Powered by Deep Web Technologies
Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

E-Print Network 3.0 - access technologies key Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

electronic identifier (IdentiKey) including access and password requirements, account lockout... that are accessed using a university electronic identifier or IdentiKey. The...

2

Accessibility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGate Access Access

3

Features  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home It isGasERPSpun Off FromFeatures

4

Web Accessibility Accessibility  

E-Print Network [OSTI]

Web Accessibility #12;Accessibility Webaim This is a pre-y prolific site that vary based on the type of web content. StaFc, content managed and dynamic web sites can benefit from our accessibility review service. Rich media

Oklahoma, University of

5

Key Features: -Handheld portability, compact rugged design  

E-Print Network [OSTI]

-touch recording - User configurable, high contrast OLED display - Solid state SD and SDHC card recording media Solid State Recorder Usable media SD/SDHC cards Recording format MP3 MPEG1 LayerIII Compression WAV 16 level 150 mW/8 ohms General Power consumption Recording/Playback 1.5 W (DC) Battery life (Alkaline) 5

6

Key features of INTOR nuclear systems  

SciTech Connect (OSTI)

The conceptual design effort for INTOR was broadly defined in three areas: (1) Plasma Physics, (2) Engineering, and (3) Nuclear Systems. This paper is devoted to a summary of the Nuclear Systems effort. The emphasis is placed on the First Wall, Breeding Blanket, and Divertor.

Abdou, M.A.

1981-05-01T23:59:59.000Z

7

Extracting secret keys from integrated circuits  

E-Print Network [OSTI]

Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

Lim, Daihyun, 1976-

2004-01-01T23:59:59.000Z

8

Public Key Cryptography and Key Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

2013-06-11T23:59:59.000Z

9

Vehicle barrier with access delay  

DOE Patents [OSTI]

An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

Swahlan, David J; Wilke, Jason

2013-09-03T23:59:59.000Z

10

LANL breaks ground on key sediment control project  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sediment control project LANL breaks ground on key sediment control project Called "grade-control" structures, the approximately 2 million features are up to eight feet high and...

11

Public Key Cryptography and Key Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

2000-02-15T23:59:59.000Z

12

Key Milestones/Outlook  

Broader source: Energy.gov [DOE]

Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

13

accessible surface area: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

14

access program eap: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

15

accessible surface areas: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

16

access programs evidence: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

17

From the Editor Knife Features of Key Gamma  

E-Print Network [OSTI]

1 of 42http://www.independent-bangladesh.com/news/oct/18/18102004ft.htm#A17 press her to seek of the innovative remedies and resources within the country and in the advanced nations. | | |Top of this page Back

West, Stuart

18

CHAPTER FIVE Impacts of Anthropogenic Features on  

E-Print Network [OSTI]

clustering these features to maximize available habitats. Key Words: avoidance behavior, energy develop- ment Prairie-Chicken avoidance behavior of anthropogenic features be quantified for impact assessment and con of monthly home ranges (95% fixed kernels, n 539) and estimated the likelihood that anthropogenic features (i

Sandercock, Brett K.

19

Access Control and Key Management for Mobile Volker Roth 1  

E-Print Network [OSTI]

Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany Abstract Security, computer code known as agents represent the next great wave of innovation and development across

Roth, Volker

20

Key Management with Policy-based Access Control Christian Cachin  

E-Print Network [OSTI]

at IBM Research - Zurich in collaboration with ETH Zurich. 1 #12; of the authorization mechanism and its integration with KMIP. IBM Research - Zurich, CH-8803 R¨uschlikon, Switzerland. {cca,gka}@zurich.ibm.com Adnovum Informatik AG, CH-8005 Zurich. divay.bansal@adnovum.ch. Work done

Cachin, Christian

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

ARM - Features  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation InExplosionAnnouncements Media ContactCenterFeature Stories

22

Quantum dense key distribution  

SciTech Connect (OSTI)

This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

2004-03-01T23:59:59.000Z

23

Key Events Timeline  

Broader source: Energy.gov [DOE]

This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

24

Accessibility | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility

25

Accessing PDSF  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGateAccessing PDSF

26

Open Access  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratorySpeeding access1 TechnicalOilOnline Application Process

27

OPEN ACCESS  

E-Print Network [OSTI]

Abstract: Providing access to and utilization of medication assisted treatment (MAT) for the treatment of opioid abuse and dependence provides an important opportunity to improve public health. Access to health services comprising MAT in the community is fundamental to achieve broad service coverage. The type and placement of the health services comprising MAT and integration with primary medical care including human immunodeficiency virus (HIV) prevention, care and treatment services are optimal for addressing both substance abuse and co-occurring infectious diseases. As an HIV prevention intervention, integrated (same medical record for HIV services and MAT services) MAT with HIV prevention, care and treatment programs provides the best “one stop shopping ” approach for health service utilization. Alternatively, MAT, medical and HIV services can be separately managed but co-located to allow convenient utilization of primary care, MAT and HIV services. A third approach is coordinated care and treatment, where primary care, MAT and HIV services are provided at distinct locations and case managers, peer facilitators, or others promote direct service utilization at the various locations. Developing a continuum of care for patients with opioid dependence throughout

Thomas F. Kresina; Robert Lubran

28

Electricity and Development: Global Trends and Key Challenges  

E-Print Network [OSTI]

Electricity and Development: Global Trends and Key Challenges Romeo Pacudan, PhD Risoe National · Prospects for electricity development · Investment requirements · Key challenges · Final remarks #12 and the transport burden in Tanzania. Source: Modi, 2004 #12;2. Energy and Human Development Access to electricity

29

Optical key system  

DOE Patents [OSTI]

An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

2000-01-01T23:59:59.000Z

30

A Smart Energy System with Distributed Access Control  

E-Print Network [OSTI]

systems to date support remote control and automation but not access control, making them applicable to HVAC (heating, ventilation, and air conditioning) systems. SE has the potential of significantly access from a remote site over the Internet, in which case access control in the form of a shared key

Shinozuka, Masanobu

31

Key Workplace Documents Federal Publications  

E-Print Network [OSTI]

to protect IPR and afford market access for IPR- related products, discriminatory regulations on imported

32

New Features of the Edison XC30 - Differences from Hopper  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Features of the Edison XC30 New Features of the Edison XC30 While the Edison and Hopper systems have similar programming environments and software, there are some key...

33

Cryptographic Key Management System  

SciTech Connect (OSTI)

This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

No, author

2014-02-21T23:59:59.000Z

34

Capital Access Program (Vermont)  

Broader source: Energy.gov [DOE]

The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

35

ARM - Key Science Questions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUC : XDCResearch Related Information Collaborations Meetings ofgovScienceKey

36

BUILDING MANAGEMENT & RESTRICTED ACCESS  

E-Print Network [OSTI]

BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

Johnston, Daniel

37

NETL: Key Staff  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey Actions forEnergy Systems

38

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

39

Key-shift transmission  

SciTech Connect (OSTI)

A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

Nemoto, S.

1989-03-07T23:59:59.000Z

40

Fulfilling the promise of the personal computer : the development of accessible computer technologies, 1970-1998  

E-Print Network [OSTI]

when discussing personal computer devices and features. 1.2with accessible personal computer technology, devices andavailable personal computers and adaptive devices that work

Petrick, Elizabeth

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Dynamic Resource Provisioning for Energy Efficiency in Wireless Access Networks  

E-Print Network [OSTI]

of controlling how much of the network infrastructure is actually needed and which parts can be temporarily. Considering that most of the energy in wireless access networks is consumed in the radio part, a dynamic the two most common wireless access technologies, namely cellular and WLAN. Main features of the proposed

Wichmann, Felix

42

features Utility Generator  

E-Print Network [OSTI]

#12;#12;#12;#12;features function utility Training Pool Utility Generator Per-frame function content utility classes utility classes utility Tree Decision Generator Module Utility Clustering Adaptive Content Classification Loop features content VO selection & Utility Selector content features Real

Chang, Shih-Fu

43

Grid Data Access on Widely Distributed Worker Nodes Using Scalla and SRM  

SciTech Connect (OSTI)

Facing the reality of storage economics, NP experiments such as RHIC/STAR have been engaged in a shift of the analysis model, and now heavily rely on using cheap disks attached to processing nodes, as such a model is extremely beneficial over expensive centralized storage. Additionally, exploiting storage aggregates with enhanced distributed computing capabilities such as dynamic space allocation (lifetime of spaces), file management on shared storages (lifetime of files, pinning file), storage policies or a uniform access to heterogeneous storage solutions is not an easy task. The Xrootd/Scalla system allows for storage aggregation. We will present an overview of the largest deployment of Scalla (Structured Cluster Architecture for Low Latency Access) in the world spanning over 1000 CPUs co-sharing the 350 TB Storage Elements and the experience on how to make such a model work in the RHIC/STAR standard analysis framework. We will explain the key features and approach on how to make access to mass storage (HPSS) possible in such a large deployment context. Furthermore, we will give an overview of a fully 'gridified' solution using the plug-and-play features of Scalla architecture, replacing standard storage access with grid middleware SRM (Storage Resource Manager) components designed for space management and will compare the solution with the standard Scalla approach in use in STAR for the past 2 years. Integration details, future plans and status of development will be explained in the area of best transfer strategy between multiple-choice data pools and best placement with respect of load balancing and interoperability with other SRM aware tools or implementations.

Jakl, Pavel; /Prague, Inst. Phys.; Lauret, Jerome; /Brookhaven; Hanushevsky, Andrew; /SLAC; Shoshani, Arie; /LBL, Berkeley; Sim, Alex; /LBL, Berkeley; Gu, Junmin; /LBL, Berkeley

2011-11-10T23:59:59.000Z

44

Imnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates  

E-Print Network [OSTI]

, such as roads, buildings, and pollution. Including these fine-scale attributes of an animal's environment whenImnaha Subbasin Assessment May 2004259 1.2.10.3 Key Environmental Correlates Key environmental conditions. Key environmental correlates are the finest scale features that help to define wildlife habitat

45

Demystifying Open Access  

SciTech Connect (OSTI)

The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

Mele, Salvatore

2007-05-14T23:59:59.000Z

46

Quantum key distribution with key extracted from basis information  

E-Print Network [OSTI]

In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

Xiongfeng Ma

2014-10-20T23:59:59.000Z

47

Tomography increases key rates of quantum-key-distribution protocols  

E-Print Network [OSTI]

We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

2008-07-22T23:59:59.000Z

48

Internet architecture Access networks  

E-Print Network [OSTI]

access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

49

ATLAS Data Access Policy  

E-Print Network [OSTI]

ATLAS has fully supported the principle of open access in its publication policy. This document outlines the policy of ATLAS as regards open access to data at different levels as described in the DPHEP model. The main objective is to make the data available in a usable way to people external to the ATLAS collaboration.

The ATLAS collaboration

2015-01-01T23:59:59.000Z

50

The LOFAR Transients Key Project  

E-Print Network [OSTI]

LOFAR, the Low Frequency Array, is a new radio telescope under construction in the Netherlands, designed to operate between 30 and 240 MHz. The Transients Key Project is one of the four Key Science Projects which comprise the core LOFAR science case. The remit of the Transients Key Project is to study variable and transient radio sources detected by LOFAR, on timescales from milliseconds to years. This will be achieved via both regular snapshot monitoring of historical and newly-discovered radio variables and, most radically, the development of a `Radio Sky Monitor' which will survey a large fraction of the northern sky on a daily basis.

Rob Fender; Robert Braun; Ben Stappers; Ralph Wijers; Michael Wise; Thijs Coenen; Heino Falcke; Jean-Mathias Griessmeier; Michiel van Haarlem; Peter Jonker; Casey Law; Sera Markoff; Joseph Masters; James Miller-Jones; Rachel Osten; Bart Scheers; Hanno Spreeuw; John Swinbank; Corina Vogt; Rudy Wijnands; Philippe Zarka

2006-11-09T23:59:59.000Z

51

Translating Orc Features into Petri nets and the Join Calculus #  

E-Print Network [OSTI]

Translating Orc Features into Petri nets and the Join Calculus # Roberto Bruni 1 , Hern@di.unipi.it, hernan.melgratti@imtlucca.it, et52@mcs.le.ac.uk Abstract. Cook and Misra's Orc is an elegant language the key novel features of Orc by comparing it with variations of Petri nets. The comparison shows that Orc

Bruni, Roberto

52

Translating Orc Features into Petri nets and the Join Calculus  

E-Print Network [OSTI]

Translating Orc Features into Petri nets and the Join Calculus Roberto Bruni1, Hern´an Melgratti2@di.unipi.it, hernan.melgratti@imtlucca.it, et52@mcs.le.ac.uk Abstract. Cook and Misra's Orc is an elegant language the key novel features of Orc by comparing it with variations of Petri nets. The comparison shows that Orc

Bruni, Roberto

53

Capital Access Program (CAP) (Michigan)  

Broader source: Energy.gov [DOE]

The Capital Access Program (CAP), utilizes public resources to generate private financing for small business in Michigan seeking access to capital. Funding from the Michigan Strategic Fund is...

54

Virginia Capital Access Program (Virginia)  

Broader source: Energy.gov [DOE]

The Virginia Capital Access Program (CAP), in partnership with Virginia’s Small Business Financing Authority, provides access to capital for small businesses. Businesses must apply to...

55

Utility Access Questionnaire | Utility Access Questionnaire  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: Salt Lake City, Utah Zip: 84111Jump to:Access Questionnaire

56

Key Issues | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key Issues

57

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKey

58

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout the

59

DVU Featured Training & Events ...  

Broader source: Energy.gov (indexed) [DOE]

Featured Training & Events Form Please complete this form in its entirety and email to AskTheDvu@hq.doe.gov 1. Course Title: 2. Course StartEnd Date: 3. StartEnd Time (Time zone...

60

1.07 -Secure Data Center Access Policy Page | 1 1.07 -Secure Data Center Access Policy D-2012-12-18 QS LF RG MH QS  

E-Print Network [OSTI]

be used to contain or process information subject to export control laws. Reason for Policy / Implication involved. Covered Parties IS&T data centers, systems, and services that may be used to store or process Security. Procedures I. Physical Access Physical access (key or badge) to systems in the IS&T data center

Guenther, Frank

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Lower Keys: 305-797-4929 Upper Keys: 305-852-7161 Contact local tree services throughout the Keys

Jawitz, James W.

62

Access to the ALS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGate Access Access to

63

Access to the ALS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access yourAccess

64

Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices  

SciTech Connect (OSTI)

In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Aldridge, Hal [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC] [Sypris Electronics, LLC; Bertino, Elisa [ORNL] [ORNL; Kulatunga, Athula [Purdue University] [Purdue University; Navaratne, Uditha Sudheera [Purdue University] [Purdue University

2011-01-01T23:59:59.000Z

65

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software  

E-Print Network [OSTI]

Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

Dodis, Yevgeniy

66

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Brain Receptor Structures Key to Future Therapeutics Print Wednesday, 28 January 2015 00:00 With an aging population in...

67

FEATURE ARTICLE Pipeline Corrosion  

E-Print Network [OSTI]

F FEATURE ARTICLE Pipeline Corrosion Issues Related to Carbon Capture, Transportation, and Storage Capture, Transportation, and Storage--Aspects of Corrosion and Materials. "Until these new technologies are developed and applied, corrosion engineers are focusing on how to best design pipelines for CO2 transport

Botte, Gerardine G.

68

Visual Navigation Visual Features  

E-Print Network [OSTI]

: § translation § rotation § scale, and § illumination 6 #12;2 Many detectors and descriptors § Detectors § Harris directions. § Such points can be detected by examining the structure tensor (2x2 matrix of local intensity: Scale-Invariant Feature Transform § SIFT Keypoints ­ local intensity extrema (minima or maxima) in both

Zhang, Hong

69

Transmission Pricing and Congestion Management: Efficiency, Simplicity and Open Access  

E-Print Network [OSTI]

Transmission Pricing and Congestion Management: Efficiency, Simplicity and Open Access Shmuel S-1403 Email OREN@IEOR.Berkeley.edu Abstract Transmission pricing and congestion management are the key the objectives of a transmission pricing and congestion management scheme. I contrast two extreme approaches

Oren, Shmuel S.

70

1. How To Get Access Complete Your Company Profile  

E-Print Network [OSTI]

1. How To Get Access Complete Your Company Profile Go to www.niu.edu/careerservices In the center you notify us otherwise. 3. Search Resume Books Log into your eRecruiting account Select Resume majors. You can choose to search resumes by using the Resume Key Words search or break down your search

Kostic, Milivoje M.

71

NANO REVIEW Open Access Thermal conductivity and thermal boundary  

E-Print Network [OSTI]

NANO REVIEW Open Access Thermal conductivity and thermal boundary resistance of nanostructures and the thermal transport prop- erties is a key point to design materials with preferred thermal properties with the heat dissipation on them. The influence of the interfacial roughness on the thermal conductivity

Boyer, Edmond

72

RESEARCH ARTICLE Open Access Survival advantages conferred to colon cancer  

E-Print Network [OSTI]

RESEARCH ARTICLE Open Access Survival advantages conferred to colon cancer cells by E Klinck5 , François A Auger4 and Jacques Huot1* Abstract Background: Extravasation of circulating cancer cells is a key event of metastatic dissemination that is initiated by the adhesion of cancer cells

Paris-Sud XI, Université de

73

Key Activities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJared Temanson - Project LeaderDepartment's DirectivesKey

74

Key Activities | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key

75

ZooKeys, unlocking Earth’s incredible biodiversity and building a sustainable bridge into the public domain: From “print-based” to “web-based” taxonomy, systematics, and natural history. ZooKeys Editorial Opening Paper  

E-Print Network [OSTI]

and print journal in zoological taxonomy and systematics, which aims to quickly respond and adapt to the newest developments in taxonomic publishing. Open Access is accepted as mandatory for ZooKeys. Th e rationale for and concept of ZooKeys is discussed...

