Powered by Deep Web Technologies
Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Hybrid silicon nanocrystal silicon nitride dynamic random access memory  

Science Conference Proceedings (OSTI)

This paper introduces a silicon nanocrystal-silicon nitride hybrid single transistor cell for potential dynamic RAM (DRAM) applications that stores charge in silicon nanocrystals or a silicon nitride charge trapping layer or both. The memory operates ...

R. F. Steimle; M. Sadd; R. Muralidhar; Rajesh Rao; B. Hradsky; S. Straub; B. E. White, Jr.

2003-12-01T23:59:59.000Z

2

Effect of memory access and caching on high performance computing.  

E-Print Network (OSTI)

??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers… (more)

Groening, James

2012-01-01T23:59:59.000Z

3

Analysis of copper ion filaments and retention of dual-layered devices for resistance random access memory applications  

Science Conference Proceedings (OSTI)

For improvement of switching uniformity, we propose a dual-layer structure with different resistance values in each layer. During the forming process, a current path is created in a high-resistance region which localizes filament formation in ultra-thin ... Keywords: Copper filament, Dual-layer, Resistance random access memory (ReRAM)

Jaesik Yoon; Joonmyoung Lee; Hyejung Choi; Ju-Bong Park; Dong-jun Seong; Wootae Lee; Chunhum Cho; Seonghyun Kim; Hyunsang Hwang

2009-07-01T23:59:59.000Z

4

Bridging the memory access gap  

Science Conference Proceedings (OSTI)

The rapid growth of electronic data processing over the past two decades has been characterized by an almost insatiable appetite for larger and faster memories. In fact, over this period of time, on-line storage capacity has increased about three times ...

Dennis E. Speliotis

1975-05-01T23:59:59.000Z

5

Multi retention level STT-RAM cache designs with a dynamic refresh scheme  

Science Conference Proceedings (OSTI)

Spin-transfer torque random access memory (STT-RAM) has received increasing attention because of its attractive features: good scalability, zero standby power, non-volatility and radiation hardness. The use of STT-RAM technology in the last level on-chip ...

Zhenyu Sun; Xiuyuan Bi; Hai (Helen) Li; Weng-Fai Wong; Zhong-Liang Ong; Xiaochun Zhu; Wenqing Wu

2011-12-01T23:59:59.000Z

6

Ram Narayanamurthy  

NLE Websites -- All DOE Office Websites (Extended Search)

Ram Narayanamurthy Chief Science Officer ram@pvtsolar.com This Speaker's Seminars Residential Energy Management system for optimization of on-site generation with HVAC...

7

Exposing Memory Access Regularities Using Object-Relative Memory Profiling  

Science Conference Proceedings (OSTI)

Memory profiling is the process of characterizing a program's memorybehavior by observing and recording its response to specific inputsets. Relevant aspects of the program's memory behavior maythen be used to guide memory optimizations in an aggressively ...

Qiang Wu; Artem Pyatakov; Alexey Spiridonov; Easwaran Raman; Douglas W. Clark; David I. August

2004-03-01T23:59:59.000Z

8

Memory access problems in block cyclic reduction on vector computers  

Science Conference Proceedings (OSTI)

In the present paper, modifications of block cyclic reduction are introduced by which the often significant memory access problems of this method on vector computers can be drastically reduced. The modifications are discussed in the context of an interval ... Keywords: Block cyclic reduction, interval arithmetics, memory access problems, vector computers

Hartmut Schwandt

1991-06-01T23:59:59.000Z

9

Purify: Fast detection of memory leaks and access errors  

E-Print Network (OSTI)

This paper describes Purifyru, a software testing and quality assurance Ool that detects memory leaks and access erors. Purify inserts additional checking instructions directly into the object code produced by existing compilers. These instructions check every memory read and write performed by the program-under-test and detect several types of access errors, such as reading uninitialized memory or witing to freed memory. Purify inserts checking logic into all of the code in a program, including third-party and vendor object-code libraries, and verifies system call interfaces. In addition, Purify tracks memory usage and identifies individual memory leals using a novel adaptation of garbage collection techniques. Purify produce standard executable files compatible with existing debuggers, and currently runs on Sun Microsystems ' SPARC family of workstations. Purify's neafly-comprehensive memory access checking slows the target program down typically by less than a facor of three and has resulted in significantly more reliable software for several development goups. L.

Reed Hastings; Bob Joyce

1991-01-01T23:59:59.000Z

10

Optimizing memory accesses for spatial computation  

Science Conference Proceedings (OSTI)

In this paper we present the internal representation and optimizations used by the CASH compiler for improving the memory parallelism of pointer-based programs. CASH uses an SSA-based representation for memory, which compactly summarizes both control-flow-and ...

Mihai Budiu; Seth C. Goldstein

2003-03-01T23:59:59.000Z

11

Empirical Memory-Access Cost Models in Multicore NUMA Architectures  

SciTech Connect

Data location is of prime importance when scheduling tasks in a non-uniform memory access (NUMA) architecture. The characteristics of the NUMA architecture must be understood so tasks can be scheduled onto processors that are close to the task's data. However, in modern NUMA architectures, such as AMD Magny-Cours and Intel Nehalem, there may be a relatively large number of memory controllers with sockets that are connected in a non-intuitive manner, leading to performance degradation due to uninformed task-scheduling decisions. In this paper, we provide a method for experimentally characterizing memory-access costs for modern NUMA architectures via memory latency and bandwidth microbenchmarks. Using the results of these benchmarks, we propose a memory-access cost model to improve task-scheduling decisions by scheduling tasks near the data they need. Simple task-scheduling experiments using the memory-access cost models validate the use of empirical memory-access cost models to significantly improve program performance.

McCormick, Patrick S. [Los Alamos National Laboratory; Braithwaite, Ryan Karl [Los Alamos National Laboratory; Feng, Wu-chun [Virginia Tech

2011-01-01T23:59:59.000Z

12

Fast Access to Distributed Atomic Memory  

Science Conference Proceedings (OSTI)

We study efficient and robust implementations of an atomic read-write data structure over an asynchronous distributed message-passing system made of reader and writer processes, as well as a number of servers implementing the data structure. We determine ... Keywords: Byzantine failures, atomic registers, distributed algorithms, fault-tolerance, shared-memory emulations, time-complexity

Partha Dutta; Rachid Guerraoui; Ron R. Levy; Marko Vukoli?

2010-08-01T23:59:59.000Z

13

Al-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous  

NLE Websites -- All DOE Office Websites (Extended Search)

Al-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous Al-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous Incremental Checkpointing Title Al-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous Incremental Checkpointing Publication Type Conference Proceedings Year of Publication 2013 Authors Nicolae, B, Cappello, F Conference Name HPDC'13 Conference Location New York City Abstract With increasing scale and complexity of supercomputing and cloud computing architectures, faults are becoming a frequent occurrence, which makes reliability a difficult challenge. Although for some applications it is enough to restart failed tasks, there is a large class of applications where tasks run for a long time or are tightly coupled, thus making a restart from scratch unfeasible. Checkpoint-Restart (CR), the main method to survive failures for such applications faces additional challenges in this context: not only does it need to minimize the performance overhead on the application due to checkpointing, but it also needs to operate with scarce resources. Given the iterative nature of the targeted applications, we launch the assumption that first-time writes to memory during asynchronous checkpointing generate the same kind of interference as they did in past iterations. Based on this assumption, we propose novel asynchronous checkpointing approach that leverages both current and past access pattern trends in order to optimize the order in which memory pages are flushed to stable storage. Large scale experiments show up to 60% improvement when compared to state-of-art checkpointing approaches, all this achievable with an extra memory requirement of less than 5% of the total application memory.

14

Understanding the Energy Consumption of Dynamic Random Access Memories  

Science Conference Proceedings (OSTI)

Energy consumption has become a major constraint on the capabilities of computer systems. In large systems the energy consumed by Dynamic Random Access Memories (DRAM) is a significant part of the total energy consumption. It is possible to calculate ... Keywords: DRAM, power

Thomas Vogelsang

2010-12-01T23:59:59.000Z

15

Exploiting off-chip memory access modes in high-level synthesis  

Science Conference Proceedings (OSTI)

Memory-intensive behaviors often contain large arrays that are synthesized into off-chip memories. With the increasing gap between on-chip and off-chip memory access delays, it is imperative to exploit the efficient access mode features of modern-day ... Keywords: Memory Synthesis, DRAM, High Level Synthesis

Preeti Ranjan Panda; Nikil D. Dutt; Alexandru Nicolau

1997-11-01T23:59:59.000Z

16

MEMMU: Memory expansion for MMU-less embedded systems  

Science Conference Proceedings (OSTI)

Random access memory (RAM) is tightly constrained in the least expensive, lowest-power embedded systems such as sensor network nodes and portable consumer electronics. The most widely used sensor network nodes have only 4 to 10KB of RAM and do not contain ... Keywords: Data compression, embedded system, wireless sensor network

Lan S. Bai; Lei Yang; Robert P. Dick

2009-04-01T23:59:59.000Z

17

Distributed anemone: transparent low-latency access to remote memory  

Science Conference Proceedings (OSTI)

Performance of large memory applications degrades rapidly once the system hits the physical memory limit and starts paging to local disk. We present the design, implementation and evaluation of Distributed Anemone (Adaptive Network Memory Engine) ...

Michael R. Hines; Jian Wang; Kartik Gopalan

2006-12-01T23:59:59.000Z

18

Research on memory access vulnerability analysis technique in SCADA protocol implementation  

Science Conference Proceedings (OSTI)

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA ... Keywords: SCADA protocol implementation, dynamic analysis, memory access vulnerability

Fang Lan; Wang Chunlei; He Ronghui

2010-07-01T23:59:59.000Z

19

Optimisation and performance evaluation of mechanisms for latency tolerance in remote memory access communication on clusters  

Science Conference Proceedings (OSTI)

This paper describes the design and performance evaluation of the mechanisms for latency tolerance in the remote memory access communication on clusters equipped with high-performance networks such as Myrinet. It discusses strategies that bridge ... Keywords: aggregation, cluster computing, communication overlap, latency tolerance, non-blocking, remote memory access

J. Nieplocha; V. Tipparaju; M. Krishnan; G. Santhanaraman; D. K. Panda

2004-03-01T23:59:59.000Z

20

U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: libvirt virTypedParameterArrayClear() Memory Access Error 3: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service U-243: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service August 24, 2012 - 7:00am Addthis PROBLEM: libvirt virTypedParameterArrayClear() Memory Access Error Lets Remote Users Deny Service PLATFORM: Version(s): 0.9.13 and prior ABSTRACT: A vulnerability was reported in libvirt. reference LINKS: libvirt SecurityTracker Alert ID: 1027437 Secunia Advisory SA50118 Bugtraq ID: 54748 CVE-2012-3445 IMPACT ASSESSMENT: Medium Discussion A remote user can send a specially crafted RPC call with the number of parameters set to zero to libvirtd to trigger a memory access error in virTypedParameterArrayClear() and cause the target service to crash. Impact:

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Hybrid in-memory and on-disk tables for speeding-up table accesses  

Science Conference Proceedings (OSTI)

Main memory database management systems have become essential for response-time-bounded applications, such as those in telecommunications systems or Internet, where users frequently access a table in order to get information or check whether an element ... Keywords: DBMS performance, hybrid tables, main memory databases

Joan Guisado-Gámez; Antoni Wolski; Calisto Zuzarte; Josep-Lluís Larriba-Pey; Victor Muntés-Mulero

2010-08-01T23:59:59.000Z

22

Complexity effective memory access scheduling for many-core accelerator architectures  

Science Conference Proceedings (OSTI)

Modern DRAM systems rely on memory controllers that employ out-of-order scheduling to maximize row access locality and bank-level parallelism, which in turn maximizes DRAM bandwidth. This is especially important in graphics processing unit (GPU) architectures, ... Keywords: graphics processors, memory controller, on-chip interconnection networks

George L. Yuan; Ali Bakhoda; Tor M. Aamodt

2009-12-01T23:59:59.000Z

23

Ram Vijayagopal resume  

NLE Websites -- All DOE Office Websites (Extended Search)

Ram Vijayagopal Argonne National Laboratory Center for Transportation Research 9700 South Cass Avenue, Building 362 Argonne, IL 60439-4837 phone: 630252-4154 e-mail:...

24

SkimpyStash: RAM space skimpy key-value store on flash-based storage  

Science Conference Proceedings (OSTI)

We present SkimpyStash, a RAM space skimpy key-value store on flash-based storage, designed for high throughput, low latency server applications. The distinguishing feature of SkimpyStash is the design goal of extremely low RAM footprint at about 1 (± ... Keywords: flash memory, indexing, key-value store, log-structured index., ram space efficient index

Biplob Debnath; Sudipta Sengupta; Jin Li

2011-06-01T23:59:59.000Z

25

Memory access scheduling and binding considering energy minimization in multi-bank memory systems  

Science Conference Proceedings (OSTI)

Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g., active, standby, nap, power-down) to facilitate energy saving. Furthermore, ... Keywords: binding, low energy design, scheduling

Chun-Gi Lyuh; Taewhan Kim

2004-06-01T23:59:59.000Z

26

Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems  

Science Conference Proceedings (OSTI)

Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network nodes and portable consumer electronics. The most widely-used sensor network ... Keywords: data compression, embedded system, wireless sensor network

Lan S. Bai; Lei Yang; Robert P. Dick

2006-10-01T23:59:59.000Z

27

An analysis of MRAM based memory technologies  

E-Print Network (OSTI)

MRAM is a memory (RAM) technology that uses electron spin to store information. Often been called "the ideal memory", it can potentially combine the density of DRAM with the speed of SRAM and non-volatility of FLASH memory ...

Vijayaraghavan, Rangarajan, M. Eng. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

28

Ram Shenoy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ram Shenoy Ram Shenoy About Us Ram Shenoy - Chief Technology Officer, ConocoPhillips Ram Shenoy Ram Shenoy is the chief technology officer for ConocoPhillips. An electrical engineer by training, he has twenty years of oil and gas industry experience. Before taking on his current role at ConocoPhillips, Shenoy was vice president of research for Schlumberger Limited, responsible for all Schlumberger's corporate scientific research laboratories. In prior years, he held a series of marketing and technology management positions with increasing responsibility, including managing director of Schlumberger-Doll Research Boston, and director and technology center manager of Schlumberger K.K. overseeing all the Engineering, Manufacturing and Sustaining activities of Schlumberger's R&D center in Tokyo, Japan.

29

An electron optical technique for large-capacity random-access memories  

Science Conference Proceedings (OSTI)

Memories of the electron beam recording type have many desirable features for large capacity applications. At the Wescon Conference of 1958, the author proposed a class of electron optical memories of very high storage density under the title, "Information ...

Sterling P. Newberry

1966-11-01T23:59:59.000Z

30

Ram Power | Open Energy Information  

Open Energy Info (EERE)

Ram Power Ram Power Jump to: navigation, search Logo: Ram Power Corp. (Formerly GTO Resources) Name Ram Power Corp. (Formerly GTO Resources) Address 9460 Double R Blvd., Suite 200 Place Reno, Nevada Zip 89521 Sector Geothermal energy Product Nevada geothermal project developer. Stock Symbol RPG Year founded 2008 Company Type For Profit Phone number (775) 398-3700 Website http://ram-power.com Coordinates 32.944065°, -97.578279° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":32.944065,"lon":-97.578279,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

31

System for loading executable code into volatile memory in a downhole tool  

DOE Patents (OSTI)

A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

2007-09-25T23:59:59.000Z

32

A DSL approach for object memory management of small devices  

Science Conference Proceedings (OSTI)

Small devices have a specific hardware configuration. In particular, they usually include several types of memories (typically ROM, internal and external RAM, Flash memory) different in quantities and properties. We propose an object memory management ...

Kevin Marquet; Gilles Grimaud

2007-09-01T23:59:59.000Z

33

Gas Mileage of 2012 Vehicles by Ram  

NLE Websites -- All DOE Office Websites (Extended Search)

MODEL City Comb Hwy 2012 Ram CV Cargo Van 6 cyl, 3.6 L, Automatic 6-spd, Regular Gas or E85 Compare 2012 Ram CV Cargo Van View MPG Estimates Shared By Vehicle Owners Gas 17 City...

34

RAM Capital Management Group | Open Energy Information  

Open Energy Info (EERE)

RAM Capital Management Group RAM Capital Management Group Jump to: navigation, search Name RAM Capital Management Group Place Boca Raton, Florida Zip 33486 Sector Hydro, Hydrogen Product Private VC fund and investment banking advisory firm investing in fuel cells and hydrogen. References RAM Capital Management Group[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. RAM Capital Management Group is a company located in Boca Raton, Florida . References ↑ "RAM Capital Management Group" Retrieved from "http://en.openei.org/w/index.php?title=RAM_Capital_Management_Group&oldid=350184" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes

35

Recipient: Shri Ram Arora International Award  

Science Conference Proceedings (OSTI)

The Shri Ram Arora Award for Materials Science and Engineering Education recognizes, encourages and supports the quest for knowledge within the materials ...

36

Recipient: Shri Ram Arora International Award - TMS  

Science Conference Proceedings (OSTI)

Quote: “The TMS Shri Ram Arora Award will provide me an opportunity to attend the TMS ... techniques in physical metallurgy, materials testing, and analysis.” ...

37

Recipient: Shri Ram Arora International Award - TMS  

Science Conference Proceedings (OSTI)

Shri Ram Arora Award ... Mrs. Bharathi's current areas of research include modeling and analysis of dynamic phenomena in materials science, nonlinear ...

38

Gas Mileage of 2013 Vehicles by Ram  

NLE Websites -- All DOE Office Websites (Extended Search)

MPG MODEL City Comb Hwy 2013 Ram 1500 2WD 8 cyl, 4.7 L, Automatic 6-spd, Regular Gas or E85 Compare 2013 Ram 1500 2WD Gas 14 City 16 Combined 20 Highway E85 10 City 11 Combined 12...

39

Gas Mileage of 2014 Vehicles by Ram  

NLE Websites -- All DOE Office Websites (Extended Search)

20 Combined 25 Highway 2014 Ram 1500 2WD 6 cyl, 3.6 L, Automatic 8-spd, Regular Gas or E85 Compare 2014 Ram 1500 2WD Gas 17 City 20 Combined 25 Highway E85 12 City 14 Combined 17...

40

shri ram arora award committee bylaws  

Science Conference Proceedings (OSTI)

ng $1,500, w. Annual Me. ENCE AND ENGIN. HRI RAM A determine th n, through a terial Scienc st for contin d Intent es, encourage mmunity. The heritage, ap.

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Renewable Auction Mechanism (RAM) (California) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Renewable Auction Mechanism (RAM) (California) Renewable Auction Mechanism (RAM) (California) Renewable Auction Mechanism (RAM) (California) < Back Eligibility Commercial Industrial Savings Category Bioenergy Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Solar Home Weatherization Wind Program Info State California Program Type Other Incentive Provider California Public Utilities Commission The Renewable Auction Mechanism (RAM), approved by the California Public Utilities Commission (CPUC) in December 2010, is expected to result in 1,299 megawatts (MW) of new distributed generation over the course of two years. RAM is designed to streamline the procurement process for distributed generation projects between 3 MW and 20 MW* in capacity while ensuring the lowest costs for ratepayers.

42

Wakes of ram pressure stripped disc galaxies  

E-Print Network (OSTI)

Spiral galaxies that move through the intracluster medium lose a substantial amount of their gas discs due to ram pressure stripping. The recent observations of NGC 4388 by Oosterloo & van Gorkom 2005 reveal a tail of stripped gas of ~ 100 kpc behind the source galaxy. We present first 3D hydrodynamical simulations of the evolution of such ram pressure stripped tails. We find that if the ICM wind does not vary significantly over a period of a few 100 Myr, subsonic galaxies produce a tail with regular features similar to a von-Karman vortex street. In this case, the tail widens systematically by about 45 kpc per 100 kpc distance behind the source galaxy. The widening rate is independent of the galaxy's inclination for a large range of inclinations. For supersonic galaxies, the tail is more irregular than for subsonic ones. The tail observed for NGC 4388 is narrower than the tails in our simulations. Reasons for this difference may be additional physical processes such as heat conduction or viscosity. In addition, we conclude that the observed S-shape of this tail is not due to von Karman oscillations, because this galaxy is likely to move supersonically. A reason for the observed shape may be motions in the ambient ICM. Finally, we discuss implications for the distribution of metals in the ICM due to ram pressure stipping.

E. Roediger; M. Brueggen; M. Hoeft

2006-03-21T23:59:59.000Z

43

Modified RAMS-Urban Canopy Model for Heat Island Simulation in Chongqing, China  

Science Conference Proceedings (OSTI)

A single-layer urban canopy model was integrated into a nonhydrostatic meteorological model, the Regional Atmospheric Modeling System (RAMS). In the new model, called RAMS-Urban Canopy (RAMS-UC), anthropogenic heat emission was also considered. ...

Hongbin Zhang; Naoki Sato; Takeki Izumi; Keisuke Hanaki; Toshiya Aramaki

2008-02-01T23:59:59.000Z

44

Radiation Level Changes at RAM Package Surfaces  

Science Conference Proceedings (OSTI)

This paper will explore design considerations required to meet the regulations that limit radiation level variations at external surfaces of radioactive material (RAM) packages. The radiation level requirements at package surfaces (e.g. TS-R-1 paragraphs 531 and 646) invoke not only maximum radiation levels, but also strict limits on the allowable increase in the radiation level during transport. This paper will explore the regulatory requirements by quantifying the amount of near surface movement and/or payload shifting that results in a 20% increase in the radiation level at the package surface. Typical IP-2, IP-3, Type A and Type B packaging and source geometries will be illustrated. Variations in surface radiation levels are typically the result of changes in the geometry of the surface due to an impact, puncture or crush event, or shifting and settling of radioactive contents.

Opperman, Erich [Washington Savannah River Company; Hawk, Mark B [ORNL; Kapoor, Ashok [U.S. Department of Energy, Office of Packaging and Transportation; Natali, Ronald [R. B. Natali Consulting, Inc.

