obtain insight into the dynamics of these reactions. In this chapter, some examples are presented, including the reactions of ground state H, Cl, and O atoms, with particular focus on our recent work using imaging to obtain the differential cross sections for these reactions.

  11. Automatic identification of abstract online groups

    DOE Patents [OSTI]

    Engel, David W; Gregory, Michelle L; Bell, Eric B; Cowell, Andrew J; Piatt, Andrew W

    2014-04-15T23:59:59.000Z

    Online abstract groups, in which members aren't explicitly connected, can be automatically identified by computer-implemented methods. The methods involve harvesting records from social media and extracting content-based and structure-based features from each record. Each record includes a social-media posting and is associated with one or more entities. Each feature is stored on a data storage device and includes a computer-readable representation of an attribute of one or more records. The methods further involve grouping records into record groups according to the features of each record. Further still the methods involve calculating an n-dimensional surface representing each record group and defining an outlier as a record having feature-based distances measured from every n-dimensional surface that exceed a threshold value. Each of the n-dimensional surfaces is described by a footprint that characterizes the respective record group as an online abstract group.

  12. SATURATED ZONE FLOW AND TRANSPORT MODEL ABSTRACTION

    SciTech Connect (OSTI)

    B.W. ARNOLD

    2004-10-27T23:59:59.000Z

    The purpose of the saturated zone (SZ) flow and transport model abstraction task is to provide radionuclide-transport simulation results for use in the total system performance assessment (TSPA) for license application (LA) calculations. This task includes assessment of uncertainty in parameters that pertain to both groundwater flow and radionuclide transport in the models used for this purpose. This model report documents the following: (1) The SZ transport abstraction model, which consists of a set of radionuclide breakthrough curves at the accessible environment for use in the TSPA-LA simulations of radionuclide releases into the biosphere. These radionuclide breakthrough curves contain information on radionuclide-transport times through the SZ. (2) The SZ one-dimensional (I-D) transport model, which is incorporated in the TSPA-LA model to simulate the transport, decay, and ingrowth of radionuclide decay chains in the SZ. (3) The analysis of uncertainty in groundwater-flow and radionuclide-transport input parameters for the SZ transport abstraction model and the SZ 1-D transport model. (4) The analysis of the background concentration of alpha-emitting species in the groundwater of the SZ.

  13. Multiple gap photovoltaic device

    DOE Patents [OSTI]

    Dalal, Vikram L. (Newark, DE)

    1981-01-01T23:59:59.000Z

    A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

  14. Polycrystal Plasticity -Multiple Slip"

    E-Print Network [OSTI]

    Rollett, Anthony D.

    Polycrystal Plasticity - Multiple Slip" 27-750 Texture, Microstructure & Anisotropy A.D. Rollett;2 Objective" The objective of this lecture is to show how plastic deformation in polycrystals requires of Los Alamos polycrystal plasticity, LApp; also the Viscoplastic Selfconsistent code, VPSC; also

  15. Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico

    E-Print Network [OSTI]

    Sanchez Flores, Maria Del Rosario

    2010-10-12T23:59:59.000Z

    this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer.... Statistical analyses were used to support the results of the quantitative assessments. The results of the simulation model showed a significant impact on economic production given different scenarios of water volume and of higher probabilities of droughts...

  16. Children with disabilities in the context of disaster: A social vulnerability perspective

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a discussion... of the theory of resilience as it per- tains to children with disabilities in disaster and outline additional research needs. Social Vulnerability and Disaster Historically, disasters have been viewed as random events that cause indiscriminate losses and suffer...

  17. AbstractAbstract Vendors of high performance computers are converging towards an

    E-Print Network [OSTI]

    AbstractAbstract Vendors of high performance computers are converging towards an architecture based full advantage of the available computing power, in order to achieve the best scalability.This new of computer time #12;Poloidal Grid: unstructured meshPoloidal Grid: unstructured mesh · Gives uniform

  18. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  19. Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1

    SciTech Connect (OSTI)

    Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

    1994-05-01T23:59:59.000Z

    This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

  20. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01T23:59:59.000Z

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  1. Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA

    SciTech Connect (OSTI)

    Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

    1992-10-01T23:59:59.000Z

    This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

  2. The ASSESS (Analytic System and Software for Evaluating Safeguards and Security) Outsider module with multiple analyses

    SciTech Connect (OSTI)

    Snell, M.K.; Winblad, A.E. (Sandia National Labs., Albuquerque, NM (USA)); Bingham, B.; Key, B.; Walker, S. (Science and Engineering Associates, Inc., Albuquerque, NM (USA))

    1990-01-01T23:59:59.000Z

    The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) includes modules for analyzing vulnerabilities against outsider and insider adversaries. The ASSESS Outsider Analysis Module has been upgraded to allow for defining, analyzing, and displaying the results of multiple analyses. Once a set of threat definitions have been defined in one Outsider file, they can be readily copied to other Outsider files. This multiple analysis, or batch, mode of operation provides an efficient way of covering the standard DOE outsider threat spectrum. A new approach for coupling the probability of interruption, P(I), values and values calculated by the ASSESS Neutralization module has been implemented in Outsider and is described. An enhanced capability for printing results of these multiple analyses is also included in the upgraded Outside module. 7 refs., 7 figs., 1 tab.

  3. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  4. Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but

    E-Print Network [OSTI]

    Mencuccini, Maurizio

    Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

  5. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  6. Current Abstracts Nuclear Reactors and Technology

    SciTech Connect (OSTI)

    Bales, J.D.; Hicks, S.C. [eds.

    1993-01-01T23:59:59.000Z

    This publication Nuclear Reactors and Technology (NRT) announces on a monthly basis the current worldwide information available from the open literature on nuclear reactors and technology, including all aspects of power reactors, components and accessories, fuel elements, control systems, and materials. This publication contains the abstracts of DOE reports, journal articles, conference papers, patents, theses, and monographs added to the Energy Science and Technology Database during the past month. Also included are US information obtained through acquisition programs or interagency agreements and international information obtained through acquisition programs or interagency agreements and international information obtained through the International Energy Agency`s Energy Technology Data Exchange or government-to-government agreements. The digests in NRT and other citations to information on nuclear reactors back to 1948 are available for online searching and retrieval on the Energy Science and Technology Database and Nuclear Science Abstracts (NSA) database. Current information, added daily to the Energy Science and Technology Database, is available to DOE and its contractors through the DOE Integrated Technical Information System. Customized profiles can be developed to provide current information to meet each user`s needs.

  7. DSNF AND OTHER WASTE FORM DEGRADATION ABSTRACTION

    SciTech Connect (OSTI)

    T.A. Thornton

    2000-12-20T23:59:59.000Z

    The purpose of this analysis/model report (AMR) is to select and/or abstract conservative degradation models for DOE-(US. Department of Energy) owned spent nuclear fuel (DSNF) and the immobilized ceramic plutonium (Pu) disposition waste forms for application in the proposed monitored geologic repository (MGR) postclosure Total System Performance Assessment (TSPA). Application of the degradation models abstracted herein for purposes other than TSPA should take into consideration the fact that they are, in general, very conservative. Using these models, the forward reaction rate for the mobilization of radionuclides, as solutes or colloids, away from the waste fondwater interface by contact with repository groundwater can then be calculated. This forward reaction rate generally consists of the dissolution reaction at the surface of spent nuclear fuel (SNF) in contact with water, but the degradation models, in some cases, may also include and account for the physical disintegration of the SNF matrix. The models do not, however, account for retardation, precipitation, or inhibition of the migration of the mobilized radionuclides in the engineered barrier system (EBS). These models are based on the assumption that all components of the DSNF waste form are released congruently with the degradation of the matrix.