Penev, Lyubomir; Erwin, Terry; Thompson, F. Christian; Sues, Hans-Dieter; Engel, Michael S.; Agosti, Donat; Pyle, Richard; Ivie, Michael; Assmann, Thorsten; Henry, Thomas; Miller, Jeremy; Ananjeva, Natalia; Casale, Achille; Lourenco, Wilson; Golovatch, Sergei; Fagerholm, Hans-Peter; Taiti, Stefano; Alonso-Zarazaga, Miguel; Nieukerken, Erik van

2008-07-04T23:59:59.000Z

76

Accessibility | Jefferson Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access

77

Public/private key certification authority and key distribution. Draft  

SciTech Connect (OSTI)

Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

1995-09-25T23:59:59.000Z

78

Fundamental study of structural features affecting enzymatic hydrolysis of lignocellulosic biomass  

E-Print Network [OSTI]

Lignocellulose is a promising and valuable alternative energy source. Native lignocellulosic biomass has limited accessibility to cellulase enzyme due to structural features; therefore, pretreatment is an essential prerequisite to make biomass...

Zhu, Li

2006-10-30T23:59:59.000Z

79

Computer Networks 00 (2012) 120 Spectrum Access Policy Reasoning for Policy-Based Cognitive Radios  

E-Print Network [OSTI]

}@vt.edu Abstract Cognitive radio (CR) is one of the key enabling technologies for opportunistic spectrum sharing. In such a spec- trum sharing paradigm, radios access spectrum opportunistically by identifying the under. Keywords: Spectrum access policy, cognitive radio, policy reasoner, binary decision diagram, policy algebra

80

Accessibility-based transit planning  

E-Print Network [OSTI]

A method for evaluating transit planning proposals using accessibility metrics is advanced in this research. A transit-accessibility model is developed intended for use by in-house transit agency planning staff as a ...

Busby, Jeffrey R

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

COLLEGE AVE CAMPUS (CAC) KEY PICK UP  

E-Print Network [OSTI]

COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

82

Open Access Week Planning Materials  

E-Print Network [OSTI]

TAMUemployees list TAMUemployees list KAMU-TV Magazine TAMU Landing-page for Open Access Week library.tamu.edu/oaweek Open Access Week (organized by SPARC) www.openaccessweek.org Digital Repository Disseminate your work... via the Texas A&M University Digital Repository and get ? ?more exposure universal access easier information discovery persistent access wide range of content? SPARC http://www.arl.org/sparc...

83

ACCESS Coin F. Guevara Vasquez and C. Hohenegger  

E-Print Network [OSTI]

ACCESS Coin F. Guevara Vasquez and C. Hohenegger July 3, 2014 1 Bitcoin Bitcoin was created exactly how this is done!). All the details are in the original paper: https://bitcoin.org/bitcoin.pdf. The security features built in to Bitcoin, make the system extremely time consuming to game, and people

Guevara-Vasquez, Fernando

84

Characterizing pervasive vehicular access to the cellular RAN infrastructure: an urban case study  

E-Print Network [OSTI]

features of pervasive vehicular access in a case- study large-scale urban environment, in presence] and distant support for safety, diagnostic and anti-theft services (e.g., BMW Assist, Ford SYNC, General Motor

Fiore, Marco

85

Role-Based Access Controls  

E-Print Network [OSTI]

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC.

Ferraiolo, David F

2009-01-01T23:59:59.000Z

86

Feature Stories | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature Stories News

87

XPort Data Sheet 910-815 Copyright 2003, Lantronix. All rights reserved. Key Features  

E-Print Network [OSTI]

MHz, 10/100M Ethernet) · Network overhead handled by XPort · Password protection · Upgrade XPort device with a serial interface. By simply adding XPortTM to a product design, device manufacturers can highly integrated hardware and software platform, you will add profit to your bottom line

Berns, Hans-Gerd

88

Access for All  

E-Print Network [OSTI]

?s Algebra 1 final grades to examine correlation with the students? grade in Algebra. Each scatter plot contained a solid linear regression line and a dashed line, y = x. The data points with a square shape represent the scores of students who were Waived... classes in a central Texas school district to determine if there is fair and equitable access for all students. The paper contains two major components. The first is quantitative study of the four entrance requirements for 8th grade Algebra I Pre-AP at a...

Stearns, Linda Lea Merenda

2012-07-16T23:59:59.000Z

89

Accessibility - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility About Us

90

Accessibility | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility Home | SHARE

91

Access to Capital  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access your

92

Answering Key Fuel Cycle Questions  

SciTech Connect (OSTI)

The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

2003-10-01T23:59:59.000Z

93

International Directory of Company Histories Immediate access to more than 11,000 companies Benefits of Gale Virtual Reference Library  

E-Print Network [OSTI]

explore thousands of popular and awardwinning reference eBooks from Gale and Gale’s partner publishers • Features 24/7 remote access — from your library, the classroom, home or anywhere with an Internet connection • Adapts your reference collection to meet the changing needs of your patrons More than 11,000 companies are covered across the entire collection. As part of the Gale Virtual Reference Library eBook platform, International Directory of Company Histories is available to learners and patrons around the clock, from any Internet-accessible device. Students, job candidates, business executives and investors will find accurate, detailed information on more than 11,000 influential and emerging companies worldwide: • Comprehensive background and history of a company • Merger and acquisition activity over time • The impact of particular sales and marketing campaigns • The effectiveness of executive leadership • And much more • Allows for unlimited simultaneous use • Makes access easy — no special reader or hardware is required • Features full cross-search ability with Gale’s periodical databases and Knowledge Portals Unbiased, comprehensive entries are created by professional independent writers. 1-800-877-GALE www.gale.com Online for more convenience International Directory of Company Histories – a classic resource for academic, public and corporate libraries – adds eBook ease to its in-depth content. Find the fact-filled entries of Vols. 1-58 in one convenient online package. Then enhance your collection with Vols. 59 and beyond, available individually or as part of a money-saving Standing Order. Together, these volumes make up a complete collection of comprehensive business information that meets a wide range of research needs – all while saving shelf space and encouraging unlimited simultaneous usage. Go deep into the details Each four- to six-page entry is meticulously crafted with facts compiled from reliable sources, including academic periodicals, books, magazines, annual reports and archives of the companies themselves. Peppered with statistics, dates and names of key players, entries accurately cover:

Empowers Users To

94

SciFeatureSciFeature SEA-MONKEYS AND ALIENS?  

E-Print Network [OSTI]

SciFeatureSciFeature MSU SEA-MONKEYS® AND ALIENS? What is the connection between Sea-Monkeys® and aliens? Believe it or not NASA scientists think it is possible that some alien life might resemble Sea

95

Lightweight Key Establishment for Distributed Networking Environments  

E-Print Network [OSTI]

/ COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

Martin, Keith

96

Alaska Feature Articles and Blogs | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess to OUO Access to OUOAlaska Feature Articles and Blogs Alaska

97

Stroke Fragmentation based on Geometry Features and Hidden Markov Model  

E-Print Network [OSTI]

1 Stroke Fragmentation based on Geometry Features and Hidden Markov Model Guihuan Feng, Christian Viard-Gaudin, Technical Report, IRCCyN Nantes/IVC ABSTRACT Stroke fragmentation is one of the key steps in pen-based interaction. In this letter, we present a unified HMM-based stroke fragmentation technique

Paris-Sud XI, Université de

98

Smart Grid Voltage Sag Detection using Instantaneous Features Extraction  

E-Print Network [OSTI]

Smart Grid Voltage Sag Detection using Instantaneous Features Extraction Yassine Amirat, Mohamed Benbouzid, Tianzhen Wang and Sylvie Turri Abstract--Smart grids have initiated a radical reappraisal, and effective use of the network are indexed as the most important keys for smart grid expansion and deployment

Boyer, Edmond

99

Pennsylvania Capital Access Program (Pennsylvania)  

Broader source: Energy.gov [DOE]

The Pennsylvania Capital Access Program provides loan guarantees for all businesses for the purchase of land, buildings, machinery, equipment and working capital through participating banks. The...

100

Remote direct memory access  

DOE Patents [OSTI]

Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

Archer, Charles J.; Blocksome, Michael A.

2012-12-11T23:59:59.000Z

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Mobile Information Access M. Satyanarayanan  

E-Print Network [OSTI]

Carnegie Mellon University Pittsburgh, PA 15213 To appear in IEEE Personal Communications, Volume 3, No. 1, February 1996 Abstract The ability to access information on demand when mobile will be a criticalMobile Information Access M. Satyanarayanan January 1996 CMU­CS­96­107 School of Computer Science

102

A Survey on Dynamic Spectrum Access Techniques for Cognitive Radio  

E-Print Network [OSTI]

Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating parameters. The technique of dynamically accessing the unused spectrum band is known as Dynamic Spectrum Access (DSA). The dynamic spectrum access technology helps to minimize unused spectrum bands. In this paper, main functions of Cognitive Radio (CR) i.e. spectrum sensing, spectrum management, spectrum mobility and spectrum sharing are discussed. Then DSA models are discussed along with different methods of DSA such as Command and Control, Exclusive-Use, Shared Use of Primary Licensed User and Commons method. Game-theoretic approach using Bertrand game model, Markovian Queuing Model for spectrum allocation in centralized architecture and Fuzzy logic based method are also discussed and result are shown.

Garhwal, Anita

2012-01-01T23:59:59.000Z

103

Brain Receptor Structures Key to Future Therapeutics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

104

Improving Access to Foundational Energy Performance Data  

SciTech Connect (OSTI)

Access to foundational energy performance data is key to improving the efficiency of the built environment. However, stakeholders often lack access to what they perceive as credible energy performance data. Therefore, even if a stakeholder determines that a product would increase efficiency, they often have difficulty convincing their management to move forward. Even when credible data do exist, such data are not always sufficient to support detailed energy performance analyses, or the development of robust business cases. One reason for this is that the data parameters that are provided are generally based on the respective industry norms. Thus, for mature industries with extensive testing standards, the data made available are often quite detailed. But for emerging technologies, or for industries with less well-developed testing standards, available data are generally insufficient to support robust analysis. However, even for mature technologies, there is no guarantee that the data being supplied are the same data needed to accurately evaluate a product?s energy performance. To address these challenges, the U.S. Department of Energy funded development of a free, publically accessible Web-based portal, the Technology Performance Exchange(TM), to facilitate the transparent identification, storage, and sharing of foundational energy performance data. The Technology Performance Exchange identifies the intrinsic, technology-specific parameters necessary for a user to perform a credible energy analysis and includes a robust database to store these data. End users can leverage stored data to evaluate the site-specific performance of various technologies, support financial analyses with greater confidence, and make better informed procurement decisions.

Studer, D.; Livingood, W.; Torcellini, P.

2014-08-01T23:59:59.000Z

105

Your Mission: To become familiar with the major plate boundaries through exploration of plate tectonic features using Google Earth.  

E-Print Network [OSTI]

boundaries through exploration of plate tectonic features using Google Earth. Your Supplies: (1) A computer with internet access and the Google Earth program of Earth's tectonic plates using Google Earth. To do this, login

Smith-Konter, Bridget

106

Monroe County Extension Services Key West Office  

E-Print Network [OSTI]

-292-4501 http://monroe.ifas.ufl.edu Key Largo Office: 102050 Overseas Highway, Room 244 City and County Tree Energy Services: 305-295-1010 Florida Keys Electric Co-op: 305-852-2431 Monroe County Roads & Bridges conditions based on USDA zone, water and light requirements, soil conditions, salt and wind tolerance

Florida, University of

107

Florida Capital Access Program (Florida)  

Broader source: Energy.gov [DOE]

The Florida Capital Access Program, run by the Florida Department of Economic Development, is a loan portfolio insurance program enabling lenders to make loans to credit-worthy small businesses. ...

108

access: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

109

accessibility: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

110

A Security Architecture for Data Aggregation and Access Control in Smart Grids  

E-Print Network [OSTI]

We propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. We use homomorphic encryption technique to achieve this. The consumer data that is collected is sent to the substations where it is monitored by remote terminal units (RTU). The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. Users can be maintenance units, utility centers, pricing estimator units or analyzing and prediction groups. We solve this problem of access control using cryptographic technique of attribute-based encryption. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The ac...

Ruj, Sushmita; Stojmenovic, Ivan

2011-01-01T23:59:59.000Z

111

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System  

Broader source: Energy.gov [DOE]

A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

112

Captured key electrical safety lockout system  

DOE Patents [OSTI]

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

Darimont, D.E.

1995-10-31T23:59:59.000Z

113

Captured key electrical safety lockout system  

SciTech Connect (OSTI)

A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

Darimont, Daniel E. (Aurora, IL)

1995-01-01T23:59:59.000Z

114

Experimental study of high speed polarization-coding quantum key distribution with sifted-key  

E-Print Network [OSTI]

and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

115

International Electricity Trade - Open Access | Department of...  

Broader source: Energy.gov (indexed) [DOE]

International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

116

Entangled topological features of light  

E-Print Network [OSTI]

We report the entanglement of topological features, namely, isolated, linked optical vortex loops in the light from spontaneous parametric down-conversion (SPDC). In three dimensions, optical vortices are lines of phase singularity and vortices of energy flow which percolate through all optical fields. This example of entanglement is between features that extend over macroscopic and finite volumes, furthermore, topological features are robust to perturbation . The entanglement of photons in complex three-dimensional(3D) topological states suggests the possibility of entanglement of similar structures in other quantum systems describable by complex scalar functions, such as superconductors, superfluids and Bose-Einstein condensates.

J. Romero; J. Leach; B. Jack; M. R. Dennis; S. Franke-Arnold; S. M. Barnett; M. J. Padgett

2010-08-26T23:59:59.000Z

117

Key Implications of the Global Economic Environment  

E-Print Network [OSTI]

Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

Lansky, Joshua

118

Research Summary Key Ingredients of Collaborative Management  

E-Print Network [OSTI]

, wildlife management and water catchments. This project, developed in discussion with stakeholders, soughtResearch Summary Key Ingredients of Collaborative Management It is widely accepted that collaboration amongst stakeholders can lead to more sustainable land-management. Voluntary collaboration

119

Nature Climate Change features Los  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Climate Change features Los Alamos forest research February 27, 2013 New print edition of journal tags tree-stress project for cover story LOS ALAMOS, N.M., Feb. 27, 2013-The print...

120

Bibliography on transmission access issues  

SciTech Connect (OSTI)

This paper presents a bibliography on issues related to transmission access in electric power systems. There are 233 citations referenced in this bibliography. This bibliography presents a collection of selected literature on issues related to transmission access. It does not contain all of the material available on this subject or the categories contained herein. Some readers may feel that citations within this bibliography should be strictly limited to transmission system issues and not include energy pricing or reliability issues. However, it was the decision of the Subcommittee of the IEEE Task Force on Transmission Access and Nonutility Generation that selected entries relating to reliability and energy pricing, most relevant to transmission access, should be included. This decision was made because certain issues relating to reliability, transmission and energy pricing are perceived by the industry to be critical in the discussion of transmission access. The bibliography has been divided into the following sections or sub-sections: 2.0 Operational (Engineering) Issues, 3.0 Planning, 4.0 Reliability, 5.1 Economics: Costing, 5.2(a) Economics: Location-Differentiated Pricing, 5.2(b) Economics: Time-Differentiated Pricing, 5.3 Economics: Brokering, Bidding, and Auctioning, 6.0 Regulatory, and 7.0 General. Although the content of many publications spanned two or more of these sections, the desire to limit document length required that all publications be placed in the single most appropriate section. Publications are sorted according to author or publication resource.

Lankford, C.B. [Oklahoma Gas and Electric Co., Oklahoma City, OK (United States)] [Oklahoma Gas and Electric Co., Oklahoma City, OK (United States); McCalley, J.D. [Iowa State Univ., Ames, IA (United States)] [Iowa State Univ., Ames, IA (United States); Saini, N.K. [Entergy Services Corp., Metairie, LA (United States)] [Entergy Services Corp., Metairie, LA (United States)

1996-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

MEASUREMENT OF IMPEDANCE CHARACTERISTICS OF COMPUTER KEYBOARD KEYS1  

E-Print Network [OSTI]

of computer keyboard keys are commonly used: rubber-dome and coil-spring keys. As indicated by their names, a rubber-dome key has a rubber dome under the keycap whereas a coil-spring key has a coil spring under of keys. From a user's perspective, the rubber-dome and coil-spring keys feel different. The properties

Nagurka, Mark L.

122

Utility-Interconnected Photovoltaic Systems: Evaluating the Rationale for the Utility-Accessible External Disconnect Switch  

SciTech Connect (OSTI)

The utility-accessible alternating current (AC) external disconnect switch (EDS) for distributed generators, including photovoltaic (PV) systems, is a hardware feature that allows a utility?s employees to manually disconnect a customer-owned generator from the electricity grid. This paper examines the utility-accessible EDS debate in the context of utility-interactive PV systems for residential and small commercial installations. It also evaluates the rationale for EDS requirements.

Coddington, M.; Margolis, R.M.; Aabakken, J.

2008-01-01T23:59:59.000Z

123

Identity, Credential, and Access Management (ICAM)  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities for DOE identity, credential, and access management program.

2013-02-19T23:59:59.000Z

124

Forests for People Access, recreation & tourism  

E-Print Network [OSTI]

Strategy Forests for People Access, recreation & tourism on the national forest estate #12;#12;Access, recreation and tourism on the national forest estate | 3 Forests for People Access, recreation and tourism on the national forest estate Setting the scene Everyone has a right of responsible access

125

Mediated Semi-Quantum Key Distribution  

E-Print Network [OSTI]

In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative bases and also to perform alternative measurements. However, we assume that the sever is untrusted and we prove the unconditional security of our protocol even in the worst case: when this quantum server is an all-powerful adversary. We also compute a lower bound of the key rate of our protocol, in the asymptotic scenario, as a function of the observed error rate in the channel allowing us to compute the maximally tolerated error of our protocol. Our results show that a semi-quantum protocol may hold similar security to a fully quantum one.

Walter O. Krawec

2014-11-21T23:59:59.000Z

126

More special features: Free membership and access to a mail order  

E-Print Network [OSTI]

website at www.Lens123.com. · A one year unconditional breakage warranty is provided for all eyeglasses) lenses. · Services not performed by licensed personnel. · Contact lenses and eyeglasses in the same benefit cycle. · Two pairs of eyeglasses in lieu of a bifocal. For more information, please visit Davis

Daly, Samantha

127

Public key infrastructure for DOE security research  

SciTech Connect (OSTI)

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

128

On the Security of Public Key Protocols  

E-Print Network [OSTI]

Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

Danny Dolev; et al.