2010-01-01T23:59:59.000Z

45

Minimizing bank selection instructions for partitioned memory architecture  

Science Conference Proceedings (OSTI)

Bank switching is a technique that increases the code and data memory in microcontrollers without extending the address buses. Given a program in which variables have been assigned to data banks, we present a novel optimization technique that minimizes ... Keywords: PBQP, RAM allocation, bank-switching, compiler optimization, microcontrollers, partitioned memory architecture

Bernhard Scholz; Bernd Burgstaller; Jingling Xue

2006-10-01T23:59:59.000Z

46

Page placement in hybrid memory systems  

Science Conference Proceedings (OSTI)

Phase-Change Memory (PCM) technology has received substantial attention recently. Because PCM is byte-addressable and exhibits access times in the nanosecond range, it can be used in main memory designs. In fact, PCM has higher density and lower idle ... Keywords: hybrid memory, memory controller, phase-change memory

Luiz E. Ramos; Eugene Gorbatov; Ricardo Bianchini

2011-05-01T23:59:59.000Z

47

Request for Comments on Candidate Algorithms for the AES  

Science Conference Proceedings (OSTI)

... 5131 of the Information Technology Management Reform Act of 1996 ... EEROM), and mainframe computers using Random Access Memory (RAM). ...

48

Federal Register/Vol. 64, No. 214/Friday, November 5, 1999 ...  

Science Conference Proceedings (OSTI)

... 5131 of the Information Technology Management Reform Act of 1996 ... EEROM), and mainframe computers using Random Access Memory (RAM). ...

2009-01-05T23:59:59.000Z

49

FIPS 46-3, Data Encryption Standard (DES) (withdrawn May ...  

Science Conference Proceedings (OSTI)

... 5131 of the Information Technology Management Reform Act of 1996 ... EEROM), and mainframe computers using Random Access Memory (RAM). ...

2012-12-12T23:59:59.000Z

50

Operational advances in ring current modeling using RAM-SCB  

Science Conference Proceedings (OSTI)

The Ring current Atmosphere interaction Model with Self-Consistently calculated 3D Magnetic field (RAM-SCB) combines a kinetic model of the ring current with a force-balanced model of the magnetospheric magnetic field to create an inner magnetospheric model that is magnetically self consistent. RAM-SCB produces a wealth of outputs that are valuable to space weather applications. For example, the anisotropic particle distribution of the KeV-energy population calculated by the code is key for predicting surface charging on spacecraft. Furthermore, radiation belt codes stand to benefit substantially from RAM-SCB calculated magnetic field values and plasma wave growth rates - both important for determining the evolution of relativistic electron populations. RAM-SCB is undergoing development to bring these benefits to the space weather community. Data-model validation efforts are underway to assess the performance of the system. 'Virtual Satellite' capability has been added to yield satellite-specific particle distribution and magnetic field output. The code's outer boundary is being expanded to 10 Earth Radii to encompass previously neglected geosynchronous orbits and allow the code to be driven completely by either empirical or first-principles based inputs. These advances are culminating towards a new, real-time version of the code, rtRAM-SCB, that can monitor the inner magnetosphere conditions on both a global and spacecraft-specific level. This paper summarizes these new features as well as the benefits they provide the space weather community.

Welling, Daniel T [Los Alamos National Laboratory; Jordanova, Vania K [Los Alamos National Laboratory; Zaharia, Sorin G [Los Alamos National Laboratory; Morley, Steven K [Los Alamos National Laboratory

2010-12-03T23:59:59.000Z

51

Application of RAM to Facility/Laboratory Design  

Science Conference Proceedings (OSTI)

Reliability, Availability, and Maintainability (RAM) studies are extensively used for mission critical systems (e.g., weapons systems) to predict the RAM parameters at the preliminary design phase. A RAM methodology is presented for predicting facility/laboratory inherent availability (i.e., availability that only considers the steady-state effects of design) at the preliminary design phase in support of Department of Energy (DOE) Order 430.1A (Life Cycle Asset Management) and DOE Order 420.1B (Facility Safety). The methodology presented identifies the appropriate system-level reliability and maintainability metrics and discusses how these metrics are used in a fault tree analysis for predicting the facility/laboratory inherent availability. The inherent availability predicted is compared against design criteria to determine if changes to the facility/laboratory preliminary design are necessary to meet the required availability objective in the final design.

Mohammadi, K

2008-04-14T23:59:59.000Z

52

RAM: a Relativistic Adaptive Mesh Refinement Hydrodynamics Code  

SciTech Connect

The authors have developed a new computer code, RAM, to solve the conservative equations of special relativistic hydrodynamics (SRHD) using adaptive mesh refinement (AMR) on parallel computers. They have implemented a characteristic-wise, finite difference, weighted essentially non-oscillatory (WENO) scheme using the full characteristic decomposition of the SRHD equations to achieve fifth-order accuracy in space. For time integration they use the method of lines with a third-order total variation diminishing (TVD) Runge-Kutta scheme. They have also implemented fourth and fifth order Runge-Kutta time integration schemes for comparison. The implementation of AMR and parallelization is based on the FLASH code. RAM is modular and includes the capability to easily swap hydrodynamics solvers, reconstruction methods and physics modules. In addition to WENO they have implemented a finite volume module with the piecewise parabolic method (PPM) for reconstruction and the modified Marquina approximate Riemann solver to work with TVD Runge-Kutta time integration. They examine the difficulty of accurately simulating shear flows in numerical relativistic hydrodynamics codes. They show that under-resolved simulations of simple test problems with transverse velocity components produce incorrect results and demonstrate the ability of RAM to correctly solve these problems. RAM has been tested in one, two and three dimensions and in Cartesian, cylindrical and spherical coordinates. they have demonstrated fifth-order accuracy for WENO in one and two dimensions and performed detailed comparison with other schemes for which they show significantly lower convergence rates. Extensive testing is presented demonstrating the ability of RAM to address challenging open questions in relativistic astrophysics.

Zhang, Wei-Qun; /KIPAC, Menlo Park; MacFadyen, Andrew I.; /Princeton, Inst. Advanced Study

2005-06-06T23:59:59.000Z

53

Structures de r\\'ealisabilit\\'e, RAM et ultrafiltre sur N  

E-Print Network (OSTI)

We show how to transform into programs the proofs in classical Analysis which use the existence of an ultrafilter on the integers. The method mixes the classical realizability introduced by the author, with the "forcing" of P. Cohen. The programs we obtain, use read and write instructions in random access memory.

Krivine, Jean-Louis

2008-01-01T23:59:59.000Z

54

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMSDEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated...

55

Radiation evaluation study of LSI RAM technologies. Final report  

SciTech Connect

Five commercial LSI static RAM technologies having a 1 kilobit capacity were radiation characterized. Arrays from the TTL, Schottky TTL, NMOS, CMOS, and CMOS/SOS families were evaluated. Radiation failure thresholds for gamma dose-rate logic upset, total gamma dose survivability, and neutron fluence survivability were determined. Included is a brief analysis of the radiation failure mechanism for each of the logic families tested.

Dinger, G.L.; Knoll, M.G.

1980-01-01T23:59:59.000Z

56

An empirical comparison of monitoring algorithms for access anomaly detection  

Science Conference Proceedings (OSTI)

One of the major disadvantages of parallel programming with shared memory is the nondeterministic behavior caused by uncoordinated access to shared variables, known as access anomalies. Monitoring program execution to detect access anomalies ...

A. Dinning; E. Schonberg

1990-02-01T23:59:59.000Z

57

Open Access  

E-Print Network (OSTI)

Research article A unique population of effector memory lymphocytes identified by CD146 having a distinct immunophenotypic and genomic profile

Bmc Immunology; Mohamed F Elshal; Sameena S Khan; Nalini Raghavachari; Yoshiyuki Takahashi; Jennifer Barb; James J Bailey; Peter J Munson; Michael A Solomon; Robert L Danner; J Philip; Robert L Danner; J Philip Mccoy

2007-01-01T23:59:59.000Z

58

Between Text and Sect: Early Nineteenth Century Shifts in the Theology of Ram  

E-Print Network (OSTI)

Ram was cast as the savior/father figure, while the Ramanandis (especially the founder of the sect, Ramanand) were the “reformers”

Paramasivan, Vasudha

2010-01-01T23:59:59.000Z

59

Scientific Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Scientific Access The APS is a open user facility that makes beam time available to the international scientific community through a peer-reviewed proposal process. Two access...

60

Carbon Dioxide Capture from Coal-Fired Power Plants: A Real Options Analysis Ram Chandra Sekar  

E-Print Network (OSTI)

Carbon Dioxide Capture from Coal-Fired Power Plants: A Real Options Analysis by Ram Chandra Sekar;2 #12;3 Carbon Dioxide Capture in Coal-Fired Power Plants: A Real Options Analysis by Ram Chandra Sekar and Master of Science in Mechanical Engineering ABSTRACT Investments in three coal-fired power generation

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Open Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Communication » Communication » Open Access Open Access Open access (OA) is the practice of providing unrestricted access via the Internet to peer-reviewed scholarly journal articles. Learn more below... Questions? Open Access Email Open access publishing and publications have experienced substantial growth, expansion and uptake in recent years. What exactly is an open access publication? There are many definitions, but in a nutshell an open access publication is a publication that provides immediately free online access to all users worldwide. This may sound like a tall order, and yet there are to date over 4000 journal publications that fit this definition. The need for this type of access has been driven by the out-of-control costs for scholarly publications. Statistics kept by the Association for Research Libraries

62

Shared Memory Programming in Metacomputing Environments: The Global Array Approach  

Science Conference Proceedings (OSTI)

The performance of the Global Array shared-memory nonuniform memory-access programming model is explored in a wide-area-network (WAN) distributed supercomputer environment. The Global Array model is extended by introducing a concept of mirrored arrays ... Keywords: Metacomputing, NUMA memory architecture, distributed arrays, global arrays, shared-memory programming

Jarek Nieplocha; Robert Harrison

1997-10-01T23:59:59.000Z

63

Clotho: decoupling memory page layout from storage organization  

Science Conference Proceedings (OSTI)

As database application performance depends on the utilization of the memory hierarchy, smart data placement plays a central role in increasing locality and in improving memory utilization. Existing techniques, however, do not optimize accesses to all ...

Minglong Shao; Jiri Schindler; Steven W. Schlosser; Anastassia Ailamaki; Gregory R. Ganger

2004-08-01T23:59:59.000Z

64

Developments in the CSU-RAMS Aerosol Model: Emissions, Nucleation, Regeneration, Deposition, and Radiation  

Science Conference Proceedings (OSTI)

The Colorado State University – Regional Atmospheric Modeling System (RAMS) has undergone development focused upon improving the treatment of aerosols in the microphysics model, with the goal of examining the impacts of aerosol characteristics, ...

Stephen M. Saleeby; Susan C. Van Den Heever

65

Open Access  

E-Print Network (OSTI)

© 2007 Brewer; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License

Earl J Brewer; Earl J Brewer

2007-01-01T23:59:59.000Z

66

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMS/DEFINITIONS FROM DOE M 470.4-7 TERMS/DEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated security areas. ACCESS CONTROL MEASURES. Hardware and software features, physical controls, operating procedures, administrative procedures, and various combinations of these designed to detect or prevent unauthorized access to classified information; special nuclear materials; Government property; automated information systems, facilities, or materials; or areas containing the above and to enforce use of these measures to protect Departmental security and property interests. CRITICAL PATH SCENARIO. An adversary-based scenario that is generated during the conduct of a vulnerability assessment and accounts for adversary tactics that

67

COMPARISONS FOR RAMS MODELS (V3A, V4.3 AND V6.0)  

SciTech Connect

The Regional Atmospheric Modeling System (RAMS) is an atmospheric numerical model developed by scientists at Colorado State University and the ASTER Division of Mission Research Corporation for simulating and forecasting meteorological phenomena. RAMS v3a and v4.3 are being used by the Savannah River National Laboratory (SRNL) as an operational tool for weather forecast and emergency response for the Savannah River Site (SRS). ATmospheric, Meteorological, and Environmental Technologies (ATMET) is now the proprietor of RAMS. The latest upgrade (v6.0) was officially released on January 11, 2006. ATG plans to eventually replace the RAMS v3a and v4.3 with the RAMS v6.0 for operational site forecasting if the newest version provides a significant improvement in the numerical forecast. A study to compare the three model (v3a, v4.3 and v6.0) results with respect to surface stations observations was conducted and is the subject of this report. Two cases were selected for simulation by these three RAMS models. One simulation started at 0 Z on April 3, 2007 and represents a warm weather case (high temperature of 26 C and low temperature of 16 C) at SRS, while the other simulation started at 0 Z on April 7, 2007 and represents a cold weather case (high temperature of 9 C and low temperature of -1 C) at SRS. The wind speeds, wind directions, temperatures and the dew point temperatures predicted by the three RAMS models were interpolated to 46 surface observation locations. The interpolated results were compared with the observation data. Statistically, the differences between the three model results were very small. For the present configurations, the predictions from RAMS v6.0 are no better than the older models with the exception of wind direction. The proposed path forward would be to fine tune the RAMS v6.0 model input parameters to improve the predictions. This should also provide insights into current weaknesses in all RAMS versions.

Chen, K

2007-08-30T23:59:59.000Z

68

RAM-induced Allostery Facilitates Assembly of a Notch Pathway Active Transcription Complex  

SciTech Connect

The Notch pathway is a conserved cell-to-cell signaling mechanism, in which extracellular signals are transduced into transcriptional outputs through the nuclear effector CSL. CSL is converted from a repressor to an activator through the formation of the CSL-NotchIC-Mastermind ternary complex. The RAM (RBP-J associated molecule) domain of NotchIC avidly interacts with CSL; however, its role in assembly of the CSL-NotchIC-Mastermind ternary complex is not understood. Here we provide a comprehensive thermodynamic, structural, and biochemical analysis of the RAM-CSL interaction for components from both mouse and worm. Our binding data show that RAM and CSL form a high affinity complex in the presence or absence of DNA. Our structural studies reveal a striking distal conformational change in CSL upon RAM binding, which creates a docking site for Mastermind to bind to the complex. Finally, we show that the addition of a RAM peptide in trans facilitates formation of the CSL-NotchIC-Mastermind ternary complex in vitro.

Friedmann, David R.; Wilson, Jeffrey J.; Kovall, Rhett A. (UCIN-MED)

2008-07-09T23:59:59.000Z

69

RAM-Induced Allostery Facilitates Assembly of a Notch Pathway Active Transcription Complex  

SciTech Connect

The Notch pathway is a conserved cell-to-cell signaling mechanism, in which extracellular signals are transduced into transcriptional outputs through the nuclear effector CSL. CSL is converted from a repressor to an activator through the formation of the CSL-NotchIC-Mastermind ternary complex. The RAM (RBP-J associated molecule) domain of NotchIC avidly interacts with CSL; however, its role in assembly of the CSL-NotchIC-Mastermind ternary complex is not understood. Here we provide a comprehensive thermodynamic, structural, and biochemical analysis of the RAM-CSL interaction for components from both mouse and worm. Our binding data show that RAM and CSL form a high affinity complex in the presence or absence of DNA. Our structural studies reveal a striking distal conformational change in CSL upon RAM binding, which creates a docking site for Mastermind to bind to the complex. Finally, we show that the addition of a RAM peptide in trans facilitates formation of the CSL-NotchIC-Mastermind ternary complex in vitro.

Friedman,D.; Wilson, J.; Kovall, R.

2008-01-01T23:59:59.000Z

70

Better I/O through byte-addressable, persistent memory  

Science Conference Proceedings (OSTI)

Modern computer systems have been built around the assumption that persistent storage is accessed via a slow, block-based interface. However, new byte-addressable, persistent memory technologies such as phase change memory (PCM) offer fast, fine-grained ... Keywords: file systems, performance, phase change memory

Jeremy Condit; Edmund B. Nightingale; Christopher Frost; Engin Ipek; Benjamin Lee; Doug Burger; Derrick Coetzee

2009-10-01T23:59:59.000Z

71

Context and Structure in Automated Full-Text Information Access  

E-Print Network (OSTI)

Context and Structure in Automated Full-Text Information Access Marti A. Hearst Report No. UCB 94720 #12;#12;Context and Structure in Automated Full-Text Information Access by Marti A. Hearst B and Structure in Automated Full-Text Information Access Copyright c 1994 by Marti A. Hearst #12;In memory of my

Hearst, Marti

72

Investigation of the Summer Climate of the Contiguous United States and Mexico Using the Regional Atmospheric Modeling System (RAMS). Part I: Model Climatology (1950–2002)  

Science Conference Proceedings (OSTI)

Fifty-three years of the NCEP–NCAR Reanalysis I are dynamically downscaled using the Regional Atmospheric Modeling System (RAMS) to generate a regional climate model (RCM) climatology of the contiguous United States and Mexico. Data from the RAMS ...

Christopher L. Castro; Roger A. Pielke Sr.; Jimmy O. Adegoke

2007-08-01T23:59:59.000Z

73

Bipolar resistive switching effect in Gd2O3 films for transparent memory application  

Science Conference Proceedings (OSTI)

A transparent resistive random access memory based on ITO/Gd"2O"3/ITO capacitor structure is fabricated on glass substrate. The transparent memory exhibits reliable resistive switching for more than 1000 cycles, low operation voltage of -2V/+2V, and ... Keywords: Gadolinium oxide, Gd2O3, RRAM, Resistive memory, TRRAM, Transparent memory

Kou-Chen Liu; Wen-Hsien Tzeng; Kow-Ming Chang; Yi-Chun Chan; Chun-Chih Kuo

2011-07-01T23:59:59.000Z

74

Liquid Waste Processing Facilities (LWPF) Reliability and Availability and Maintainability (RAM) Analysis  

SciTech Connect

A reliability, availability, and maintainability (RAM) analysis was prepared for the liquid effluents support being provided to the River Protection Project Waste Treatment Plant (WTP). The availability of liquid effluents services to the WTP was determined. Recommendations are provided on improvements and upgrades to increase the availability of the Liquid Waste Processing Facilities treatment and disposal systems.

LOWE, S.S.

2001-02-20T23:59:59.000Z

75

Circuit design for embedded memory in low-power integrated circuits  

E-Print Network (OSTI)

This thesis explores the challenges for integrating embedded static random access memory (SRAM) and non-volatile memory-based on ferroelectric capacitor technology-into lowpower integrated circuits. First considered is the ...

Qazi, Masood

2012-01-01T23:59:59.000Z

76

A memory mapping approach for network and controller optimization in parallel interleaver architectures  

Science Conference Proceedings (OSTI)

Recent communication standards and storage systems uses parallel architectures for error correcting codes (LDPC or Turbo-codes) to reliably transfer data between two equipments. However, parallel architectures suffer from memory access conflicts. In ... Keywords: interleavers, memory mapping, parallel architectures

Aroua Briki; Cyrille Chavet; Philippe Coussy

2013-05-01T23:59:59.000Z

77

Access to recorded interviews: A research agenda  

Science Conference Proceedings (OSTI)

Recorded interviews form a rich basis for scholarly inquiry. Examples include oral histories, community memory projects, and interviews conducted for broadcast media. Emerging technologies offer the potential to radically transform the way in which recorded ... Keywords: Interviews, access technology, oral history, speech indexing, spoken word archives

Franciska De Jong; Douglas W. Oard; Willemijn Heeren; Roeland Ordelman

2008-06-01T23:59:59.000Z

78

Tolerating data access latency with register preloading  

Science Conference Proceedings (OSTI)

By exploiting fine grain parallelism, superscalar processors can potentially increase the performance of future supercomputers. However, supercomputers typically have a long access delay to their first level memory which can severely restrict the performance ... Keywords: VLIW/superscalar processor, data dependence analysis, load latency, register file, register preload

William Y. Chen; Scott A. Mahlke; Wen-mei W. Hwu; Tokuzo Kiyohara; Pohua P. Chang

1992-08-01T23:59:59.000Z

79

Verification of High-Resolution RAMS Forecasts over East-Central Florida during the 1999 and 2000 Summer Months  

Science Conference Proceedings (OSTI)

This paper presents an objective and subjective verification of a high-resolution configuration of the Regional Atmospheric Modeling System (RAMS) over east-central Florida during the 1999 and 2000 summer months. Centered on the Cape Canaveral ...

Jonathan L. Case; John Manobianco; Allan V. Dianic; Mark M. Wheeler; Dewey E. Harms; Carlton R. Parks

2002-12-01T23:59:59.000Z

80

THE ROLES OF RADIATION AND RAM PRESSURE IN DRIVING GALACTIC WINDS  

SciTech Connect

We study gaseous outflows from disk galaxies driven by the combined effects of ram pressure on cold gas clouds and radiation pressure on dust grains. Taking into account the gravity due to disk, bulge, and dark matter halo, and assuming continuous star formation in the disk, we show that radiation or ram pressure alone is not sufficient to drive escaping winds from disk galaxies and that both processes contribute. We show that in the parameter space of star formation rate (SFR) and rotation speed of galaxies the wind speed in galaxies with rotation speeds v{sub c} {<=} 200 km s{sup -1} and SFR {<=} 100 M{sub Sun} yr{sup -1} has a larger contribution from ram pressure, and that in high-mass galaxies with large SFR radiation from the disk has a greater role in driving galactic winds. The ratio of wind speed to circular speed can be approximated as v{sub w} / v{sub c} {approx} 10{sup 0.7}, [SFR/50{sub Sun }yr{sup -1}]{sup 0.4} [v{sub c}/120 km s{sup -1}]{sup -1.25}. We show that this conclusion is borne out by observations of galactic winds at low and high redshift and also of circumgalactic gas. We also estimate the mass loading factors under the combined effect of ram and radiation pressure, and show that the ratio of mass-loss rate to SFR scales roughly as v{sup -1}{sub c}{Sigma}{sub g}{sup -1}, where {Sigma}{sub g} is the gas column density in the disk.