  8. 2013 LIST OF PUBLICATIONS REVIEWED BY PETROLEUM ABSTRACTS Petroleum Abstracts reviews the following publications on a regular basis and selects material for indexing and abstracting according to

    E-Print Network [OSTI]

    Reynolds, Albert C.

    2013 LIST OF PUBLICATIONS REVIEWED BY PETROLEUM ABSTRACTS Petroleum Abstracts reviews the following was used by Petroleum Abstracts through 2004. Beginning with 2005 issues, the Complete Title is used. TABLE OF CONTENTS SERVICE As a current-awareness service, Petroleum Abstracts Document Delivery Service (PADDS

  9. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

    2012-07-01T23:59:59.000Z

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  10. Verification of Parallel Garbage Collection by Abstract Model Checking

    E-Print Network [OSTI]

    Hagiya, Masami

    have a finite state space provided that the abstraction mapping is powerful. Mšuller and Nipkow's work working on abstract model checking. In Section 4, the abstractions we defined on garbage #12; collectionVerification of Parallel Garbage Collection by Abstract Model Checking (Extended Abstract) Masami

  11. DOE NABIR PI Workshop: Abstracts 2002

    SciTech Connect (OSTI)

    Hawkes (Editor), Dan

    2002-01-09T23:59:59.000Z

    The mission of the NABIR program is to provide the fundamental science that will serve as the basis for the development of cost-effective bioremediation and long-term stewardship of radionuclides and metals in the subsurface at DOE sites. The focus of the program is on strategies leading to long-term immobilization of contaminants in place to reduce the risk to humans and the environment. Contaminants of special interest are uranium, technetium, plutonium, chromium, and mercury. The focus of the NABIR program is on the bioremediation of these contaminants in the subsurface below the root zone, including both vadose and saturated zones. The program is implemented through four interrelated scientific research elements (Biogeochemistry, Biomolecular Science and Engineering, Biotransformation, and Community Dynamics/Microbial Ecology); and through an element called Bioremediation and its Societal Implications and Concerns (BASIC), which addresses societal issues and potential concerns of stakeholders. The material presented at this year's workshop focuses on approximately 60 research projects funded in FY 2000-2002 by DOE's Office of Biological and Environmental Research (BER). Abstracts of NABIR research projects are provided in this book.

  12. DOE-NABIR PI Workshop: Abstracts 2003

    SciTech Connect (OSTI)

    Various

    2003-01-28T23:59:59.000Z

    The mission of the NABIR program is to provide the fundamental science that will serve as the basis for the development of cost-effective bioremediation and long-term stewardship of radionuclides and metals in the subsurface at DOE sites. The focus of the program is on strategies leading to long-term immobilization of contaminants in situ to reduce the risk to humans and the environment. Contaminants of special interest are uranium, technetium, plutonium, chromium, and mercury. The focus of the NABIR program is on the bioremediation of these contaminants in the subsurface below the root zone, including both vadose and saturated zones. The program consists of four interrelated Science Elements (Biotransformation, Community Dynamics/Microbial Ecology, Biomolecular Science and Engineering, and Biogeochemistry). The program also has a cross-cutting Assessment Element that supports development of innovative approaches and technologies to support the science elements. An element called Bioremediation and its Societal Implications and Concerns (BASIC) addresses potential societal issues of implementing NABIR scientific findings. The material presented at this year's workshop focuses on approximately 60 research projects funded in FY 2000-2003 by the Environmental Remediation Sciences Division in DOE's Office of Biological and Environmental Research (BER) in the Office of Science. Abstracts of NABIR research projects are provided in this book.

  13. Multiple capillary biochemical analyzer

    DOE Patents [OSTI]

    Dovichi, N.J.; Zhang, J.Z.

    1995-08-08T23:59:59.000Z

    A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

  14. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01T23:59:59.000Z

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  15. California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area

    SciTech Connect (OSTI)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-11-01T23:59:59.000Z

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

  16. Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress

    E-Print Network [OSTI]

    Wang, Xinkun; Zaidi, Asma; Pal, Ranu; Garrett, Alexander S.; Braceras, Rogelio; Chen, Xue-wen; Michaelis, Mary L.; Michaelis, Elias K.

    2009-02-19T23:59:59.000Z

    ral ssBioMed CentBMC Neuroscience Open AcceResearch article Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress Xinkun Wang*1,2, Asma Zaidi2,3, Ranu Pal1,2, Alexander S Garrett4...: Daiichi Sankyo Inc., Two Hilton Court, Parsippany, NJ 07054, USA Email: Xinkun Wang* - xwang@ku.edu; Asma Zaidi - azaidi@kcumb.edu; Ranu Pal - ranupal@ku.edu; Alexander S Garrett - asg@stowers- institute.org; Rogelio Braceras - rbraceras@dsus.com; Xue...

  17. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01T23:59:59.000Z

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  18. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

  19. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||Vulnerability

  20. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy SEARCH-LAB

  1. Selected Abstracts & Bibliography of International Oil Spill Research, through 1998

    E-Print Network [OSTI]

    Louisiana Applied Oil Spill Research & Development Program Electronic Bibliography

    1998-01-01T23:59:59.000Z

    Quarterly. 7(3) Energy Research Abstracts. 1987. Spills-of-Energy Daily. 18:139. Energy Research Abstracts. 1987. FieldResponse. 96pp. ERA (Energy Research Abstracts), ETD (Energy

  2. Process Abstraction in the Verification of Temporal Properties 

    E-Print Network [OSTI]

    Bruns, Glen R

    as abstraction operations. We show that an abstract process satisfies a property expressed as a temporal logic formula just if the original process satisfies a transformed formula. We define various abstraction operators and illustrate their use in verification...

  3. Querying Multiple Sets of Discovered Rules Rule mining is an important data mining task that has been

    E-Print Network [OSTI]

    Liu, Bing

    operating on multiple rulebases because many practically important data mining queries naturally requireQuerying Multiple Sets of Discovered Rules ABSTRACT Rule mining is an important data mining task querying of multiple data mining rulebases to retrieve interesting rules. In this paper, we propose a new

  4. TROPICAL MULTIPLICATION MAPS AND THE GIESEKER-PETRI THEOREM

    E-Print Network [OSTI]

    Payne, Sam

    TROPICAL MULTIPLICATION MAPS AND THE GIESEKER-PETRI THEOREM DAVID JENSEN AND SAM PAYNE Abstract. We. Supported in part by NSF grants DMS­1068689 and CAREER DMS­1149054. 1 #12;2 DAVID JENSEN AND SAM PAYNE v1 w1 by the addition or deletion of a bridge are canonically isomorphic, and these isomorphisms respect the images of the

  5. Multiplicity theorems modulo p for GL2(Qp) Stefano Morra

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Multiplicity theorems modulo p for GL2(Qp) Stefano Morra Abstract Let F be a non-archimedean local field, an admissible irreducible GL2(F)-representation with complex coefficients. For a quadratic correspondence for GL2(Qp). We describe the restriction to Cartan subgroups of an irreducible p

  6. Efficient routing algorithms for multiple vehicles with no explicit communications

    E-Print Network [OSTI]

    Savla, Ketan

    1 Efficient routing algorithms for multiple vehicles with no explicit communications Alessandro Arsie Ketan Savla Emilio Frazzoli Abstract In this paper we consider a class of dynamic vehicle routing research area today addresses coordination of several mobile agents: groups of autonomous robots and large

  7. Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs Kiran Kumar Matam, prasanna}@usc.edu Abstract--Energy efficiency has emerged as one of the key performance metrics in scientific computing. In this work, we evaluate the energy efficiency of floating point matrix multipli