1983-01-01T23:59:59.000Z

129

Feature Stories | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicyFeasibility of SF 6 Gas-Insulated TransformersFeatureFeature

130

Proposed Regulations Could Limit Access to Affordable Health Coverage for Workers'  

E-Print Network [OSTI]

Proposed Regulations Could Limit Access to Affordable Health Coverage for Workers' Children for Health Policy Research University of California, Los Angeles Key Findings The Patient Protection and Affordable Care Act (ACA) is designed to offer premium subsidies to help eligible individuals

Militzer, Burkhard

131

RESEARCH ARTICLE Open Access Origin of land plants: Do conjugating green algae  

E-Print Network [OSTI]

RESEARCH ARTICLE Open Access Origin of land plants: Do conjugating green algae hold the key? Sabina (embryophytes) evolved from streptophyte algae, also referred to as charophycean algae. The streptophyte algae are a paraphyletic group of green algae, ranging from unicellular flagellates to morphologically complex forms

132

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance  

E-Print Network [OSTI]

1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming in mobile ad hoc networks. Specifically, we focus on ad hoc networks where the spa- tial diversity technique technique can enhance the performance of mobile ad hoc networks significantly. Key words: ad hoc networks

Reisslein, Martin

133

Ontology-based Spectrum Access Policies for Policy-based Cognitive Radios  

E-Print Network [OSTI]

Ontology-based Spectrum Access Policies for Policy-based Cognitive Radios Behnam Bahrak, Jung radios (CRs) need to be able to cope with the constantly changing spectrum environment, evolving spectrum, to alleviate the spectrum shortage problem. The cognitive radio is seen as one of the key technologies

134

Key facts about Argonne National Laboratory  

E-Print Network [OSTI]

Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

Kemner, Ken

135

CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS  

E-Print Network [OSTI]

Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

Pawlowski, Wojtek

136

Roadmap for selected key measurements of LHCb  

E-Print Network [OSTI]

Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estčve; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

2010-11-23T23:59:59.000Z

137

www.defra.gov.uk Environmental Key  

E-Print Network [OSTI]

that good environmental performance makes good business sense. Environmental risks and uncertainties impact. These Guidelines seek to help companies report their environmental impacts in a meaningful and cost-effective waywww.defra.gov.uk Environmental Key Performance Indicators Reporting Guidelines for UK Business #12

138

2 Key Achievements 7 Greenhouse Gas Reduction  

E-Print Network [OSTI]

Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

139

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

140

Rangeland ecology: Key global research issues & questions  

E-Print Network [OSTI]

1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Key Management Challenges in Smart Grid  

SciTech Connect (OSTI)

Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

2012-01-01T23:59:59.000Z

142

FCLib: The Feature Characterization Library.  

SciTech Connect (OSTI)

The Feature Characterization Library (FCLib) is a software library that simplifies the process of interrogating, analyzing, and understanding complex data sets generated by finite element applications. This document provides an overview of the library, a description of both the design philosophy and implementation of the library, and examples of how the library can be utilized to extract understanding from raw datasets.

Gentile, Ann C.; Doyle, Wendy S. K.; Kegelmeyer, W. Philip [Sandia National Laboratories, Livermore, CA; Ulmer, Craig D. [Sandia National Laboratories, Livermore, CA

2008-11-01T23:59:59.000Z

143

NIF featured on BBC "Horizon"  

SciTech Connect (OSTI)

The National Ignition Facility, the world's largest laser system, located at Lawrence Livermore National Laboratory, was featured in the BBC broadcast "Horizon" hosted by physicist Brian Cox. Here is the NIF portion of the program, which was entitled "Can We Make A Star On Earth?" This video is used with the express permission of the BBC.

Brian Cox

2010-01-12T23:59:59.000Z

144

NIF featured on BBC "Horizon"  

ScienceCinema (OSTI)

The National Ignition Facility, the world's largest laser system, located at Lawrence Livermore National Laboratory, was featured in the BBC broadcast "Horizon" hosted by physicist Brian Cox. Here is the NIF portion of the program, which was entitled "Can We Make A Star On Earth?" This video is used with the express permission of the BBC.

Brian Cox

2010-09-01T23:59:59.000Z

145

Accessibility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuel

146

Experimental quantum key distribution with finite-key security analysis for noisy channels  

E-Print Network [OSTI]

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

2014-06-17T23:59:59.000Z

147

City of Boulder- Solar Access Ordinance  

Broader source: Energy.gov [DOE]

The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

148

Metropolitan Accessibility and Transportation Sustainability:Sustainability  

E-Print Network [OSTI]

Metropolitan Accessibility and Transportation Sustainability:Sustainability: Comparative Reduce (fulfillment of)Promote Sustainability: Meet needs of (fulfillment of) needs present Institute SMART Sustainable Mobility and Accessibility Research andSMART Sustainable Mobility

Papalambros, Panos

149

Chemical and Petroleum Engineering Key and Lab Space Agreement  

E-Print Network [OSTI]

Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys

Calgary, University of

150

Key Physical Mechanisms in Nanostructured Solar Cells  

SciTech Connect (OSTI)

The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

Dr Stephan Bremner

2010-07-21T23:59:59.000Z

151

Three key elements necessary for successful testing  

SciTech Connect (OSTI)

Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

1994-07-25T23:59:59.000Z

152

Energy Data Access | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Data Management Building Energy Use Benchmarking Benchmarking & Disclosure Policy Data-Driven, Strategic Energy Management Data Access Evaluation, Measurement, & Verification...

153

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE  

E-Print Network [OSTI]

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

Oregon, University of

154

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

155

AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS  

E-Print Network [OSTI]

AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS E. Damiani1, S. De Capitani di Vimercati2, E. Fern controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector such as GIF, JPEG, and PNG, SVG has many advantages: SVG documents are plain text, so they can be read

Samarati, Pierangela

156

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS is around 340m/s. #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS Homework Problem 2: Calculate

Kieu, Khanh

157

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS OPTI · Metropolitan and local area networks #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS OPTI500C Syllabus

Kieu, Khanh

158

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS multiplexing · Network topology #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS Communication Source

Kieu, Khanh

159

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS  

E-Print Network [OSTI]

Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS Significant progress #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS What else can we multiplex

Kieu, Khanh

160

Midstream Infrastructure Improvements Key to Realizing Full Potential...  

Office of Environmental Management (EM)

Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Vehicle Electrification is Key to Reducing Petroleum Dependency...  

Broader source: Energy.gov (indexed) [DOE]

Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas Emission Vehicle Electrification is Key to Reducing Petroleum Dependency and Greenhouse Gas...

162

analysis material key: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

163

Sandia National Laboratories: Direct Measurement of Key Molecule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Modeling & SimulationDirect Measurement of Key Molecule Will Increase Accuracy of Combustion Models Direct Measurement of Key Molecule Will Increase Accuracy of Combustion...

164

Evaluating the Rationale for the Utility-Accessible External Disconnect Switch: Preprint  

SciTech Connect (OSTI)

This paper describes the utility-accessible alternating current (AC) external disconnect switch (EDS) for distributed generators, including photovoltaic (PV) systems, which is a hardware feature that allows a utility's employees to manually disconnect a customer-owned generator from the electricity grid.

Coddington, M. H.

2008-05-01T23:59:59.000Z

165

Accessing Graduate or Archived Catalogs  

E-Print Network [OSTI]

from the drop down menu. #12;Keyword Search Search the entire catalog ... ...or try the advanced search feature #12;Advanced Search Narrow your search: enter a keyword or phrase & select location(s). #12;My Descriptions Course Descriptions Search for courses by prefix, number, and/or keyword Click on the course title

166

Range Condition: Key to Sustained Ranch Productivity  

E-Print Network [OSTI]

species composition is the criteria used to make this determination. Range condition is evaluated for each range site on a ranch. Range sites are areas with the potential for producing similar amounts and kinds of vegetation (for example, shallow hillside... site, deep upland site, draw site, etc.). Sites are determined by climatic, soil, topographic and vegetation features. A complete listing and description of all range sites on a ranch can be obtained from the Soil Conservation Service (SCS). Range...

McGinty, Allan; White, Larry D.

2000-04-25T23:59:59.000Z

167

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps  

E-Print Network [OSTI]

Tips for Key Maps / Inset Maps How Do I Add a Key Maps or Inset Maps You need a new data frame o the properties/look of the extent rectangle Tips Index Map o Should be a simplified version of the map o Should cover at least 5X the area of the main map o Should have its own scale/coordinates/title o Main coverage

Brownstone, Rob

168

Administrative Access Policy Exception Process & Request Form Administrative Access Policy Exception Process  

E-Print Network [OSTI]

Administrative Access Policy ­ Exception Process & Request Form (Page 1) Administrative Access Policy ­ Exception Process Administrative Access Policy Overview According to the Franklin College Administrative Access Policy , all IT devices with a UGA control number will be setup with user

Arnold, Jonathan

169

Solar access of residential rooftops in four California cities  

E-Print Network [OSTI]

rooftops in four California cities Solar access ofcomputed. Solar access violation California Public ResourcesSolar access of residential rooftops in four California

Levinson, Ronnen

2010-01-01T23:59:59.000Z

170

Instructions for Accessing FedConnect Postings, June 30, 2009...  

Broader source: Energy.gov (indexed) [DOE]

Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings and...

171

Subject Access to Your Information  

E-Print Network [OSTI]

Lists Transportation Research Thesaurus Your own list Use a Short List or a Long List of Terms? If you have a small collection, a short list of terms is appropriate. If you have a large collection, a longer list of more specific terms..., such as the Transportation Research Thesaurus, may be helpful. Longer list will help describe your packages in more specific ways. Subject Access to Other Kinds of Information People ? Expertise Groups of People Projects Equipment, Facilities Use the same set of subject...

Tucker, Sandra

2006-08-01T23:59:59.000Z

172

Remote Access | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote Access Ames

173

ARM - Features and Releases Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation InExplosionAnnouncements Media ContactCenterFeature

174

Feature Stories | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicyFeasibility of SF 6 Gas-Insulated Transformers BrandonFeature

175

Feature Stories | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicyFeasibility of SF 6 Gas-Insulated TransformersFeature Stories

176

Feature Stories | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicyFeasibility of SF 6 Gas-Insulated TransformersFeature

177

Feature Stories | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature Stories

178

Features 2010 | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature Stories0

179

Features 2011 | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature Stories01

180

Features 2012 | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature Stories012

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Features 2013 | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature Stories0123

182

Features | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature

183

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

2007-03-14T23:59:59.000Z

184

Keyes, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen6Kentwood, Michigan: EnergyKesona PowerStatistics-2010Keyes,

185

Key Renewable Energy Opportunities for Oklahoma Tribes  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About »KEY RENEWABLE

186

Fermilab | Science | Particle Physics | Key Discoveries  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home ItDarkDiscoveries WorldwideDarkKey

187

Another key Y-12 General Foreman remembered  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmes Laboratory Site|Andrea4»Another key Y-12 General

188

Key Agency Targets Summary _FY 2012_.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJeffersonJonathan PershingrelocatesKaye D.Ken T.NA>Kevlar andKey5 B

189

Quantum key distribution with entangled photon sources  

E-Print Network [OSTI]

A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

2007-01-01T23:59:59.000Z

190

SLAC All Access: Laser Labs  

ScienceCinema (OSTI)

From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

Minitti, Mike; Woods Mike

2014-06-03T23:59:59.000Z

191

Techniques to Access Databases and Integrate Data for Hydrologic Modeling  

SciTech Connect (OSTI)

This document addresses techniques to access and integrate data for defining site-specific conditions and behaviors associated with ground-water and surface-water radionuclide transport applicable to U.S. Nuclear Regulatory Commission reviews. Environmental models typically require input data from multiple internal and external sources that may include, but are not limited to, stream and rainfall gage data, meteorological data, hydrogeological data, habitat data, and biological data. These data may be retrieved from a variety of organizations (e.g., federal, state, and regional) and source types (e.g., HTTP, FTP, and databases). Available data sources relevant to hydrologic analyses for reactor licensing are identified and reviewed. The data sources described can be useful to define model inputs and parameters, including site features (e.g., watershed boundaries, stream locations, reservoirs, site topography), site properties (e.g., surface conditions, subsurface hydraulic properties, water quality), and site boundary conditions, input forcings, and extreme events (e.g., stream discharge, lake levels, precipitation, recharge, flood and drought characteristics). Available software tools for accessing established databases, retrieving the data, and integrating it with models were identified and reviewed. The emphasis in this review was on existing software products with minimal required modifications to enable their use with the FRAMES modeling framework. The ability of four of these tools to access and retrieve the identified data sources was reviewed. These four software tools were the Hydrologic Data Acquisition and Processing System (HDAPS), Integrated Water Resources Modeling System (IWRMS) External Data Harvester, Data for Environmental Modeling Environmental Data Download Tool (D4EM EDDT), and the FRAMES Internet Database Tools. The IWRMS External Data Harvester and the D4EM EDDT were identified as the most promising tools based on their ability to access and retrieve the required data, and their ability to integrate the data into environmental models using the FRAMES environment.

Whelan, Gene; Tenney, Nathan D.; Pelton, Mitchell A.; Coleman, Andre M.; Ward, Duane L.; Droppo, James G.; Meyer, Philip D.; Dorow, Kevin E.; Taira, Randal Y.

2009-06-17T23:59:59.000Z

192

Learning Deep Web Crawling with Diverse Features Lu Jiang, Zhaohui Wu, Qinghua Zheng and Jun Liu  

E-Print Network [OSTI]

Learning Deep Web Crawling with Diverse Features Lu Jiang, Zhaohui Wu, Qinghua Zheng and Jun Liu@yahoo.com, wzh@stu.xjtu.edu.cn, qhzheng@mail.xjtu.edu.cn, liukeen@mail.xjtu.edu.cn Abstract--The key to Deep Web crawling is to submit promising keywords to query form and retrieve Deep Web content efficiently. To select

Shamos, Michael I.

193

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data  

Broader source: Energy.gov [DOE]

Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

194

Better accessibility for Paramaribo / Paramaribo beter bereikbaar:.  

E-Print Network [OSTI]

??A quantitative study for increasing the accessibility of Paramaribo, the capital of Suriname. The analysis was done with the help of a traffic demand model… (more)

Flu, M.E.

2012-01-01T23:59:59.000Z

195

Access Control for SAR Systems Stephen Quirolgico  

E-Print Network [OSTI]

Access Control for SAR Systems Stephen Quirolgico Vincent Hu Tom Karygiannis NIST IR 7815 #12;NIST Systems Stephen Quirolgico Vincent Hu Tom Karygiannis Computer Security Division Information Technology

196

The Ohio Capital Access Program (OCAP) (Ohio)  

Broader source: Energy.gov [DOE]

The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business...

197

@ work' video segment features Robotic Software Engineer  

ScienceCinema (OSTI)

@ work highlights Idaho National Laboratory employees and the jobs they perform.This segment features Robotic Software Engineer Miles Walton.

Idaho National Laboratory

2010-01-08T23:59:59.000Z

198

Discriminant Absorption Feature Learning for Material Classification  

E-Print Network [OSTI]

1 Discriminant Absorption Feature Learning for Material Classification Zhouyu Fu, Antonio Robles in spectral imaging by combining the use of invariant spectral absorption features and statistical machine learning techniques. Our method hinges in the relevance of spectral absorption features for material

Robles-Kelly, Antonio

199

CONSTRUCTION OF WEB-ACCESSIBLE MATERIALS HANDBOOK FORGENERATION IV NUCLEAR REACTORS  

SciTech Connect (OSTI)

The development of a web-accessible materials handbook in support of the materials selection and structural design for the Generation IV nuclear reactors is being planned. Background of the reactor program is briefly introduced. Evolution of materials handbooks for nuclear reactors over years is reviewed in light of the trends brought forth by the rapid advancement in information technologies. The framework, major features, contents, and construction considerations of the web-accessible Gen IV Materials Handbook are discussed. Potential further developments and applications of the handbook are also elucidated.

Ren, Weiju [ORNL

2005-01-01T23:59:59.000Z

200

Academic Libraries and Open Access: Policies, Services and Resources for Increasing Access to Scholarship  

E-Print Network [OSTI]

This presentation will focus on emerging roles for academic libraries in supporting access to scholarship through open access policies and practices. The University of Kansas recently became the first public university in ...

Rosenblum, Brian

2010-07-06T23:59:59.000Z

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Compression station key to Texas pipeline project  

SciTech Connect (OSTI)

This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

NONE

1996-10-01T23:59:59.000Z

202

The impacts of urbanization on endangered florida key deer  

E-Print Network [OSTI]

for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

Harveson, Patricia Moody

2006-04-12T23:59:59.000Z

203

actual key success: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

204

Updated distribution and reintroduction of the Lower Keys marsh rabbit  

E-Print Network [OSTI]

Listed as federally-endangered in 1990, the Lower Keys marsh rabbit (LKMR, Sylvilagus palustris hefneri) exists as a metapopulation in patches of wetland habitat in Florida?s Lower Keys. This study sought to address 2 priority actions identified...