Sharma, Mahavir; Nath, Biman B., E-mail: mahavir@rri.res.in, E-mail: biman@rri.res.in [Raman Research Institute, Sadashiva Nagar, Bangalore 560 080 (India)

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

DEVELOPMENT OF BURN TEST SPECIFICATIONS FOR FIRE PROTECTION MATERIALS IN RAM PACKAGES  

SciTech Connect

The regulations in 10 CFR 71 require that the radioactive material (RAM) packages must be able to withstand specific fire conditions given in 10 CFR 71.73 during Hypothetical Accident Conditions (HAC). This requirement is normally satisfied by extensive testing of full scale test specimens under required test conditions. Since fire test planning and execution is expensive and only provides a single snapshot into a package performance, every effort is made to minimize testing and supplement tests with results from computational thermal models. However, the accuracy of such thermal models depends heavily on the thermal properties of the fire insulating materials that are rarely available at the regulatory fire temperatures. To the best of authors knowledge no test standards exist that could be used to test the insulating materials and derive their thermal properties for the RAM package design. This paper presents a review of the existing industry fire testing standards and proposes testing methods that could serve as a standardized specification for testing fire insulating materials for use in RAM packages.

Gupta, N.

2010-03-03T23:59:59.000Z

82

System Verification Through Reliability, Availability, Maintainability (RAM) Analysis & Technology Readiness Levels (TRLs)  

DOE Green Energy (OSTI)

The Next Generation Nuclear Plant (NGNP) Project, managed by the Idaho National Laboratory (INL), is authored by the Energy Policy Act of 2005, to research, develop, design, construct, and operate a prototype fourth generation nuclear reactor to meet the needs of the 21st Century. A section in this document proposes that the NGNP will provide heat for process heat applications. As with all large projects developing and deploying new technologies, the NGNP is expected to meet high performance and availability targets relative to current state of the art systems and technology. One requirement for the NGNP is to provide heat for the generation of hydrogen for large scale productions and this process heat application is required to be at least 90% or more available relative to other technologies currently on the market. To reach this goal, a RAM Roadmap was developed highlighting the actions to be taken to ensure that various milestones in system development and maturation concurrently meet required availability requirements. Integral to the RAM Roadmap was the use of a RAM analytical/simulation tool which was used to estimate the availability of the system when deployed based on current design configuration and the maturation level of the system.

Emmanuel Ohene Opare, Jr.; Charles V. Park

2011-06-01T23:59:59.000Z

83

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to...

84

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Gate Access Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register...

85

Active memory operations  

Science Conference Proceedings (OSTI)

The performance of modern microprocessors is increasingly limited by their inability to hide main memory latency. The problem is worse in large-scale shared memory systems, where remote memory latencies are hundreds, and soon thousands, of processor ... Keywords: DRAM, cache coherence, distributed shared memory, memory performance, stream processing, thread synchronization

Zhen Fang; Lixin Zhang; John B. Carter; Ali Ibrahim; Michael A. Parker

2007-06-01T23:59:59.000Z

86

A frequent-value based PRAM memory architecture  

Science Conference Proceedings (OSTI)

Phase Change Random Access Memory (PRAM) has great potential as the replacement of DRAM as main memory, due to its advantages of high density, non-volatility, fast read speed, and excellent scalability. However, poor endurance and high write energy appear ...

Guangyu Sun; Dimin Niu; Jin Ouyang; Yuan Xie

2011-01-01T23:59:59.000Z

87

Waste Feed Delivery System Phase 1 Preliminary RAM Analysis [SEC 1 and 2  

SciTech Connect

This report presents the updated results of the preliminary reliability, availability, and maintainability (RAM) analysis of selected waste feed delivery (WFD) operations to be performed by the Tank Farm Contractor (TFC) during Phase I activities in support of the Waste Treatment and Immobilization Plant (WTP). For planning purposes, waste feed tanks are being divided into five classes in accordance with the type of waste in each tank and the activities required to retrieve, qualify, and transfer waste feed. This report reflects the baseline design and operating concept, as of the beginning of Fiscal Year 2000, for the delivery of feed from three of these classes, represented by source tanks 241-AN-102, 241-AZ-101 and 241-AN-105. The preliminary RAM analysis quantifies the potential schedule delay associated with operations and maintenance (OBM) field activities needed to accomplish these operations. The RAM analysis is preliminary because the system design, process definition, and activity planning are in a state of evolution. The results are being used to support the continuing development of an O&M Concept tailored to the unique requirements of the WFD Program, which is being documented in various volumes of the Waste Feed Delivery Technical Basis (Carlson. 1999, Rasmussen 1999, and Orme 2000). The waste feed provided to the WTP must: (1) meet limits for chemical and radioactive constituents based on pre-established compositional envelopes (i.e., feed quality); (2) be in acceptable quantities within a prescribed sequence to meet feed quantities; and (3) meet schedule requirements (i.e., feed timing). In the absence of new criteria related to acceptable schedule performance due to the termination of the TWRS Privatization Contract, the original criteria from the Tank Waste Remediation System (77443s) Privatization Contract (DOE 1998) will continue to be used for this analysis.

DYKES, A.A.

2000-10-11T23:59:59.000Z

88

A new parallel sorting approach with sorting memory module  

Science Conference Proceedings (OSTI)

A new approach to accelerating parallel sorting processes is introduced in this paper. This approach involves the design of a new type of memory chip with sorting functions. This type of sorting memory chip is feasible with today's VLSI techniques. A memory module organizing several sorting memory chips associated with additional ECL or TTL control logic circuits is also presented. Using the sorting memory modules in a shared memory parallel processor machine, parallel sorting algorithms such as the column sort method can reduce the row access time significantly and avoid data collisions in the interconnection network. Experimental simulation results on the practical speedup achieved and the memory utilization for the proposed approach are described.

Zhu, C.Q. (Illinois Univ., Urbana, IL (USA). Center for Supercomputing Research and Development); Fang, Z. (Research and Development, Concurrent Computer Corp., Tinton Falls, NJ (US)); Li, X. (Dept. of Computing Science, Univ. of Alberta, Edmonton, Alberta (CA))

1989-12-01T23:59:59.000Z

89

Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Scope, Shape memory alloys (SMA) have received widespread attention from ... The symposium focuses on shape memory and superelastic materials and their ...

90

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register with the ALS...

91

Ram Narayanamurthy  

NLE Websites -- All DOE Office Websites (Extended Search)

unless specifically identified as a Berkeley Lab staff member. This Speaker's Seminars Residential Energy Management system for optimization of on-site generation with HVAC...

92

Capital Access Program (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

93

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

94

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

95

Memory Considerations for Carver  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Overview Carver login nodes each have 48GB of physical memory. Most compute nodes have 24GB; however, 80 compute nodes have 48GB. Not all of this memory is available to user processes. Some memory is reserved for the Linux kernel. Furthermore, since Carver nodes have no disk, the "root" file system (including /tmp) is kept in memory ("ramdisk"). The kernel and root file system combined occupy about 4GB of memory. Therefore users should try to use no more than 20GB on most compute nodes, or 44GB on the large-memory compute nodes. There are also two "extra-large" memory nodes; each node has four 8-core Intel X7550 ("Nehalem EX") 2.0 GHz processors (32 cores total) and 1TB memory. These nodes are available through the queue "reg_xlmem". Please

96

Practical Thermal Evaluation Methods For HAC Fire Analysis In Type B Radiaoactive Material (RAM) Packages  

SciTech Connect

Title 10 of the United States Code of Federal Regulations Part 71 for the Nuclear Regulatory Commission (10 CFR Part 71.73) requires that Type B radioactive material (RAM) packages satisfy certain Hypothetical Accident Conditions (HAC) thermal design requirements to ensure package safety during accidental fire conditions. Compliance with thermal design requirements can be met by prototype tests, analyses only or a combination of tests and analyses. Normally, it is impractical to meet all the HAC using tests only and the analytical methods are too complex due to the multi-physics non-linear nature of the fire event. Therefore, a combination of tests and thermal analyses methods using commercial heat transfer software are used to meet the necessary design requirements. The authors, along with his other colleagues at Savannah River National Laboratory in Aiken, SC, USA, have successfully used this 'tests and analyses' approach in the design and certification of several United States' DOE/NNSA certified packages, e.g. 9975, 9977, 9978, 9979, H1700, and Bulk Tritium Shipping Package (BTSP). This paper will describe these methods and it is hoped that the RAM Type B package designers and analysts can use them for their applications.

2013-03-28T23:59:59.000Z

97

Optical memory  

DOE Patents (OSTI)

Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

Mao, Samuel S; Zhang, Yanfeng

2013-07-02T23:59:59.000Z

98

On-Demand Information Portals for Disaster Yiming Ma, Dmitri V. Kalashnikov, Ram Hariharan, Sharad Mehrotra, Nalini Venkatasubramanian,  

E-Print Network (OSTI)

, and such information is indeed valuable to disaster managers or even citizens in their response. In this paper we in the response and planning during or after the disaster. This motivates us in the direction of an "InformationOn-Demand Information Portals for Disaster Situations Yiming Ma, Dmitri V. Kalashnikov, Ram

Kalashnikov, Dmitri V.

99

PDSF Memory Considerations  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Interactive Nodes The amount of memory available on the interactive nodes is described on the Interactive (login) Nodes page. The interactive nodes are shared among all users and running high memory jobs on the interactive nodes slows them down for everyone. If you think your work might be disruptive you should either run it in batch or run it interactively on a batch node as described here. Batch Nodes The batch system knows how much memory each node has and how much memory each job requires. By default each job is given 1.1GB, but you can request more or less memory by following the instructions in Submitting Jobs. However, it should be noted that the more memory you require, the harder it will be for the batch system to schedule your job, especially when the

100

Advanced Vehicle Testing Activity: Dodge Ram Wagon Van -- Hydrogen/CNG Operations Summary  

DOE Green Energy (OSTI)

Over the past two years, Arizona Public Service, a subsidiary of Pinnacle West Capital Corporation, in cooperation with the U.S. Department of Energy’s Advanced Vehicle Testing Activity, tested four gaseous fuel vehicles as part of its alternative fueled vehicle fleet. One vehicle, a Dodge Ram Wagon Van, operated initially using compressed natural gas (CNG) and later a blend of CNG and hydrogen. Of the other three vehicles, one was fueled with pure hydrogen and two were fueled with a blend of CNG and hydrogen. The three blended-fuel vehicles were originally equipped with either factory CNG engines or factory gasoline engines that were converted to run CNG fuel. The vehicles were variously modified to operate on blended fuel and were tested using 15 to 50% blends of hydrogen (by volume). The pure-hydrogen-fueled vehicle was converted from gasoline fuel to operate on 100% hydrogen. All vehicles were fueled from the Arizona Public Service’s Alternative Fuel Pilot Plant, which was developed to dispense gaseous fuels, including CNG, blends of CNG and hydrogen, and pure hydrogen with up to 99.9999% purity. The primary objective of the test was to evaluate the safety and reliability of operating vehicles on hydrogen and blended hydrogen fuel, and the interface between the vehicles and the hydrogen fueling infrastructure. A secondary objective was to quantify vehicle emissions, cost, and performance. Over a total of 40,000 fleet test miles, no safety issues were found. Also, significant reductions in emissions were achieved by adding hydrogen to the fuel. This report presents results of 22,816 miles of testing for the Dodge Ram Wagon Van, operating on CNG fuel, and a blended fuel of 15% hydrogen–85% CNG.

Don Karner; Francfort, James Edward

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Advanced Vehicle Testing Activity: Dodge Ram Wagon Van - Hydrogen/CNG Operations Summary - January 2003  

Science Conference Proceedings (OSTI)

Over the past two years, Arizona Public Service, a subsidiary of Pinnacle West Capital Corporation, in cooperation with the U.S. Department of Energy's Advanced Vehicle Testing Activity, tested four gaseous fuel vehicles as part of its alternative fueled vehicle fleet. One vehicle, a Dodge Ram Wagon Van, operated initially using compressed natural gas (CNG) and later a blend of CNG and hydrogen. Of the other three vehicles, one was fueled with pure hydrogen and two were fueled with a blend of CNG and hydrogen. The three blended-fuel vehicles were originally equipped with either factory CNG engines or factory gasoline engines that were converted to run CNG fuel. The vehicles were variously modified to operate on blended fuel and were tested using 15 to 50% blends of hydrogen (by volume). The pure-hydrogen-fueled vehicle was converted from gasoline fuel to operate on 100% hydrogen. All vehicles were fueled from the Arizona Public Service's Fuel Pilot Plant, which was developed to dispense gaseous fuels, including CNG, blends of CNG and hydrogen, and pure hydrogen with up to 99.9999% purity. The primary objective of the test was to evaluate the safety and reliability of operating vehicles on hydrogen and blended hydrogen fuel, and the interface between the vehicles and the hydrogen fueling infrastructure. A secondary objective was to quantify vehicle emissions, cost, and performance. Over a total of 40,000 fleet test miles, no safety issues were found. Also, significant reductions in emissions were achieved by adding hydrogen to the fuel. This report presents results of 22,816 miles of testing for the Dodge Ram Wagon Van, operating on CNG fuel, and a blended fuel of 15% hydrogen-85% CNG.

Karner, D.; Francfort, J.E.

2003-01-16T23:59:59.000Z

102

Web accessible image similarity measurements  

Science Conference Proceedings (OSTI)

Web accessible image similarity measurements. Background: There ... messages). Web Access to Image Similarity Measurements. ...

2013-04-16T23:59:59.000Z

103

Decoupled DIMM: Building High-Bandwidth Memory System from Low-Speed DRAM Devices  

E-Print Network (OSTI)

The widespread use of multicore processors has dramatically increased the demands on high bandwidth and large capacity from memory systems. In a conventional DDRx DRAM memory system, the memory bus and DRAM devices run at the same data rate. To improve memory bandwidth, we propose a new memory system design called decoupled DIMM that allows the memory bus to operate at a data rate much higher than that of the DRAM devices. In the design, a synchronization buffer is added to relay data between the slow DRAM devices and the fast memory bus; and memory access scheduling is revised to avoid access conflicts on memory ranks. The design not only improves memory bandwidth beyond what can be supported by current memory devices, but also improves reliability, power efficiency, and cost effectiveness by using relatively slow memory devices. The idea of decoupling, precisely the decoupling of bandwidth match between memory bus and a single rank of devices, can also be applied to other types of memory systems including FB-DIMM. Our experimental results show that a decoupled DIMM system of 2667MT/s bus data rate and 1333MT/s device data rate improves the performance of memory-intensive workloads by 51 % on average over a conventional memory system of 1333MT/s data rate. Alternatively, a decoupled DIMM system of 1600MT/s bus data rate and 800MT/s device data rate incurs only 8 % performance loss when compared with a conventional system of 1600MT/s data rate, with 16 % reduction on the memory power consumption and 9 % saving of memory energy.

Hongzhong Zheng; Jiang Lin; Zhao Zhang; Zhichun Zhu

2009-01-01T23:59:59.000Z

104

Traffic management: a holistic approach to memory placement on NUMA systems  

Science Conference Proceedings (OSTI)

NUMA systems are characterized by Non-Uniform Memory Access times, where accessing data in a remote node takes longer than a local access. NUMA hardware has been built since the late 80's, and the operating systems designed for it were optimized for ... Keywords: multicore, numa, operating systems, scheduling

Mohammad Dashti; Alexandra Fedorova; Justin Funston; Fabien Gaud; Renaud Lachaize; Baptiste Lepers; Vivien Quema; Mark Roth

2013-04-01T23:59:59.000Z

105

Silicon nanocrystal memories  

Science Conference Proceedings (OSTI)

In this paper, we present an overview of memory structures fabricated by our group by using silicon nanocrystals as storage nodes. These devices show promising characteristics as candidates for future deep-submicron non-volatile memories.

S. Lombardo; B. De Salvo; C. Gerardi; T. Baron

2004-05-01T23:59:59.000Z

106

Drifting absence :: drafting memory  

E-Print Network (OSTI)

The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

Kuhn, Marlene Eva

2006-01-01T23:59:59.000Z

107

Samuel Rosen Memorial Award  

Science Conference Proceedings (OSTI)

Recognizing accomplishments in surfactant chemistry. The Samuel Rosen Memorial Award is sponsored by Milton J. Rosen. Samuel Rosen Memorial Award Membership Information achievement application award Awards distinguished division Divisions fats job

108

Tolerating memory leaks  

Science Conference Proceedings (OSTI)

Type safety and garbage collection in managed languages eliminate memory errors such as dangling pointers, double frees, and leaks of unreachable objects. Unfortunately, a program still leaks memory if it maintains references to objects it will never ... Keywords: bug tolerance, managed languages, memory leaks

Michael D. Bond; Kathryn S. McKinley

2008-10-01T23:59:59.000Z

109

External Memory Algorithms  

Science Conference Proceedings (OSTI)

Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/ output communication (or I/O) between fast internal memory and slower external memory (such as disks) can be a major performance ...

Jeffrey Scott Vitter

1998-08-01T23:59:59.000Z

110

A high-level abstraction of shared accesses  

Science Conference Proceedings (OSTI)

We describe the design and use of the tape mechanism, a new high-level abstraction of accesses to shared data for software DSMs. Tapes consolidate and generalize a number of recent protocol optimizations, including update-based locks ... Keywords: DSM, programming libraries, shared memory, update protocols

Peter J. Keleher

2000-02-01T23:59:59.000Z

111

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication – communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

112

REMEM: REmote MEMory as Checkpointing Storage  

SciTech Connect

Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively studied in research but made little success in practice due to its complexity and potential reliability concerns. In this study we present the design and implementation of REMEM, a REmote MEMory checkpointing system to extend the checkpointing storage from disk to remote memory. A unique feature of REMEM is that it can be integrated into existing disk-based checkpointing systems seamlessly. A user can flexibly switch between REMEM and disk as checkpointing storage to balance the efficiency and reliability. The implementation of REMEM on Open MPI is also introduced. The experimental results confirm that REMEM and the proposed adaptive checkpointing storage selection are promising in both performance, reliability and scalability.

Jin, Hui [Illinois Institute of Technology; Sun, Xian-He [Illinois Institute of Technology; Chen, Yong [ORNL; Ke, Tao [Illinois Institute of Technology

2010-01-01T23:59:59.000Z

113

Using DMA for copying performance counter data to memory  

SciTech Connect

A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance data.

Gara, Alan; Salapura, Valentina; Wisniewski, Robert W

2013-12-31T23:59:59.000Z

114

Downscaling and Bias Correcting a Cold Season Precipitation Climatology over Coastal Southern British Columbia Using the Regional Atmospheric Modeling System (RAMS)  

Science Conference Proceedings (OSTI)

Thirty years of the North American Regional Reanalysis (NARR) are dynamically downscaled to an 8-km grid spacing using the Regional Atmospheric Modeling System (RAMS) to generate a climatology of glacier winter accumulation over the southern ...

B. Ainslie; P. L. Jackson

2010-05-01T23:59:59.000Z

115

Role Based Access Control  

Science Conference Proceedings (OSTI)

... Nash and Poland [10] discuss the application of role based access control to cryptographic authentication devices commonly used in the banking ...

116

Access Grid - CECM  

E-Print Network (OSTI)

"The Access Grid (AG) is the ensemble of resources that can be used to support ... We shall also illustrate the basic capture capacities that Smart Technology's ...

117

Science Open Access Journals  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. Results are consolidated and returned in relevance-ranked order, and users are...

118

Making VRML Accessible  

Science Conference Proceedings (OSTI)

... Paper - Making VRML Accessible for People with Disabilities by Sandy Ressler and Qiming Wang to Appear in Proceeding of ASSETS 98. ...

119

Georg-August-Universitt Zentrum fr Informatik  

E-Print Network (OSTI)

in this field that is usually relying on central servers, is to be reformed with peer-to-peer techniques of Acronyms PI Principal Investigator PSTN Public Switched Telephone Network RAM Random Access Memory RELOAD

Fu, Xiaoming

120

Integrating program transformations in the memory-based synthesis of image and video algorithms  

Science Conference Proceedings (OSTI)

In this paper we discuss the interaction and integration of two important program transformations in high-level synthesis—Tree Height Reduction and Redundant Memory-access Elimination. Intuitively, these program transformations do not interfere ...

David J. Kolson; Alexandru Nicolau; Nikil Dutt

1994-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Accessibility validation with RAVEN  

Science Conference Proceedings (OSTI)

Testing is, for most, a necessary evil in the software life cycle. One very important form of testing is the evaluation of software products according to mandated criteria or guidelines such as those that specify level of accessibility. Such evaluations ... Keywords: AOP, GUI, Java, accessibility, reflection, rich-client

Barry Feigenbaum; Michael Squillace

2006-05-01T23:59:59.000Z

122

Accessing HPSS at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Accessing HPSS Accessing HPSS Accessing HPSS Once you have successfully generated an HPSS token you can access NERSC's HPSS in the different ways listed below. HSI and HTAR are usually the best ways to transfer data in and out of HPSS but other methods are also included. Access Method When to use this method Features Limitations HSI When a full-featured unix-like interface is desired high performance (parallel); unix-like user interface; firewall mode client is specific to HPSS version and might not work at other sites; HTAR When you have large collections of smaller (~10MB or less) files high performance (parallel); creates a tar file directly in HPSS along with an index file; more efficient for large collections of file same client limitations as HSI; also does not have firewall mode so using on a remote site with a firewall will require modification of firewall rules

123

Cache directory look-up re-use as conflict check mechanism for speculative memory requests  

DOE Patents (OSTI)

In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

Ohmacht, Martin

2013-09-10T23:59:59.000Z

124

Using Cyclic Memory Allocation to Eliminate Memory Leaks  

E-Print Network (OSTI)

We present and evaluate a new memory management technique for eliminating memory leaks in programs with dynamic memory allocation. This technique observes the execution of the program on a sequence of training inputs to ...