  8. On Multiple Slice Turbo Codes(1)(2) David Gnaedig*

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On Multiple Slice Turbo Codes(1)(2) David Gnaedig* , Emmanuel Boutillon+ , Michel Jézéquel- , Vincent C. Gaudet° and P. Glenn Gulak& * TurboConcept + LESTER. Université de Bretagne Sud - ENST Bretagne.gnaedig@univ-ubs.fr, emmanuel.boutillon@univ-ubs.fr Abstract: The main problem concerning the hardware implementation of turbo

  9. Frontier-Based Exploration Using Multiple Robots Brian Yamauchi

    E-Print Network [OSTI]

    Baltes, Jacky

    Frontier-Based Exploration Using Multiple Robots Brian Yamauchi Navy Center for Applied Research. ABSTRACT Frontier-based exploration directs mobile robots to regions on the boundary between unexplored spaceand spacethat is known to be open. Previously, we havedemonstrated that frontier-based exploration can

  10. Mapping subtasks with multiple versions on an ad hoc grid

    E-Print Network [OSTI]

    Maciejewski, Anthony A.

    Mapping subtasks with multiple versions on an ad hoc grid S. Shivle a , P. Sugavanam a , H; Mapping; Resource allocation; Task scheduling 1. Introduction and problem statement An ad hoc grid; accepted 15 April 2005 Available online 16 June 2005 Abstract An ad hoc grid is a heterogeneous computing

  11. ABSTRACT: Bioenergy Harvesting Technologies to Supply Crop Residues...

    Energy Savers [EERE]

    ABSTRACT: Bioenergy Harvesting Technologies to Supply Crop Residues In a Densified Large Square Bale Format ABSTRACT: Bioenergy Harvesting Technologies to Supply Crop Residues In a...

  12. Asymptotic almost-equivalence of abstract evolution systems ?

    E-Print Network [OSTI]

    2008-05-13T23:59:59.000Z

    May 13, 2008 ... Abstract. We study the asymptotic behavior of almost-orbits of abstract .... In that sense our work is different but complementary to [12,11].

  13. Multiple layer insulation cover

    DOE Patents [OSTI]

    Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

    1981-11-03T23:59:59.000Z

    A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

  14. AM with Multiple Merlins

    E-Print Network [OSTI]

    Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

    2014-01-27T23:59:59.000Z

    We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

  15. Clad Degradation- Summary and Abstraction for LA

    SciTech Connect (OSTI)

    D. Stahl

    2004-10-01T23:59:59.000Z

    The purpose of this model report is to develop the summary cladding degradation abstraction that will be used in the Total System Performance Assessment for the License Application (TSPA-LA). Most civilian commercial nuclear fuel is encased in Zircaloy cladding. The model addressed in this report is intended to describe the postulated condition of commercial Zircaloy-clad fuel as a function of postclosure time after it is placed in the repository. Earlier total system performance assessments analyzed the waste form as exposed UO{sub 2}, which was available for degradation at the intrinsic dissolution rate. Water in the waste package quickly became saturated with many of the radionuclides, limiting their release rate. In the total system performance assessments for the Viability Assessment and the Site Recommendation, cladding was analyzed as part of the waste form, limiting the amount of fuel available at any time for degradation. The current model is divided into two stages. The first considers predisposal rod failures (most of which occur during reactor operation and associated activities) and postdisposal mechanical failure (from static loading of rocks) as mechanisms for perforating the cladding. Other fuel failure mechanisms including those caused by handling or transportation have been screened out (excluded) or are treated elsewhere. All stainless-steel-clad fuel, which makes up a small percentage of the overall amount of fuel to be stored, is modeled as failed upon placement in the waste packages. The second stage of the degradation model is the splitting of the cladding from the reaction of water or moist air and UO{sub 2}. The splitting has been observed to be rapid in comparison to the total system performance assessment time steps and is modeled to be instantaneous. After the cladding splits, the rind buildup inside the cladding widens the split, increasing the diffusion area from the fuel rind to the waste package interior. This model report summarizes the component models, developed for the two stages noted above, that are used as inputs to TSPA-LA. The model concludes that less than two percent of the fuel, including all of the stainless-steel clad fuel, received at the repository is failed (perforated) upon receipt at the repository. All failed fuel is assumed to axially split upon waste package failure exposing the fuel to oxidation from the in-package environment. TSPA-LA then calculates the release of radionuclides from the exposed volume of oxidized fuel.

  16. DSNF AND OTHER WASTE FORM DEGRADATION ABSTRACTION

    SciTech Connect (OSTI)

    J. CUNNANE

    2004-11-19T23:59:59.000Z

    Several hundred distinct types of DOE-owned spent nuclear fuel (DSNF) may potentially be disposed in the Yucca Mountain repository. These fuel types represent many more types than can be viably individually examined for their effect on the Total System Performance Assessment for the License Application (TSPA-LA). Additionally, for most of these fuel types, there is no known direct experimental test data for the degradation and dissolution of the waste form in repository groundwaters. The approach used in the TSPA-LA model is, therefore, to assess available information on each of 11 groups of DSNF, and to identify a model that can be used in the TSPA-LA model without differentiating between individual codisposal waste packages containing different DSNF types. The purpose of this report is to examine the available data and information concerning the dissolution kinetics of DSNF matrices for the purpose of abstracting a degradation model suitable for use in describing degradation of the DSNF inventory in the Total System Performance Assessment for the License Application. The data and information and associated degradation models were examined for the following types of DSNF: Group 1--Naval spent nuclear fuel; Group 2--Plutonium/uranium alloy (Fermi 1 SNF); Group 3--Plutonium/uranium carbide (Fast Flux Test Facility-Test Fuel Assembly SNF); Group 4--Mixed oxide and plutonium oxide (Fast Flux Test Facility-Demonstration Fuel Assembly/Fast Flux Test Facility-Test Demonstration Fuel Assembly SNF); Group 5--Thorium/uranium carbide (Fort St. Vrain SNF); Group 6--Thorium/uranium oxide (Shippingport light water breeder reactor SNF); Group 7--Uranium metal (N Reactor SNF); Group 8--Uranium oxide (Three Mile Island-2 core debris); Group 9--Aluminum-based SNF (Foreign Research Reactor SNF); Group 10--Miscellaneous Fuel; and Group 11--Uranium-zirconium hydride (Training Research Isotopes-General Atomics SNF). The analyses contained in this document provide an ''upper-limit'' (i.e., instantaneous degradation) model for use in the TSPA-LA model. ''Best-estimate'' models for the degradation of the fuels in each of the DSNF groups are discussed to provide a basis for selecting the upper limit model for use in the TSPA-LA model. The instantaneous degradation model is chosen for use in the TSPA-LA model because the available information shows that the degradation rate of the N Reactor fuel (which constitutes most of the DSNF inventory) is very high and because the available qualified information is insufficient to justify use of a less conservative approach. The commercial spent nuclear fuel model will be used for naval spent nuclear fuel because it has been shown to be conservative for representing naval spent nuclear fuel.