Faulhaber, Craig Alan

2005-02-17T23:59:59.000Z

205

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

206

Exploring the context : a small hotel in Key West  

E-Print Network [OSTI]

This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

VanBeuzekom, Edrick

1984-01-01T23:59:59.000Z

207

The NIH Public Access PolicyThe NIH Public Access Policy April 21, 2009  

E-Print Network [OSTI]

The NIH Public Access PolicyThe NIH Public Access Policy April 21, 2009 http://publicaccess.nih.gov/ 11 #12;The NIH Public Access Policy Is Mandatory · The Policy implements Division G, Title II of the National Institutes of Health shall require that all investigators funded by the NIH submit or have

Grishok, Alla

208

Metering Schemes for General Access Structures  

E-Print Network [OSTI]

Metering Schemes for General Access Structures Barbara Masucci Dipartimento di Informatica ed, Canada E­mail: dstinson@cacr.math.uwaterloo.ca Abstract A metering scheme is a method by which an audit time frame. In this paper we construct metering schemes for more general access structures, which

Stinson, Douglas

209

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

RESEARCH & INNOVATION OFFICE EASY ACCESS IP AN INTRODUCTION FOR INDUSTRY PARTNERS FEBRUARY 2014 #12 to economic, environmental and social benefits. We believe there are some significant benefits to Easy Access, design and innovation Simple template license agreements means no lengthy and expensive negotiations

University of Technology, Sydney

210

Database Hints for Readex's AccessUN  

E-Print Network [OSTI]

Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

Stowell, Michael

211

Locally Accessible Information and Distillation of Entanglement  

E-Print Network [OSTI]

A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

2004-03-18T23:59:59.000Z

212

Revised Spring 2008 NIH Public Access Policy  

E-Print Network [OSTI]

Revised Spring 2008 NIH Public Access Policy Notice Number: NOT-OD-08-033 - (See Notice NOT-OD-08-161 (Consolidated Appropriations Act, 2008), the NIH voluntary Public Access Policy (NOT-OD-05-022) is now mandatory funded by the NIH submit or have submitted for them to the National Library of Medicine's PubMed Central

213

Web Accessibility Office of Diversity and Inclusion  

E-Print Network [OSTI]

Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

Jones, Michelle

214

Usability and Accessibility in Consumer Health Informatics  

E-Print Network [OSTI]

Usability and Accessibility in Consumer Health Informatics Current Trends and Future Challenges, for innovative eHealth systems to have true value and impact, they must first and foremost be usable challenges in the usability and accessibility of consumer health informatics will be described. Consumer

Shneiderman, Ben

215

Towards a sustainable web accessibility Giorgio Brajnik  

E-Print Network [OSTI]

this is by focussing on sustainable accessibility, i.e. by shaping and establishing effective acces- sibility processes;processes that can be sustained mainly by their own return on investment and by minimal additional resourcesTowards a sustainable web accessibility Giorgio Brajnik Dip. di Matematica e Informatica Universit

Brajnik, Giorgio

216

National Radiobiology Archives Distributed Access user's manual  

SciTech Connect (OSTI)

This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

1991-11-01T23:59:59.000Z

217

Interactive Database Access with Statistics and Graphics  

E-Print Network [OSTI]

DbAccess The Manual Interactive Database Access with Statistics and Graphics Version 2.1.1 D. M and graphical needs of NSTX Physicists. Flexible views and joins are possible, including options for complex SQL General Atomics (GA Plot Objects) adds extensive graphical and interactive capabilities (and documentation

Princeton Plasma Physics Laboratory

218

RESEARCH Open Access Probabilistic framework for opportunistic  

E-Print Network [OSTI]

approaches. Keywords: Cognitive radio networks, Opportunistic spectrum management, Medium access control 1 that the licensed spectrum is underutilized for 15 to 85% of the time depending on the spatial location [1]. ThusRESEARCH Open Access Probabilistic framework for opportunistic spectrum management in cognitive ad

Perkins, Dmitri

219

Foreign National Access to DOE Cyber Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

1999-11-01T23:59:59.000Z

220

Residential Energy Efficiency Financing: Key Elements of Program Design  

Broader source: Energy.gov [DOE]

Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

A Full Key Recovery Attack on HMAC-AURORA-512  

E-Print Network [OSTI]

A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

222

MA et al.: SKETCH RETRIEVAL VIA STROKE FEATURES 1 Sketch Retrieval via Dense Stroke Features  

E-Print Network [OSTI]

MA et al.: SKETCH RETRIEVAL VIA STROKE FEATURES 1 Sketch Retrieval via Dense Stroke Features Chao search method. In this paper, we propose a representation scheme which takes sketch strokes into account with local features, thereby facilitat- ing efficient retrieval with codebooks. Stroke features are detected

Yang, Ming-Hsuan

223

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request  

E-Print Network [OSTI]

K:\\Operations\\Forms\\201 Key or Vendor Card Request.pdf Rev ASU DPc Key/Vendor Card Request Complete/Staff Undergrad Grad Asst Other Department or Vendor PO # or Agency/ORG Mail Code Affiliation (place X in one box am personally accountable for all ASU keys/vendor cards issued to me. I understand that only I am

Rhoads, James

224

Check WorkNet often for job vacancies or rely on the e-mail feature to  

E-Print Network [OSTI]

Check WorkNet often for job vacancies or rely on the e-mail feature to receive a message when a job Bowling Green, OH 43403-0150 419-372-2865 Review Postings Carefully All job vacancies include a job. Access Job Vacancies Using WorkNet Log-in to your MyBGSU portal. Scroll down to Misc Services, located

Moore, Paul A.

225

The ISO/NASA Key Project on AGN Spectral Energy Distributions (Characteristics of the ISO Data)  

E-Print Network [OSTI]

The U.S. ISO Key Project on quasar spectral energy distributions seeks to better understand the very broad-band emission features of quasars from radio to X-rays. A key element of this project is observations of 72 quasars with the ISOPHOT instrument at 8 bands, from 5 to 200 microns. The sample was chosen to span a wide range of redshifts and quasar types. This paper presents an overview of the analysis and reduction techniques, as well as general trends within the data set (comparisons with IRAS fluxes, uncertainties as a function of background sky brightness, and an analysis of vignetting corrections in chopped observing mode). A more detailed look at a few objects in the sample is presented in Wilkes et al. 1999, astro-ph/9902084.

Eric J. Hooper; Belinda J. Wilkes; Kim K. McLeod; Martin S. Elvis; Chris D. Impey; Carol J. Lonsdale; Matt A. Malkan; Jonathan C. McDowell

1999-02-05T23:59:59.000Z

226

A Framework for Flexible Access Control in Digital Library Systems  

E-Print Network [OSTI]

to merely control access to documents local to the digital library. The access control policies are often called DACM (Document Access Control Methods). The basic idea is geared toward discretionary accessA Framework for Flexible Access Control in Digital Library Systems Indrajit Ray and Sudip

Ray, Indrajit

227

Access to UCNI | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess to OUO Access to OUO DOE M 471.3-1, Admin Chg 1, ChapterAccess

228

CMS conditions data access using FroNTier  

SciTech Connect (OSTI)

The CMS experiment at the LHC has established an infrastructure using the FroNTier framework to deliver conditions (i.e. calibration, alignment, etc.) data to processing clients worldwide. FroNTier is a simple web service approach providing client HTTP access to a central database service. The system for CMS has been developed to work with POOL which provides object relational mapping between the C++ clients and various database technologies. Because of the read only nature of the data, Squid proxy caching servers are maintained near clients and these caches provide high performance data access. Several features have been developed to make the system meet the needs of CMS including careful attention to cache coherency with the central database, and low latency loading required for the operation of the online High Level Trigger. The ease of deployment, stability of operation, and high performance make the FroNTier approach well suited to the GRID environment being used for CMS offline, as well as for the online environment used by the CMS High Level Trigger (HLT). The use of standard software, such as Squid and various monitoring tools, make the system reliable, highly configurable and easily maintained. We describe the architecture, software, deployment, performance, monitoring and overall operational experience for the system.

Blumenfeld, Barry J.; /Johns Hopkins U.; Dykstra, David; Lueking, Lee; Wicklund, Eric; /Fermilab

2007-10-01T23:59:59.000Z

229

Metadata Value Chain for Open Access Journals  

E-Print Network [OSTI]

In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly communication lifecycle...

Mercer, Holly; Dyas-Correia, Sharon

2011-01-01T23:59:59.000Z

230

Accessing MDS with IDL February 1993  

E-Print Network [OSTI]

Accessing MDS with IDL Reference Manual February 1993 Software Version: MDS 5.2 VAX/VMS Version 4 Equipment Corporation: CDD DECnet VAX DATATRIEVE DECUS VAXcluster DEC MicroVAX VAX Information Architecture

California at San Diego, University of

231

Radioactive hot cell access hole decontamination machine  

DOE Patents [OSTI]

Radioactive hot cell access hole decontamination machine. A mobile housing has an opening large enough to encircle the access hole and has a shielding door, with a door opening and closing mechanism, for uncovering and covering the opening. The housing contains a shaft which has an apparatus for rotating the shaft and a device for independently translating the shaft from the housing through the opening and access hole into the hot cell chamber. A properly sized cylindrical pig containing wire brushes and cloth or other disks, with an arrangement for releasably attaching it to the end of the shaft, circumferentially cleans the access hole wall of radioactive contamination and thereafter detaches from the shaft to fall into the hot cell chamber.

Simpson, William E. (Richland, WA)

1982-01-01T23:59:59.000Z

232

Cognitive Medium Access: Exploration, Exploitation and Competition  

E-Print Network [OSTI]

1 Cognitive Medium Access: Exploration, Exploitation and Competition Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor Abstract-- This paper establishes the equivalence between cognitive cognitive user wishes to opportunistically exploit the availability of empty fre- quency bands

El-Gamal, Hesham

233

Rail Access to Yucca Mountain: Critical Issues  

SciTech Connect (OSTI)

The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

Halstead, R. J.; Dilger, F.; Moore, R. C.

2003-02-25T23:59:59.000Z

234

Adjudicative Guidelines for Determining Eligibility for Access...  

Broader source: Energy.gov (indexed) [DOE]

access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her...

235

Decision Analysis of Dynamic Spectrum Access Rules  

SciTech Connect (OSTI)

A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

2011-12-01T23:59:59.000Z

236

North Carolina Capital Access Program (North Carolina)  

Broader source: Energy.gov [DOE]

The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lender’s usual standards. The average CAP loan is ...

237

A Dyslexic Perspective on e-Content Accessibility  

E-Print Network [OSTI]

an insight into the issues of web accessibility for users with Dyslexia (and/or other specific learning and accessibility issues of electronic educational content. Keywords: dyslexia, SLD, web accessibility, usability...................................................................................................2 2. Explaining Dyslexia

Brajnik, Giorgio

238

ad libitum access: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

239

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

240

Data Foundations Data Attributes and Features  

E-Print Network [OSTI]

1 Data Foundations Data Attributes and Features Data Pre-processing Data Storage Data Analysis Data Sources 1 Data Attributes Describing data content and characteristics Representing data Data Sortable Data Numerical Attributes 4 Discrete vs. Continuous #12;3 Statistical Features of Data 5

Fang, Shiaofen

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Nature Climate Change features Los Alamos forest research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nature Climate Change Features Forest Research Nature Climate Change features Los Alamos forest research The print issue features as its cover story the tree-stress research of...

242

Fake state attack on practically decoy state quantum key distribution  

E-Print Network [OSTI]

In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

Yong-gang Tan

2012-02-15T23:59:59.000Z

243

QKD with finite resources: secret key rates via Rényi entropies  

E-Print Network [OSTI]

A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

2011-05-27T23:59:59.000Z

244

NBP RFI: Data Access Honeywell Responses To Request for Information...  

Broader source: Energy.gov (indexed) [DOE]

on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

245

Bursting at the Seams: Water Access and Housing in Luanda  

E-Print Network [OSTI]

constructed areas. The lack of water access and properand how the lack of access to clean water, coupled withmost slum residents lack knowledge about the basics of water

Bulfin, Michael Patrick

2009-01-01T23:59:59.000Z

246

Increasing Community Access to Solar: Designing and Developing...  

Broader source: Energy.gov (indexed) [DOE]

Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System (Fact Sheet), U.S. Department of Energy (DOE) Increasing Community Access to...

247

SBA Expands Access to Contracting Opportunities for Women-Owned...  

Office of Environmental Management (EM)

SBA Expands Access to Contracting Opportunities for Women-Owned Small Businesses SBA Expands Access to Contracting Opportunities for Women-Owned Small Businesses January 22, 2013 -...

248

access system based: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

249

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

250

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Broader source: Energy.gov (indexed) [DOE]

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

251

access control policies: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Last Page Topic Index 1 Resiliency Policies in Access Control , Mahesh Tripunitara Computer Technologies and Information Sciences Websites Summary: Resiliency Policies in Access...

252

Public Roundtable- Data Access and Privacy Issues Related to...  

Office of Environmental Management (EM)

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

253

Equitable Access: Remote and Rural Communities 'Transport Needs...  

Open Energy Info (EERE)

Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

254

National Geothermal Data Systems Data Acquisition and Access...  

Broader source: Energy.gov (indexed) [DOE]

National Geothermal Data Systems Data Acquisition and Access National Geothermal Data Systems Data Acquisition and Access Project objective: To support the acquisition of new and...

255

Pre-Packaged Commercial Property-Accessed Clean Energy Financing...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Packaged Commercial Property-Accessed Clean Energy Financing Solutions - 2014 BTO Peer Review Pre-Packaged Commercial Property-Accessed Clean Energy Financing Solutions - 2014 BTO...

256

Climate Action Planning: A Review of Best Practices, Key Elements...  

Open Energy Info (EERE)

Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

257

TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring...  

Broader source: Energy.gov (indexed) [DOE]

Radiation Monitoring Subgroup TEC Working Group Topic Groups Rail Key Documents Radiation Monitoring Subgroup Radiation Monitoring Subgroup Draft Work Plan - February 4, 2008 More...

258

Hydrodynamic experiment provides key data for Stockpile Stewardship  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

predictively model and assess weapon performance in the absence of full-scale underground nuclear testing," said Webster. Los Alamos hydrodynamic experiment provides key data for...

259

Worldwide Trends in Energy Use and Efficiency: Key Insights from...  

Open Energy Info (EERE)

Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

260

Water dynamics clue to key residues in protein folding  

SciTech Connect (OSTI)

A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

2010-01-29T23:59:59.000Z

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

262

Key Practical Issues in Strengthening Safety Culture, INSAG-15  

Broader source: Energy.gov [DOE]

Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

263

Impact analysis of MBTA 2009 Key Bus Route Initiative program  

E-Print Network [OSTI]

The Massachusetts Bay Transit Agency (MBTA) has the stated service objectives of customer service excellence, accessibility, reliability, and state-of-the-art technology. Over the last few years, the MBTA has been concerned ...

Krysinski, Yann

2010-01-01T23:59:59.000Z

264

Passive Safety Features for Small Modular Reactors  

SciTech Connect (OSTI)

The rapid growth in the size and complexity of commercial nuclear power plants in the 1970s spawned an interest in smaller, simpler designs that are inherently or intrinsically safe through the use of passive design features. Several designs were developed, but none were ever built, although some of their passive safety features were incorporated into large commercial plant designs that are being planned or built today. In recent years, several reactor vendors are actively redeveloping small modular reactor (SMR) designs with even greater use of passive features. Several designs incorporate the ultimate in passive safety they completely eliminate specific accident initiators from the design. Other design features help to reduce the likelihood of an accident or help to mitigate the accident s consequences, should one occur. While some passive safety features are common to most SMR designs, irrespective of the coolant technology, other features are specific to water, gas, or liquid-metal cooled SMR designs. The extensive use of passive safety features in SMRs promise to make these plants highly robust, protecting both the general public and the owner/investor. Once demonstrated, these plants should allow nuclear power to be used confidently for a broader range of customers and applications than will be possible with large plants alone.

Ingersoll, Daniel T [ORNL] [ORNL

2010-01-01T23:59:59.000Z

265

The continental margin is a key source of iron to the HNLC North Pacific Ocean  

SciTech Connect (OSTI)

Here we show that labile particulate iron and manganese concentrations in the upper 500m of the Western Subarctic Pacific, an iron-limited High Nutrient Low Chlorophyll (HNLC) region, have prominent subsurface maxima between 100-200 m, reaching 3 nM and 600 pM, respectively. The subsurface concentration maxima in particulate Fe are characterized by a more reduced oxidation state, suggesting a source from primary volcagenic minerals such as from the Kuril/Kamchatka margin. The systematics of these profiles suggest a consistently strong lateral advection of labile Mn and Fe from redox-mobilized labile sources at the continental shelf supplemented by a more variable source of Fe from the upper continental slope. This subsurface supply of iron from the continental margin is shallow enough to be accessible to the surface through winter upwelling and vertical mixing, and is likely a key source of bioavailable Fe to the HNLC North Pacific.

Lam, P.J.; Bishop, J.K.B

2008-01-15T23:59:59.000Z

266

Mercury: An Example of Effective Software Reuse for Metadata Management, Data Discovery and Access  

SciTech Connect (OSTI)

Mercury is a federated metadata harvesting, data discovery and access tool based on both open source packages and custom developed software. Though originally developed for NASA, the Mercury development consortium now includes funding from NASA, USGS, and DOE. Mercury supports the reuse of metadata by enabling searching across a range of metadata specification and standards including XML, Z39.50, FGDC, Dublin-Core, Darwin-Core, EML, and ISO-19115. Mercury provides a single portal to information contained in distributed data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. One of the major goals of the recent redesign of Mercury was to improve the software reusability across the 12 projects which currently fund the continuing development of Mercury. These projects span a range of land, atmosphere, and ocean ecological communities and have a number of common needs for metadata searches, but they also have a number of needs specific to one or a few projects. To balance these common and project-specific needs, Mercury's architecture has three major reusable components; a harvester engine, an indexing system and a user interface component. The harvester engine is responsible for harvesting metadata records from various distributed servers around the USA and around the world. The harvester software was packaged in such a way that all the Mercury projects will use the same harvester scripts but each project will be driven by a set of project specific configuration files. The harvested files are structured metadata records that are indexed against the search library API consistently, so that it can render various search capabilities such as simple, fielded, spatial and temporal. This backend component is supported by a very flexible, easy to use Graphical User Interface which is driven by cascading style sheets, which make it even simpler for reusable design implementation. The new Mercury system is based on a Service Oriented Architecture and effectively reuses components for various services such as Thesaurus Service, Gazetteer Web Service and UDDI Directory Services. The software also provides various search services including: RSS, Geo-RSS, OpenSearch, Web Services and Portlets, integrated shopping cart to order datasets from various data centers (ORNL DAAC, NSIDC) and integrated visualization tools. Other features include: Filtering and dynamic sorting of search results, book- markable search results, save, retrieve, and modify search criteria.

Devarakonda, Ranjeet [ORNL] [ORNL

2008-01-01T23:59:59.000Z

267

Energy Security: A Key Requirement forSustainable Development  

E-Print Network [OSTI]

1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

268

Prairie Fruit Summary, 2010 Some key considerations for the homeowner  

E-Print Network [OSTI]

1 Prairie Fruit Summary, 2010 Some key considerations for the homeowner by Bob Bors The following list highlights some key positive (+), negative (-) and variable ( ± ) attributes for growing fruit into account. For more info visit: www.fruit.usask.ca Haskap/Blue Honeysuckle: - All varieties are very cold

Peak, Derek

269

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

270

Reflective cracking of shear keys in multi-beam bridges  

E-Print Network [OSTI]

..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

Sharpe, Graeme Peter

2009-06-02T23:59:59.000Z

271

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

272

Public Key Encryption that Allows PIR Queries Eyal Kushilevitz  

E-Print Network [OSTI]

Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

Ostrovsky, Rafail

273

Key ornamental innovations facilitate diversification in an avian radiation  

E-Print Network [OSTI]

Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

Rubenstein, Dustin R.