Nguyen, Huu Hai

125

Memory Usage Considerations on Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Memory Considerations Memory Considerations Memory Considerations Memory Usage Considerations on Hopper Most Hopper compute nodes have 32 GB of physical memory, but, not all that memory is available to user programs. Compute Node Linux (the kernel), the Lustre file system software, and message passing library buffers all consume memory, as does loading the executable into memory. Thus the precise memory available to an application varies. Approximately 31 GB of memory can be allocated from within an MPI program using all 24 cores per node, i.e., 1.29 GB per MPI task on average. If an application uses 12 MPI tasks per node, then each MPI task could use about 2.58 GB of memory. You may see an error message such as "OOM killer terminated this process." "OOM" means Out of Memory and it means that your code has exhausted the

126

The Broadband Access Facility  

Science Conference Proceedings (OSTI)

The deployment of broadband access networks will revolutionise many aspects of society in the early years of the next millennium. Manufacturers, telecommunications providers and cable television operators world-wide are investing heavily on research ...

J. Kelly; R. Adnams; M. Enrico; M. Whittle

2000-01-01T23:59:59.000Z

127

Hysteresis, Reversibility, and Shape Memory  

Science Conference Proceedings (OSTI)

Basic Properties of Shape Memory Materials from First-Principles ... Control Loops of Shape Memory Actuators by Detection of the Electrical Resistance.

128

Shape memory alloys  

SciTech Connect

A shape memory alloy is disclosed consisting essentially of, by weight ratio, 2 to 15% aluminium, 0.01 to 3% beryllium and the balance being substantially copper, with impurities being inevitably present in the process of preparation, and a shape memory alloy further including 0.05 to 15% zinc, both including composition ranges which allows cold work.

Suzuki, K.

1983-10-04T23:59:59.000Z

129

The Java memory model  

Science Conference Proceedings (OSTI)

This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations ... Keywords: Java, concurrency, memory model, multithreading

Jeremy Manson; William Pugh; Sarita V. Adve

2005-01-01T23:59:59.000Z

130

Technology strategy for the semiconductor memory market  

E-Print Network (OSTI)

Solid state memories are used in a variety of applications as data and code storages. A non-volatile memory is a memory that retains information when its power supply is off. Flash memory is a type of nonvolatile memory ...

Nakamura, Tomohiko

2012-01-01T23:59:59.000Z

131

Computer memory management system  

DOE Patents (OSTI)

A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

Kirk, III, Whitson John (Greenwood, MO)

2002-01-01T23:59:59.000Z

132

Brief announcement: subgraph isomorphism on a multithreaded shared memory architecture  

Science Conference Proceedings (OSTI)

Graph algorithms tend to suffer poor performance due to the irregularity of access patterns within general graph data structures, arising from poor data locality, which translates to high memory latency. The result is that advances in high-performance ... Keywords: cray xmt, graphs, mutlithreading, subgraph isomorphism

Claire C. Ralph; Vitus J. Leung; William McLendon, III

2012-06-01T23:59:59.000Z

133

Microsoft Word - inactive 41233_EPRI_Adv Monitoring for RAM_Factsheet_Rev01_10-17-03.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Fact Sheet - October 2003 Fact Sheet - October 2003 Advanced Monitoring to Improve Combustion Turbine (CT)/Combined Cycle (CC) Reliability, Availability and Maintainability (RAM) I. Project Participants EPRI (Prime) Impact Technologies, LLC Boyce Engineering International Carolina Power & Light/Progress Energy II. Project Description Objectives: The objective is to develop a suite of intelligent software tools integrated with a diagnostic monitoring platform that will, in real time, interpret data to assess the "total health" of combustion turbines. The project team will develop advanced probabilistic and artificially intelligent performance and mechanical fault diagnostics algorithms, sensor validation and recovery modules, and prognostics for maintenance-intensive CT areas.

134

Coherence-Centric Logging and Recovery for Home-Based Software Distributed Shared Memory  

E-Print Network (OSTI)

Coherence-Centric Logging and Recovery for Home-Based Software Distributed Shared Memory Angkul, called the coherence-centric logging (CCL) and re- covery protocol, for home-based SDSM. Our CCL mini access latency by overlapping disk accesses with coherence-induced com- munication existing in home-based

Tzeng, Nian-Feng

135

Mondriaan memory protection  

E-Print Network (OSTI)

Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

Witchel, Emmett Jethro, 1970-

2004-01-01T23:59:59.000Z

136

Reconsidering custom memory allocation  

Science Conference Proceedings (OSTI)

Programmers hoping to achieve performance improvements often use custom memory allocators. This in-depth study examines eight applications that use custom allocators. Surprisingly, for six of these applications, a state-of-the-art general-purpose allocator ...

Emery D. Berger; Benjamin G. Zorn; Kathryn S. McKinley

2002-11-01T23:59:59.000Z

137

Warship : memorial in antithesis  

E-Print Network (OSTI)

This thesis is divided into three distinct yet related parts. The first consists of observations and reflections on some of New York City's many war memorials, ranging from one commemorating the Revolutionary War to one ...

Tchelistcheff, Andre Victor

1992-01-01T23:59:59.000Z

138

Access Grid | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Grid Access Grid Access Grid The Access Grid is the ensemble of resources that can be used to support human interaction across the grid. It consists of multimedia display, presentation and interactive environments, interfaces to grid middleware, and interfaces to visualization environments. The Access Grid will support large-scale distributed meetings, collaborative work sessions, seminars, lectures, tutorials and training. The Access Grid design point is group-to-group communication (thus differentiating it from desktop to desktop based tools that focus on individual communication). The Access Grid environment must enable both formal and informal group interactions. Large-format displays integrated with intelligent or active meeting rooms are a central feature of the Access Grid nodes. Access Grid nodes are

139

Using Cyclic Memory Allocation to Eliminate Memory Leaks  

E-Print Network (OSTI)

We present and evaluate a new memory management technique foreliminating memory leaks in programs with dynamic memoryallocation. This technique observes the execution of the program on asequence of training inputsto find ...

Nguyen, Huu Hai

2005-10-26T23:59:59.000Z

140

Microsoft Word - 41448_GE_Enabling & IT for RAM_Factsheet_Rev01_09-03.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

GE Power Systems GE Power Systems Fact Sheet: Enabling & IT to Increase RAM for Advanced Powerplants DOE Contract No: DE-FC26-03NT41448 I. Project Participants: A. Prime Participant: General Electric Company, General Electric Power Systems B. Sub-Award Participants: General Electric Company, Global Research General Electric Company, Aircraft Engine General Electric Company, Energy and Environmental Research Corp. General Electric Company, Energy and Industrial Services, Inc. Georgia Institute of Technology Sandia National Laboratory II Project Description: A. Objective: Advanced analytical part lifing models, advanced sensors and controls, and highly integrated information technology (IT) platforms will be demonstrated in merchant coal/IGCC (Integrated Gasification Combined Cycle) gas turbine combined cycle

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

The rope memory: a permanent storage device  

Science Conference Proceedings (OSTI)

A powerful way of increasing the capability and flexibility of digital computing systems is through the use of permanent storage memories. Such memories are also known as readonly memories or NDRO electrically unalterable memories. As an example of the ...

P. Kuttner

1963-11-01T23:59:59.000Z

142

Dynamically replicated memory: building reliable systems from nanoscale resistive memories  

Science Conference Proceedings (OSTI)

DRAM is facing severe scalability challenges in sub-45nm tech- nology nodes due to precise charge placement and sensing hur- dles in deep-submicron geometries. Resistive memories, such as phase-change memory (PCM), already scale well beyond DRAM and ... Keywords: phase-change memory, write endurance

Engin Ipek; Jeremy Condit; Edmund B. Nightingale; Doug Burger; Thomas Moscibroda

2010-03-01T23:59:59.000Z

143

High Temperature Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 5, 2013 ... Shape Memory Response of NiTiHfPd High Strength and High Hysteresis Shape Memory Alloys: Emre Acar1; Haluk Karaca1; Hirobumi Tobe1; ...

144

Thomas H. Smouse Memorial Fellowship  

Science Conference Proceedings (OSTI)

Awarded to a graduate student doing research in areas of interest to AOCS. Thomas H. Smouse Memorial Fellowship Thomas H. Smouse Memorial Fellowship graduate research scholastically outstanding Smouse Award Student Award Student Awards achievemen

145

Unifluxor: a permanent memory element  

Science Conference Proceedings (OSTI)

The Unifluxor is a new binary permanent memory element which appears to have the advantages of high-speed operation, easy fabrication, and low cost. Unlike cores, twistors, capacitors, and other commonly used memory devices, the Unifluxor does not depend ...

A. M. Renard; W. J. Neumann

1960-05-01T23:59:59.000Z

146

Memory Usage Considerations on Franklin  

NLE Websites -- All DOE Office Websites (Extended Search)

the memory requirement vvia internal checking in their codes or by some tools. Craypat could track heap usage. And IPM also tracks memory usage. Last edited: 2013-06-30 08:33:51...

147

VEHICLE ACCESS PORTALS  

NLE Websites -- All DOE Office Websites (Extended Search)

East Jemez Road (Map 1) East Jemez Road (Map 1) VEHICLE ACCESS PORTALS Traffic Lane 1: Closed except for emergencies and maintenance operations. Traffic Lanes 2-7: Drivers required to stop and present LANL badges or other form of valid identification to Protective Force officers. Drivers may proceed upon direction of the officers. Note: Commercial delivery vehicle drivers must also pres- ent their inspection passes from Post 10. More Information: spp-questions@lanl.gov Non-work Hours Vehicles entering LANL at the East Jemez VAPs during non-work hours (between 7

148

Shape memory polymer medical device  

SciTech Connect

A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

Maitland, Duncan (Pleasant Hill, CA); Benett, William J. (Livermore, CA); Bearinger, Jane P. (Livermore, CA); Wilson, Thomas S. (San Leandro, CA); Small, IV, Ward (Livermore, CA); Schumann, Daniel L. (Concord, CA); Jensen, Wayne A. (Livermore, CA); Ortega, Jason M. (Pacifica, CA); Marion, III, John E. (Livermore, CA); Loge, Jeffrey M. (Stockton, CA)

2010-06-29T23:59:59.000Z

149

ARCS – Access Rate Control System  

protected steel housing. ... Access Rate Control System This rugged, maintenance- ... Y-12 is seeking an industry partner to fully com-

150

Topic: Emergency Egress and Access  

Science Conference Proceedings (OSTI)

Topic: Emergency Egress and Access. Fire Research Seminar Series. NIST WTC Recommendations Are Basis for New Set of Revised Codes. ...

2012-08-20T23:59:59.000Z

151

Transparently consistent asynchronous shared memory  

Science Conference Proceedings (OSTI)

The advent of many-core processors is imposing many changes on the operating system. The resources that are under contention have changed; previously, CPU cycles were the resource in demand and required fair and precise sharing. Now compute cycles are ... Keywords: copy on write, memory management, memory sharing, virtual memory

Hakan Akkan, Latchesar Ionkov, Michael Lang

2013-06-01T23:59:59.000Z

152

Open Access Transmission Tariff  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission | OATT Transmission | OATT Skip Navigation Links Transmission Functions Infrastructure projects Interconnection OASIS OATT Western Open Access Transmission Service Tariff Revision Western Area Power Administration submitted its revised Open Access Transmission Service Tariff with the Federal Energy Regulatory Commission on Sept. 30, 2009. The tariff became effective on Dec. 1, 2009, as modified by Western's March 2, 2011 compliance filing. The revised tariff was developed to comply with FERC Order No. 890 and to be consistent with Western's statutory and regulatory requirements. It addresses changes in transmission services and planning. FERC issued an order on Dec. 2, 2010, granting Western's petition for a Declaratory Order approving the tariff as an acceptable reciprocity tariff, subject to Western making a compliance filing within 30 days to address items in Attachment C, Attachment P and Attachment Q. Western made its compliance filing on March 2, 2010, addressing FERC's Dec. 2, 2010, order. FERC accepted Western's March 2, 2011 compliance filing on April 25, 2011. Western has made several ministerial filings to its OATT as part of FERC's eTariff viewer system, the last of these was approved on March 29, 2013. Further detail can be found in the links below.Current OATT

153

The memory book  

Science Conference Proceedings (OSTI)

In this paper we present an Augmented Reality book for remembering past events and to plan future ones. We have developed this system using Brainstorm eStudio. We have incorporated Augmented Reality options into Brainstorm eStudio using a plugin of ARToolKit. ... Keywords: augmented reality, memory book, storytelling

M. C. Juan; B. Rey; D. Perez; D. Tomas; M. Alcañiz

2005-06-01T23:59:59.000Z

154

Library Book Memorial and  

E-Print Network (OSTI)

Library Book Memorial and Honorary Gift Program A university library provides the information or event. We will inform the individual or family of your gift and the book(s) we add to the library Enclosed is my $___________ contribution for gift books. K $20 or more -- Bookplate(s) K Under $20

VanDieren, Monica

155

NSLS User Access | Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

156

Template Discontinuation Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOR SUBJECT FOR SUBJECT FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions signed on [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. A review of that form disclosed recent use of illegal drugs. [Insert a brief description of the circumstances such as: Specifically, you listed marijuana use 1 time in 5/02; 1 time in 2/03; and 1 time in 3/07.] This office has discontinued the personnel security processing of your security clearance due to your illegal drug usage within twelve months of the signing of your security clearance application.

157

Remote access of electronic resources for thermal plant using mobile devices  

Science Conference Proceedings (OSTI)

This paper proposes a framework that extends a typical intelligent thermal system management that enables field engineers retrieving vital resources from centralised management station using mobile devices with limited memory, such as PDAs and cell phones. ... Keywords: J2ME, PDAs, artificial intelligence, cell phones, fault diagnosis, intelligent thermal management, mobile devices, mobile phones, remote access, thermal management systems, thermal plants, thermodynamic properties

F-L. Tan; S-C. Fok

2007-11-01T23:59:59.000Z

158

REMOTE ACCESS SERVICES | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Access the information you need... Anywhere. Anytime. Different service providers within the Department offer remote access services based on your specific work requirements. If you need assistance, please contact your individual service provider. Energy IT Services (EITS) Remote Access Services Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network Instructions Citrix Workplace Instructions Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN Office of Intelligence and Counterintelligence (IN) Remote Access Services Outlook Web Access Office of Science (SC) Remote Access Services Citrix Workplace Help for EITS Customers

159

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Core Plan OPEN ACCESS PLUS MEDICAL BENEFITS ............................................................................................................................................11 Open Access Plus Medical Benefits

160

Performance analysis of memory hierachies in high performance systems  

SciTech Connect

This thesis studies memory bandwidth as a performance predictor of programs. The focus of this work is on computationally intensive programs. These programs are the most likely to access large amounts of data, stressing the memory system. Computationally intensive programs are also likely to use highly optimizing compilers to produce the fastest executables possible. Methods to reduce the amount of data traffic by increasing the average number of references to each item while it resides in the cache are explored. Increasing the average number of references to each cache item reduces the number of memory requests. Chapter 2 describes the DLX architecture. This is the architecture on which all the experiments were performed. Chapter 3 studies memory moves as a performance predictor for a group of application programs. Chapter 4 introduces a model to study the performance of programs in the presence of memory hierarchies. Chapter 5 explores some compiler optimizations that can help increase the references to each item while it resides in the cache.

Yogesh, A.

1993-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

A Large-Droplet Mode and Prognostic Number Concentration of Cloud Droplets in the Colorado State University Regional Atmospheric Modeling System (RAMS). Part I: Module Descriptions and Supercell Test Simulations  

Science Conference Proceedings (OSTI)

The microphysics module of the version of the Regional Atmospheric Modeling System (RAMS) maintained at Colorado State University has undergone a series of improvements, including the addition of a large-cloud-droplet mode from 40 to 80 ?m in ...

Stephen M. Saleeby; William R. Cotton

2004-01-01T23:59:59.000Z

162

Laboratory Access | Sample Preparation Laboratories  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Access Planning Ahead Planning Ahead Please complete the Beam Time Request (BTR) and Support Request forms thourgh the User Portal. Thorough chemical and sample information must be included in your BTR. Support Request forms include a list of collaborators that require laboratory access and your group's laboratory equipment requests. Researcher safety is taken seriously at SLAC. Please remember that radioactive materials, nanomaterials, and biohazardous materials have additional safety requirements. Refer to the SSRL or LCLS Safety Offices for further guidance. Upon Arrival Upon Arrival Once you arrive you must complete training and access forms before accessing the Sample Preparation Laboratories (SPL). All Sample Prep Lab doors are locked with access key codes. Once your SPL

163

Shape memory alloy actuator  

DOE Patents (OSTI)

An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

Varma, Venugopal K. (Knoxville, TN)

2001-01-01T23:59:59.000Z

164

Genepool Memory Heatmaps  

NLE Websites -- All DOE Office Websites (Extended Search)

Genepool Memory Heatmaps Genepool Memory Heatmaps Heatmap of Memory and Slots Requested vs Time Waited (in hours) | Queue: All | Last 7 Days Memory Requested Slots <5GB 5-10GB 10-20GB 20-30GB 30-40GB 40-50GB 50-100GB 100-150GB 150-200GB 200-256GB 256-512GB 512+GB Job Count Longest Wait 1 2.26 (2693) 10.5 (201167) 3.2 (11650) 0 1.75 (282) 1.49 (1627) 0.03 (1) 0 0 0 0 0 217420 538.96 2 0.26 (103) 1.02 (2817) 0 0 0 0 0 0 0 0 0 0 2920 9.1 4 1.55 (198) 1.48 (104) 0.34 (8) 0 0 0 1.86 (3) 0 0 0 0 0 313 20.48 6 0.01 (1) 0.09 (34) 0 0 0 0 0 0 0 0 0 0 35 1.22 8 0.34 (37) 6.15 (12376) 1.01 (17) 24.7 (1) 0.03 (3) 0 0.02 (6) 0 0 0 0 0 12440 46.16 10 0 8.56 (1) 0 0 0 0 0 0 0 0 0 0 1 8.56 16 0 0.03 (1) 0 0 0 0 0 0 0 0 0 0 1 0.03 24 0 0 0.01 (1) 0 0 0 0 0 0 0 0 0 1 0.01 32 0 0.01 (4) 0.05 (9) 0 0.01 (6) 0 0.0 (1) 0 0 0 0 0 20 0.26

165

Optical access port  

DOE Patents (OSTI)

A 0.025 m diameter optical access port system is provided for a high-pressure (20.4 bars) and high-temperature (538{degrees}C) fixed-bed coal gasification process stream. A pair of proximal channels lead into the pipe containing the process stream with the proximal channels disposed on opposite sides of the pipe and coaxial. A pair of ball valves are attached to respective ends of proximal channels for fluidly closing the respective channels in a closed position and for providing a fluid and optical aperture in an open position. A pair of distal channels are connected to respective ball valves. These distal channels are also coaxial with each other and with the proximal channels. Each distal channel includes an optical window disposed therein and associated sealing gaskets. A purge gas is introduced into each distal channel adjacent a respective optical window. The purge gas is heated by a heater before entry into the distal channels. Preferably the optical windows are made of fused silica and the seals are Grafoil gaskets which are pressed against the optical window. 3 figs.

Lutz, S.A.; Anderson, R.J.

1988-09-14T23:59:59.000Z

166

Design exploration of hybrid caches with disparate memory technologies  

Science Conference Proceedings (OSTI)

Traditional multilevel SRAM-based cache hierarchies, especially in the context of chip multiprocessors (CMPs), present many challenges in area requirements, core--to--cache balance, power consumption, and design complexity. New advancements in technology ... Keywords: Hybrid cache architecture, Three-dimensional IC design, cache hierarchy, embedded DRAM, magnetic RAM, nonuniform cache architecture, phase-change RAM, power, thermal

Xiaoxia Wu; Jian Li; Lixin Zhang; Evan Speight; Ram Rajamony; Yuan Xie

2010-12-01T23:59:59.000Z

167

Access Control Policy Tool (ACPT)  

Science Conference Proceedings (OSTI)

... In regard to cyber security, privacy, and information sharing, access control is one of the crucial elements in protecting the nation's critical IT ...

2013-01-15T23:59:59.000Z

168

Foreign National Access Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

will be allowed access to the ANL facility prior to approval by the Security and Counterintelligence Division. The visitor must have a valid passport and visa (or supplemental...

169

Science Open Access Journals - About  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. The query is sent simultaneously to each individual database searched by SOAJ,...

170

APC: a performance metric of memory systems  

Science Conference Proceedings (OSTI)

Due to the infamous "memory wall" problem and a drastic increase in the number of data intensive applications, memory rather than processor has become the leading performance bottleneck of modern computing systems. Evaluating and understanding memory ... Keywords: measurement methodology, memory metric, memory performance measurement

Xian-He Sun; Dawei Wang

2012-10-01T23:59:59.000Z

171

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

8:54 AM Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Basic Plan OPEN ACCESS PLUS MEDICAL ...................................................................................................................................................10 Open Access Plus Medical Benefits Basic Plan ...............................................................................................................................................................12 Open Access Plus Medical Benefits Core Plan

172

Internal Controls Over Sensitive Compartmented Information Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Controls Over Sensitive Compartmented Information Access for Selected Field Intelligence Elements, IG-0796 Internal Controls Over Sensitive Compartmented Information Access...

173

Using Hardware Memory Protection to Build a High-Performance, Strongly-Atomic Hybrid Transactional Memory  

Science Conference Proceedings (OSTI)

We demonstrate how fine-grained memory protection can be used in support of transactional memory systems: first showing how a software transactional memory system (STM) can be made strongly atomic by using memory protection on transactionally-held state, ... Keywords: Transactional Memory, Hybrid, Memory Protection, Primitives, Abort Handler, Strong Atomicity

Lee Baugh; Naveen Neelakantam; Craig Zilles

2008-06-01T23:59:59.000Z

174

Applications of Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 3, 2011 ... More than 50 years after the discovery of shape memory alloys, and after investments of millions of dollars, there are very few successful ...