  17. Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability 

    E-Print Network [OSTI]

    Crossley, Janet Ruth

    2008-01-01T23:59:59.000Z

    needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

  18. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30T23:59:59.000Z

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  19. Formal Proof of Abstract Model Checking of Concurrent Garbage Collection

    E-Print Network [OSTI]

    Hagiya, Masami

    , the correctness of abstraction is not always easy to verify. In our pre- vious work, we applied abstract model with that of proving the concrete system from scratch (not by abstract model checking). In our previous work [6], whichFormal Proof of Abstract Model Checking of Concurrent Garbage Collection Koichi Takahashi Masami

  20. Abstract machines for game semantics, revisited Olle Fredriksson

    E-Print Network [OSTI]

    Ghica, Dan

    : In this paper we are developing the line of work on PAM/IAM/JAM in order to define new abstract machines whichAbstract machines for game semantics, revisited Olle Fredriksson University of Birmingham, UK Dan R. Ghica University of Birmingham, UK Abstract--We define new abstract machines for game seman- tics which

  1. Abstract To test whether the impact of drought on the growth and biomass allocation of first-season shade-

    E-Print Network [OSTI]

    Sack, Lawren

    and water supply for spe- cies of forest seedlings, and suggest a multiplicative- effects approachAbstract To test whether the impact of drought on the growth and biomass allocation of first irradiance treatments. Infrequent watering did not signif- icantly alter any species' biomass allocation

  2. Multiple paternity in Asclepias syriaca using a paired-fruit analysis

    E-Print Network [OSTI]

    Shore, Joel S.

    Multiple paternity in Asclepias syriaca using a paired-fruit analysis Julie J. Gold and Joel S. Shore Introduction Abstract: We investigated the extent of multiple paternity within and between fruits within fruits. When pairs of fruits obtained from individual ramets were analyzed in a similar manner

  3. A multiple temperature kinetic model and its application to micro-scale gas flow simulations

    E-Print Network [OSTI]

    Xu, Kun

    A multiple temperature kinetic model and its application to micro-scale gas flow simulations model, micro-scale flows. 1. Introduction Gas flows can be classified according to the flow regimes_pku@yahoo.com.cn Abstract This paper presents a numerical approach to solve the multiple temperature kinetic model (MTKM

  4. Directions to Petroleum Abstracts Petroleum Abstracts' main office is located in the basement of John Rogers Hall (JRH)

    E-Print Network [OSTI]

    Reynolds, Albert C.

    Directions to Petroleum Abstracts Petroleum Abstracts' main office is located in the basement approximately 2 blocks West of South Harvard Avenue. Petroleum Abstracts' office (Room 1520) is on the basement wish to visit Petroleum Abstracts and they will contact us to direct you to our office in the basement

  5. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26T23:59:59.000Z

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  6. Sublethal Oxygen–Glucose Deprivation Alters Hippocampal Neuronal AMPA Receptor Expression and Vulnerability to

    E-Print Network [OSTI]

    Kainate-induced Death; Howard S. Ying; Jochen H. Weishaupt; Margaret Grabb; Lorella M. T. Canzoniero; Stefano L. Sensi; Christian T. Sheline; Hannah Monyer; Dennis W. Choi

    Recent studies have suggested that rats subjected to transient global brain ischemia develop depressed expression of GluR-B in CA1 hippocampal neurons. The present study was performed to determine whether a similar change in AMPA receptor expression could be triggered in vitro by sublethal oxygen–glucose deprivation in rat hippocampal neuronal cultures. mRNA was extracted from individual hippocampal neurons via patch electrodes and amplified by RT-PCR 24–48 hr after sublethal oxygen–glucose deprivation. Compared with controls, insulted neurons expressed increased levels of GluR-D flop. As an indication that this change in receptor expression was functionally significant, insulted cultures exhibited increased AMPA- or kainate-induced 45 Ca 2 ? accumulation sensitive to Joro spider toxin and increased vulnerability to kainate-induced death. These data support the hypothesis that exposure to ischemia may enhance subsequent hippocampal

  7. LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis

    SciTech Connect (OSTI)

    Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

    1986-01-01T23:59:59.000Z

    At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

  8. Women and Sustainability: Creating Community based literacy for climate solutions Women are particularly vulnerable to economic downturns and the impacts of climate change may

    E-Print Network [OSTI]

    Boone, Randall B.

    Accord (2009) acknowledges disproportionate impacts of climate change on women in developing countries are particularly vulnerable to economic downturns and the impacts of climate change may increase that vulnerability. Water is the biggest limiting factor in Colorado and climate change is anticipated to reduce its

  9. Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost analysis of planting grass buffer

    E-Print Network [OSTI]

    Boyer, Edmond

    Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost and summer storms lead to large scale sediment deposition on roadways, and cleanup costs are a major concern characteristics which control sediment deposition on roadways in order to compare the cost of planting grass

  10. Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium q

    E-Print Network [OSTI]

    . Bhattacharya, Associate Editor Keywords: Vulnerability Particle-tracking Arsenic Uranium Classification tree through aquifer systems and also through specific redox and pH zones within aquifers. Time were generally strongest for variables computed for distinct redox zones. Classification tree analysis

  11. The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking water, irrigation, industry, transportation,

    E-Print Network [OSTI]

    Saldin, Dilano

    The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking for drinking water is rising in the United States and around the world due to population growth. At the same water, irrigation, industry, transportation, power production, recreation and scenic beauty

  12. Bundle: A Group Based Programming Abstraction for Cyber Physical Systems

    E-Print Network [OSTI]

    Stankovic, John A.

    ). Similar to other programming abstractions, a Bun- dle creates logical collections of sensing devices on feedback from the current members. The Bun- dle abstraction is implemented in Java which ensures ease

  13. On the Hardness of Optimal Auctions (Extended Abstract)

    E-Print Network [OSTI]

    Saberi, Amin

    On the Hardness of Optimal Auctions (Extended Abstract) Amir Ronen #3; Amin Saberi y Abstract We Berkeley. Email: saberi@cc.gatech.edu. problem which is perhaps the most basic in optimal auction design

  14. Policy space abstraction for a lifelong learning agent 

    E-Print Network [OSTI]

    Hawasly, Majd

    2014-11-27T23:59:59.000Z

    This thesis is concerned with policy space abstractions that concisely encode alternative ways of making decisions; dealing with discovery, learning, adaptation and use of these abstractions. This work is motivated by ...

  15. Abstract--. This paper shows an assessment of multiple scenarios of electricity generation in Chile. This study uses an

    E-Print Network [OSTI]

    Catholic University of Chile (Universidad CatĂłlica de Chile)

    sustentabilidad del desarrollo de los países, respecto a la seguridad de suministro energético y diversidad de

  16. Abstract--In the design of a spaceborne Synthetic Aperture RADAR mission with multiple modes and swaths, like the

    E-Print Network [OSTI]

    Gesbert, David

    the modes. Index Terms-- Synthetic Aperture Radar, STRIPMAP, TOPSAR. Conference topic: SAR/ISAR I Sophia-Antipolis cedex, France. mail: lorenzo.maggi@eurecom.fr calibration and the processing. In order of a spaceborne SAR. Let us refer to the geometry of Fig. 1.a, where we assumed for simplicity flat earth

  17. Abstract --This letter presents highly-polarized edge light emitting diodes with high-confinement, strained, multiple

    E-Print Network [OSTI]

    Coldren, Larry A.

    power. We characterize InGaAsP MQW ELED devices with different lengths and optical confinement factors that transitions involving the HH band provide gain/absorption to TE polarized light and those involving the LH band provide gain/absorption mostly to TM polarized light, and to a lesser extent to TE light [7

  18. Division of Environmental Control Technology Program, 1979. [Lead abstract

    SciTech Connect (OSTI)

    None

    1980-06-01T23:59:59.000Z

    Separate abstracts were prepared for the 10 sections in this progress report dealing with environmental engineering. (KRM)

  19. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 29, 2013...

  20. U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...

    Broader source: Energy.gov (indexed) [DOE]

    Pidgin Multiple Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities...