274

Practical Key-Recovery for All Possible Parameters of SFLASH  

E-Print Network [OSTI]

function over a finite field. However, unlike RSA this power function is an easy-to-invert bijec- tion a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older from the public-key. The attack uses new crypt- analytic tools, most notably pencils of matrices

Fouque, Pierre-Alain

275

Offshore Wind Power Experiences, Potential and Key Issues for  

E-Print Network [OSTI]

Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik-Erik Clausen Title: Offshore Wind Power Experiences, Potential and Key Issues for Deployment Division: VEA, SYS Risø-R-1673(EN) January 2008 Abstract: Wind power has been growing at spectacular rates. Today

276

Apparatus, system, and method for synchronizing a timer key  

DOE Patents [OSTI]

A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

2014-04-22T23:59:59.000Z

277

Feature identification framework and applications (FIFA)  

E-Print Network [OSTI]

collections that provides a general framework for applications while allowing decisions about the details of document representation and features identification to be deferred to domain specific implementations of that framework. These deferred decisions...

Audenaert, Michael Neal

2006-04-12T23:59:59.000Z

278

Feature Binding and the Hebb Repetition Effect   

E-Print Network [OSTI]

Previous studies have found no evidence that long-term learning of integrated objects and individual features benefit visual short term memory tasks (Logie, Brockmole, & Vandenbroucke, in press; Olson & Jiang, 2004; Treisman, ...

Barrett, Maeve

2008-12-04T23:59:59.000Z

279

Hybrid Solutions to the Feature Interaction Problem  

E-Print Network [OSTI]

Calder,M. Kolberg,M. Magill,E. Marples,D. Reiff-Marganiec,S. Feature Interactions in Telecommunications and Software Systems VII pp 295-312 IOS Press

Calder, M.

280

ECG Feature Extraction Techniques - A Survey Approach  

E-Print Network [OSTI]

ECG Feature Extraction plays a significant role in diagnosing most of the cardiac diseases. One cardiac cycle in an ECG signal consists of the P-QRS-T waves. This feature extraction scheme determines the amplitudes and intervals in the ECG signal for subsequent analysis. The amplitudes and intervals value of P-QRS-T segment determines the functioning of heart of every human. Recently, numerous research and techniques have been developed for analyzing the ECG signal. The proposed schemes were mostly based on Fuzzy Logic Methods, Artificial Neural Networks (ANN), Genetic Algorithm (GA), Support Vector Machines (SVM), and other Signal Analysis techniques. All these techniques and algorithms have their advantages and limitations. This proposed paper discusses various techniques and transformations proposed earlier in literature for extracting feature from an ECG signal. In addition this paper also provides a comparative study of various methods proposed by researchers in extracting the feature from ECG signal.

Karpagachelvi, S; Sivakumar, M

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Improving Data Access Efficiency by Using a Tagless Access Buffer (TAB)  

E-Print Network [OSTI]

of the processor's energy expenditure. We describe the implemen- tation and use of a tagless access buffer (TAB University of Technology [perla/mckee/pers]@chalmers.se Abstract The need for energy efficiency continues) that greatly improves data access energy efficiency while slightly im- proving performance. The compiler

Whalley, David

282

The UCSB Access ID Card Application for Department Use Door Access will be needed  

E-Print Network [OSTI]

of the University and must be returned to the department access controller (DAC) upon demand or when affiliation signature below asserts your identification information is correct and acknowledges your responsibility this or their own department's form/system to document approvals and record authorized access levels. Retention: One

Bigelow, Stephen

283

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

284

Student On Line Access to Records Provides on-line, self service access to  

E-Print Network [OSTI]

SOLAR Student On Line Access to Records #12;Provides on-line, self service access to: Registrar Enrollment Appointments · Review Solar Messages Student Account/ Financial Aid: · View Support offered (available aid ­ i.e. Federal loans, scholarships, etc.) · Accept financial aid (i.e. loans, etc.) ­ loan

285

Feature extraction for structural dynamics model validation  

SciTech Connect (OSTI)

This study focuses on defining and comparing response features that can be used for structural dynamics model validation studies. Features extracted from dynamic responses obtained analytically or experimentally, such as basic signal statistics, frequency spectra, and estimated time-series models, can be used to compare characteristics of structural system dynamics. By comparing those response features extracted from experimental data and numerical outputs, validation and uncertainty quantification of numerical model containing uncertain parameters can be realized. In this study, the applicability of some response features to model validation is first discussed using measured data from a simple test-bed structure and the associated numerical simulations of these experiments. issues that must be considered were sensitivity, dimensionality, type of response, and presence or absence of measurement noise in the response. Furthermore, we illustrate a comparison method of multivariate feature vectors for statistical model validation. Results show that the outlier detection technique using the Mahalanobis distance metric can be used as an effective and quantifiable technique for selecting appropriate model parameters. However, in this process, one must not only consider the sensitivity of the features being used, but also correlation of the parameters being compared.

Hemez, Francois [Los Alamos National Laboratory; Farrar, Charles [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory; Nishio, Mayuko [UNIV OF TOKYO; Worden, Keith [UNIV OF SHEFFIELD; Takeda, Nobuo [UNIV OF TOKYO

2010-11-08T23:59:59.000Z

286

Participant Name:_____________________________ Canadian Access Federation: Trust Assertion Document (TAD)  

E-Print Network [OSTI]

(TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation Access Federation: Trust Assertion Document (TAD) CANARIE Inc. - Canadian Access Federation Service Page Greg.Condon@unbc.ca (250) 960-5289 #12;Canadian Access Federation: Trust Assertion Document (TAD

Northern British Columbia, University of

287

Performance estimates for personnel access control systems  

SciTech Connect (OSTI)

Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

Bradley, R. G.

1980-10-01T23:59:59.000Z

288

Access to OUO | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess to OUO Access to OUO DOE M 471.3-1, Admin Chg 1, Chapter II,

289

Bridging the Gap Between Feature-and Grid-based SLAM Kai M. Wurm Cyrill Stachniss Giorgio Grisetti  

E-Print Network [OSTI]

be used or whether a dense representation such as occupancy grid maps is more appropriate. In this paper a landmark-based representation and a dense grid map. In practical experiments, we demonstrate that our of the individual representations. Key words: SLAM, features, grid maps, learning, dual representation 1

Stachniss, Cyrill

290

Feature Extraction for Data-Driven Fault Detection in Nuclear Power Plants Xin Jin, Robert M. Edwards and Asok Ray  

E-Print Network [OSTI]

Feature Extraction for Data-Driven Fault Detection in Nuclear Power Plants Xin Jin, Robert M monitoring of nuclear power plants (NPP) is one of the key issues addressed in nuclear energy safety research is performed during each nuclear power plant refueling outage, which may not be cost effective [1

Ray, Asok

291

Distribution Statistics and Random Matrix Formalism of Multicarrier Continuous-Variable Quantum Key Distribution  

E-Print Network [OSTI]

We propose a combined mathematical framework of order statistics and random matrix theory for multicarrier continuous-variable (CV) quantum key distribution (QKD). In a multicarrier CVQKD scheme, the information is granulated into Gaussian subcarrier CVs, and the physical Gaussian link is divided into Gaussian sub-channels. The sub-channels are dedicated to the conveying of the subcarrier CVs. The distribution statistics analysis covers the study of the distribution of the sub-channel transmittance coefficients in the presence of a Gaussian noise and the utilization of the moment generation function (MGF) in the error analysis. We reveal the mathematical formalism of sub-channel selection and formulation of the transmittance coefficients, and show a reduced complexity progressive sub-channel scanning method. We define a random matrix formalism for multicarrier CVQKD to evaluate the statistical properties of the information flowing process. Using random matrix theory, we express the achievable secret key rates and study the efficiency of the AMQD-MQA (adaptive multicarrier quadrature division-multiuser quadrature allocation) multiple-access multicarrier CVQKD. The proposed combined framework is particularly convenient for the characterization of the physical processes of experimental multicarrier CVQKD.

Laszlo Gyongyosi

2014-10-30T23:59:59.000Z

292

The Harness Workbench: Unified and Adaptive Access to Diverse HPC Platforms (final report)  

SciTech Connect (OSTI)

In this project, we conducted preliminary research to create a flexible environment that encapsulates the knowledge of the application developers, site system administrators, and the vendors to assist application building and execution on HPC systems, in particular the DOE leadership computing platforms. The key research involved how to describe and use the knowledge from these varied sources to improve productivity of the end-user scientists, while creating a flexible and modular environment supporting all these features.

George Bosilca

2012-11-07T23:59:59.000Z

293

OFC'13 Summary ---Access Networks-I  

E-Print Network [OSTI]

They Be A Blueprint for Optical Networks? Ali Khayrallah Ericsson Research USA Spectrum crunch, Feedback from receiver's residential network model to a converged access/aggregation platform based on SDN. Network convergence to reduce number of devices such as PON for residential, business as well as mobile backhauling ­ Long reach

California at Davis, University of

294

Example School Communications Email about Open Access   

E-Print Network [OSTI]

This is an example text for an email to be sent to the School of Mathematics as part of preparations for implementing Open Access requirements for the post-2014 REF. This is made available here as part of the Jisc-funded LOCH Project....

Tate, Dominic

2015-03-23T23:59:59.000Z

295

Caf Systems Central Security Access Form  

E-Print Network [OSTI]

and Procurement Tracking Reports (Encumbrances, Delivery, Change Order History) SCH_SUPPLY_CHAIN Ad Hoc Query Runner Ability to run reports created by Ad Hoc Query Authors CAFE_NU_COGNOS_AD_HOC_VIEWERS Ad Hoc Query Author (Training Required) Access to Query Studio to create, build, and save reports CAFE_NU_COGNOS_AD_HOC

Shull, Kenneth R.

296

ACCESS TO INFORMATION MANUAL NATIONAL RESEARCH FOUNDATION  

E-Print Network [OSTI]

ACCESS TO INFORMATION MANUAL FOR THE NATIONAL RESEARCH FOUNDATION Manual in terms of section 14 ............................................................................................. 1 2.2 A SCHEMATIC DIARAM OF THE STRUCTURE OF THE NATIONAL RESEARCH FOUNDATION......... 2 2 BODIES #12;© National Research Foundation Malefyane Mogale i FOREWORD In order to present a balanced

Jarrett, Thomas H.

297

RESEARCH & INNOVATION OFFICE EASY ACCESS IP  

E-Print Network [OSTI]

the barriers to internal investment in development by offering the IP for free and using quick and simple university and an international partner of the initiative for Australasia in December 2013. This new approach Access IP? Whilst we will still protect and commercialise some IP as before, we will offer some of our IP

University of Technology, Sydney

298

Improving School Governance | 3 Open access publishing  

E-Print Network [OSTI]

Access Article Processing Charges Bo-Christer Björk and David Solomon March 2014 #12;1 Developing, Finland and Haslett, Michigan, USA Bo-Christer Björk, Dr. Tech. David J Solomon, PhD Professor Professor.............................................................................................................................................................7 1.2 Methodology

Rambaut, Andrew

299

REVIEW Open Access Pulmonary arterial hypertension  

E-Print Network [OSTI]

REVIEW Open Access Pulmonary arterial hypertension David Montani1,2,3 , Sven GĂĽnther1,2,3 , Peter,2,3 and Olivier Sitbon1,2,3* Abstract Pulmonary arterial hypertension (PAH) is a chronic and progressive disease and designated as clinical group 1'. Group 2 'Pulmonary hypertension due to left heart diseases' is divided

Paris-Sud XI, Université de

300

UH Parking Access & Mid-Pacific Institute  

E-Print Network [OSTI]

Hall Keller Hall Physical Science Building Pacific Ocean Science & Technology Kuykendall AnnexStairs Pond UH Parking Access & Mid-Pacific Institute Exit MŻanoa Innovation Center and Kau Auxiliary Services Pacific Biomedical Warehouse Agricultural Science Shops Campus Security n Landscaping

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Access Agreement Principal Contact for Enquiries  

E-Print Network [OSTI]

Access Agreement 2014/15 Contents 1) Introduction 3 2) Fees, Student Numbers and Fee Income 4 3, strong community spirit and excellent student life. Observing Keele's founding ethos of 'the pursuit of education for individuals, communities and society and equality of opportunity. 1.2 Our University Mission

Stell, John

302

Technology Access Deutsches Patent; Internationale Patentanmeldung (PCT)  

E-Print Network [OSTI]

Technology Access offered by Deutsches Patent; Internationale Patentanmeldung (PCT) TM 586 besitzt einen so gro�en Einfluss auf eine Vielzahl zellulä- in zahlreichen Signalwegen #12; Deutsches Störungen, Depression, Schizophrenie sowie Haarausfall und verringerte Spermienmotilität. #12; Deutsches

Haller-Dintelmann, Robert

303

Characterizing Open Access Publishing at Your Institution  

E-Print Network [OSTI]

access scholarly communication in Tanzanian public universities. 76th IFLA General Conference and Assembly, Gothenburg, Sweden. Retrieved March 3, 2014, from http://conference.ifla.org/past-wlic/2010/138-dulle-en.pdf. Gul, S., Shah, T. A., & Bhagwan, T. A...

Hubbard, David E.; Li, Yu

2014-11-03T23:59:59.000Z

304

Reactive Support and Voltage Control Service: Key Issues and Challenges  

E-Print Network [OSTI]

reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

Gross, George

305

Detailed Description of Key NIF Milestones for NNSA Description  

E-Print Network [OSTI]

1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

306

Key Factors in Displacement Ventilation Systems for Better IAQ  

E-Print Network [OSTI]

This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

Wang, X.; Chen, J.; Li, Y.; Wang, Z.

2006-01-01T23:59:59.000Z

307

NREL: News - NREL Scientists Find Key Function for Ferredoxins...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

614 NREL Scientists Find Key Function for Ferredoxins in Algae Hydrogen Production Two of six iron-rich proteins shown to have role in algae metabolism; discovery could lead to...

308

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

2000-01-01T23:59:59.000Z

309

Building America Expert Meeting: Key Innovations for Adding Energy...  

Broader source: Energy.gov (indexed) [DOE]

This report describes an expert meeting hosted by the Building America research team NAHB Research Center, which was held on February 8, 2012, in Orlando, Florida. The topic, Key...

310

Families First: Keys to Successful Family Functioning Communication  

E-Print Network [OSTI]

Families First: Keys to Successful Family Functioning Communication Rick Peterson, Extension Specialist and Assistant Professor, Department of Human Development, Virginia Tech Stephen Green, Department of Human Development, Virginia Tech www.ext.vt.edu Produced by Communications and Marketing, College

Liskiewicz, Maciej

311

Self-referenced continuous-variable quantum key distribution  

E-Print Network [OSTI]

We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

2015-01-01T23:59:59.000Z

312

Nano Lect 1 Questions and Keypoints Key Points  

E-Print Network [OSTI]

Nano Lect 1 ­ Questions and Keypoints Key Points 1. What is nano technology: a. Very small technology with device in the 1nm to 100nm lots of useful properties Questions 1. Define nanotechnology. Is an nano

Smy, Tom

313

Encrusting growth and retreat of Montastrea annularis (Anthozoa; Scleractinia) following the grounding of a freighter on Molasses Reef, Key Largo, Florida  

E-Print Network [OSTI]

). Because of its accessibility, it is one of the most visited reefs in the upper Florida Keys (Voss, 1984). Voss (1984) characterized the usage of Molasses Reef by divers as "heavya and use for fishing as "moderate". Structurally, ix, has s, well-developed... management, quantitative evaluation on destructive processes of coral is very necessary as well as that of constructive processes. It is suggested that the influence of previously discussed environmental factors on coral tissue retreat as well as growth...

Choi, Kwang-Sik

1987-01-01T23:59:59.000Z

314

SPECIAL FEATURE FACILITATION IN PLANT COMMUNITIES  

E-Print Network [OSTI]

. Horton2 1 Ecological Farming Systems, Agroscope Reckenholz-Ta¨nikon, Research Station ART, Zurich on seedling species identity, mycorrhizal identity, plant species combinations and study system. We present plant­plant interactions and by supplying and recycling nutrients. Key-words: arbuscular mycorrhizal

Horton, Tom

315

Feature recognition applications in mesh generation  

SciTech Connect (OSTI)

The use of feature recognition as part of an overall decomposition-based hexahedral meshing approach is described in this paper. The meshing approach consists of feature recognition, using a c-loop or hybrid c-loop method, and the use of cutting surfaces to decompose the solid model. These steps are part of an iterative process, which proceeds either until no more features can be recognized or until the model has been completely decomposed into meshable sub-volumes. This method can greatly reduce the time required to generate an all-hexahedral mesh, either through the use of more efficient meshing algorithms on more of the geometry or by reducing the amount of manual decomposition required to mesh a volume.

Tautges, T.J. [Sandia National Labs., Albuquerque, NM (United States); Liu, S.S.; Lu, Y.; Kraftcheck, J.; Gadh, R. [Wisconsin Univ., Madison, WI (United States). Mechanical Engineering Dept.

1997-06-01T23:59:59.000Z

316

Input from Key Stakeholders in the National Security Technology Incubator  

SciTech Connect (OSTI)

This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

None

2008-01-31T23:59:59.000Z

317

Mobile Communities Requirements and Features for Success  

E-Print Network [OSTI]

Mobile Communities ­ Requirements and Features for Success Sarah Denis Heldt Media Informatics LMU.broll@ifi.lmu.de Philipp Lehmann Burda Wireless GmbH philipp.lehmann@burda.com ABSTRACT Advancements in mobile technologies and decreasing charges are starting to leverage the mobile usage of the internet and its applications. This paper

318

Convex Principal Feature Selection Mahdokht Masaeli1  

E-Print Network [OSTI]

Advertising Sciences, Yahoo! Labs, Silicon Valley, CA, USA 3 Computer Aided Diagnosis and Therapy, Siemens Medical Solutions, USA {masaeli.m, yan.y, cui.yi}@neu.edu, glenn.fung@siemens.com, jdy transformation is achieved. However, true feature selection may not be achieved as non-sparse coefficients may

Dy, Jennifer G.