175

Memory exploration for low power, embedded systems  

Science Conference Proceedings (OSTI)

Keywords: cache simulator, design automation, low power design, low power embedded systems, memory exploration and optimization, memory hierarchy, off-chip data assignment

Wen-Tsong Shiue; Chaitali Chakrabarti

1999-06-01T23:59:59.000Z

176

Shape memory alloy thaw sensors  

DOE Patents (OSTI)

A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

1998-01-01T23:59:59.000Z

177

KINEMATICS AND EXCITATION OF THE RAM PRESSURE STRIPPED IONIZED GAS FILAMENTS IN THE COMA CLUSTER OF GALAXIES  

SciTech Connect

We present the results of deep imaging and spectroscopic observations of very extended ionized gas (EIG) around four member galaxies of the Coma Cluster of galaxies: RB 199, IC 4040, GMP 2923, and GMP 3071. The EIGs were serendipitously found in an H{alpha} narrowband imaging survey of the central region of the Coma Cluster. The relative radial velocities of the EIGs with respect to the systemic velocities of the parent galaxies from which they emanate increase almost monotonically with the distance from the nucleus of the respective galaxies, reaching {approx} - 400 to - 800 km s{sup -1} at around 40-80 kpc from the galaxies. The one-sided morphologies and the velocity fields of the EIGs are consistent with the predictions of numerical simulations of ram pressure stripping. We found a very low velocity filament (v{sub rel} {approx} -1300 km s{sup -1}) at the southeastern edge of the disk of IC 4040. Some bright compact knots in the EIGs of RB 199 and IC 4040 exhibit blue continuum and strong H{alpha} emission. The equivalent widths of the H{alpha} emission exceed 200 A and are greater than 1000 Angstrom-Sign for some knots. The emission-line intensity ratios of the knots are basically consistent with those of sub-solar abundance H II regions. These facts indicate that intensive star formation occurs in the knots. Some filaments, including the low-velocity filament of the IC 4040 EIG, exhibit shock-like emission-line spectra, suggesting that shock heating plays an important role in ionization and excitation of the EIGs.

Yoshida, Michitoshi [Hiroshima Astrophysical Science Center, Hiroshima University, Higashi-Hiroshima, Hiroshima 739-8526 (Japan); Yagi, Masafumi; Komiyama, Yutaka; Kashikawa, Nobunari [Optical and Infrared Astronomy Division, National Astronomical Observatory, Mitaka, Tokyo 181-8588 (Japan); Furusawa, Hisanori [Astronomical Data Center, National Astronomical Observatory of Japan, Mitaka, Tokyo 181-8588 (Japan); Hattori, Takashi [Subaru Telescope, National Astronomical Observatory of Japan, 650 North A'Ohoku Place, Hilo, HI 96720 (United States); Okamura, Sadanori, E-mail: yoshidam@hiroshima-u.ac.jp [Department of Astronomy, University of Tokyo, Tokyo 113-0033 (Japan)

2012-04-10T23:59:59.000Z

178

A High Integrity Profile for Memory Safe Programming in Real-time Java Alex Potanin1  

E-Print Network (OSTI)

to their classes' packages abstract class ScopeGate { protected ScopeGate(LTMemory memory); public final void reset Zen's structure, we then had to relocate classes into the correct packages, adjusting their defini.3. Step 3: Access Mode Adaption and Type Specialization Once the package structure of the program has been

Zhao, Tian

179

Notices Accessible Format: Individuals with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

472 Federal Register 472 Federal Register / Vol. 77, No. 83 / Monday, April 30, 2012 / Notices Accessible Format: Individuals with disabilities can obtain this document in an accessible format (e.g., braille, large print, audiotape, or computer diskette) on request to the program contact person listed under FOR FURTHER INFORMATION CONTACT. Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document

180

Network Access to Multimedia Information  

Science Conference Proceedings (OSTI)

This report summarises the requirements of research and academic network users for network access to multimedia information. It does this by investigating some of the projects planned or currently underway in the community. Existing information systems ...

C. Adie

1994-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Categorical Exclusion for Access Road  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Road Access Road Improvements along the Pinnacle Peak- Prescott 230-kV Transmission Line between Structures 16813 and 170/1 Yavapai County. Arizona * RECORD OF CATEGORICAL EXCLUSION DETERMINATION A. Proposed Action: Western proposes to improve access roads along a portion of the Pinnacle Peak to Prescott 230-kV Transmission Line (Structures 168/3 and 170/1). which are currently impassable. to maintain worker safety and the reliability of the bulk electric system. Western plans to blade and grade the existing access road where it enters and leaves three washes so that Western's maintenance vehicles can drive across the washes. We will remove dirt from the road prism by starting at wash edges and pulling dirt up slope in order to create ramps with grades suitable for our equipment.

182

XML access control using static analysis  

Science Conference Proceedings (OSTI)

Access control policies for XML typically use regular path expressions such as XPath for specifying the objects for access-control policies. However such access-control policies are burdens to the query engines for XML documents. To relieve this burden, ... Keywords: Access control, XML, XPath, XQuery, automaton, query optimization, schema, static analysis, value-based access control, view schema

Makoto Murata; Akihiko Tozawa; Michiharu Kudo; Satoshi Hada

2006-08-01T23:59:59.000Z

183

ELECTROSTATIC MEMORY SYSTEM  

DOE Patents (OSTI)

An improved electrostatic memory system is de scribed fer a digital computer wherein a plarality of storage tubes are adapted to operate in either of two possible modes. According to the present irvention, duplicate storage tubes are provided fur each denominational order of the several binary digits. A single discriminator system is provided between corresponding duplicate tubes to determine the character of the infurmation stored in each. If either tube produces the selected type signal, corresponding to binazy "1" in the preferred embodiment, a "1" is regenerated in both tubes. In one mode of operation each bit of information is stored in two corresponding tubes, while in the other mode of operation each bit is stored in only one tube in the conventional manner.

Chu, J.C.

1958-09-23T23:59:59.000Z

184

Multi-Level Bitmap Indexes for Flash Memory Storage  

SciTech Connect

Due to their low access latency, high read speed, and power-efficient operation, flash memory storage devices are rapidly emerging as an attractive alternative to traditional magnetic storage devices. However, tests show that the most efficient indexing methods are not able to take advantage of the flash memory storage devices. In this paper, we present a set of multi-level bitmap indexes that can effectively take advantage of flash storage devices. These indexing methods use coarsely binned indexes to answer queries approximately, and then use finely binned indexes to refine the answers. Our new methods read significantly lower volumes of data at the expense of an increased disk access count, thus taking full advantage of the improved read speed and low access latency of flash devices. To demonstrate the advantage of these new indexes, we measure their performance on a number of storage systems using a standard data warehousing benchmark called the Set Query Benchmark. We observe that multi-level strategies on flash drives are up to 3 times faster than traditional indexing strategies on magnetic disk drives.

Wu, Kesheng; Madduri, Kamesh; Canon, Shane

2010-07-23T23:59:59.000Z

185

Shape memory metals. Final report  

SciTech Connect

The ability to define a manufacturing process to form, heat-treat, and join parts made of nickel-titanium and/or copper-zinc-aluminum shape memory alloys was investigated. The specific emphasis was to define a process that would produce shape memory alloy parts in the configuration of helical coils emulating the appearance of compression springs. In addition, the mechanical strength of the finished parts along with the development of a electrical lead attachment method using shape memory alloy wire was investigated.

Dworak, T.D.

1993-09-01T23:59:59.000Z

186

A durable and energy efficient main memory using phase change memory technology  

Science Conference Proceedings (OSTI)

Using nonvolatile memories in memory hierarchy has been investigated to reduce its energy consumption because nonvolatile memories consume zero leakage power in memory cells. One of the difficulties is, however, that the endurance of most nonvolatile ... Keywords: endurance, low power, phase change memory

Ping Zhou; Bo Zhao; Jun Yang; Youtao Zhang

2009-06-01T23:59:59.000Z

187

HM-ACCESS Project | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HM-ACCESS Project HM-ACCESS Project Framework for the Use of Electronic Shipping Papers for the Transport of Hazardous Materials HM-ACCESS Project (Framework for the Use of...

188

2e Carbon Access | Open Energy Information  

Open Energy Info (EERE)

Access Jump to: navigation, search Name 2e Carbon Access Place New York, New York Zip 10280 Sector Carbon Product 2E Carbon Access is an enterprise focused solely on bringing...

189

Enhanced input/output architecture for toroidally-connected distributed-memory parallel computers  

SciTech Connect

This patent describes an improvement in a toroidally-connected distributed-memory parallel computer having rows and columns of processors, wherein each processor has an independent memory and is connected to four neighboring processors. It comprises: at least one common I/O channel; a buffering mechanisms, each being connected to such I/O channel and to only one corresponding processor in a given row of processors; and each such processor of the given row being connected to only one corresponding buffer mechanism in such a manner that it can access its buffer mechanism independently of the access top such buffer mechanism by the I/O channel, and independently of access to the buffer mechanisms corresponding to other processors in the given row.

Cok, R.S.

1990-07-17T23:59:59.000Z

190

Shri Ram Arora Application  

Science Conference Proceedings (OSTI)

Please submit to: Deborah Price. 184 Thorn Hill Road. Warrendale, PA 15086- 7514. USA. Telephone: +(724) 776-9000, ext. 232. E-mail: awards@tms.org. 3. 4.

191

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Neustar, Inc. ("Neustar") hereby submits comments in response to the captioned Request for Information ("RFI") of the Department of Energy ("DOE"). The...

192

International Electricity Trade - Open Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

193

Remote Access of Computer Controlled Experiments.  

E-Print Network (OSTI)

??In this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program.… (more)

Nilsson, Kristian; Zackrisson, Johan

2008-01-01T23:59:59.000Z

194

OMC-INTEGRAL Memory Management  

Science Conference Proceedings (OSTI)

The management of the memory restrictions imposed by the processor (1750A) was one of the major difficulties found in designing the Software (SW) controlling the Optical Monitoring Camera (OMC) payload of the International Gamma Ray Laboratory (INTEGRAL) ...

Jose Manuel Pérez Lobato; Eva Martín Lobo

2002-06-01T23:59:59.000Z

195

Shape memory alloy thaw sensors  

SciTech Connect

A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

Shahinpoor, M.; Martinez, D.R.

1998-04-07T23:59:59.000Z

196

Energy efficient Phase Change Memory based main memory for future high performance systems  

Science Conference Proceedings (OSTI)

Phase Change Memory (PCM) has recently attracted a lot of attention as a scalable alternative to DRAM for main memory systems. As the need for high-density memory increases, DRAM has proven to be less attractive from the point of view of scaling and ... Keywords: DDR3 commodity DRAM memory system, energy efficient phase change memory, main memory, future high performance systems, energy consumption, latency issues, write energy, write endurance, cache, embedded DRAM

R. A. Bheda; Jason A. Poovey; J. G. Beu; T. M. Conte

2011-07-01T23:59:59.000Z

197

USRI Admins Accessing USRI Reports  

E-Print Network (OSTI)

button #12;Step 6: Search by Instructor Search Area Enter: Instructors ID; or Instructors full or partC Access Enter the following: User name, and Password with secure ID#s #12;Step 3: Click on the following: Mandatory Parameters Selections Select Term; Select Course Career; Select Releasable Type; Click

Habib, Ayman

198

Flexible access control for javascript  

Science Conference Proceedings (OSTI)

Providing security guarantees for systems built out of untrusted components requires the ability to define and enforce access control policies over untrusted code. In Web 2.0 applications, JavaScript code from different origins is often combined on a ... Keywords: delimited histories, javascript, same-origin policy, security

Gregor Richards, Christian Hammer, Francesco Zappa Nardelli, Suresh Jagannathan, Jan Vitek

2013-10-01T23:59:59.000Z

199

NBP_RFI_Data_Access.PDF | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF More Documents & Publications Silver Spring Networks comments on DOE NBP RFI: Data Access...

200

PIA - Foreign Access Central Tracking System (FACTS) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central...

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

ETTP Security Access Control System (ESACS) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

202

Reducing Cache Access Energy in Array-Intensive Applications  

E-Print Network (OSTI)

Mahmut Kandemir Microsystems Design Lab Pennsylvania State University University Park, PA, 16802, USA Ibrahim Kolcu UMIST P.O. Box 88, Sackville Street Manchester, M60 1QD, UK Cache memories are known to consume a large percentage of on-chip energy in current microprocessors. For example, [1] reports that the on-chip cache in DEC Alpha 21264 consumes approximately 25% of the on-chip energy. Both sizes and complexities of state-of-the-art caches play a major role in their energy consumption. Direct-mapped caches are, in general, more energy efficient (from a per access energy consumption viewpoint) as they are simpler as compared to set-associative caches, and require no complex line replacement mechanisms (i.e., there is no decision concerning which line has to be evicted when a new line is to be loaded).

Exte Nd Ed; Mahmut Kandemir; Ibrahim Kolcu

2002-01-01T23:59:59.000Z

203

SunShot Initiative: Access to Capital  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to Capital to someone by Access to Capital to someone by E-mail Share SunShot Initiative: Access to Capital on Facebook Tweet about SunShot Initiative: Access to Capital on Twitter Bookmark SunShot Initiative: Access to Capital on Google Bookmark SunShot Initiative: Access to Capital on Delicious Rank SunShot Initiative: Access to Capital on Digg Find More places to share SunShot Initiative: Access to Capital on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Reducing Non-Hardware Costs Lowering Barriers Fostering Growth Access to Capital Photo of a room full of people seated in rows with a few standing in the background. Two hands in the crowd are holding up sheets of paper with 'Like'. Participants at the SunShot Summit breakout session "Big and Small Ideas:

204

Ralph H. Potts Memorial Fellowship Award  

Science Conference Proceedings (OSTI)

Awarded to a graduate student doing research in fats and oils. Ralph H. Potts Memorial Fellowship Award Awards Program achievement aocs application award Awards baldwin distinguished division memorial nomination poster program recognizing research

205

A Large-Droplet Mode and Prognostic Number Concentration of Cloud Droplets in the Colorado State University Regional Atmospheric Modeling System (RAMS). Part II: Sensitivity to a Colorado Winter Snowfall Event  

Science Conference Proceedings (OSTI)

This paper is the second in a two-part series describing recent additions to the microphysics module of the Regional Atmospheric Modeling System (RAMS) at Colorado State University. These changes include the addition of a large-cloud-droplet mode ...

Stephen M. Saleeby; William R. Cotton

2005-12-01T23:59:59.000Z

206

Fishman, B., Pinkard, N., & Bruce, C. (1998). Preparing schools for curricular reform: Planning for Technology vs. Technology Planning. In A. Bruckman, M. Guzdial, J. Kolodner, & A. Ram (Eds.), International Conference on the  

E-Print Network (OSTI)

Fishman, B., Pinkard, N., & Bruce, C. (1998). Preparing schools for curricular reform: Planning for Technology vs. Technology Planning. In A. Bruckman, M. Guzdial, J. Kolodner, & A. Ram (Eds.), International for Curricular Reform: Planning for Technology vs. Technology Planning Barry Fishman, Nichole Pinkard, Chris

Fishman, Barry

207

Available Technologies:Collective Memory Transfers for ...  

APPLICATIONS OF TECHNOLOGY: High Performance Computing (HPC) Big Data processing and analysis; Processor manufacturers; Memory module manufacturers

208

NIST Demonstrates Better Memory with Quantum Computer ...  

Science Conference Proceedings (OSTI)

... to demonstrate a quantum physics version of computer memory lasting ... prospects for making practical, reliable quantum computers (which make ...

2013-01-03T23:59:59.000Z

209

Battelle Memorial Institute Technology Marketing Summaries ...  

... applications and industries, and development stage. Battelle Memorial ... Typical existing armor for vehicles uses rigid plates of steel.

210

Chapter 5: Virtual Memory Management 1 Virtual Memory Management  

E-Print Network (OSTI)

kernel data structures. The zone package This package facilitates fast allocation of memory for kernel data structures, some of which may be in time critical pieces of code. The zone package provides, organization, data structures, interactions. The emphasis is laid on both ma- chine dependent portion

Melbourne, University of

211

DOBSON: a Pentium-based SMP Linux PC Beowulf for distributed-memory high resolution environment modelling  

Science Conference Proceedings (OSTI)

With the increasing computational speed of PC processors, lowering hardware prices, and the increasing accessibility of open source software, PC clusters have become an attractive option for exploring budgetary high performance computation on high resolution ... Keywords: 07.05.Bx, 92.60.Fm, 92.60.Jq, 92.60.Sz, Air pollution modelling, Beowulf, Cluster computing, Distributed-memory computing

K. -Y. Wang; D. E. Shallcross; S. M. Hall; Y. -H. Lo; C. Chou; D. Chen

2005-10-01T23:59:59.000Z

212

Shape memory polymer foams for endovascular therapies  

DOE Patents (OSTI)

A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

Wilson, Thomas S. (Castro Valley, CA); Maitland, Duncan J. (Pleasant Hill, CA)

2012-03-13T23:59:59.000Z

213

Specifying memory consistency of write buffer multiprocessors  

Science Conference Proceedings (OSTI)

Write buffering is one of many successful mechanisms that improves the performance and scalability of multiprocessors. However, it leads to more complex memory system behavior, which cannot be described using intuitive consistency models, such as Sequential ... Keywords: Memory consistency framework, alpha, coherence, partial store order, relaxed memory order, sequential consistency, sparc multiprocessors, total store order, write-buffer architectures

Lisa Higham; Lillanne Jackson; Jalal Kawash

2007-02-01T23:59:59.000Z

214

Reducing memory sharing overheads in distributed JVMs  

Science Conference Proceedings (OSTI)

Distributed JVM systems by supporting Java’s shared-memory model enable concurrent Java applications to run transparently on clusters of computers. Aiming to reduce the overheads associated to memory coherence enforcement mechanisms required in ... Keywords: JVM, Java, cluster computing, concurrent Java applications, distributed shared memory, high-performance computing

Marcelo Lobosco; Orlando Loques; Claudio L. de Amorim

2005-09-01T23:59:59.000Z

215

Multistable Circuits for Analog Memories Implementation  

Science Conference Proceedings (OSTI)

In this work two multistable circuits suitable for analog memories implementation will be presented. These circuits have been used to implement completely asynchronous analog memories, one type based on a flash converter and thus having a linear complexity ... Keywords: analog memories, asynchronous converters, successive approximations

Giorgio Biagetti; Massimo Conti; Simone Orcioni

2004-04-01T23:59:59.000Z

216

The Tempest approach to distributed shared memory  

Science Conference Proceedings (OSTI)

This paper summarizes how distributed shared memory (DSM) can be both efficiently and portably supported by the Tempest interface. Tempest is a collection of mechanisms for communication and synchronization in parallel programs. These mechanisms provide ... Keywords: Tempest, Tempest interface, distributed shared memory, message passing, parallel programs, shared memory

David A. Wood; Mark D. Hill; James R. Larus

1996-10-01T23:59:59.000Z

217

Algorithms and data structures for external memory  

Science Conference Proceedings (OSTI)

Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/output communication (or I/O) between fast internal memory and slower external memory (such as disks) can be a major performance ...

Jeffrey Scott Vitter

2008-01-01T23:59:59.000Z

218

The use of Texel, Dorper, Suffolk, and Rambouillet rams in terminal crossbreeding programs on fine wool type sheep to improve growth rate and carcass composition of offspring  

E-Print Network (OSTI)

A crossbreeding study to compare the use of Texel, Dorper, Suffolk and Rambouillet rams as terminal sires on fine wool type sheep was conducted at Texas A&M University, College Station, Texas. Two-hundred fifty-five multiparous Rambouillet ewes were randomly divided into four breeding groups and mated to rams representing the test breeds. Ewes were maintained on native grass pastures and supplemented with concentrate or dry hay, when forage sources were deemed insufficient to meet ewes' dietary requirements according to NRC (1985) for gestating and lactating ewes. Ewes lambed and were maintained on pasture through weaning. Data collected and analyzed included birth weights, lamb vigor scores and death loss prior to weaning. Lambs were weaned at average age of 90d, weaning weights were taken and adjusted for age, sex, and type of birth/rearing. Seventy-eight lambs, 20 from each of the Rambouillet, Suffolk, Texel and 18 from the Dorper subgroups, were placed in the feedlot portion of this study. Lambs were fed ad libitum for 78d. Refusals were weighed back weekly and feed conversions calculated. After a 12hr shrink, final weights were obtained, post weaning average daily gain calculated, and lambs were slaughtered. Hot carcass weights were obtained and dressing percentages calculated. Cold carcass weights, loin eye area (LEA), 12[] rib fat thickness, leg circumferences and carcass lengths were measured. Leg conformation scores were assigned to each carcass after a 48h chill. Texel-sired lambs had a higher mean (P.10). Texel- and Suffolk-sired lambs had higher mean final weights (P.10) among breeds. Dorper-sired lambs had the lowest final weights, lightest hot carcass weights and shortest carcass lengths (P<.01).

Taylor, Todd Allen

2001-01-01T23:59:59.000Z

219

Indiana Memorial Union Wells Library  

E-Print Network (OSTI)

Franklin Hall Bryan Hall Law Indiana Memorial Union Jordan Hall Morrison Hall Wells Library Loop (0.5 miles) IMU to Greenhouse (0.3 miles) Business to Law School (0.75 miles) Wells Library to Morrison Hall (0.5 miles) Wells Library to Muisc Library (0.4 miles) #12;

Indiana University

220

Trapped-flux superconducting memory  

Science Conference Proceedings (OSTI)

A memory cell based on trapped flux in superconductors has been built and tested. The cell is constructed entirely by vacuum evaporation of thin films and can be selected by coincident current or by other techniques, with drive-current requirements less ...

J. W. Crowe

1957-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

An Access Definition and Query Language : Towards a Unified Access Control Model.  

E-Print Network (OSTI)

??In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of… (more)

Sonnenbichler, Andreas

2013-01-01T23:59:59.000Z

222

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Reply comments from Cleco Power LLC on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid:...