  1. Invited Editorial Manually structured digital abstracts: A scaffold for automatic

    E-Print Network [OSTI]

    Gerstein, Mark

    in the publication process, and authors will then use this out- put as a starting point to shape the digital abstractInvited Editorial Manually structured digital abstracts: A scaffold for automatic text mining In the past, we have advocated the adoption of the struc- tured digital abstract to bring scientific

  2. The Impact of Distributed Programming Abstractions on Application Energy Consumption

    E-Print Network [OSTI]

    Tilevich, Eli

    The Impact of Distributed Programming Abstractions on Application Energy Consumption Young-Woo Kwon of their energy consumption patterns. By varying the abstractions with the rest of the functionality fixed, we measure and analyze the impact of distributed programming abstractions on application energy consumption

  3. Reasoning with Generic Cases in the Arithmetic of Abstract Matrices

    E-Print Network [OSTI]

    Sorge, Volker

    Department of Computer Science, University of Western Ontario www.csd.uwo.ca/watt Abstract. In previous work specifying n. We call this working with "symbolic" or "abstract" values. In previous work we have givenReasoning with Generic Cases in the Arithmetic of Abstract Matrices Alan P. Sexton1 , Volker Sorge1

  4. Reasoning with Generic Cases in the Arithmetic of Abstract Matrices

    E-Print Network [OSTI]

    Watt, Stephen M.

    Department of Computer Science, University of Western Ontario www.csd.uwo.ca/~watt Abstract. In previous work specifying n. We call this working with "symbolic" or "abstract" values. In previous work we have givenReasoning with Generic Cases in the Arithmetic of Abstract Matrices Alan P. Sexton1 , Volker Sorge1

  5. A certifying frontend for (sub)polyhedral abstract domains

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of the overall abstract domain. The main contribution of the work described here is the design of the linkA certifying frontend for (sub)polyhedral abstract domains Alexis Fouilhe and Sylvain Boulmé Univ. Grenoble-Alpes, VERIMAG, F-38000 Grenoble, France {alexis.fouilhe,sylvain.boulme}@imag.fr Abstract. Convex

  6. No. ___________ Reviewer: ______________________________ 2014 WSU Academic Showcase Abstract Evaluation Rubric

    E-Print Network [OSTI]

    Collins, Gary S.

    , or student A student-submitted abstract has either a faculty co-author or a faculty Sponsor All work mustNo. ___________ Reviewer: ______________________________ 2014 WSU Academic Showcase Abstract Evaluation Rubric Eligibility Criteria1 Does not meet criteria Abstract is submitted by a WSU faculty, staff

  7. Abstract Local Reasoning for Concurrent Libraries: Mind the Gap

    E-Print Network [OSTI]

    Gardner, Philippa

    considerable work on combining lo- cal reasoning with abstraction. There are two main approaches. One approach, truly abstract reasoning of a tree module (such as DOM) works with predicates based on connecting treeMFPS 2014 Abstract Local Reasoning for Concurrent Libraries: Mind the Gap Philippa Gardner, Azalea

  8. From Abstract to Concrete Norms in Agent Institutions

    E-Print Network [OSTI]

    Dignum, Frank

    From Abstract to Concrete Norms in Agent Institutions Davide Grossi and Frank Dignum Utrecht accounts for how (abstract) norms can be incorporated in the (concrete) procedures constituting. This abstract is organized as follows. In Section 2 we make the problem we are focusing on concrete by means

  9. Numerical Simulation and Multiple Realizations for Sensitivity Study of Shale Gas Reservoir

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    SPE 141058 Numerical Simulation and Multiple Realizations for Sensitivity Study of Shale Gas. The abstract must contain conspicuous acknowledgment of SPE copyright. Abstract Shale gas in the United States the largest conventional gas accumulations in the world. Shale gas success is directly the result

  10. Search Results Cite abstracts as Author(s) (2010), Title, Abstract xxxxx-xxxx presented at 2010 Fall

    E-Print Network [OSTI]

    Ng, Chung-Sang

    2010 Fall Meeting Search Results Cite abstracts as Author(s) (2010), Title, Abstract xxxxx will present results on the scaling of reconnection rate with S, as well as turbulence levels. This work

  11. Multiple Motivations Institutional Change Principle

    Broader source: Energy.gov [DOE]

    The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

  12. Multiple hypothesis evaluation in auditing

    E-Print Network [OSTI]

    Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

    2002-11-01T23:59:59.000Z

    , unidentified causes may have led to the fluctuation. A widely accepted approach for modeling multiple hypotheses is to employ a probabilistic revision process (Winterfeldt and Edwards 1986; Winkler and Hays 1975; Luce and Raiffa, 1957). Probability theory...

  13. V-047: IBM Lotus Foundation Multiple Cross Site Scripting | Department...

    Broader source: Energy.gov (indexed) [DOE]

    the malicious data is being viewed. 2) An error exists within the bundled version of PHP. IMPACT: Two vulnerabilities have been reported in IBM Lotus Foundations Start, which...

  14. The INEL beryllium multiplication experiment

    SciTech Connect (OSTI)

    Smith, J.R.; King, J.J.

    1991-03-01T23:59:59.000Z

    The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

  15. Fair capacity sharing of multiple aperiodic servers

    E-Print Network [OSTI]

    Melapudi, Vinod Reddy

    2002-01-01T23:59:59.000Z

    For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

  16. Modularization to Support Multiple Brand Platforms

    E-Print Network [OSTI]

    Agus, Sudjianto

    2001-09-09T23:59:59.000Z

    Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

  17. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities

    SciTech Connect (OSTI)

    Wilkey, D.D.

    1995-09-01T23:59:59.000Z

    This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

  18. Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume II, part 7: Mound working group assessment team report

    SciTech Connect (OSTI)

    NONE

    1994-09-01T23:59:59.000Z

    This is the report of a visit to the Mound site by the Working Group Assessment Team (WGAT) to assess plutonium vulnerabilities. Purposes of the visit were: to review results of the site`s self assessment of current practices for handling and storing plutonium; to conduct an independent assessment of these practices; to reconcile differences and assemble a final list of vulnerabilities; to calculate consequences and probability for each vulnerability; and to issue a report to the Working Group. This report, representing completion of the Mound visit, will be compiled along with those from all other sites with plutonium inventories as part of a final report to the Secretary of Energy.

  19. automatic modular abstractions: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: We propose a method for automatically generating abstract transformers for static analysis permits the analysis of loops and recursive functions. Our...

  20. Selected Translated Abstracts of Chinese-Language Climate Change Publications

    SciTech Connect (OSTI)

    Cushman, R.M.; Burtis, M.D.

    1999-05-01T23:59:59.000Z

    This report contains English-translated abstracts of important Chinese-language literature concerning global climate change for the years 1995-1998. This body of literature includes the topics of adaptation, ancient climate change, climate variation, the East Asia monsoon, historical climate change, impacts, modeling, and radiation and trace-gas emissions. In addition to the biological citations and abstracts translated into English, this report presents the original citations and abstracts in Chinese. Author and title indexes are included to assist the reader in locating abstracts of particular interest.

  1. 7th international symposium on photosynthetic prokaryotes. Abstracts

    SciTech Connect (OSTI)

    Fuller, R.C.

    1991-12-31T23:59:59.000Z

    This book contains the abstracts of all the presentations made either in oral or poster form, at the VII International Symposium on Photosynthetic Prokaryotes.

  2. Abstract: Design and Demonstration of an Advanced Agricultural...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Design and Demonstration of an Advanced Agricultural Feedstock Supply System for Lignocellulosic Bioenergy Production Abstract: Design and Demonstration of an Advanced Agricultural...