319

Feature-oriented Runtime Adaptation Mario Pukall  

E-Print Network [OSTI]

QuickSort (dark-gray background). Figure 1: Feature Evolution in a DBMS SPL. Having recreated of a DBMS1 SPL, is replaced by fea- ture QuickSort) does not aect the running program. Usu- ally, applying (according to the modi#12;cations made in the SPL). For in- stance, the changes within the DBMS SPL require

Cazzola, Walter

320

FEATURE ARTICLE 2 Kunde Hospital: Nepal  

E-Print Network [OSTI]

FEATURE ARTICLE 2 Kunde Hospital: Nepal WORK IN PROGRESS 4 Public Health in Ceylon Medical research of the Mt Everest area in Nepal who have played such an important role in Himalayan mountaineering century the region became incorporated into the Gorkha kingdom that now forms the modern nation of Nepal

Rambaut, Andrew

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

ADVANCED DIRECT MANIPULATION OF FEATURE MODELS  

E-Print Network [OSTI]

ADVANCED DIRECT MANIPULATION OF FEATURE MODELS Rafael Bidarra, Alex Noort Faculty of Electrical validity maintenance. In particular, it offers a powerful combination of various 3D handles for real and are functionally signifi- cant for some product life-cycle phase" (Bidarra and Bronsvoort, 2000). In contrast

Bidarra, Rafael

322

Features . . . Cover Crop Value to Cotton  

E-Print Network [OSTI]

Features . . . Cotton Cover Crop Value to Cotton Cotton Price and Rotation 32:12 December 2008 #12;Cotton Price and Rotation Agronomy Notes Page 2 Cotton price has been low. Either peanut or soybean should be rotated with cotton, corn, or other grasses. However, with cotton

Watson, Craig A.

323

Channel Access Client Toolbox for Matlab  

SciTech Connect (OSTI)

This paper reports on MATLAB Channel Access (MCA) Toolbox--MATLAB [1] interface to EPICS Channel Access (CA) client library. We are developing the toolbox for SPEAR3 accelerator controls, but it is of general use for accelerator and experimental physics applications programming. It is packaged as a MATLAB toolbox to allow easy development of complex CA client applications entirely in MATLAB. The benefits include: the ability to calculate and display parameters that use EPICS process variables as inputs, availability of MATLAB graphics tools for user interface design, and integration with the MATLAB-based accelerator modeling software--Accelerator Toolbox [2-4]. Another purpose of this paper is to propose a feasible path to a synergy between accelerator control systems and accelerator simulation codes, the idea known as on-line accelerator model.

Terebilo, Andrei

2002-08-07T23:59:59.000Z

324

National Radiobiology Archives distributed access programmer's guide  

SciTech Connect (OSTI)

The National Radiobiology Archives is a comprehensive effort to gather, organize, and catalog original data, representative specimens, and supporting materials related to significant radiobiology studies. This provides researchers with information for analyses which compare or combine results of these and other studies and with materials for analysis by advanced molecular biology techniques. This Programmer's Guide document describes the database access software, NRADEMO, and the subset loading script NRADEMO/MAINT/MAINTAIN, which comprise the National Laboratory Archives Distributed Access Package. The guide is intended for use by an experienced database management specialist. It contains information about the physical and logical organization of the software and data files. It also contains printouts of all the scripts and associated batch processing files. It is part of a suite of documents published by the National Radiobiology Archives.

Prather, J. C. [Linfield Coll., McMinnville, OR (United States); Smith, S. K.; Watson, C. R. [Pacific Northwest Lab., Richland, WA (United States)

1991-12-01T23:59:59.000Z

325

Non-Markovianity through accessible information  

E-Print Network [OSTI]

The degree of non-Markovianity of quantum processes has been characterized in several different ways in the recent literature. However, the relationship between the non-Markovian behavior and the flow of information between the system and the environment through an entropic measure has not been yet established. We propose an entanglement-based measure of non-Markovianity by employing the concept of assisted knowledge, where the environment E, acquires information about a system S, by means of its measurement apparatus A. The assisted knowledge, based on the accessible information in terms of von-Neumann entropy, monotonically increases in time for all Markovian quantum processes. We demonstrate that the signatures of non-Markovianity can be captured by the nonmonotonic behaviour of the assisted knowledge. We explore this scenario for a two-level system undergoing a relaxation process, through an experimental implementation using an optical approach that allows full access to the state of the environment.

F. F. Fanchini; G. Karpat; B. Çakmak; L. K. Castelano; G. H. Aguilar; O. Jiménez Farías; S. P. Walborn; P. H. Souto Ribeiro; M. C. de Oliveira

2014-06-04T23:59:59.000Z

326

Representing mechanical assemblies with features and mating conditions  

E-Print Network [OSTI]

A high-level product representation has been developed and implemented, using design features for part description and mating conditions between features for the relationships among parts. The underlying ideas are that features are necessary...

Qamar, Sayyad Zahid

1993-01-01T23:59:59.000Z

327

The Human Right to Access Electricity  

SciTech Connect (OSTI)

Electricity access is already well established within the framework of human rights, either as an implicit attribute of a pre-existing right (such as non-discrimination or sustainable development) or explicitly in the context of eliminating discrimination against women. There is also broad acknowledgement by states of the desirability of eliminating energy poverty - for all, but particularly for the rural poor, and women. (author)

Tully, Stephen

2006-04-15T23:59:59.000Z

328

Relict Geothermal Features | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-g Grant of Access(California and Hawaii). Task 3:Western Us |Relict

329

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

2010-10-19T23:59:59.000Z

330

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2007-02-06T23:59:59.000Z

331

Instruction sets for Parallel Random Access Machines. Doctoral thesis  

SciTech Connect (OSTI)

An important model of parallel computation is the Parallel Random Access Machine (PRAM), which comprises multiple processors that execute instructions synchronously and share a common memory. Formalized by Fortune and Wyllie (1978) and Goldschlager (1982), the PRAM is a much more natural model of parallel computation than older models such as combinational circuits and alternating Turing machines (Ruzzo, 1981) because the PRAM abstracts the salient features of a modern multiprocessor computer. Eventually an algorithm developed for the PRAM can be implemented on a parallel network computer such as a mesh-connected array computer (Thompson and Kung, 1977), a hypercube machine (Seitz, 1985), a cube-connected cycles machine (Preparata and Vuillemin, 1981) or a bounded degree processor network (Alt et al., 1987); on all network computers the routing of data complicates the implementation of algorithms. The PRAM provides the foundation for the design of highly parallel algorithms (Luby, 1986; Miller and Reif, 1985; among many others). This model permits the exposure of the intrinsic parallelism in a computational problem because it simplifies the communication of data through a shared memory. To quantify differences in computational performance, the time complexities of simulations between PRAMS with different instruction sets are determined. Focus is on the computational complexity of simulations between PRAMs with the following operations: multiplication, division, arbitrary left shift, arbitrary right shift, and probabilistic choice.

Trahan, J.L.

1988-08-01T23:59:59.000Z

332

Dynamic access policies for unconditionally secure secret  

E-Print Network [OSTI]

generation of cryptographic secrets · Key management in distributed environments · Multiparty computation #12 Awaji Island, Japan 2 Ueli's orders · Choose a topic related to information theoretic security · Provide an overview · Identify some open problems · Give a "nice talk" #12;ITW 2005 Awaji Island, Japan 3 A little bit

Martin, Keith

333

Auctions to gas transmission access : the British experience  

E-Print Network [OSTI]

When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

McDaniel, Tanga

2002-01-01T23:59:59.000Z

334

Distributed Random Access Algorithm: Scheduling and Congesion Control  

E-Print Network [OSTI]

This paper provides proofs of the rate stability, Harris recurrence, and ?-optimality of carrier sense multiple access (CSMA) algorithms where the random access (or backoff) parameter of each node is adjusted dynamically. ...

Jiang, Libin

335

Phase II Smart Grid Data Access Funding Opportunity Winner Announced...  

Broader source: Energy.gov (indexed) [DOE]

Phase II Smart Grid Data Access Funding Opportunity Winner Announced Phase II Smart Grid Data Access Funding Opportunity Winner Announced January 8, 2014 - 12:00am Addthis The...

336

THE INTRODUCTION OF DIRECT ACCESS IN NEW ZEALAND'S ELECTRICITY MARKET  

E-Print Network [OSTI]

of the reform: namely, direct access from consumers to the energy suppliers, or direct access, for short the negotiations between the distributing company and the energy supplier could be sufficient to generate

California at Berkeley. University of

337

amigo online access: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

338

AP1000{sup R} severe accident features and post-Fukushima considerations  

SciTech Connect (OSTI)

The AP1000{sup R} passive nuclear power plant is uniquely equipped to withstand an extended station blackout scenario such as the events following the earthquake and tsunami at Fukushima without compromising core and containment integrity. The AP1000 plant shuts down the reactor, cools the core, containment and spent fuel pool for more than 3 days using passive systems that do not require AC or DC power or operator actions. Following this passive coping period, minimal operator actions are needed to extend the operation of the passive features to 7 days using installed equipment. To provide defense-in-depth for design extension conditions, the AP1000 plant has engineered features that mitigate the effects of core damage. Engineered features retain damaged core debris within the reactor vessel as a key feature. Other aspects of the design protect containment integrity during severe accidents, including unique features of the AP1000 design relative to passive containment cooling with water and air, and hydrogen management. (authors)

Scobel, J. H.; Schulz, T. L.; Williams, M. G. [Westinghouse Electric Company, LLC, 1000 Westinghouse Dr., Cranberry Township, PA 16066 (United States)

2012-07-01T23:59:59.000Z

339

Events & Topics in Renewable Energy & the Environment featuring...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Events & Topics in Renewable Energy & the Environment featuring Chenyang Lu Events & Topics in Renewable Energy & the Environment featuring Chenyang Lu Smart Buildings with...

340

automatic archaeological feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nancy2 University NASA Ames robots to automatically detect features. Hid- den Markov Models have been used for a long time in pattern 28 Adaptive Automatic Facial Feature...

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

algorithm based feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

feature level fusion framework using two well- known biometric cryptosystems, namely, fuzzy vault 60 A stochastic algorithm for feature selection in pattern recognition...

342

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

343

Field Test of Measurement-Device-Independent Quantum Key Distribution  

E-Print Network [OSTI]

A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

2014-08-11T23:59:59.000Z

344

Security Proof of a Semi-Quantum Key Distribution Protocol  

E-Print Network [OSTI]

Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.

Walter O. Krawec

2014-11-30T23:59:59.000Z

345

ibm.com/redbooks iNotes Web Access  

E-Print Network [OSTI]

environment secure Plan for capacity Front cover #12;#12;iNotes Web Access Deployment and Administration

346

Legal Protection of Solar Access under Japanese Law  

E-Print Network [OSTI]

solar access protection were considered one of the purposes behind a 20 meter height restriction in such districts, the roadway

Bennett Jr., Frank G.

1986-01-01T23:59:59.000Z

347

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey DatesKey

348

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey Dates

349

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKeyKey

350

Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington, DC 20585on253.16582104)Key Issues Key

351

Key Concepts in Project Development and Financing in Alaska  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » KeyKeyAbout

352

Soft Multiple Winners for Sparse Feature Extraction  

E-Print Network [OSTI]

A simple and computationally inexpensive neural network method for generating sparse representations is presented. The network has a single layer of linear neurons and, on top of it, a mechanism, which assigns a winning strength for each neuron. Both input and output are real valued in contrast to many earlier methods, where either input or output must have been binary valued. Also, the sum of winning strengths does not have to be normalized as in some other approaches. The ability of the algorithm to find meaningful features is demonstrated in a simulation with images of handwritten numerals. 1. Introduction The objective of a feature extraction system is to refine data in such a way that further processing becomes easier. In classification, such a system has two basic goals. One is to remove redundancies from the data. This helps cutting down computational costs later on. Another, contradictory goal is to discriminate data, which helps in distinguishing between similar inputs. A fe...

353

LEDSGP/tools/features | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformationparticipants < LEDSGP‎ |features < LEDSGP‎ |

354

Invited Viewer Invited Viewer iSIS Portal Access  

E-Print Network [OSTI]

1 Invited Viewer Invited Viewer iSIS Portal Access Tufts "Invited Viewers" such as parents and spouses can be granted view-only access to a student's iSIS secure personal information. Students previously registered by another student or you do not have a Tufts Username and active iSIS access (most

Dennett, Daniel

355

UNIVERSITY OF ABERDEEN POLICY FOR ACCESS TO PERSONAL DATA  

E-Print Network [OSTI]

UNIVERSITY OF ABERDEEN POLICY FOR ACCESS TO PERSONAL DATA Policy for dealing with either external or internal requests to the University for access to personal and sensitive personal data in terms of the Data and outside of the University for access to personal data of staff or students held by the University

Levi, Ran

356

PeopleSoft (ERP) Finance Access Request Form User Guide  

E-Print Network [OSTI]

PeopleSoft (ERP) Finance Access Request Form User Guide Last Revised: 3/22/11 #12;PeopleSoft ERP Finance Access Request Form User Guide FINAL Last Revised: 3/22/11 Page ii REVISION CONTROL Document Title: PeopleSoft ERP Finance Access Request Form User Guide Author: IT Training & Support File Reference

de Lijser, Peter

357

Measuring Accessibility by Automobile Report # 11 in the series  

E-Print Network [OSTI]

Measuring Accessibility by Automobile Report # 11 in the series Access to Destinations Study Report by Automobile March 2010 6. 7. Author(s) 8. Performing Organization Report No. David Levinson, Bernadette Marion measures for the Twin Cities region that measure accessibility by the automobile mode over the period from

Levinson, David M.

358

CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE  

E-Print Network [OSTI]

CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE Abstract This work develops an econometric model that links credit access with agricultural profitability and investment. Using data. Econometric estimates are run for agricultural investment and profitability as a function of credit access

Foltz, Jeremy D.

359

Access Control Policies and Languages in Open Environments  

E-Print Network [OSTI]

systems is specifying and enforcing access control security policies regulating interactions between languages and coming from different systems can be combined. 1 Introduction Access control is the process should be granted or denied. Access control plays an important role in overall system security

Samarati, Pierangela

360

ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE SP-18 Revision 01  

E-Print Network [OSTI]

ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE SP-18 Page 1 Revision 01 April 17, 2007 NATIONAL HIGH ______________________________________________________ ASSOCIATE DIRECTOR for MANAGEMENT & ADMINISTRATION Brian Fairhurst #12;ELECTRICAL AREA CONTROLLED ACCESS TITLE: ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE 1.0 PURPOSE 1.1 This document establishes policy

Weston, Ken

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Statler College Research Data Center Access and Usage Policy  

E-Print Network [OSTI]

Statler College Research Data Center Access and Usage Policy Objective Access to the Statler under WVU and federal guidelines. Scope This policy applies to all Statler staff, faculty, administrators, officers, contractors and students. Policy Access to the RDC shall be limited to those authorized

Mohaghegh, Shahab

362

XML ACCESS CONTROL SYSTEMS: A COMPONENT-BASED APPROACH  

E-Print Network [OSTI]

the characteristics of XML documents, allowing the definition of access control policies that operate with a fine to the integration of the access control system with Web based systems. #12;The analysis contained in this paperCHAPTER 4 XML ACCESS CONTROL SYSTEMS: A COMPONENT-BASED APPROACH E. Damiani1 S. De Capitani di

Samarati, Pierangela

363

Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses  

E-Print Network [OSTI]

Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses Bertrand Le pipelined memory access controllers can be generated improving the pipeline access mode to RAM. We focus as unpredictable ones (dynamic address computations) in a pipeline way. 1 Introduction Actual researches

Paris-Sud XI, Université de

364

Competitive Interference-aware Spectrum Access in Cognitive Radio Networks  

E-Print Network [OSTI]

Competitive Interference-aware Spectrum Access in Cognitive Radio Networks Jocelyne Elias, Fabio studies the spectrum access problem in cognitive radio networks from a game theoretical perspective. Finally, we provide numerical results of the proposed spectrum access game in several cognitive radio

Boyer, Edmond

365

Cooperation and Learning in Multiuser Opportunistic Spectrum Access  

E-Print Network [OSTI]

for the efficient utilization of the radio frequency spectrum is opportunistic spectrum access (OSA), whereCooperation and Learning in Multiuser Opportunistic Spectrum Access Hua Liu§ , Bhaskar spectrum access net- work where spectrum opportunities are time varying and spatially inhomogeneous

Islam, M. Saif

366

MAP: Multiauctioneer Progressive Auction for Dynamic Spectrum Access  

E-Print Network [OSTI]

to access the licensed spectrum, and dynamic spectrum access (DSA) is one of the fundamental functions of CR solution according to the length of step. Index Terms--Cognitive radio, dynamic spectrum access, auction from scarcity in spectrum resource and inefficiency in spectrum usage. Cognitive radio (CR) or dynamic

Wang, Xinbing

367

UC SANTA BARBARA POLICY AND PROCEDURE Physical Access Control  

E-Print Network [OSTI]

property. A successful program is dependent on every member of the community being diligent access controls are to enhance the personal safety of the campus community and to secure University physical access controls for all facilities managed by UCSB (University facilities). Physical access

Bigelow, Stephen

368

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo  

E-Print Network [OSTI]

BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

369

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments  

E-Print Network [OSTI]

Cedar Key Aquaculture Workshop Sulfide Concentrations in Sediments and Water: Influence on Hard;ObjectivesObjectives Examine sediment sulfide levels in the SuwanneeExamine sediment sulfide levels of sulfide on hard clam survivalsurvival #12;MethodsMethods SedimentSediment porewaterporewater samples

Florida, University of

370

Dictionaries Using Variable-Length Keys and Data, with Applications *  

E-Print Network [OSTI]

(Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

Blelloch, Guy E.