223

Game Accessibility: Enabling Everyone to Play  

Science Conference Proceedings (OSTI)

There is a growing push to make computer games accessible to the disabled. Keywords: Games,Assistive technology,Assistive devices,game developers,games,accessibility,disabilities,disabled,adaptive technology

Lee Garber

2013-06-01T23:59:59.000Z

224

arXiv.org help - Web Accessibility  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Accessibility The arXiv.org web site is designed to work on the largest possible set of browsers and platforms, and to be accessible to users with disabilities. Our web pages...

225

Access Solar Energy LLC | Open Energy Information  

Open Energy Info (EERE)

Access Solar Energy LLC Jump to: navigation, search Name Access Solar Energy LLC Place Park CIty, Utah Zip 84060 Sector Renewable Energy, Solar Product Utah-based developers of...

226

Access Control: Policies, Models, and Mechanisms  

Science Conference Proceedings (OSTI)

Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access control decision is enforced by a mechanism implementing regulations established ...

Pierangela Samarati; Sabrina De Capitani di Vimercati

2000-09-01T23:59:59.000Z

227

Survey of Substation Equipment Access Control Policies  

Science Conference Proceedings (OSTI)

Utility management and control of access to substations and equipment can help prevent not only unauthorized access by outside agents with ill intent, but also erroneous access to, or erroneous operation of, utility equipment by utility personnel.  This report provides the results of an EPRI–sponsored research project to identify how utilities manage access to transmission and distribution substations and equipment. BackgroundThe enhanced ...

2012-11-20T23:59:59.000Z

228

Transmission Access Charge Informational Filing  

E-Print Network (OSTI)

of any new Participating Transmission Owner (“Participating TO”) during the proceeding six months or (2) changes to Transmission Revenue Requirements of any of the Participating TOs. 1 Because the Access Charges are determined through a formula rate mechanism, these semi-annual adjustments take place automatically. In the enclosed informational filing, the ISO is providing notice regarding the updated Access Charges that reflect the charges that will be in effect beginning January 1, 2002 in accordance with the formula rate. The adjusted charges are based on the modified Transmission Revenue Requirements, both High Voltage and Low Voltage as a result of: (1) the Offer of Settlement accepted by the Commission in Pacific Gas & Electric Company’s (“PG&E”) Docket No. ER01-66-000, (2) San Diego Gas and Electric Company’s supplemental surcharge accepted, subject to refund, in Docket No. ER01-3074-000, and (3) the annual adjustment to the Transmission Revenue Balancing Account (“TRBA”) of the Participating TOs. 1 Capitalized terms not otherwise defined herein are defined in the Master Definitions

unknown authors

2001-01-01T23:59:59.000Z

229

Substation Security and Remote Access Implementation Strategies  

Science Conference Proceedings (OSTI)

This project analyzed control system remote access solutions in a side-by-side comparison. Five systems were lab-tested against common functions used by utilities to access and manage electronic control systems. The five vendors’ products met the basic remote access requirements tested.BackgroundElectronic control systems that actuate protective equipment and physical operations in the ...

2012-12-20T23:59:59.000Z

230

A propositional policy algebra for access control  

Science Conference Proceedings (OSTI)

Security-sensitive environments protect their information resources against unauthorized use by enforcing access control mechanisms driven by access control policies. Due to the need to compare, contrast, and compose such protected information resources, ... Keywords: Access control, policy algebra, policy composition, security policy

Duminda Wijesekera; Sushil Jajodia

2003-05-01T23:59:59.000Z

231

Programmer-focused website accessibility evaluations  

Science Conference Proceedings (OSTI)

Suggested methods for conducting website accessibility evaluations have typically focused on the needs of end-users who have disabilities. However, programmers, not people with disabilities, are the end-users of evaluations reports generated by accessibility ... Keywords: accessibility, evaluation, internet, reporting

Chris Law; Julie Jacko; Paula Edwards

2005-10-01T23:59:59.000Z

232

A systematic approach to static access control  

Science Conference Proceedings (OSTI)

The Java Security Architecture includes a dynamic mechanism for enforcing access control checks, the so-called stack inspection process. While the architecture has several appealing features, access control checks are all implemented via dynamic ... Keywords: Type systems, access control, stack inspection

François Pottier; Christian Skalka; Scott Smith

2005-03-01T23:59:59.000Z

233

Mission-Aware Medium Access Control in Random Access Networks  

E-Print Network (OSTI)

We study mission-critical networking in wireless communication networks, where network users are subject to critical events such as emergencies and crises. If a critical event occurs to a user, the user needs to send necessary information for help as early as possible. However, most existing medium access control (MAC) protocols are not adequate to meet the urgent need for information transmission by users in a critical situation. In this paer, we propose a novel class of MAC protocols that utilize available past information as well as current information. Our proposed protocols are mission-aware since they prescribe different transmission decision rules to users in different situations. We show that the proposed protocols perform well not only when the system faces a critical situation but also when there is no critical situation. By utilizing past information, the proposed protocols coordinate transmissions by users to achieve high throughput in the normal phase of operation and to let a user in a critical ...

Park, Jaeok

2009-01-01T23:59:59.000Z

234

Optimizing Memory Accesses For Spatial Computation Mihai Budiu and Seth C. Goldstein  

E-Print Network (OSTI)

- sented are: load/store hoisting (subsuming partial re- dundancy elimination and common programs in hardware. Each operation in the program is implemented as a hard- ware operator. Data flows

Goldstein, Seth Copen

235

Energy-performance trade-offs for spatial access methods on memory-resident data  

Science Conference Proceedings (OSTI)

The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious design is important at all levels of system architecture, and the software has a key role to play in conserving battery energy ... Keywords: Energy optimization, Multidimensional indexing, Resource-constrained computing, Spatial data

Ning An; Sudhanva Gurumurthi; Anand Sivasubramaniam; Narayanan Vijaykrishnan; Mahmut Kandemir; Mary Jane Irwin

2002-11-01T23:59:59.000Z

236

[hal-00809847, v1] AI-Ckpt: Leveraging Memory Access Patterns...  

NLE Websites -- All DOE Office Websites (Extended Search)

asynchronous checkpointing gen- erate the same kind of interference as they did in past iter- ations. Based on this assumption, we propose novel asyn- chronous checkpointing...

237

Utility Data Accessibility Map | Open Energy Information  

Open Energy Info (EERE)

Utility Data Accessibility Map Utility Data Accessibility Map Jump to: navigation, search Residential Commercial Benchmarking Energy Efficiency Delivery of Data Time Period Frequency of Data Access to Data Residential frequency of data access Ua Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored

238

Chapter_12_Special_Access_Programs  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Special Access Programs This chapter describes the DOE Special Access Program (SAP) at DOE HQ and implements the requirements of: * Executive Order 13526, Classified National Security Information, Section 4.3, Special Access Programs, and Section 5.4, General Responsibilities, subparagraph (d). * DOE Order 471.5, Special Access Programs. A SAP is a program established for a specific class of classified information that imposes safeguarding and access requirements exceeding those normally required for information at the same classification level. Terms and activities such as Limited Access, Controlled Access, and Limited Distribution programs are not authorized. HQ Implementation Procedures SAP administration for both DOE and NNSA is handled through the Executive

239

Access Fund Partners LP | Open Energy Information  

Open Energy Info (EERE)

Access Fund Partners LP Access Fund Partners LP Jump to: navigation, search Name Access Fund Partners, LP Place San Juan Capistrano, California Zip 92675 Product Boutique investment banking and investment advisory firm with clean energy focus References Access Fund Partners, LP[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Access Fund Partners, LP is a company located in San Juan Capistrano, California . References ↑ "Access Fund Partners, LP" Retrieved from "http://en.openei.org/w/index.php?title=Access_Fund_Partners_LP&oldid=341703" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes Special pages Printable version

240

On the impact of Gold Open Access journals  

Science Conference Proceedings (OSTI)

Gold Open Access (=Open Access publishing) is for many the preferred route to achieve unrestricted and immediate access to research output. However, true Gold Open Access journals are still outnumbered by traditional journals. Moreover availability of ... Keywords: Directory of Open Access journals (DOAJ), Gold Open Access, Impact analysis, Impact evolution, Journal citation reports (JCR), Journal impact factor, Open Access publishing, SJR, SNIP, Ulrichsweb

Christian Gumpenberger; María-Antonia Ovalle-Perandones; Juan Gorraiz

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

242

SPEED CONTROL SYSTEM FOR AN ACCESS GATE - Energy Innovation Portal  

An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first ...

243

Disaggregated memory for expansion and sharing in blade servers  

Science Conference Proceedings (OSTI)

Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contributed by memory systems to total datacenter costs and power consumption during ... Keywords: disaggregated memory, memory blades, memory capacity expansion, power and cost efficiencies

Kevin Lim; Jichuan Chang; Trevor Mudge; Parthasarathy Ranganathan; Steven K. Reinhardt; Thomas F. Wenisch

2009-06-01T23:59:59.000Z

244

Introspection-based memory de-duplication and migration  

Science Conference Proceedings (OSTI)

Memory virtualization abstracts a physical machine's memory resource and presents to the virtual machines running on it a piece of physical memory that could be shared, compressed and moved. To optimize the memory resource utilization by fully leveraging ... Keywords: introspection, memory de-duplication, vm migration

Jui-Hao Chiang; Han-Lin Li; Tzi-cker Chiueh

2013-03-01T23:59:59.000Z

245

Architecture extensions for efficient management of scratch-pad memory  

Science Conference Proceedings (OSTI)

Nowadays, many embedded processors include in their architecture on-chip static memories, so called scratch-pad memories (SPM). Compared to cache, these memories do not require complex control logic, thus resulting in increased efficiency both in silicon ... Keywords: embedded processors, memory architecture, scratch-pad memory

José V. Busquets-Mataix; Carlos Catalá; Antonio Martí-Campoy

2011-09-01T23:59:59.000Z

246

Experiments with Memory-to-Memory Coupling for End-to-End Fusion Simulation Workflows  

Science Conference Proceedings (OSTI)

Scientific applications are striving to accurately simulate multiple interacting physical processes that comprise complex phenomena being modeled. Efficient and scalable parallel implementations of these coupled simulations present challenging interaction ... Keywords: coupling, memory-to-memory, rdma, workflows

Ciprian Docan; Fan Zhang; Manish Parashar; Julian Cummings; Norbert Podhorszki; Scott Klasky

2010-05-01T23:59:59.000Z

247

SLAC Lightsource User Access Guidelines and Agreement  

NLE Websites -- All DOE Office Websites (Extended Search)

Lightsource User Access Guidelines & Agreement Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC Lightsource User Access Guidelines and Agreement LCLS / SSRL User Research Administration approval (signature/date): LCLS Safety Office approval (signature/date): SSRL Safety Office approval (signature/date): XFO Operations approval (signature/date): Revision Record Revision Date Revised Section(s) Affected Description of Change R001 October 4 th , 2010 User Form Updated SLAC Lightsource User Access Agreement Form R000 Sept 14, 2009 Original Release SLAC Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC LIGHTSOURCE USER ACCESS GUIDELINES & AGREEMENT Introduction Welcome to SSRL and LCLS, SLAC's lightsource user facilities. We hope that your stay here will be

248

Rotary actuator utilizing a shape memory alloy  

SciTech Connect

An apparatus is described comprising; (a) rotary accumulator means for accumulating a length of a shape memory alloy wire; (b) the shape memory alloy wire attached at one end to a point fixed with respect to the rotary accumulator means and attached at a second end to the rotary accumulator means; (c) biasing means for biasing the rotary accumulator means to a first position; and (d) means for heating the shape memory alloy wire to cause the shape memory alloy wire to contract, thereby rotating the rotary accumulator means from the first position to a second position.

Bloch, J.T.

1988-08-09T23:59:59.000Z

249

Exploiting Data Similarity to Reduce Memory Footprints  

SciTech Connect

Memory size has long limited large-scale applications on high-performance computing (HPC) systems. Since compute nodes frequently do not have swap space, physical memory often limits problem sizes. Increasing core counts per chip and power density constraints, which limit the number of DIMMs per node, have exacerbated this problem. Further, DRAM constitutes a significant portion of overall HPC system cost. Therefore, instead of adding more DRAM to the nodes, mechanisms to manage memory usage more efficiently - preferably transparently - could increase effective DRAM capacity and thus the benefit of multicore nodes for HPC systems. MPI application processes often exhibit significant data similarity. These data regions occupy multiple physical locations across the individual rank processes within a multicore node and thus offer a potential savings in memory capacity. These regions, primarily residing in heap, are dynamic, which makes them difficult to manage statically. Our novel memory allocation library, SBLLmalloc, automatically identifies identical memory blocks and merges them into a single copy. SBLLmalloc does not require application or OS changes since we implement it as a user-level library. Overall, we demonstrate that SBLLmalloc reduces the memory footprint of a range of MPI applications by 32.03% on average and up to 60.87%. Further, SBLLmalloc supports problem sizes for IRS over 21.36% larger than using standard memory management techniques, thus significantly increasing effective system size. Similarly, SBLLmalloc requires 43.75% fewer nodes than standard memory management techniques to solve an AMG problem.

Biswas, S; de Supinski, B R; Schulz, M; Franklin, D; Sherwood, T; Chong, F T

2011-01-28T23:59:59.000Z

250

Memory resource management in vmware esx server  

E-Print Network (OSTI)

VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified commodity operating systems. This paper introduces several novel ESX Server mechanisms and policies for managing memory. A ballooning technique reclaims the pages considered least valuable by the operating system running in a virtual machine. An idle memory tax achieves efficient memory utilization while maintaining performance isolation guarantees. Content-based page sharing and hot I/O page remapping exploit transparent page remapping to eliminate redundancy and reduce copying overheads. These techniques are combined to efficiently support virtual machine workloads that overcommit memory. 1

Carl A. Waldspurger

2002-01-01T23:59:59.000Z

251

Memorandum Memorializing Ex Parte Communication - August 12,...  

NLE Websites -- All DOE Office Websites (Extended Search)

Memorandum Memorializing Ex Parte Communication - August 12, 2011 On August 9, 2011, the Air-Conditioning, Heating and Refrigeration Institute's (AHRI) Unitary Small Engineering...

252

ON EFFICIENTLY COMBINING LIMITED MEMORY AND TRUST ...  

E-Print Network (OSTI)

... Euclidean norm with an insignificant computational overhead compared with the cost of computing the quasi-Newton direction in line-search limited memory ...

253

Characterization of Shape Memory Alloys: Deformation Behavior  

Science Conference Proceedings (OSTI)

Feb 28, 2011... expected that NiTi shape memory alloys (SMA) actuators would provide simple and light weight replacements for controlling chevron-shaped ...

254

Julian Szekely Memorial Symposium Rental Car Information  

Science Conference Proceedings (OSTI)

The Julian Szekely Memorial Symposium on Materials Processing will be held at the Royal Sonesta Hotel in Cambridge, Massachusetts, October 5-8, 1997.

255

Determining Memory Use | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Allinea DDT Core File Settings Determining Memory Use Using VNC with a Debugger bgqstack gdb Coreprocessor TotalView on BGQ Systems Performance Tools & APIs Software & Libraries...

256

Site Access Policy | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory About Work with Argonne Safety News Community Events Careers Directory Energy Environment Security User Facilities Science Technology Visiting Argonne Site Access...

257

Presenting Accessibility to Mobility-Impaired Travelers  

E-Print Network (OSTI)

Behaviors of the Mobility-Disabled Consumer." Journal ofCampus Access Guide at the Disabled Student Program at UCto dental services for disabled people. A questionnaire

Nuernberger, Andrea

2008-01-01T23:59:59.000Z

258

Adjudicative Guidelines for Determining Eligibility for Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to help a foreign person, group, or country by providing that information; (c) counterintelligence information, that may be classified, indicates that the individual's access to...

259

Expanding Researcher Access to EIA Microdata  

U.S. Energy Information Administration (EIA)

personal computers at remote locations. EIA’s research access program is much more limited than those offered by other statistical agencies.

260

ORISE Resources: Puerto Rico Equal Access Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Minority AIDS Council (NMAC) and Office of AIDS Research (OAR) Puerto Rico Equal Access Program (PREAP). This PREAP training was specifically developed for the Puerto Rican...

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Technology and Access to Knowledge - CECM  

E-Print Network (OSTI)

Feb 9, 1998 ... Technology and Access to Knowledge. Mathematics as a branch of human knowledge is several millenia old, and though each individual ...

262

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for approximately 11 percent of all electric energy sold in the United States. NBP RFI: Data Access More Documents & Publications Re: DOE Request for Information - Implementing the...

263

Content-Based Access to Unstructured Information  

Science Conference Proceedings (OSTI)

... of automatic systems that can provide content-based access to information that has not been explicitly structured for machine consumption. ...

2012-01-03T23:59:59.000Z

264

Nanopatterned ferroelectrics for ultrahigh density rad-hard nonvolatile memories.  

SciTech Connect

Radiation hard nonvolatile random access memory (NVRAM) is a crucial component for DOE and DOD surveillance and defense applications. NVRAMs based upon ferroelectric materials (also known as FERAMs) are proven to work in radiation-rich environments and inherently require less power than many other NVRAM technologies. However, fabrication and integration challenges have led to state-of-the-art FERAMs still being fabricated using a 130nm process while competing phase-change memory (PRAM) has been demonstrated with a 20nm process. Use of block copolymer lithography is a promising approach to patterning at the sub-32nm scale, but is currently limited to self-assembly directly on Si or SiO{sub 2} layers. Successful integration of ferroelectrics with discrete and addressable features of {approx}15-20nm would represent a 100-fold improvement in areal memory density and would enable more highly integrated electronic devices required for systems advances. Towards this end, we have developed a technique that allows us to carry out block copolymer self-assembly directly on a huge variety of different materials and have investigated the fabrication, integration, and characterization of electroceramic materials - primarily focused on solution-derived ferroelectrics - with discrete features of {approx}20nm and below. Significant challenges remain before such techniques will be capable of fabricating fully integrated NVRAM devices, but the tools developed for this effort are already finding broader use. This report introduces the nanopatterned NVRAM device concept as a mechanism for motivating the subsequent studies, but the bulk of the document will focus on the platform and technology development.

Brennecka, Geoffrey L.; Stevens, Jeffrey; Scrymgeour, David; Gin, Aaron V.; Tuttle, Bruce Andrew

2010-09-01T23:59:59.000Z

265

Models on Distributed Memory Architectures  

NLE Websites -- All DOE Office Websites (Extended Search)

5/2004 Y.He 1 5/2004 Y.He 1 MPH: a Library for Coupling Multi-Component Models on Distributed Memory Architectures and its Applications Yun (Helen) He and Chris Ding CRD Division Lawrence Berkeley National Laboratory 10/15/2004 Y.He 2 10/15/2004 Y.He 3 Motivation n Application problems grow in scale & complexity n Effective organization of simulation software system that is maintainable, reusable, sharable, and efficient è a major issue n Community Climate System Model (CCSM) development n Software lasts much longer than a computer! 10/15/2004 Y.He 4

266

Data Center Access Policies and Version 2.0  

E-Print Network (OSTI)

Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 University://uits.arizona.edu #12;Table of Contents UITS Data Center Access Policies and Procedures!3 .Introduction!3 Overview!3 Data Center Access!3 Data Center Access - Levels of Access!4 Periodic Review and Termination of Access

Watkins, Joseph C.

267

Archive Access and Accessibility: A Progress Report on Social Networking at Work  

E-Print Network (OSTI)

bubble demo: http://lah.soas.ac.uk/projects/dev/bubble-player/wilbur.html 34 Access is also about perceptions ? perceptions of interfaces – like Facebook, ELAR “reduces distance and power disparities, supports interactions” ? difficult access mistaken...

Nathan, David

2010-12-10T23:59:59.000Z

268

Three web accessibility evaluation perspectives for RIA  

Science Conference Proceedings (OSTI)

With the increasing popularity of Rich Internet Applications (RIAs), several challenges arise in the area of web accessibility evaluation. A particular set of challenges emerges from RIAs dynamic nature: original static Web specifications can change ... Keywords: automated evaluation, web accessibility, web browser processing, web science

Nádia Fernandes, Ana Sofia Batista, Daniel Costa, Carlos Duarte, Luís Carriço

2013-05-01T23:59:59.000Z

269

Web Accessibility Office of Diversity and Inclusion  

E-Print Network (OSTI)

Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

Jones, Michelle

270

National Radiobiology Archives Distributed Access user's manual  

SciTech Connect

This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

1991-11-01T23:59:59.000Z

271

Improving Access to Web Content at Google  

E-Print Network (OSTI)

1 Improving Access to Web Content at Google Loretta Guarino Reid (LorettaGuarino@google.com) Srinivas Annam (AnnamS@google.com) March 12, 2008 #12;2 Overview Accessibility developments for : · Gmail · Search · Toolbar · Maps & Transit · Books · Video & Captions · Short Topics ­ Calendar, Google Groups

Cortes, Corinna

272

Distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide users with different services in terms ...

Haodong Wang; Qun Li

2006-06-01T23:59:59.000Z

273

Locally Accessible Information and Distillation of Entanglement  

E-Print Network (OSTI)

A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

2004-03-18T23:59:59.000Z

274

DOE - Office of Legacy Management -- Memorial Hospital - NY 0...  

Office of Legacy Management (LM)

Memorial Hospital - NY 0-16 FUSRAP Considered Sites Site: MEMORIAL HOSPITAL (NY.0-16 ) Eliminated from consideration under FUSRAP Designated Name: Not Designated Alternate Name:...

275

Crystallographic Boundary in a Magnetic Shape Memory Material  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Science Highlights Science Briefs Crystallographic Boundary in a Magnetic Shape Memory Material Crystallographic Boundary in a Magnetic Shape Memory Material Print...

276

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised) Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure) (Revised)...