  3. Abstract Domains of Affine Relations MATT ELDER, University of Wisconsin

    E-Print Network [OSTI]

    Reps, Thomas W.

    modulo 2w, for some machine-integer width w). We show that the abstract domains of Mšuller-Olm/Seidl (MOS

  4. Molecular biology of signal transduction in plants. Abstracts

    SciTech Connect (OSTI)

    Not Available

    1991-12-31T23:59:59.000Z

    This volume contains abstracts of oral presentations and poster sessions of the 1991 Cold Springs Harbor Meeting entitled Molecular Biology of Signal Transduction in Plants.

  5. Multi-unit Auctions with Unknown Supply [Extended Abstract

    E-Print Network [OSTI]

    Saberi, Amin

    Multi-unit Auctions with Unknown Supply [Extended Abstract] Mohammad Mahdian Microsoft Research Redmond, WA, USA mahdian@microsoft.com Amin Saberi Stanford University Stanford, CA, USA saberi

  6. Abstract: Development and Deployment of a Short Rotation Woody...

    Energy Savers [EERE]

    Development and Deployment of a Short Rotation Woody Crops Harvesting System Based on a Case New Holland Forage Harvester and SRC Woody Crop Header Abstract: Development and...

  7. abstract symbolic semantics: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Semantics Gregory Grefenstette Abstract Quantified self, life logging, digital eyeglasses to induce personal semantic dimensions to sift data and find what is meaningful to...

  8. Handling Nonnegative Constraints in Spectral Estimation Abstract 1 ...

    E-Print Network [OSTI]

    Abstract. We consider convex optimization problems with the. constraint that the variables form a ... component of this work in other works, must be obtained from.

  9. Abstract Presented at Synchrotron Environmental Science II (SES-II)

    E-Print Network [OSTI]

    Brookhaven National Laboratory

    Abstract Presented at Synchrotron Environmental Science II (SES-II) Argonne National Laboratory - 6 such as dioxins and furans, polychlorinated biphenyls (PCBs), and polynuclear aromatic hydrocarbons (PAHs). *Work

  10. aluminum tolerance abstract: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    thermique de lchantillon. Abstract. 2014 Investigating (001) and (011) oriented monocrystalline thin foils of Cu2O in a conven-tional electron microscope enabled us to...

  11. alloy particles abstract: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    thermique de lchantillon. Abstract. 2014 Investigating (001) and (011) oriented monocrystalline thin foils of Cu2O in a conven-tional electron microscope enabled us to...

  12. abstract air thermal: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    thermique de lchantillon. Abstract. 2014 Investigating (001) and (011) oriented monocrystalline thin foils of Cu2O in a conven-tional electron microscope enabled us to...

  13. abstracts fsta published: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    thermique de lchantillon. Abstract. 2014 Investigating (001) and (011) oriented monocrystalline thin foils of Cu2O in a conven-tional electron microscope enabled us to...

  14. Geothermal: Sponsored by OSTI -- Geothermal Energy: Current abstracts

    Office of Scientific and Technical Information (OSTI)

    Energy: Current abstracts Geothermal Technologies Legacy Collection HelpFAQ | Site Map | Contact Us | Admin Log On HomeBasic Search About Publications Advanced Search New Hot...

  15. Interactive Multiple Scale Small Multiples Andrew S. Forsberg

    E-Print Network [OSTI]

    Laidlaw, David

    -dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

  16. Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA. [Human Reliability Analysis (HRA)

    SciTech Connect (OSTI)

    Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

    1992-01-01T23:59:59.000Z

    This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

  17. Multiple resonant railgun power supply

    DOE Patents [OSTI]

    Honig, E.M.; Nunnally, W.C.

    1985-06-19T23:59:59.000Z

    A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

  18. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    -08004 Barcelona, Spain Sart-Tilman B28, B-4000 Li`ege, Belgium Abstract -- This paper presents (Spain) AIA - Consulting and Engineering (Spain) CESI - Consulting and Engineering (Italy) SEMA Group

  19. Modular Verification of Timed Circuits Using Automatic Abstraction

    E-Print Network [OSTI]

    Zheng, Hao

    Modular Verification of Timed Circuits Using Automatic Abstraction Hao Zheng, Eric Mercer, Member for verification of timed circuits using automatic abstraction. This approach partitions the design into modules by the RAPPID instruction length decoder designed at Intel [2]. This design was 3 times faster while using only

  20. Abstract Interpretation with Alien Expressions and Heap Structures

    E-Print Network [OSTI]

    Leino, K. Rustan M.

    Abstract Interpretation with Alien Expressions and Heap Structures Bor-Yuh Evan Chang0, and K constraint mentions other, alien, function or relation symbols, it is ignored (that is, it is very coarsely over-approximated) by the abstract domain. Rather than building in special treatment of such alien

  1. Abstract adiabatic charge pumping Institut Fourier, Universite de Grenoble 1

    E-Print Network [OSTI]

    Joye, Alain

    Abstract adiabatic charge pumping A. Joye, Institut Fourier, UniversitÂŽe de Grenoble 1 BP 74, 38402 This paper is devoted to the analysis of an abstract formula describing quantum adiabatic charge pumping with respect to , once integrated over some time interval, gives rise to a charge pumped through the system

  2. Ecological Research Division Theoretical Ecology Program. [Contains abstracts

    SciTech Connect (OSTI)

    Not Available

    1990-10-01T23:59:59.000Z

    This report presents the goals of the Theoretical Ecology Program and abstracts of research in progress. Abstracts cover both theoretical research that began as part of the terrestrial ecology core program and new projects funded by the theoretical program begun in 1988. Projects have been clustered into four major categories: Ecosystem dynamics; landscape/scaling dynamics; population dynamics; and experiment/sample design.

  3. New Blind Signatures Equivalent to Factorization (Extended Abstract)

    E-Print Network [OSTI]

    Pointcheval, David

    New Blind Signatures Equivalent to Factorization (Extended Abstract) David Pointcheval Jacques Stern Abstract In this paper, we present new blind signature schemes based on the factorization problem. They are the first blind sig- nature schemes proved secure relatively to factorization. By security, we mean

  4. Optimal Fractal Coding is NP-Hard1 (Extended Abstract)

    E-Print Network [OSTI]

    Reiterer, Harald

    Optimal Fractal Coding is NP-Hard1 (Extended Abstract) Matthias Ruhl, Hannes Hartenstein Institut f,hartenst@informatik.uni-freiburg.de Abstract In fractal compression a signal is encoded by the parameters of a contractive trans- formation whose fixed point (attractor) is an approximation of the original data. Thus fractal coding can

  5. Submitted Abstract on November 02, 11:49 PM

    E-Print Network [OSTI]

    Maruyama, Shigeo

    Simulation of Thermal Boundary Resistance between a Carbon Nanotube and Surrounding Materials. AUTHORS (ALL Nanotubes, Molecular Dynamics Simulation, Thermal Boundary Resistance. Abstract TITLE: Molecular Dynamics. ABSTRACT BODY: Several kind of thermal boundary resistance related to single-walled carbon nanotubes (SWNTs

  6. A Testing Strategy for Abstract Classes [Draft] Peter J. Clarke

    E-Print Network [OSTI]

    Power, James

    approach to testing abstract classes is to instantiate a concrete descendant class and test the features on concrete classes in these applications if changes are made to the abstract classes. Testing OO software via one of its concrete descendants and test the derived instance [2]. However, it is not clear

  7. Automated Requirements Testing with Abstract Oracles Bernhard K. Aichernig

    E-Print Network [OSTI]

    , a mapping between abstract and concrete test data is required. The presented framework focuses on the usage of formal requirements specifications as test ora­ cles for concrete implementations. The approach is based, then the model may serve as a test oracle and specification as well. In Fig­ A A op abstract C C op concrete r r

  8. Automated Black-Box Testing with Abstract VDM Oracles

    E-Print Network [OSTI]

    as test oracles for concrete software. The automation of the resulting testing frame-work is based of a target system. For that reason, a mapping between abstract and concrete test data is requiredAutomated Black-Box Testing with Abstract VDM Oracles Bernhard K. Aichernig Technical University

  9. Transformation of Meta-Information by Abstract Co-Interpretation

    E-Print Network [OSTI]

    Transformation of Meta-Information by Abstract Co-Interpretation Raimund Kirner and Peter Puschner based on abstract interpretation to transform meta-information in parallel with the transformation. The construction of a correct transformation function for the meta-information can be quite complicated in case

  10. Multiple reflection solar energy absorber

    SciTech Connect (OSTI)

    Cooley, W.L.