371

TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt  

E-Print Network [OSTI]

·38 TICKS: KEY TO GENERA IN UNITED STATES Harry D. Pratt I Capitulum inferior; scutum absent. without definite sutural line. anus, indistinct, or absent. j ~ I lated .... ~ :. / ORNITHODOROS I ment Mouthparts much longer than ..~".'LJv--_, .0",,,,L } }_..., ---'~':r,.-.__.{ Mouthparts as long as basis

372

news and views A key issue for hydrogen storage materi-  

E-Print Network [OSTI]

news and views A key issue for hydrogen storage materi- als is that the hydrogenation and dehydro be possible to discover stable hydrogen hydrates with higher storage Hydrogen Posture Plan www.eere.energy.gov/hydrogenandfuelcells/pdfs/ hydrogen_posture_plan.pdf 7. Kuhs, W

Palumbi, Stephen

373

Using Key Performance Indicators to Manage Energy Costs  

E-Print Network [OSTI]

-effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

Van Gorp, J. C.

2005-01-01T23:59:59.000Z

374

Page 1 of 4 Creating and Submitting a Key Request  

E-Print Network [OSTI]

of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

Howitt, Ivan

375

Cold Boot Key Recovery by Solving Polynomial Systems with Noise  

E-Print Network [OSTI]

Cold Boot Key Recovery by Solving Polynomial Systems with Noise Martin Albrecht and Carlos Cid 1 proposed in [9]; the technique was called Cold Boot attacks. When considering block ciphers Cold Boot attacks, was proposed in [9] and also provided an insight into the strength of a particular

Sheldon, Nathan D.

376

The Seven Keys to Success in Energy Management and Conservation  

E-Print Network [OSTI]

This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

Darby, D. F.

1984-01-01T23:59:59.000Z

377

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK  

E-Print Network [OSTI]

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK Murat Cihan1 and C¸etin Kaya Ko¸c2,3 1 I@eecs.oregonstate.edu Abstract. Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols

378

Termites, elephants and fire are key drivers of tree mortality  

E-Print Network [OSTI]

mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

379

Daylight quantum key distribution over 1.6 km  

E-Print Network [OSTI]

Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

2000-01-25T23:59:59.000Z

380

Key words: STREAMLINE, yeast, scale up, automation, sanitization.  

E-Print Network [OSTI]

adsorption by defining a realistic process example at small scale and taking it all the way up to a fullyKey words: STREAMLINE, yeast, scale up, automation, sanitization. Abstract This application note was evaluated by performing a sanitization study in which the column and system were challenged with culture

Lebendiker, Mario

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Highly Efficient Quantum Key Distribution Immune to All Detector Attacks  

E-Print Network [OSTI]

Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

2014-10-10T23:59:59.000Z

382

Essentials of Energy Key concepts for the day  

E-Print Network [OSTI]

Essentials of Energy 4/14/05 Key concepts for the day Markets monopoly Substitution volatility Energy intensity Levelized costs externalities I. Market essentials Are there working energy markets · international geo-political issues Speculation Long lead times for development so supply is not very responsive

383

PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches  

E-Print Network [OSTI]

Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

384

BERNAL and RESTREPO Key issues for decentralization in municipal  

E-Print Network [OSTI]

BERNAL and RESTREPO Key issues for decentralization in municipal wastewater treatment Diana Paola, the inadequate management and disposal of wastewater and the implementation of sophisticated treatment systems is the decentralisation in wastewater treatment. In this article, it is proposed an overview of the state of the art

Boyer, Edmond

385

Public-Key Locally-Decodable Codes Brett Hemenway  

E-Print Network [OSTI]

Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

Ostrovsky, Rafail

386

In 2010 a group of key forestry players  

E-Print Network [OSTI]

Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

387

The U.S. ISO Key Project on Quasars  

E-Print Network [OSTI]

Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

1998-09-22T23:59:59.000Z

388

Architecture of the Secoqc Quantum Key Distribution network  

E-Print Network [OSTI]

The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

Mehrdad Dianati; Romain Alleaume

2006-10-25T23:59:59.000Z

389

The Design of a Group Key Agreement API Giuseppe Ateniese  

E-Print Network [OSTI]

and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

Kim, Dae-Shik

390

Cryptanalysis of two knapsack public-key cryptosystems  

E-Print Network [OSTI]

Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

391

Putting cancer in focusPathologists key to picking the  

E-Print Network [OSTI]

Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

Eichman, Brandt F.

392

Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes  

E-Print Network [OSTI]

Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

393

Key issues of FED/INTOR impurity control system  

SciTech Connect (OSTI)

A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

Abdou, M.A.

1982-10-01T23:59:59.000Z

394

The Key Coal Producers ONLINE SUPPORTING MATERIALS to  

E-Print Network [OSTI]

The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

Patzek, Tadeusz W.

395

SUBJECT ACCESS REQUEST PROCEDURE The Data Protection Act 1998 (DPA) entitles individuals to request access to any personal  

E-Print Network [OSTI]

access to any personal data that the University is holding about them. This is known as a `Subject Access Request' (SAR). This information explains the process for obtaining your personal data. The Process AllSUBJECT ACCESS REQUEST PROCEDURE The Data Protection Act 1998 (DPA) entitles individuals to request

Mumby, Peter J.

396

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND My signature on the "Mobile Technology Access and Payment Option Request"  

E-Print Network [OSTI]

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

Oregon, University of

397

File: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Remote Access Service  

E-Print Network [OSTI]

to connecting. You must be approved by your Responsibility Center Administrator to access Network ConnectFile: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Restricted University Online Resources Using Network Connect on the Secure Remote Access Service Table

Jiang, Huiqiang

398

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

399

Open Access: From Myth to Paradox  

ScienceCinema (OSTI)

True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculate on the sociology of the next generation of users.

Paul Ginsparg

2010-01-08T23:59:59.000Z

400

Access Venture Partners | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpenWende NewSowitecAWS Ocean Energy Ltd JumpAbraxa IFSAccentAccess

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Accessibility Standard Statement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility About

402

Accessing the Laboratory | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility Home |

403

Accounts & Access | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility Home | Account

404

Access to Clean Water | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility Vitaly YakimenkoAccess

405

Utility Data Accessibility Map | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: Salt Lake City, Utah Zip: 84111Jump to:AccessUtility

406

ACCESS 2010 Level 1 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment(October-DecemberBasedToward a MoreA RisingA1AFromDepartmentACCESS

407

2e Carbon Access | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place:ReferenceEditWisconsin:YBR14Information 20ElectionAccess

408

Remote Access Options | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAXBalancedDepartment ofColumbusReport #Study |RegionalRelated LinksAccess to

409

Access Your Files | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access your files

410

Visual Text Features for Image Matching Sam S. Tsai1  

E-Print Network [OSTI]

Visual Text Features for Image Matching Sam S. Tsai1 , Huizhong Chen1 , David Chen1 , Vasu features that are based on text in cameraphone images. A robust text detection algorithm locates individual the visual text features in a way that resembles image features. We calculate their location, scale

Girod, Bernd

411

Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,  

E-Print Network [OSTI]

Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

Zheng, Yuliang

412

ENGINEERED BARRIER SYSTEM FEATURES, EVENTS AND PROCESSES  

SciTech Connect (OSTI)

The purpose of this report is to evaluate and document the inclusion or exclusion of engineered barrier system (EBS) features, events, and processes (FEPs) with respect to models and analyses used to support the total system performance assessment for the license application (TSPA-LA). A screening decision, either Included or Excluded, is given for each FEP along with the technical basis for exclusion screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.114 (d, e, and f) [DIRS 173273]. The FEPs addressed in this report deal with those features, events, and processes relevant to the EBS focusing mainly on those components and conditions exterior to the waste package and within the rock mass surrounding emplacement drifts. The components of the EBS are the drip shield, waste package, waste form, cladding, emplacement pallet, emplacement drift excavated opening (also referred to as drift opening in this report), and invert. FEPs specific to the waste package, cladding, and drip shield are addressed in separate FEP reports: for example, ''Screening of Features, Events, and Processes in Drip Shield and Waste Package Degradation'' (BSC 2005 [DIRS 174995]), ''Clad Degradation--FEPs Screening Arguments (BSC 2004 [DIRS 170019]), and Waste-Form Features, Events, and Processes'' (BSC 2004 [DIRS 170020]). For included FEPs, this report summarizes the implementation of the FEP in the TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from TSPA-LA (i.e., why the FEP is excluded). This report also documents changes to the EBS FEPs list that have occurred since the previous versions of this report. These changes have resulted due to a reevaluation of the FEPs for TSPA-LA as identified in Section 1.2 of this report and described in more detail in Section 6.1.1. This revision addresses updates in Yucca Mountain Project (YMP) administrative procedures as they pertain to this report; the current procedures are addressed in Section 2. This revision also addresses updates to the technical basis in supporting analysis and model reports and corroborative documentation, as presented in Sections 4 and 6 of this report. Finally, Sections 4, 5, and 6 of this report provide additional information pertaining to the relevant FEPs-related Acceptance Criteria presented in ''Yucca Mountain Review Plan, Final Report'' (YMRP) (NRC 2003 [DIRS 163274], Sections 2.2.1.2.1.3 and 2.2.1.3.3.3).

Jaros, W.

2005-08-30T23:59:59.000Z

413

Quantum features of consciousness, computers and brain  

E-Print Network [OSTI]

Many people believe that mysterious phenomenon of consciousness may be connected with quantum features of our world. The present author proposed so-called Extended Everett's Concept (EEC) that allowed to explain consciousness and super-consciousness (intuitive knowledge). Brain, according to EEC, is an interface between consciousness and super-consciousness on the one part and body on the other part. Relations between all these components of the human cognitive system are analyzed in the framework of EEC. It is concluded that technical devices improving usage of super-consciousness (intuition) may exist.

Michael B. Mensky

2009-10-22T23:59:59.000Z

414

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation InExplosionAnnouncements Media ContactCenterFeature Stories and

415

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News] Final RecoveryNovemberJanuaryFeature

416

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News] FinalSeptember 28,8, 2011 [Feature

417

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [Feature Stories and

418

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [Feature Stories

419

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [Feature Stories7,

420

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [Feature Stories7,4,

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [Feature

422

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [FeatureAugust 27,

423

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [FeatureAugust 27,May

424

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [FeatureAugust

425

ARM - Feature Stories and Releases Article  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation(AVIRIS) ProductsAirborneOctober 11, 2011 [Facility News]January 18, 2006 [FeatureAugustJanuary

426

Featured Licensing Professional - Energy Innovation Portal  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature Stories News

427

Featured Technical Reports | netl.doe.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFORFALL NEWS ROCKY MOUNTAINFastFeature Stories

428

Category:Topographic Features | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin: EnergyBostonFacilityCascadeJumpInformationcontainingTerritories ofFeatures

429

Satellite stories featured in Lab lecture series  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassiveSubmitted for USMaterialstheterahertz sourcesSatellite stories featured

430

Accessing TRANSP Output: A User's Guide Accessing TRANSP Output: A User's Guide  

E-Print Network [OSTI]

of such TRANSP analyses are stored on magnetic and laser disk on a VMS VAX cluster. The purpose of this User's . Guide is to describe how to access these analysis results in graphical form on a VAX system. The reader is not expected to have specialized VAX knowledge, although familiarity with fundamentals (e.g. how to log in

Princeton Plasma Physics Laboratory

431

Redeeming features of in situ combustion  

SciTech Connect (OSTI)

In situ combustion remains the most tantalizing enhanced oil recovery method. It has been tested extensively - in over 150 field tests - in both heavy and light oil reservoirs. What we have learned from this experience is that in situ combustion works under most conditions, but the nature of the problems is such that it is seldom profitable. Also, looking at many previous in situ combustion tests, steam injection, and even waterflooding, would have been a better choice. Yet in situ combustion has unique features not found in any other EOR method. These must be weighed against its shortcomings to evaluate a potential application. This paper discusses the redeeming features of in situ combustion, in particular the reservoir conditions under which in situ combustion may be superior to other EOR methods are outlined. All variations of in situ combustion - forward, reverse, wet, dry - as well as combinations with other EOR methods are considered. The conclusions is that in situ combustion still has a place, and its future application would depend on research on certain crucial aspects of the process.

Farouq Ali, S.M. [Univ. of Alberta, Edmonton (Canada)

1995-02-01T23:59:59.000Z

432

Public key Steganography Using Discrete Cross-Coupled Chaotic Maps  

E-Print Network [OSTI]

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

2012-11-01T23:59:59.000Z

433

I t=106sec3a 10 Energy key) 10'  

E-Print Network [OSTI]

. Optics for EUV, X-Ray, and Gamma-Ray Astronomy II, edited by Oberto Citterio, Stephen L. O'Dell, ProcRXTE HE& I t=106sec3a - AEIEH/2 a =10 - 10 Energy key) 10' IBIS NuSTAR Hard X-ray Optics Jason ESTAR will be the first satellite mission to employ focusing optics in the hard X-ray band (8- 80 keV). Its design

434

Economy key to 1992 U. S. oil, gas demand  

SciTech Connect (OSTI)

This paper provides a forecast US oil and gas markets and industry in 1992. An end to economic recession in the U.S. will boost petroleum demand modestly in 1992 after 2 years of decline. U.S. production will resume its slide after a fractional increase in 1991. Drilling in the U.S. will set a record low. Worldwide, the key questions are economic growth and export volumes from Iraq, Kuwait, and former Soviet republics.

Beck, R.J.

1992-01-27T23:59:59.000Z

435

City of Key West, Florida (Utility Company) | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhio (UtilityHolyrood, Kansas (Utility Company)JohnsonKennett, MissouriKey

436

New Approach to Quantum Key Distribution Via Quantum Encryption  

E-Print Network [OSTI]

In this Paper, we investigate the security of Zhang, Li and Guo quantum key distribution via quantum encryption protocol [$\\text{Phys. Rev. A} \\textbf{64}, 24302 (2001)$] and show that it is not secure against some of Eve's attacks and with the probability one half she gets all of keys without being detected by the two parties. The main defect in this protocol is that there is an attack strategy by which Eve can change the previously shared Bell state between Alice and Bob to two Bell states among herself and Alice and Bob. Hence, we show that with probability $1/d$ its generalization to $d$-dimension systems is not secure and show that its extension to the case of more partners based on the reusable GHZ states is not secure and with probability one half Eve gets all of keys without being detected by the two parties. In what follows, we show how in going to higher dimensions those protocols can be repaired.

A. Fahmi

2006-04-25T23:59:59.000Z

437

A Comparison of Key PV Backsheet and Module Properties from Fielded...  

Broader source: Energy.gov (indexed) [DOE]

of Key PV Backsheet and Module Properties from Fielded Module Exposures and Accelerated Test Conditions A Comparison of Key PV Backsheet and Module Properties from Fielded...

438

Recommendations for mass spectrometry data quality metrics for open access data(corollary to the Amsterdam principles)  

SciTech Connect (OSTI)

Policies supporting the rapid and open sharing of proteomic data are being implemented by the leading journals in the field. The proteomics community is taking steps to ensure that data are made publicly accessible and are of high quality, a challenging task that requires the development and deployment of methods for measuring and documenting data quality metrics. On September 18, 2010, the U.S. National Cancer Institute (NCI) convened the 'International Workshop on Proteomic Data Quality Metrics' in Sydney, Australia, to identify and address issues facing the development and use of such methods for open access proteomics data. The stakeholders at the workshop enumerated the key principles underlying a framework for data quality assessment in mass spectrometry data that will meet the needs of the search community, journals, funding agencies, and data repositories. Attendees discussed and agreed upon two primary needs for the wide use of quality metrics: (i)an evolving list of comprehensive quality metrics and (ii)standards accompanied by software analytics. Attendees stressed the importance of increased education and training programs to promote reliable protocols in proteomics. This workshop report explores the historic precedents, key discussions, and necessary next steps to enhance the quality of open access data. By agreement, this article is published simultaneously in Proteomics, Proteomics Clinical Applications, Journal of Proteome Research, and Molecular and Cellular Proteomics, as a public service to the research community.The peer review process was a coordinated effort conducted by a panel of referees selected by the journals.

Kingsinger, Christopher R.; Apffel, James; Baker, Mark S.; Bian, Xiaopeng; Borchers, Christoph H.; Bradshaw, Ralph A.; Brusniak, Mi-Youn; Chan, Daniel W.; Deutsch, Eric W.; Domon, Bruno; Gorman, Jeff; Grimm, Rudolf; Hancock, William S.; Hermjakob, Henning; Horn, David; Hunter, Christie; Kolar, Patrik; Kraus, Hans-Joachim; Langen, Hanno; Linding, Rune; Moritz, Robert L.; Omenn, Gilbert S.; Orlando, Ron; Pandey, Akhilesh; Ping, Peipei; Rahbar, Amir; Rivers, Robert; Seymour, Sean L.; Simpson, Richard J.; Slotta, Douglas; Smith, Richard D.; Stein, Stephen E.; Tabb, David L.; Tagle, Danilo; Yates, John R.; Rodriguez, Henry

2011-12-01T23:59:59.000Z

439

Instruction sets for Parallel Random Access Machines  

SciTech Connect (OSTI)

The computational powers of time-bounded Parallel Random Access Machines (PRAMs) with different instruction sets are compared. A basic PRAM can perform the following operations in unit-time: addition, subtraction, Boolean operations, comparisons, and indirect addressing. Multiple processors may concurrently read and concurrently write a single cell. This thesis establishes that the class of languages accepted in polynomial time on a PRAM(*, {up arrow}, {down arrow}) contains the class of languages accepted in exponential time on a nondeterministic Turing machine (NEXPTIME) and is contained in the class of languages accepted in exponential space on a Turing machine. Efficient simulations are presented of PRAMs with enhanced instruction sets by sequential RAMs with the same instruction sets; also simulations of probabilistic PRAMs by deterministic PRAMs, using parallelism to replace randomness. Also given are simulations of PRAM(op)s by PRAMs, where both the simulated machine and the simulating machine are exclusive-read, exclusive-write machines.

Trahan, J.L.

1988-01-01T23:59:59.000Z

440

Remote direct memory access over datagrams  

DOE Patents [OSTI]

A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

2014-12-02T23:59:59.000Z

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Direct memory access transfer completion notification  

DOE Patents [OSTI]

Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

2010-07-27T23:59:59.000Z

442

Energy for sustainable development: Key issues and challenges  

SciTech Connect (OSTI)

Energy generation and use are strongly linked to all elements of sustainable development such as economic, social, and environmental. The history of human development rests on the availability and use of energy, the transformation from the early use of fire and animal power that improved lives, to the present world with use of electricity and clean fuels for a multitude of purposes. Energy is the neglected issue of the development debate. The lack of access to reliable and clean energy supplies is a major barrier to improving human well-being around the globe. There are an estimated 1.6 billion people living in the rural areas of developing countries who lack access to electricity, and so dependence on fossil fuels. Combustion of fossil fuels produces large amounts of CO{sub 2}, an important greenhouse gas. In response to increasing concern about the effect of anthropogenic greenhouse gases on global climate, international action has been agreed to reduce these emissions. On the other hand, renewable energy is the great, barely tapped solution to the two great challenges of the coming century such as poverty and global warming. Not only can renewable energy provide a clean, flexible power source for homes, schools and hospitals, at the micro-to-medium scale it has huge potential to create meaningful and useful jobs.