277

Ethiopia Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Ethiopia Energy Access Project Ethiopia Energy Access Project Jump to: navigation, search Name of project Ethiopia Energy Access Project Location of project Ethiopia Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2005 Organization World Bank Website http://documents.worldbank.org Coordinates 9.145°, 40.489673° References The World Bank[1] The Energy Access Project for Ethiopia will establish a sustainable program for expanding the population's access to electricity and improving the quality and adequacy of electricity supply, reduce environmental degradation and improve energy end-use efficiency; reduce the barriers to the wide spread adoption of renewable energy technologies, and provide technical support for institutional and capacity building of key sector

278

Shape memory polymer actuator and catheter  

SciTech Connect

An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

Maitland, Duncan J. (Pleasant Hill, CA); Lee, Abraham P. (Walnut Creek, CA); Schumann, Daniel L. (Concord, CA); Matthews, Dennis L. (Moss Beach, CA); Decker, Derek E. (Byron, CA); Jungreis, Charles A. (Pittsburgh, PA)

2007-11-06T23:59:59.000Z

279

Quantifying Dynamic Stability of Genetic Memory Circuits  

Science Conference Proceedings (OSTI)

Bistability/Multistability has been found in many biological systems including genetic memory circuits. Proper characterization of system stability helps to understand biological functions and has potential applications in fields such as synthetic biology. ... Keywords: Dynamic stability, genetic memory, gene circuit, dynamic noise margin.

Yong Zhang; Peng Li; Garng Huang

2012-05-01T23:59:59.000Z

280

Optimum LDPC decoder: a memory architecture problem  

Science Conference Proceedings (OSTI)

This paper addresses a frequently overlooked problem: designing a memory architecture for an LDPC decoder. We analyze the requirements to support the codes defined in the IEEE 802.11n and 802.16e standards. We show a design methodology for a flexible ... Keywords: LDPC codes, low power architectures, memory optimization

Erick Amador; Renaud Pacalet; Vincent Rezard

2009-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Memory Fault Modeling Trends: A Case Study  

Science Conference Proceedings (OSTI)

In recent years, embedded memories are the fastest growing segment of system on chip. They therefore have a major impact on the overall Defect per Million (DPM). Further, the shrinking technologies and processes introduce new defects that cause previously ... Keywords: data backgrounds, dynamic faults, fault coverage, fault models, memory tests, static faults

Said Hamdioui; Rob Wadsworth; John Delos Reyes; Ad J. Van De Goor

2004-06-01T23:59:59.000Z

282

Preserved Access to Abstract Letter Identities Despite Abolished Letter . . .  

E-Print Network (OSTI)

In this paper, we discuss the letter processing difficulties of a patient (MS) with pure alexia after left hemisphere stroke who is unable to read any words aloud despite preserved writing and good performance at naming orally spelled words. MS is completely unable to name visually presented letters even though she can name them when they are presented in other modalities. Despite her poor naming, she can distinguish correctly oriented letters from mirror reversals and can perform accurate cross-case matching of visually presented letters. It, therefore, appears that MS is able to access the abstract identity of visually presented letters despite her total inability to name them. This is a more precise form of letter processing impairment than that which has been reported in previous cases of pure alexic patients who are unable to name visually presented letters [Caplan, L.R., & HedleyWhite, T. (1974). Cueing and memory function in alexia without agraphia: a case report. Brain, 115, 251-262; Miozzo, M., & Caramazza, A. (1998). Varieties of pure alexia: the case of failure to access graphemic representations. Cognitive Neuropsychology, 15, 203-238; Sevush, S., & Heilman, K.M. (1984). A case of literal alexia. Brain & Language, 22, 92-108]. It suggests that representations of the graphemic identities of letters used in reading are either modality specific or else they are hemisphere specific [Saffran, E.M., & Coslett, H.B. (1998). Implicit vs. letter-by-letter reading in pure alexia: a tale of two systems. Cognitive Neuropsychology, 15, 141-165]. Her letter processing impairment also appears to be different from that observed in a letter-by-letter reader [Perri, R., Bartolomeo, P., & Silveri, M.C. (1996). Letter dyslexia in a letter-by-letter reader. Brain & Language, 53,...

R. Mycroft; J. R. Hanley B; J. Kay A

2002-01-01T23:59:59.000Z

283

ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains  

Science Conference Proceedings (OSTI)

In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently ... Keywords: decentralized access control, identity privacy, location privacy, mobile privacy, wireless security

Jiejun Kong; Shirshanka Das; Edward Tsai; Mario Gerla

2003-09-01T23:59:59.000Z

284

Improving Organizational Memories Through User Feedback  

E-Print Network (OSTI)

The benefits of an organizational memory are ultimately determined by the usefulness of the organizational memory as perceived by its users. Therefore, an improvement of an organizational memory should be measured in the added perceived usefulness. Unfortunately, the perceived usefulness has many impact factors (e.g., the precision of the user query, the urgency with which the user needs information, the coverage of the underlying knowledge base, the quality of the schema used to store knowledge, and the quality of the implementation). Hence, it is difficult to identify good starting points for improvement. This paper presents the goal-oriented method OMI (Organizational Memory Improvement) for improving an organizational memory incrementally from the user's point of view. It has been developed through several case studies and consists of a general usage model, a set of indicators for improvement potential, and a cause-effect model. At each step of the general usage model of OMI, pro...

Klaus-Dieter Althoff; Markus Nick; Carsten Tautz

1999-01-01T23:59:59.000Z

285

Rail Access to Yucca Mountain: Critical Issues  

SciTech Connect

The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

Halstead, R. J.; Dilger, F.; Moore, R. C.

2003-02-25T23:59:59.000Z

286

PARS II User Account Access Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Management Office of Management Office of Engineering and Construction Management User Account Access Guide for PARS II Version 1.5 June 25, 2011 Submitted by: Energy Enterprise Solutions 20440 Century Blvd. Suite 150 Germantown, MD 20874 Phone 301-916-0050 Fax 301-916-0066 www.eesllc.net June 25, 2011 (V1.5) PARS II User Account Access Guide ii This page intentionally left blank. June 25, 2011 (V1.5) PARS II User Account Access Guide iii Title Page Document Name: User Account Access Guide for PARS II Version Number: V1.5 Publication Date: June 25, 2011 Contract Number: DE-AT01-06IM00102 Project Number: 1ME07 CLIN 4 Prepared by: Scott Burns, Energy Enterprise Solutions, LLC Reviewed by: Judith Bernsen, Energy Enterprise Solutions, LLC

287

Dynamic spectrum access -- concepts and future architectures  

Science Conference Proceedings (OSTI)

New trends and developments in radio technology are enhancing the future capabilities of devices to access electromagnetic spectrum using the full range of dimensions associated with the spectrum. This increased capability, together with current developments ...

M. Nekovee

2006-04-01T23:59:59.000Z

288

Decision Analysis of Dynamic Spectrum Access Rules  

SciTech Connect

A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

2011-12-01T23:59:59.000Z

289

Accessing speech data using strategic fixation  

Science Conference Proceedings (OSTI)

When users access information from text, they engage in strategic fixation, visually scanning the text to focus on regions of interest. However, because speech is both serial and ephemeral, it does not readily support strategic fixation. This paper describes ...

Steve Whittaker; Julia Hirschberg

2007-04-01T23:59:59.000Z

290

Fair resource allocation in multiple access channels  

E-Print Network (OSTI)

We consider the problem of resource allocation in a multiple access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates over ...

ParandehGheibi, Ali

2008-01-01T23:59:59.000Z

291

JOBAID-ACCESSING AND MODIFYING TALENT PROFILE  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

292

North Carolina Capital Access Program (North Carolina)  

Energy.gov (U.S. Department of Energy (DOE))

The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lender’s usual standards. The average CAP loan is ...

293

Radio over fiber in multimedia access networks  

Science Conference Proceedings (OSTI)

Dominant broadband access technologies today are Digital Subscriber Line (DSL) and hybrid fiber coaxial (HFC) networks. DSL leads, with global subscribers exceeding 100 million, while cable-modem subscribers worldwide total 55 million in 2005 [1]. Recently, ...

Xavier Fernando

2006-09-01T23:59:59.000Z

294

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

295

Crystallographic attributes of a shape-memory alloy  

SciTech Connect

Shape-memory alloys are attractive for many potential applications. In an attempt to provide ideas and guidelines for the development of new shape-memory alloys, this paper reports on a series of investigations that examine the reasons in the crystallography that made (i) shape-memory alloys special amongst martensites and (ii) Nickel-Titanium special among shape-memory alloys.

Bhattacharya, K. [California Inst. of Tech., Pasadena, CA (United States). Div. of Engineering and Applied Science

1999-01-01T23:59:59.000Z

296

L6: Memory Hierarchy Optimization III, Bandwidth Optimization  

E-Print Network (OSTI)

wherever there are capacity limitations ­ Between grids if total data exceeds global memory capacity will "spill" data to local memory · Local memory ­ Deals with capacity limitations of registers and shared ­ Across thread blocks if shared data exceeds shared memory capacity (also to partition computation across

Hall, Mary W.

297

Cork: dynamic memory leak detection for garbage-collected languages  

Science Conference Proceedings (OSTI)

A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap growth, degrading performance and resulting in program crashes after ... Keywords: dynamic, garbage collection, memory leak detection, memory leaks, runtime analysis

Maria Jump; Kathryn S. McKinley

2007-01-01T23:59:59.000Z

298

Journal of Experimental Psychology: Learning, Memory, and Cognition  

E-Print Network (OSTI)

explicit and implicit tests of memory (for reviews, see Graf & Masson, 1993; Lewandosky, Dunn, & Kirsner

Shimamura, Arthur P.

299

Persistent systems techniques in forensic acquisition of memory  

Science Conference Proceedings (OSTI)

In this paper we discuss how operating system design and implementation influence the methodology for computer forensics investigations, with the focus on forensic acquisition of memory. In theory the operating system could support such investigations ... Keywords: Computer forensics, Memory acquisition, Memory forensics, Memory persistence, Persistent operating systems

Ewa Huebner; Derek Bem; Frans Henskens; Mark Wallis

2007-09-01T23:59:59.000Z

300

Memory energy management for an enterprise decision support system  

Science Conference Proceedings (OSTI)

Energy efficiency is an important factor in designing and configuring enterprise servers. In these servers, memory may consume 40% of the total system power. Different memory configurations (sizes, numbers of ranks, speeds, etc.) can have significant ... Keywords: memory power management, power-aware memory

Karthik Kumar; Kshitij Doshi; Martin Dimitrov; Yung-Hsiang Lu

2011-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Architecting phase change memory as a scalable dram alternative  

Science Conference Proceedings (OSTI)

Memory scaling is in jeopardy as charge storage and sensing mechanisms become less reliable for prevalent memory technologies, such as DRAM. In contrast, phase change memory (PCM) storage relies on scalable current and thermal mechanisms. To exploit ... Keywords: dram alternative, endurance, energy, pcm, performance, phase change memory, power, scalability

Benjamin C. Lee; Engin Ipek; Onur Mutlu; Doug Burger

2009-06-01T23:59:59.000Z

302

Characterizing the Memory Behavior of Compiler-Parallelized Applications  

Science Conference Proceedings (OSTI)

Abstract¿Compiler-parallelized applications are increasing in importance as moderate-scale multiprocessors become common. This paper evaluates how features of advanced memory systems (e.g., longer cache lines) impact memory system behavior for applications ... Keywords: Parallelizing compilers, memory hierarchies, shared-memory multiprocessors, cache performance, false and true sharing, parallelism granularity.

Evan Torrie; Margaret Martonosi; Chau-Wen Tseng; Mary W. Hall

1996-12-01T23:59:59.000Z

303

Dynamic tracking of page miss ratio curve for memory management  

Science Conference Proceedings (OSTI)

Memory can be efficiently utilized if the dynamic memory demands of applications can be determined and analyzed at run-time. The page miss ratio curve(MRC), i.e. page miss rate vs. memory size curve, is a good performance-directed metric to serve this ... Keywords: memory management, power management, resource allocation

Pin Zhou; Vivek Pandey; Jagadeesan Sundaresan; Anand Raghuraman; Yuanyuan Zhou; Sanjeev Kumar

2004-12-01T23:59:59.000Z

304

On Working Memory: Its organization and capacity limits  

E-Print Network (OSTI)

64 iii 6.2 Working memory capacity10 1.4 Capacity limits of workingcapacity . . . . . . . . . . . . . . . . . . . . . . . . . .

Lara, Antonio Homero

2010-01-01T23:59:59.000Z

305

A Quantum Information Retrieval Approach to Memory  

E-Print Network (OSTI)

As computers approach the physical limits of information storable in memory, new methods will be needed to further improve information storage and retrieval. We propose a quantum inspired vector based approach, which offers a contextually dependent mapping from the subsymbolic to the symbolic representations of information. If implemented computationally, this approach would provide exceptionally high density of information storage, without the traditionally required physical increase in storage capacity. The approach is inspired by the structure of human memory and incorporates elements of Gardenfors' Conceptual Space approach and Humphreys et al.'s matrix model of memory.

Kirsty Kitto; Peter Bruza; Liane Gabora

2013-10-11T23:59:59.000Z

306

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

307

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

308

Experiences with Co-Array Fortran on Hardware Shared Memory Platforms  

E-Print Network (OSTI)

Abstract. Source-to-source translation is an important code generation strategy commonly used by parallelizing compilers and compilers for parallel languages. In this paper, we investigate the performance impact of using different Fortran 90 representations for local and remote accesses on scalable shared-memory multiprocessors when generating SPMD code for Co-array Fortran. Our aim is to deliver the full power of the hardware platform to the application when operating on local data and when accessing remote data using either coarse-grain or fine-grain communication. We explored the performance impact of several different representations for shared data and several different ways of implementing communication. Using CAF variants of the STREAM, Random Access, and NAS MG & SP benchmarks, we compared the performance of library-based implementations of one-sided communication with fine-grain communication that uses pointers to access remote data using load and store operations. Our experiments showed that using pointer-based fine-grain communication improved performance as much as a factor of 24 on an SGI Altix and as much as a factor of five on an SGI Origin, when pointer initialization is hoisted out of a loop performing data accesses. 1

Yuri Dotsenko; Cristian Coarfa; John Mellor-crummey; Daniel Chavarría-mir

2004-01-01T23:59:59.000Z

309

Why Has the Land Memory Changed?  

Science Conference Proceedings (OSTI)

The “land memory” refers to an interseasonal predictability of the summer monsoon rainfall in the southwestern United States, describing a relationship of the summer monsoon rainfall anomaly with anomalies in the antecedent winter season snow and ...

Qi Hu; Song Feng

2004-08-01T23:59:59.000Z

310

The Neural Substrate of Orientation Working Memory  

Science Conference Proceedings (OSTI)

We have used positron emission tomography (PET) to identify the neural substrate of two major cognitive components of working memory (WM), maintenance and manipulation of a single elementary visual attribute, i.e., the orientation of a grating presented ...

L. Cornette; P. Dupont; E. Salmon; Guy A. Orban

2001-08-01T23:59:59.000Z

311

30 days to a more powerful memory  

Science Conference Proceedings (OSTI)

With phones ringing off the hook, constantly changing to-do lists, and increasingly complicated schedules, having a good memory has become more important than ever. Drawing on the latest research from cognitive experts and psychologists, 30 Days to a ...

Gini Scott

2007-04-01T23:59:59.000Z

312

A strategy of memory : Suzhou, China  

E-Print Network (OSTI)

The thesis is trying to establish a strategy of memory for the urban preservation of old cities, like Suzhou, within the context of the rapid growing economy in Southern China. The general attitude towards the problem ...

Chang, Ping Hung

1995-01-01T23:59:59.000Z

313

Revisiting parallel rendering for shared memory machines  

Science Conference Proceedings (OSTI)

Increasing the core count of CPUs to increase computational performance has been a significant trend for the better part of a decade. This has led to an unprecedented availability of large shared memory machines. Programming paradigms and systems are ...

B. Nouanesengsy; J. Ahrens; J. Woodring; H. Shen

2011-04-01T23:59:59.000Z

314

Commercialization of germanium based nanocrystal memory  

E-Print Network (OSTI)

This thesis explores the commercialization of germanium-based nanocrystal memories. Demand for smaller and faster electronics and embedded systems supports the development of high-density, low-power non-volatile electronic ...

Seow, Kian Chiew

2007-01-01T23:59:59.000Z

315

Cultural differences on the children's memory scale  

E-Print Network (OSTI)

Memory is an essential component for learning. Deficits in verbal short-term memory (STM) and working memory (WM) are thought to hinder language learning, reading acquisition, and academic achievement. The Children’s Memory Scale (CMS) is an assessment instrument used to identify memory and learning deficits and strengths in children ages five through 16. This study investigated the impact of culture and parent educational level (PEL) on student performance on the Children’s Memory Scale using the CMS standardization data. The major question addressed was: Will CMS subtest performance differ significantly between ethnic groups or as a function of PEL? The results of this study support a relationship between STM and WM performance and culture. Culture as defined by ethnicity minimally impacted student subtest performance on the CMS when PEL was taken into account. In contrast, PEL was significantly associated with student subtest performance within each ethnic group. Student subtest performance improved with each increase in PEL regardless of ethnicity. CMS subtest performance of Hispanic and African American students was most affected by PEL; however, no difference occurred in subtest performance by ethnicity or as a function of PEL for African American and Hispanic students on the Family Pictures subtest which examines visual and auditory memory processes through recall of everyday life tasks in meaningful context. Although statistical significance was found between CMS subtest performance and cultural factors, the effect sizes were mainly in the small range and variance was not specific to any one subtest. Larger effect sizes were found on verbal subtests which in previous studies have been found to be most impacted by quality of schooling and lower PELs. Mean score differences did not exceed one standard deviation with the exception of one subtest. The results of this study provide a better understanding of the effect of culture and PEL on memory and learning.

Cash, Deborah Dyer

2007-08-01T23:59:59.000Z

316

Distributed trace using central performance counter memory  

SciTech Connect

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L.; Sexton, James C.

2013-01-22T23:59:59.000Z

317

Distributed trace using central performance counter memory  

Science Conference Proceedings (OSTI)

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Satterfield, David L; Sexton, James C

2013-10-22T23:59:59.000Z

318

ABC D EFG H IJKL M NO P QR S T U VWXYZ  

Science Conference Proceedings (OSTI)

... file; Principal Component Analysis; Problems (and answers); Profile plots (intensity); Pseudo color: using sliders. RAE file format; RAM (memory, assign ...

319

Property:EnergyAccessYearInitiated | Open Energy Information  

Open Energy Info (EERE)

EnergyAccessYearInitiated EnergyAccessYearInitiated Jump to: navigation, search Property Name EnergyAccessYearInitiated Property Type Date Description Year Initiated Pages using the property "EnergyAccessYearInitiated" Showing 10 pages using this property. B Benin: Increased Access to Modern Energy Project + 2009 + Burkina Faso Energy Access Project + 2007 + E Ethiopia Energy Access Project + 2005 + G Ghana Energy Development and Access Project (GEDAP) + 2007 + M Mongolia Renewable Energy and Rural Electricity Access Project + 2006 + P Papua New Guinea Improved Energy Access for Rural Communities + 2012 + R Republic of Yemen Energy Access Project + 2006 + S Sri Lanka Credit to Connect + 2011 + T Tanzania Energy Development and Access Expansion Project + 2007 + V Viet Nam Rural Electrification + 2009 +

320

Center for Nanoscale Materials User Access Program Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Materials User Access Program Overview Materials User Access Program Overview CNM User Access Program Overview 1. Objective ............................................................................................................................................... 1 2. Submission Guidelines .......................................................................................................................... 1 2.1 Proposal Content ............................................................................................................................ 1 3. Proposal Review Process ....................................................................................................................... 2 3.1 Proposal Evaluation Board .............................................................................................................. 2

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Environment/Health/Safety/Security (EHSS): Building Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Access Building Access Access Control - On-site access is controlled by either keys or by LBNL's automated access control system. LBNL's automated access control system is used for exterior perimeter doors to most buildings, as well as some individual labs, offices, and equipment. The access system is linked to the LBNL Human Resources PeopleSoft database and is updated with the employees' or affiliates' current appointment status at the Laboratory. . If your LBNL appointment end date has expired, then your access will be suspended. Security Access Managers (SAM) Administrators - LBNL's automated access control system is a decentralized access permission control structure managed by each Division or major program via Security Access Managers (SAM) Administrators and In-putters. Go here for the current

322

Web accessibility testing: when the method is the culprit  

Science Conference Proceedings (OSTI)

Testing accessibility of a web site is still an art. Lack of appropriate definitions of accessibility and of standard testing methods are some of the reasons why Web accessibility is so difficult to achieve The paper describes a heuristic walkthrough ...

Giorgio Brajnik

2006-07-01T23:59:59.000Z

323

Cradle modification for hydraulic ram  

DOE Green Energy (OSTI)

The analysis of the cradle hydraulic system considers stress, weld strength, and hydraulic forces required to lift and support the cradle/pump assembly. The stress and weld strength of the cradle modifications is evaluated to ensure that they meet the requirements of the American Institute for Steel Construction (AISC 1989). The hydraulic forces are evaluated to ensure that the hydraulic system is capable of rotating the cradle and pump assembly to the vertical position (between 70{degrees} and 90{degrees}).

Koons, B.M.

1995-03-02T23:59:59.000Z

324

SECURITY RISK ASSESSMENT METHODOLOGIES (RAM)  

In the mid 1970s, the Department of Energy (DOE) designated ... For more information or licensing opportunities contact us at ip@sandia.gov or visit

325

SECURITY RISK ASSESSMENT METHODOLOGIES (RAM)  

owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration. SAND # 2010-5794P TECHNOLOGY

326

Ram Sriram's List of Publications  

Science Conference Proceedings (OSTI)

... Accurate Design-Stage Estimation of Energy Consumption for ... Modeling Framework For Product Lifecycle Management, International Symposium ...

2010-11-30T23:59:59.000Z

327

NBP RFI: Data Access Honeywell Responses To Request for Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

328

RE: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Building Owners and Managers Association International on DOE Request for Information-Implementing the National...

329

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of...

330

RE: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Southern California Edison on DOE Request for Information-Implementing the National Broadband Plan by Empowering...