    1993-06-01T23:59:59.000Z

    A method of converting solar energy into heat energy thereby generating power is described comprising the steps: (a) focusing said solar energy by means of a primary concentrator, (b) concentrating said solar energy from said primary concentrator by means of a secondary concentrator located at the focal point of said primary concentrator, (c) slowing the flux of said solar energy from said secondary concentrator by means of a multiple reflection chamber attached to the rear aperture of the secondary concentrator, (d) circulating a working fluid by means of a working fluid delivery tube into said secondary concentrator and said multiple reflection chamber, (e) absorbing said solar energy into said working fluid by means of an ultra high concentration of said solar energy in said multiple reflection chamber, (f) insulating said working fluid by means of a surrounding thermal barrier, (g) exhausting the heat working fluid by means as of a nozzle joined to said multiple reflection chamber, (h) replacing said working fluid by means of a working fluid delivery tube, thereby completing a cycle for generating power.

  11. 6, 81258154, 2006 Multiple scattering

    E-Print Network [OSTI]

    Boyer, Edmond

    ACPD 6, 8125­8154, 2006 Multiple scattering effects for Cloudsat A. Battaglia et al. Title Page A. Battaglia1 , M. O. Ajewole2 , and C. Simmer3 1 Meteorological Institute, University of Bonn, Bonn: 28 August 2006 Correspondence to: A. Battaglia (batta@uni-bonn.de) 8125 #12;ACPD 6, 8125­8154, 2006

  12. Towards a Situated, Multimodal Interface for Multiple UAV Control Geraint Jones, Nadia Berthouze, Roman Bielski, Simon Julier

    E-Print Network [OSTI]

    Jones, Peter JS

    Towards a Situated, Multimodal Interface for Multiple UAV Control Geraint Jones, Nadia Berthouze, Roman Bielski, Simon Julier Abstract-- Multiple autonomous Unmanned Aerial Vehicles (UAVs) can be used perspective, Unmanned Aerial Ve- hicles (UAVs) can aid the activities of human teams in a number of situations

  13. Geophysical Research Abstracts Vol. 13, EGU2011-PREVIEW, 2011

    E-Print Network [OSTI]

    Belousov, Alexander

    collapsed and formed a powerful pyroclastic density current (PDC). This PDC completely devastated an area that the PDC was strongly channelized even by small (tens meters) topographic features; the front of the moving PDC was frequently split into multiple small tongues which were variously deflected by topography

  14. The proliferation of functions: multiple systems playing multiple roles in multiple super systems

    E-Print Network [OSTI]

    Crilly, Nathan

    2014-07-14T23:59:59.000Z

     played by any given system are represented by the  function analysis diagram (Aurisicchio, Bracewell, & Armstrong, 2013;  Devoino et al., 1997). Here, components of a system are connected to each  other through the effect that one has on the other. Components can affect  multiple...

  15. Apron: A Library of Numerical Abstract Domains for Static Analysis

    E-Print Network [OSTI]

    Miné, Antoine

    Polka convex polyhedra linear equalities PPL + Wrapper convex polyhedra linear congruences Abstraction toolbox- mensions in vector spaces. Nevertheless, the domains implemented in the PPL can be interfaced to Apron

  16. Studying Professional Software Designers and their Use of Abstraction

    E-Print Network [OSTI]

    Godfrey, Michael W.

    abstractions according domain (e.g., problem domain vs. user- interface domain vs. computer-science domain and support beams, and the configurations of rooms; electrical plans map out the electrical circuits

  17. Symposium on atomic spectroscopy (SAS-83): abstracts and program

    SciTech Connect (OSTI)

    Not Available

    1983-09-01T23:59:59.000Z

    Abstracts of papers given at the symposium are presented. Session topics include: Rydbergs, optical radiators, and planetary atoms; highly ionized atoms; ultraviolet radiation; theory, ion traps, and laser cooling; beam foil; and astronomy. (GHT)

  18. Earth Sciences Division annual report 1981. [Lead abstract

    SciTech Connect (OSTI)

    Not Available

    1982-09-01T23:59:59.000Z

    Separate abstracts were prepared for the 59 papers of the 1981 annual report of the Earth Sciences Division at Lawrence Berkeley Laboratory. The general topics covered included nuclear waste isolation, geophysics and reservoir engineering, and geosciences. (KRM)

  19. Abstract The rapidly emerging field of synthetic biology

    E-Print Network [OSTI]

    Reisslein, Martin

    Abstract The rapidly emerging field of synthetic biology originated, as synthetic biology has expanded into mammalian systems, it is increasingly more. Biomaterials will play an important role in advancing synthetic biology

  20. Exploring the Community Structure of Newsgroups [Extended Abstract

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Mohammad Mahdian Amin Saberi ABSTRACT We propose to use the community structure of Usenet for organizing Institute of Technology, At- lanta, GA. Email: saberi@cc.gatech.edu. This work was done while the last two

  1. FREE FILM SCREENING AND DISCUSSION Abstract from Jezebel Productions

    E-Print Network [OSTI]

    de Lijser, Peter

    FREE FILM SCREENING AND DISCUSSION Abstract from Jezebel Productions: "No Dinosaurs in Heaven charge: free and open to the public. THURSDAY OCTOBER 27, 2011 7:00 PM Mackey Auditorium Ruby Gerontology

  2. Abstract Interpretation for Worst and Average Case Analysis

    E-Print Network [OSTI]

    Di Pierro, Alessandra

    energy usage whilst bounding the average number of requests waiting to be served. PRISM is used phase extracts a control flow graph ­ for some classes of language this may already involve an abstract

  3. The Omniscient Garbage Collector: a Resource Analysis Framework (extended abstract)

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Omniscient Garbage Collector: a Resource Analysis Framework (extended abstract) Aurélien point of view, we develop the omniscient garbage collector (OGC), which decides precisely when the resource index requires an omniscient garbage collector, a NP-complete problem tightly connected

  4. Abstract Submitted for the DPP07 Meeting of

    E-Print Network [OSTI]

    Hudson, Stuart

    Abstract Submitted for the DPP07 Meeting of The American Physical Society Sorting Category: 5-interface periodic-cylinder configuration. In this work, we per- form a stability scan over pressure and for a two

  5. ,~ Abstract Submitted to 1997 Denver X-Ray Conference

    E-Print Network [OSTI]

    Brookhaven National Laboratory

    ,~ Abstract Submitted to 1997 Denver X-Ray Conference Denver, Colorado -August 4-8, 1997 BNL-.64346 being distributed through the entire volume of the particle needs further investigation. *Work supported

  6. Abstract Submitted for the DPP97 Meeting of

    E-Print Network [OSTI]

    Hammett, Greg

    Abstract Submitted for the DPP97 Meeting of The American Physical Society Sorting Category: 5 solve these problems. 1 This work supported by DoE Contract DE­AC02­76CH03073. Prefer Oral Session X

  7. The Bioelectromagnetic Society Thirteenth Annual Meeting 1991: Program and abstracts

    SciTech Connect (OSTI)

    Not Available

    1992-12-31T23:59:59.000Z

    This volume contains author abstracts representing oral and poster presentations made at the Thirteenth Annual Meeting of The Bioelectromagnetic Society held in Salt Lake City, Utah June 23--27, 1991.