Kaygusuz, K. [Karadeniz Technical University, Trabzon (Turkey). Dept. of Chemistry

2007-07-01T23:59:59.000Z

443

EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel  

E-Print Network [OSTI]

EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel access device. In order to obtain fuel from for access. Employee access is not required for the U-M fleet vehicle equipped with an automated fuel device

Kirschner, Denise

444

Features, Events, and Processes: Disruptive Events  

SciTech Connect (OSTI)

The primary purpose of this analysis is to evaluate seismic- and igneous-related features, events, and processes (FEPs). These FEPs represent areas of natural system processes that have the potential to produce disruptive events (DE) that could impact repository performance and are related to the geologic processes of tectonism, structural deformation, seismicity, and igneous activity. Collectively, they are referred to as the DE FEPs. This evaluation determines which of the DE FEPs are excluded from modeling used to support the total system performance assessment for license application (TSPA-LA). The evaluation is based on the data and results presented in supporting analysis reports, model reports, technical information, or corroborative documents that are cited in the individual FEP discussions in Section 6.2 of this analysis report.

J. King

2004-03-31T23:59:59.000Z

445

Component with inspection-facilitating features  

DOE Patents [OSTI]

A turbine airfoil can be formed with features to facilitate measurement of its wall thickness. An outer wall of the airfoil can include an outer surface and an inner surface. The outer surface of the airfoil can have an outer inspection target surface, and the inner surface of the airfoil can have an inner inspection target surface. The inner and outer target surfaces can define substantially flat regions in surfaces that are otherwise highly contoured. The inner and outer inspection target surfaces can be substantially aligned with each other. The inner and outer target surfaces can be substantially parallel to each other. As a result of these arrangements, a highly accurate measurement of wall thickness can be obtained. In one embodiment, the outer inspection target surface can be defined by an innermost surface of a groove formed in the outer surface of the outer wall of the airfoil.

Marra, John J; Zombo, Paul J

2014-02-11T23:59:59.000Z

446

Multiplicity features of adiabatic autothermal reactors  

SciTech Connect (OSTI)

In this paper singularity theory, large activation energy asymptotic, and numerical methods are used to present a comprehensive study of the steady-state multiplicity features of three classical adiabatic autothermal reactor models: tubular reactor with internal heat exchange, tubular reactor with external heat exchange, and the CSTR with external heat exchange. Specifically, the authors derive the exact uniqueness-multiplicity boundary, determine typical cross-sections of the bifurcation set, and classify the different types of bifurcation diagrams of conversion vs. residence time. Asymptotic (limiting) models are used to determine analytical expressions for the uniqueness boundary and the ignition and extinction points. The analytical results are used to present simple, explicit and accurate expressions defining the boundary of the region of autothermal operation in the physical parameter space.

Lovo, M.; Balakotaiah, V. (Houston Univ., TX (United States). Dept. of Chemical Engineering)

1992-01-01T23:59:59.000Z

447

Innovative safety features of the modular HTGR  

SciTech Connect (OSTI)

The Modular High Temperature Gas-Cooled Reactor (MHTGR) is an advanced reactor concept under development through a cooperative program involving the US Government, the nuclear industry, and the utilities. Near-term development is focused on electricity generation. The top-level safety requirement is that the plant's operation not disturb the normal day-to-day activities of the public. Quantitatively, this requires that the design meet the US Environmental Protection Agency's Protective Action Guides at the site boundary and hence preclude the need for sheltering or evacuation of the public. To meet these stringent safety requirements and at the same time provide a cost competitive design requires the innovative use of the basic high temperature gas-cooled reactor features of ceramic fuel, helium coolant, and a graphite moderator. The specific fuel composition and core size and configuration have been selected to the use the natural characteristics of these materials to develop significantly higher margins of safety. In this document the innovative safety features of the MHTGR are reviewed by examining the safety response to events challenging the functions relied on to retain radionuclides within the coated fuel particles. A broad range of challenges to core heat removal are examined, including a loss of helium pressure of a simultaneous loss of forced cooling of the core. The challenges to control of heat generation consider not only the failure to insert the reactivity control systems but also the withdrawal of control rods. Finally, challenges to control of chemical attack of the ceramic-coated fuel are considered, including catastrophic failure of the steam generator, which allows water ingress, or failure of the pressure vessels, which allows air ingress. The plant's response to these extreme challenges is not dependent on operator action, and the events considered encompass conceivable operator errors.

Silady, F.A.; Simon, W.A.

1992-01-01T23:59:59.000Z

448

Innovative safety features of the modular HTGR  

SciTech Connect (OSTI)

The Modular High Temperature Gas-Cooled Reactor (MHTGR) is an advanced reactor concept under development through a cooperative program involving the US Government, the nuclear industry, and the utilities. Near-term development is focused on electricity generation. The top-level safety requirement is that the plant`s operation not disturb the normal day-to-day activities of the public. Quantitatively, this requires that the design meet the US Environmental Protection Agency`s Protective Action Guides at the site boundary and hence preclude the need for sheltering or evacuation of the public. To meet these stringent safety requirements and at the same time provide a cost competitive design requires the innovative use of the basic high temperature gas-cooled reactor features of ceramic fuel, helium coolant, and a graphite moderator. The specific fuel composition and core size and configuration have been selected to the use the natural characteristics of these materials to develop significantly higher margins of safety. In this document the innovative safety features of the MHTGR are reviewed by examining the safety response to events challenging the functions relied on to retain radionuclides within the coated fuel particles. A broad range of challenges to core heat removal are examined, including a loss of helium pressure of a simultaneous loss of forced cooling of the core. The challenges to control of heat generation consider not only the failure to insert the reactivity control systems but also the withdrawal of control rods. Finally, challenges to control of chemical attack of the ceramic-coated fuel are considered, including catastrophic failure of the steam generator, which allows water ingress, or failure of the pressure vessels, which allows air ingress. The plant`s response to these extreme challenges is not dependent on operator action, and the events considered encompass conceivable operator errors.

Silady, F.A.; Simon, W.A.

1992-01-01T23:59:59.000Z

449

Law-Aware Access Control and its Information Model  

E-Print Network [OSTI]

Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

Stieghahn, Michael

2010-01-01T23:59:59.000Z

450

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal  

E-Print Network [OSTI]

Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

451

Symmetrical Multilevel Diversity Coding with an All-Access Encoder  

E-Print Network [OSTI]

and L randomly accessible en- coders 1 to L. A total of L + 1 independent discrete memoryless sources (S0, S1, . . . , SL) are to be encoded at the encoders. The decoder, which has access to encoder 0 and a subset U of the ran- domly accessible... with polyhedral cone being the first quadrant and L + 2 faces. . . . . . . . . . . . . . 24 3 An illustration of the sliding windows of length ? when the in- tegers 1, . . . , L are circularly placed (clockwise) based on their natural order...

Marukala, Neeharika

2012-07-16T23:59:59.000Z

452

Using Digital Technology to Access And Store African Art  

E-Print Network [OSTI]

Using Digital Technology to Access And Store African Art Gary Marsden, Katherine Malan & Edwin Blake Collaborative Visual Computing Group, Department of Computer Science, University of Cape Town +27

Blake, Edwin

453

access control mechanism: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...

454

access control framework: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web and directly access device resources....

455

access to information: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the Protocol of Corporate Governance in the Public Sector (1997), the Public Finance Management Act of 1999 Jarrett, Thomas H. 2 Access to Geographic Information: Openness versus...

456

access industry profile: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hired can help you build a career Access information about713 Complete Your Profile -- Logging into Huskies Get Hired Log into your Huskies Get Hired account...

457

access communication datac: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Open learner models, communication, multiple users. 1 Introduction Open learner models (OLM) are learner models that are accessible Bull, Susan 111 Channel modelling and relay for...

458

access memory devices: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Information Sciences Websites Summary: magnetic disks, such as lower access latency, lower power consumption, lack of noise, and shock resistance of traditional...

459

access devices evaluation: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

unnecessarily long query processing times, since web accesses exhibit high and variable latency. Fortunately, web sources can be probed in parallel, and each source can typically...

460

accelerating access initiative: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nuovo database 12;26-04-2010 2 7 programma di gestione di database (cio un DBMS) Access offre: un supporto transazionale limitato Anselma, Luca 455 Dynamical...

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

University of Utah Registrar's Office Security Access Deletion Form  

E-Print Network [OSTI]

Access Student Records Web Reports DARS (Class rolls, picture rosters, etc.) Comments/Additional Information FOR REGISTRAR'S OFFICE USE ONLY ACS Administrator Date Student Systems Administrator Date DARS

Feschotte, Cedric

462

arabidopsis thaliana accessions: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

occurring variation is an important alternative resource for functional genetics and genomics research.; In a well-characterized collection of Arabidopsis thaliana accessions, we...

463

Health care access, utilization and barriers among injection drug users.  

E-Print Network [OSTI]

?? Background: To curb the transmission of HIV/AIDS and other infectious diseases several studies indicate the need for improved access to medical care for injection… (more)

Oche, Ishaka

2015-01-01T23:59:59.000Z

464

Tri-Party Agreement databases, access mechanism and procedures  

SciTech Connect (OSTI)

This document contains the information required for the Washington State Department of Ecology (Ecology) and the US Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order [also known as the Tri-Party Agreement (TPA)] (Ecology et al. 1992). It identifies the procedure required to obtain access to the Hanford computer networks and the TPA related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford networks.

Brulotte, P.J.; Christensen, K.C.

1993-10-01T23:59:59.000Z

465

access policies tutela: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

os estudantes lembraram a Jos Ferreira Gomes Instituto de Sistemas e Robotica 3 Policy 3507 Information Technology Accessibility 1 OLD DOMINION UNIVERSITY Computer...

466

Microsoft Word - CX-Ross-Lexington_access_road_WEB.doc  

Broader source: Energy.gov (indexed) [DOE]

Darin Bowman Project Manager - TELF-TPP-3 Proposed Action: Access road repair including reconstructing, grading, and shaping of roads, placing and compacting of rock surfacing,...

467

Application for Permit to Construct Access Driveway Facilities...  

Open Energy Info (EERE)

ROW Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Permit ApplicationPermit Application: Application for Permit to Construct Access Driveway...

468

Accessing Low-Cost Capital Through Securitization (Poster)  

SciTech Connect (OSTI)

Poster for Solar Power International conference presents information on NREL's effort to open capital markets through securitization via Solar Access to Public Capital (SAPC) working group's efforts.

Mendelsohn, M.

2014-10-01T23:59:59.000Z

469

Reducing rural poverty through increased access to energy services...  

Open Energy Info (EERE)

rural poverty through increased access to energy services: a review of the multifunctional platform project in Mali Jump to: navigation, search Tool Summary LAUNCH TOOL Name:...

470

Boyer-Tillamook Access Road Improvement Project 1 Finding of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

dangerous. In addition, improvements to access road stream crossings would facilitate fish passage. Construction is expected to last from 2 to 4 months, although work may need to...

471

Effect of memory access and caching on high performance computing.  

E-Print Network [OSTI]

??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers… (more)

Groening, James

2012-01-01T23:59:59.000Z

472

National Geothermal Data Systems Data Acquisition and Access  

Broader source: Energy.gov (indexed) [DOE]

and Access Principal Investigator Walter S. Snyder Boise State University National Geothermal Data System May 18, 2010 This presentation does not contain any proprietary...

473

City of San Jose- Solar Access Design Guidelines  

Broader source: Energy.gov [DOE]

The San Jose Environmental Services Department has developed voluntary guidelines to encourage solar orientation in new construction. These Solar Access Design Guidelines specify that the long...

474

SUMMARY: PEST RISK ANALYSIS FOR PHYTOPHTHORA RAMORUM This summary presents the main features of a Pest Risk Analysis (PRA) which has been  

E-Print Network [OSTI]

SUMMARY: PEST RISK ANALYSIS FOR PHYTOPHTHORA RAMORUM This summary presents the main features of a Pest Risk Analysis (PRA) which has been conducted on Phytophthora ramorum as the key deliverable from the EU-funded RAPRA Project. The PRA was prepared according to the EPPO Standard `Guidelines on Pest Risk

475

Classification and Feature Extraction in Man and Machine  

E-Print Network [OSTI]

Classification and Feature Extraction in Man and Machine Dissertation zur Erlangung des Grades stimuli and for their subsequent classification. A methodology combining human psychophysics and machine learning is introduced, where feature extractors are modeled using methods from unsupervised machine

476

A hybrid ANN/DBN approach to articulatory feature recognition   

E-Print Network [OSTI]

Artificial neural networks (ANN) have proven to be well suited to the task of articulatory feature (AF) recognition. Previous studies have taken a cascaded approach where separate ANNs are trained for each feature group, making the assumption...

Frankel, Joe; King, Simon

2005-01-01T23:59:59.000Z

477

37th World Energy Engineering Congress / Featuring GreenStreet...  

Broader source: Energy.gov (indexed) [DOE]

Congress Featuring GreenStreet 37th World Energy Engineering Congress Featuring GreenStreet October 1, 2014 2:00PM EDT to October 2, 2014 10:00PM EDT Washington, DC http:...

478

Feature-based design of solids with local composition control  

E-Print Network [OSTI]

This thesis presents a parametric and feature-based methodology for the design of solids with local composition control (LCC). A suite of composition design features are conceptualized and implemented. The designer can use ...

Liu, Hongye, 1970-

2004-01-01T23:59:59.000Z

479

Feb. 9 Event at Jefferson Lab Features Chemistry Demonstrations...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Feb. 9 Event at Jefferson Lab Features Chemistry Demonstrations Set to Pop Music NEWPORT NEWS, Va., Feb. 2, 2010 - Jefferson Lab's Feb. 9 Science Series event will feature members...

480

ARPA-E Announces 2012 Energy Innovation Summit Featuring Bill...  

Broader source: Energy.gov (indexed) [DOE]

2012 Energy Innovation Summit Featuring Bill Gates, Fred Smith and Lee Scott ARPA-E Announces 2012 Energy Innovation Summit Featuring Bill Gates, Fred Smith and Lee Scott September...

Note: This page contains sample records for the topic "access key features" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Advertiser retains sole responsibility for content ADVERTISEMENT FEATURE  

E-Print Network [OSTI]

Advertiser retains sole responsibility for content ADVERTISEMENT FEATURE T okyo University to combat global food shortages, monitoring air pollution in East Asia and safeguarding the world's energy abilitiesinyoungresearchers." #12;Advertiser retains sole responsibility for content ADVERTISEMENT FEATURE and then use

Cai, Long

482

Key results from SB8 simulant flowsheet studies  

SciTech Connect (OSTI)

Key technically reviewed results are presented here in support of the Defense Waste Processing Facility (DWPF) acceptance of Sludge Batch 8 (SB8). This report summarizes results from simulant flowsheet studies of the DWPF Chemical Process Cell (CPC). Results include: Hydrogen generation rate for the Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) cycles of the CPC on a 6,000 gallon basis; Volume percent of nitrous oxide, N2O, produced during the SRAT cycle; Ammonium ion concentrations recovered from the SRAT and SME off-gas; and, Dried weight percent solids (insoluble, soluble, and total) measurements and density.

Koopman, D. C.

2013-04-26T23:59:59.000Z

483

Orthogonal-state-based protocols of quantum key agreement  

E-Print Network [OSTI]

Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based protocols arise from monogamy of entanglement. This is in contrast to the existing protocols of QKA where security arises from the use of non-orthogonal state (non-commutativity principle). Further, it is shown that all the quantum systems that are useful for implementation of quantum dialogue and most of the protocols of secure direct quantum communication can be modified to implement protocols of QKA.

Chitra Shukla; Nasir Alam; Anirban Pathak

2013-10-05T23:59:59.000Z

484

2014 CATEE: Collaboration is the Key- Public/Private Partnerships  

E-Print Network [OSTI]

, Texas Nov. 18-20 HGOC Education and Outreach ? District Meetings ? Peer Exchange ? Workshops ? Webinars ? One-on-One Trainings ? Newsletters ? Social media ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18...2014 CATEE Collaboration is the Key - Public/Private Partnerships November 19, 2014 Lisa Lin, Sustainability Manager, City of Houston ESL-KT-14-11-24 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 City of Houston...

Lin, L.

2014-01-01T23:59:59.000Z

485

LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 ThrottledInformation KumasiTools < LEDSGP‎ | DIA-Toolkit Jump<Key

486

NERSC Played Key Role in Nobel Laureate's Discovery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSC logos arePlayed Key Role in Nobel

487

NNSA Administrator, Three Lab Directors Tour Key Weapons Facility |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKey ActionsThe NextAwards

488

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey Dates

489

Key Dates | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 IndustrialIsadore Perlman, 1960 The Ernest OrlandoJohn B.Jorge LuisKayeKey

490

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA Key

491

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyA

492

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAA

493

A Key Enzyme to the Potency of an Anticancer Agent  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICSHe β-Research andA Hollow-IonHybridA KeyAAA

494

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key to

495

Iron is the Key to Preserving Dinosaur Soft Tissue  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for andFuel-Efficient Engines |Iron is the Key toIron is

496

Key Activities in Energy Efficiency | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 | Department7JanuaryWASTE-TO-ENERGY:About » Key Activities

497

GE Key Partner in Innovation Institutes | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky Learning Fun with Big SkyDIII-D Performance ToolsGlobalIs Key

498

Key Activities in Wind Energy | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |EnergyonSupport0.pdf5 OPAM SEMIANNUAL REPORT TOJaredKansas City DataKen Salazar AboutKey

499

Key Activities of the Geothermal Technologies Office | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartmentJuneWhen IAjani Stewart was close toKeri FultonKey

500

Catalysis Center for Energy Innovation KEY ACCOMPLISHMENTS AND CORE CAPABILITIES  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium:and Technical Information Catalogue ofKEY