  8. SERS internship Fall 1992--Spring 1993: Abstract and research papers

    SciTech Connect (OSTI)

    Not Available

    1993-08-05T23:59:59.000Z

    This report contains the abstracts and research papers by students on a variety of topics in engineering, genetics, solid state physics, thermonuclear energy, astrophysics, and other science related topics.

  9. Axioms for Recursion in CallbyValue (Extended Abstract)

    E-Print Network [OSTI]

    the distinction between values and effect­free programs is essential [16, 6]. So here is an amusing coincidence combined with the Continuation­Passing Style (CPS) translation can be understood within the abstract

  10. A Typed Calculus Supporting Shallow Embeddings of Abstract Machines

    E-Print Network [OSTI]

    Ariola, Zena M.

    . We believe that by doing so we shed light on some essential characteristics of abstract machines in a CPS interpreter. A defunctionalized continuation is actually just a data structure representing

  11. Pattern-based Abstraction for Verifying Secrecy in Protocols

    E-Print Network [OSTI]

    , an unbounded number of principals and an unbounded size of messages. As abstract domain we essentially use sets. Lowe using the CSP model-checker FDR in 1995 [23]; #3; This work has been partially supported

  12. Abstract Data Types and UML Models* Heinrich Hussmann1

    E-Print Network [OSTI]

    Reggio, Gianna

    , Francoise Tort3 1 Department of Computer Science, Dresden University of Technology, Germany 2 DISI in order to find out to which extent it follows clean data abstraction principles. In this sense

  13. Goldschmidt Conference Abstracts Mineralogical Magazine www.minersoc.org

    E-Print Network [OSTI]

    Sparks, Donald L.

    Goldschmidt Conference Abstracts Mineralogical Magazine www.minersoc.org 1279 Role of Fe- and Mn by mineral surface area, mineralogy, pH, redox, polyvalent cations, ionic strength, and the chemical

  14. Small Business Innovation Research. Abstracts of Phase I awards, 1999

    SciTech Connect (OSTI)

    None

    1999-12-01T23:59:59.000Z

    This booklet presents technical abstracts of Phase I awards made in Fiscal Year (FY) 1999 under the DOE Small Business Innovation Research (SBIR) program. SBIR research explores innovative concepts in important technological and scientific areas that can lead to valuable new technology and products. The work described in the abstracts is novel, high-risk research, but the benefits will also be potentially high if the objectives are met. Brief comments on the potential applications, as described by the awardee, are given after each abstract. Individuals and organizations, including venture capital and larger industrial firms, with an interest in the research described in any of the abstracts are encouraged to contact the appropriate small business directly.

  15. Abstracts and research accomplishments of university coal research projects

    SciTech Connect (OSTI)

    Not Available

    1991-06-01T23:59:59.000Z

    The Principal Investigators of the grants supported by the University Coal Research Program were requested to submit abstracts and highlight accomplishments of their projects in time for distribution at a grantees conference. This book is a compilation of the material received in response to the request. Abstracts discuss the following area: coal science, coal surface science, reaction chemistry, advanced process concepts, engineering fundamentals and thermodynamics, environmental science.

  16. Vulnerability of the Superficial Zone of Immature Articular Cartilage to Compressive Injury

    SciTech Connect (OSTI)

    Rolauffs, R.; Muehleman, C; Li, J; Kurz, B; Kuettner, K; Frank, E; Grodzinsky, A

    2010-01-01T23:59:59.000Z

    The zonal composition and functioning of adult articular cartilage causes depth-dependent responses to compressive injury. In immature cartilage, shear and compressive moduli as well as collagen and sulfated glycosaminoglycan (sGAG) content also vary with depth. However, there is little understanding of the depth-dependent damage caused by injury. Since injury to immature knee joints most often causes articular cartilage lesions, this study was undertaken to characterize the zonal dependence of biomechanical, biochemical, and matrix-associated changes caused by compressive injury. Disks from the superficial and deeper zones of bovine calves were biomechanically characterized. Injury to the disks was achieved by applying a final strain of 50% compression at 100%/second, followed by biomechanical recharacterization. Tissue compaction upon injury as well as sGAG density, sGAG loss, and biosynthesis were measured. Collagen fiber orientation and matrix damage were assessed using histology, diffraction-enhanced x-ray imaging, and texture analysis. Injured superficial zone disks showed surface disruption, tissue compaction by 20.3 {+-} 4.3% (mean {+-} SEM), and immediate biomechanical impairment that was revealed by a mean {+-} SEM decrease in dynamic stiffness to 7.1 {+-} 3.3% of the value before injury and equilibrium moduli that were below the level of detection. Tissue areas that appeared intact on histology showed clear textural alterations. Injured deeper zone disks showed collagen crimping but remained undamaged and biomechanically intact. Superficial zone disks did not lose sGAG immediately after injury, but lost 17.8 {+-} 1.4% of sGAG after 48 hours; deeper zone disks lost only 2.8 {+-} 0.3% of sGAG content. Biomechanical impairment was associated primarily with structural damage. The soft superficial zone of immature cartilage is vulnerable to compressive injury, causing superficial matrix disruption, extensive compaction, and textural alteration, which results in immediate loss of biomechanical function. In conjunction with delayed superficial sGAG loss, these changes may predispose the articular surface to further softening and tissue damage, thus increasing the risk of development of secondary osteoarthritis.

  17. CHARGED PARTICLE MULTIPLICITIES AT BRAHMS.

    SciTech Connect (OSTI)

    DEBBE, R., FOR THE BRAHMS COLLABORATION

    2001-07-30T23:59:59.000Z

    This report presents the measurement of charged particle multiplicity densities dN/d{eta} in ultrarelativistic heavy ion collisions as function of {eta} and the centrality of the collisions. This distributions were extracted from data collected by the BRAHMS collaboration during the first RHK run with gold ions at {radical}s{sub NN} = 130A {center_dot} GeV. The analysis method is described and, results are compared to some model predictions.

  18. FORESTRY 347 MULTIPLE RESOURCE SILVICULTURE

    E-Print Network [OSTI]

    Vonessen, Nikolaus

    FORESTRY 347 MULTIPLE RESOURCE SILVICULTURE Autumn 2008 Instructor: John Goodburn Office: Rm. 409 Science Complex Telephone: 243-4295 Email: goodburn@forestry.umt.edu Office hours: Mon. 3:00 - 5:00 pm.m. Rm. 301 Forestry Bldg. Lab/Field Work Wed or Thur. 2:10 - 6:00 p.m. In Field or Rm. 106 (W) & 206(H

  19. Supporting Multiple Workloads, Batch Systems,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystalline Gallium OxideSuminDepositionSupplierSupporting Multiple

  20. Spatial Interference Mitigation for Multiple Input Multiple Output Ad Hoc Networks: MISO Gains

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Spatial Interference Mitigation for Multiple Input Multiple Output Ad Hoc Networks: MISO Gains beamforming for a multiple input single output (MISO) ad hoc network to increase the density of successful