331

Environment/Health/Safety/Security (EHSS): Site Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Access Office Site Access Office Contact Information | Feedback Most-viewed links: Badging Getting a badge - new, stolen, or replacement. Building Access On-site access, key requests, Security Access Managers. Visitor Access Visitor passes, general information. Parking at the Lab Permits, parking map, vehicles registration, parking policy. Other information: FAQ Frequently Asked Questions. Foreign National Access Information on access to DOE sites. Gate Information Information on the different Lab gates. Getting to the Lab Directions and options for getting to Berkeley Lab: buses, carpooling, rapid transit, biking. Guest House Guest House information. Lost and Found Lost and found information and contacts. Meeting and Conference Meeting and conference procedures and general information.

332

Wind Access and Permitting Law | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access and Permitting Law Wind Access and Permitting Law < Back Eligibility Residential Savings Category Wind Buying & Making Electricity Program Info State Delaware Program Type...

333

Green Button Energy Data Access Expanding Across America | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Button Energy Data Access Expanding Across America Green Button Energy Data Access Expanding Across America October 17, 2012 - 6:01pm Addthis Utilities demonstrating the...

334

Re~ Request for Information NBP RFI: Data Access | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Re Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

335

Request for Information NBP RFI: Data Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

336

Reading Systems for eBooks Need to Become Accessible  

Science Conference Proceedings (OSTI)

Reading Systems for eBooks Need to Become Accessible. While the Publication Structure 1.0 spec is accessible, the reading systems are not. ...

2001-05-25T23:59:59.000Z

337

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

338

Solar access of residential rooftops in four California cities  

E-Print Network (OSTI)

the solar access of rooftop solar-energy systems, includingthermal collection by rooftop solar-energy equipment. It canthe solar access of rooftop solar-energy systems, including

Levinson, Ronnen

2010-01-01T23:59:59.000Z

339

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

340

Rail Access Modes and Catchment Areas for the BART System  

E-Print Network (OSTI)

parking supplies), ridership (e.g. , rail modal splits), andof California at Berkeley Rail Access Modes and CatchmentHypothesized Distributions of Rail Station Access Modes as a

Cervero, Robert

1995-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

City of Boulder - Solar Access Ordinance (Colorado) | Open Energy...  

Open Energy Info (EERE)

solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

342

ORISE Resources: Equal Access Initiative Computer Grants Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Equal Access Initiative Computer Grants Program The Equal Access Initiative Computer Grants Program is sponsored by the National Minority AIDS Council (NMAC) and the National...

343

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

344

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

345

Test Procedure for §170.302 (p) Emergency Access  

Science Conference Proceedings (OSTI)

... September 24, 2010 1 Test Procedure for §170.302 (p) Emergency Access ... 170.302(p) Emergency Access. Permit authorized users ...

2013-11-06T23:59:59.000Z

346

Uniform Transboundary Pollution Reciprocal Access Act (Montana) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Institutional Fuel Distributor Transportation Program Info State Montana Program Type Environmental Regulations This Act allows any entity in a Reciprocating Jurisdiction harmed by pollution originating in the state of Montana to bring an action or other proceeding against the source of that pollution in the state of Montana. Such an entity has the same rights in the state of Montana as they would if

347

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access NBP RFI: Data Access NBP RFI: Data Access The National Rural Electric Cooperative Association (NRECA) is the national service organization representing more than 900 not-for-profit, member-owned rural electric cooperatives ("Cooperatives"). Most of NRECA's members are distribution cooperatives, providing retail electric service to more than 42 million consumers in 47 states. NRECA members also include approximately 66 generation and transmission ("G&T") cooperatives that supply wholesale power to their distribution cooperative member-owners. Cooperatives provide service to approximately 75 percent of the nation's land mass, resulting in a consumer density of just seven consumers per mile of line, significantly less density than that of

348

Notices Electronic Access to This Document:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

805 Federal Register 805 Federal Register / Vol. 77, No. 67 / Friday, April 6, 2012 / Notices Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document Format (PDF). To use PDF you must have Adobe Acrobat Reader, which is available free at the site. You may also access documents of the Department published in the Federal Register by using the article search feature at: www.federalregister.gov.

349

Shape memory system with integrated actuation using embedded particles  

SciTech Connect

A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

2009-09-22T23:59:59.000Z

350

Shape memory system with integrated actuation using embedded particles  

DOE Patents (OSTI)

A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

2012-05-29T23:59:59.000Z

351

Security and Access Policy Security of and access to campus facilities, including campus residences  

E-Print Network (OSTI)

Security and Access Policy Security of and access to campus facilities, including campus residences facilities. Residence halls are secured 24 hours a day. Over extended breaks, the doors of all residence halls will be secured around the clock. Some facilities may have individual hours, which may vary

Escher, Christine

352

Quantum internet using code division multiple access  

E-Print Network (OSTI)

A crucial open problem in large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

Jing Zhang; Yu-xi Liu; Sahin Kaya Ozdemir; Re-Bing Wu; Feifei Gao; Xiang-Bin Wang; Lan Yang; Franco Nori

2012-04-08T23:59:59.000Z

353

Scalla: Structured Cluster Architecture for Low Latency Access  

Science Conference Proceedings (OSTI)

Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

2012-03-20T23:59:59.000Z

354

Compile-Time Compaction Of Traces For Memory Simulation  

E-Print Network (OSTI)

This thesis examines compile-time compaction of program execution traces. It presents a new method for compacting traces for memory simulation. Further, it describes a tool prototype that implements the method. Experiments with the tool prototype show that the new method reduces the time needed in simulating the operation of memories. Memory simulation is needed in the performance analysis and in the design of programs. In high performance applications, the data transfer between different layers of memory is one of the main bottlenecks. A program execution trace is a list of memory references. Using traces as simulation inputs is a flexible way of analyzing the memory perfor...

Vesa Hirvisalo; Vesa Hirvisalo; Dr. Tech Esko Nuutila

1998-01-01T23:59:59.000Z

355

Open Access and UK universities: an introduction  

E-Print Network (OSTI)

both Gold and Green OA options but with a preference for Gold (= immediate access and maximum opportunity for re-use) • Preferred Green embargos: max. 6 months (STEM) & 12 months (A/H/SS) – but 12 /24 months are acceptable during transition period...

Morgan, Peter

2013-05-17T23:59:59.000Z

356

Securing network access in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure ... Keywords: elliptic curve cryptography, security, sensor networks

Kun Sun; An Liu; Roger Xu; Peng Ning; Douglas Maughan

2009-03-01T23:59:59.000Z

357

Providing Access to High Performance Computing Technologies  

E-Print Network (OSTI)

Providing Access to High Performance Computing Technologies Jack Dongarra 1 , Shirley Browne 2 to high performance computing technologies. One effort, the National HPCC Software Exchange, is providing scientists involved with High Performance Computing and Communications (HPCC) [1] 3 . The NHSE facilitates

Dongarra, Jack

358

Consumer Devices for eCommerce Access  

Science Conference Proceedings (OSTI)

It is widely predicted that electronic commerce will have a far-reaching impact on businesses in the next few years. For this to occur it will be essential that users are able to access and use eCommerce services when and where they wish, at times and ...

M. C. Revett; G. J. South

1999-07-01T23:59:59.000Z

359

Creating home network access for the elderly  

Science Conference Proceedings (OSTI)

Wireless broadband networks for home environment present us with many challenges unfamiliar in more public settings. At home, we encounter the end-users with little ICT experience. Probably among the most challenging members of the home network are the ... Keywords: accessibility, authentication, home networks, security, usability, user interface design

Kristiina Karvonen

2007-07-01T23:59:59.000Z

360

The capacity of hybrid quantum memory  

E-Print Network (OSTI)

The general stable quantum memory unit is a hybrid consisting of a classical digit with a quantum digit (qudit) assigned to each classical state. The shape of the memory is the vector of sizes of these qudits, which may differ. We determine when N copies of a quantum memory A embed in N(1+o(1)) copies of another quantum memory B. This relationship captures the notion that B is as at least as useful as A for all purposes in the bulk limit. We show that the embeddings exist if and only if for all p >= 1, the p-norm of the shape of A does not exceed the p-norm of the shape of B. The log of the p-norm of the shape of A can be interpreted as the maximum of S(\\rho) + H(\\rho)/p (quantum entropy plus discounted classical entropy) taken over all mixed states \\rho on A. We also establish a noiseless coding theorem that justifies these entropies. The noiseless coding theorem and the bulk embedding theorem together say that either A blindly bulk-encodes into B with perfect fidelity, or A admits a state that does not visibly bulk-encode into B with high fidelity. In conclusion, the utility of a hybrid quantum memory is determined by its simultaneous capacity for classical and quantum entropy, which is not a finite list of numbers, but rather a convex region in the classical-quantum entropy plane.

Greg Kuperberg

2002-03-21T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Organic Data Memory using the DNA Approach  

Science Conference Proceedings (OSTI)

A data preservation problem looms large behind today's information superhighway. During the prehistoric age, humans preserved their knowledge by engraving bones and rocks. About two millenniums ago, people invented paper and started writing and publishing. In today?s electronic age, we use magnetic media and silicon chips to store our data. But bones and rocks erode, paper disintegrates, and electronic memory simply loses its contents into thin air. All these storage media require constant attention to maintain their information content. All of them can easily be destroyed intentionally or accidentally by people or natural disasters. With the large amount of information generated by our society every day, it is time to think of a new generation of data memory. In an effort to search for an inexpensive and lasting data memory, scientists at the Pacific Northwest National Laboratory (PNNL) have investigated the use of deoxyribonucleic acid--commonly known as DNA--as an information storage medium since 1998. The ambitious goal is to develop a data memory technology that has a life expectancy much longer than any of the existing ones. The creation of our initial DNA memory prototype consists of four major steps: encoding meaningful information as artificial DNA sequences, transforming the sequences to living organisms, allowing the organisms to grow and multiply, and eventually extracting the information back from the organisms. This article describes the objective of our investigation, followed by a brief description of our recent experiments and several potential applications being considered at PNNL.

Wong, Pak C.; Wong, Kwong K.; Foote, Harlan P.

2003-01-01T23:59:59.000Z

362

Julian Szekely Memorial Symposium: Royal Sonesta Hotel  

Science Conference Proceedings (OSTI)

... easy access to the historic waterfront, Quincy Market and the financial district. ... If you need any additional information on location directions, please contact ...

363

An algorithm for the principal component analysis of large data sets  

E-Print Network (OSTI)

Recently popularized randomized methods for principal component analysis (PCA) efficiently and reliably produce nearly optimal accuracy - even on parallel processors - unlike the classical (deterministic) alternatives. We adapt one of these randomized methods for use with data sets that are too large to be stored in random-access memory (RAM). (The traditional terminology is that our procedure works efficiently "out-of-core.") We illustrate the performance of the algorithm via several numerical examples. For example, we report on the PCA of a data set stored on disk that is so large that less than a hundredth of it can fit in our computer's RAM.

Halko, Nathan; Shkolnisky, Yoel; Tygert, Mark

2010-01-01T23:59:59.000Z

364

Speed control system for an access gate  

DOE Patents (OSTI)

An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

Bzorgi, Fariborz M. (Knoxville, TN)

2012-03-20T23:59:59.000Z

365

5.3 Identity Management - Data Access Authorization Policy ...  

Science Conference Proceedings (OSTI)

****WORKING DOCUMENT****. 5.3 Identity Management - Data Access Authorization Policy Management in the Cloud. ...

2010-11-02T23:59:59.000Z

366

An access control model for dynamic client-side content  

Science Conference Proceedings (OSTI)

The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources are usually static, and an access control policy ... Keywords: access control, authentication, credentials, trust negotiation

Adam Hess; Kent E. Seamons

2003-06-01T23:59:59.000Z

367

Chemistry Central Journal Commentary Open access and medicinal chemistry  

E-Print Network (OSTI)

This is an Open Access article distributed under the terms of the Creative Commons Attribution License

Chris Swain; Chris Swain

2007-01-01T23:59:59.000Z

368

Guidelines for Handling Confidential Information by Remote Access  

E-Print Network (OSTI)

Guidelines for Handling Confidential Information by Remote Access You have signed an OHSU of your access to OHSU electronic information and/or other sanctions. Remember, using remote access of the OHSU facilities. When you are utilizing remote access, you must provide the same level of security used

Chapman, Michael S.

369

NIST Offering Free Access to Standards for First Responders  

Science Conference Proceedings (OSTI)

NIST Offering Free Access to Standards for First Responders. From NIST Tech Beat: April 26, 2011. ...

2011-04-26T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Memorandum Memorializing Ex Parte Communication, DOE impending  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Memorandum Memorializing Ex Parte Communication, DOE impending Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. Memorandum Memorializing Ex Parte Communication, DOE impending determination of coverage for commercial and industrial fans, blowers, and fume hoods. The meeting was requested by AMCA International to introduce the association's leadership, standards, and experience in developing fan standards to DOE; to learn more about the DOE process for developing regulations for fan efficiency standards; and to inform DOE on how commercial and industrial fan markets work. AMCA_Ex_Parte.pdf More Documents & Publications DOE-STD-1168-2013 DOE Meeting Memorandum: Ex Parte Communications Independent Oversight Review, Savannah River Site - August 2011

382

Home-based Shared Virtual Memory  

E-Print Network (OSTI)

In this dissertation, I investigate how to improve the performance of shared virtual memory (SVM) by examining consistency models, protocols, hardware support and applications. The main conclusion of this research is that the performance of shared virtual memory can be significantly improved when performance-enhancing techniques from all these areas are combined. This dissertation proposes home-based lazy release consistency as a simple, effective, and scalable way to build shared virtual memory systems. In home-based protocols each shared page has a home to which all writes are propagated and from which all copies are derived. Two home-based protocols are described, implemented and evaluated on two hardware and software platforms: Automatic Update Release Consistency (AURC), which requires hardware support for fine-grained remote writes (automatic updates), and Homebased Lazy Release Consistency (HLRC), which is implemented exclusively in software. The dissertation investigates the ...

Liviu Iftode

1998-01-01T23:59:59.000Z

383

Profile Guided Load Marking for Memory Renaming  

E-Print Network (OSTI)

Memory operations remain a significant bottleneck in dynamically scheduled pipelined processors, due in part to the inability to statically determine the existence of memory address dependencies. Hardware memory renaming techniques have been proposed which predict which stores a load might be dependent upon. These prediction techniques can be used to speculatively forward a value from a predicted store dependency to a load through a value prediction table; however, these techniques require large and time-consuming hardware tables. In this paper we propose a software-guided approach for identifying dependencies between store and load instructions and the Load Marking (LM) architecture to communicate these dependencies to the hardware. Compiler analysis and profiles are used to find important store/load relationships, and these relationships are identified during execution via hints or an n-bit tag. For those loads that are not marked for renaming, we then use additional profiling inform...

Glenn Reinman; Brad Calder; Dean Tullsen; Gary Tyson; Todd Austin

1998-01-01T23:59:59.000Z

384

DIODE STEERED MANGETIC-CORE MEMORY  

DOE Patents (OSTI)

A word-arranged magnetic-core memory is designed for use in a digital computer utilizing the reverse or back current property of the semi-conductor diodes to restore the information in the memory after read-out. In order to ob tain a read-out signal from a magnetic core storage unit, it is necessary to change the states of some of the magnetic cores. In order to retain the information in the memory after read-out it is then necessary to provide a means to return the switched cores to their states before read-out. A rewrite driver passes a pulse back through each row of cores in which some switching has taken place. This pulse combines with the reverse current pulses of diodes for each column in which a core is switched during read-out to cause the particular cores to be switched back into their states prior to read-out. (AEC)

Melmed, A.S.; Shevlin, R.T.; Laupheimer, R.

1962-09-18T23:59:59.000Z

385

Memory device using movement of protons  

DOE Patents (OSTI)

An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

2000-01-01T23:59:59.000Z

386

Shape Memory Behavior of Heat Treated Ni60Ti40 (wt%)  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Shape Memory Behavior of Heat ...

387

THE FOUNDATION, INC. THE ALLEN SHACKELFORD AIFD MEMORIAL SCHOLARSHIP FUND  

E-Print Network (OSTI)

THE FOUNDATION, INC. THE ALLEN SHACKELFORD AIFD MEMORIAL SCHOLARSHIP FUND THE EULALAH OVERMEYER of an application for scholarship under The Allen Shackelford AIFD Memorial Scholarship Fund, The Eulalah Overmeyer

Schweik, Charles M.

388

Estimating Local Memory of Tropical Cyclones through MPI Anomaly Evolution  

Science Conference Proceedings (OSTI)

This study examines the local memory of atmospheric and oceanic changes associated with a tropical cyclone (TC). The memory is quantified through anomalous maximum potential intensity (MPI) evolution for 20 days prior to the arrival of a TC ...

Robert E. Hart; Ryan N. Maue; Michael C. Watson

2007-12-01T23:59:59.000Z

389

Dynamic Memory Optimization using Pool Allocation and Prefetching  

E-Print Network (OSTI)

Heap memory allocation plays an important role in modern applications. Conventional heap allocators, however, generally ignore the underlying memory hierarchy of the system, favoring instead a low runtime overhead and fast ...

Zhao, Qin

390

Speedy transactions in multicore in-memory databases  

Science Conference Proceedings (OSTI)

Silo is a new in-memory database that achieves excellent performance and scalability on modern multicore machines. Silo was designed from the ground up to use system memory and caches efficiently. For instance, it avoids all centralized contention points, ...

Stephen Tu, Wenting Zheng, Eddie Kohler, Barbara Liskov, Samuel Madden

2013-11-01T23:59:59.000Z

391

Design and Implementation of High Speed Memory in 130 nm  

Science Conference Proceedings (OSTI)

This paper deals with the design and analysis of high speed SRAM memory using ATD (Address Transition Detector) technique in 130 nm with the capacitive load of the memory is 5pF

Sampath Kumar; Arti Noor; Sanjay Kr. Singh

2010-01-01T23:59:59.000Z

392

Intellectual property strategy : analysis of the flash memory industry  

E-Print Network (OSTI)

This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

Ogura, Tomoko H

2006-01-01T23:59:59.000Z

393

Teapot: language support for writing memory coherence protocols  

Science Conference Proceedings (OSTI)

Recent shared-memory parallel computer systems offer the exciting possibility of customizing memory coherence protocols to fit an application's semantics and sharing patterns. Custom protocols have been used to achieve message-passing performance---while ...

Satish Chandra; Brad Richards; James R. Larus

1996-05-01T23:59:59.000Z

394

Purify: Fast Detection of Memory Leaks and Access Errors This paper describes Purify, a software testing and quality assurance tool that detects memory leaks and  

E-Print Network (OSTI)

], Catalytix [Feuer85] and various similar malloc_debug packages use. Byte and two-byte checking cannot spent eliminating leaks in the X11R4 server for Sun workstations. All that effort, yet dozens of leaks as gcc. The data was collected on a Sun SPARCstation SLC running SUNOS 4.1.1, and all times are real

Qin, Feng

395

Precipitate Phases in Several High Temperature Shape Memory ...  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Precipitate Phases in Several High ...

396

Improving the Performance of Software Distributed Shared Memory with Speculation  

E-Print Network (OSTI)

in a release consistent software distributed shared memory system. We propose a new protocol, Speculative Home-based

Alvisi, Lorenzo

397

Physical and Mechanical Metallurgy of Shape Memory Alloys for ...  

Science Conference Proceedings (OSTI)

About this Symposium. Meeting, 2011 TMS Annual Meeting & Exhibition. Symposium, Physical and Mechanical Metallurgy of Shape Memory Alloys for Actuator ...

398

Societal Implicit Memory and his Speed on Tracking Extrema in ...  

E-Print Network (OSTI)

of emergent adaptive memory, cooperative learning and perception ..... comparison purposes, we plotted bold curves for static Ackley functions with respective ...

399

LOUIS CALDER MEMORIAL LIBRARY AND BIOMEDICAL COMMUNICATIONS  

E-Print Network (OSTI)

's online catalog provides full bibliographic access, by title, subject, author, and keyword, to all from a citation directly to the full text of the article. · Google and Google Scholar provide oneclick access from many citations identified in a search directly to the full text of the articles

Shyu, Mei-Ling

400

Pricing and Security of ResidentialPricing and Security of Residential Broadband AccessBroadband Access  

E-Print Network (OSTI)

and Department of Electrical Engineering Pennsylvania State University kesidis@engr.psu.edu Carlos Kirjner McKinsey and Company, New York Carlos_Kirjner@Mckinsey.com #12;2 OutlineOutline Growth in residential broadband access

Yener, Aylin

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

The nature of the working memory system underlying language processing and its relationship to the long-term memory system  

E-Print Network (OSTI)

This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

Fedorenko, Evelina Georgievna

2007-01-01T23:59:59.000Z

402

Executive Order 12968 Access to Classified Information  

NLE Websites -- All DOE Office Websites (Extended Search)

40243 40243 Monday August 7, 1995 Part IV The President Executive Order 12968-Access to Classified Information Presidential Determination No. 95-32 of July 28, 1995 Presidential Determination No. 95-33 of July 31, 1995 Presidential Documents 40245 Federal Register Vol. 60, No. 151 Monday, August 7, 1995 Title 3- The President Executive Order 12968 of August 2, 1995 Access to Classified Information The national interest requires that certain information be maintained in confidence through a system of classification in order to protect our citizens, our democratic institutions, and our participation within the community of nations. The unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.

403

Access Venture Partners | Open Energy Information  

Open Energy Info (EERE)

Logo: Access Venture Partners Name Access Venture Partners Address 8787 Turnpike Drive, Suite 260 Place Westminster, Colorado Zip 80030 Region Rockies Area Product Venture Capital Number of employees 1-10 Year founded 1998 Phone number 303-426-8899 Website http://www.accessvp.com/ Coordinates 39.854298°, -105.052635° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.854298,"lon":-105.052635,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

404

NSLS User Access | Requesting Beam Time  

NLE Websites -- All DOE Office Websites (Extended Search)

Requesting Beam Time Requesting Beam Time Use one of the following options depending on your research: General User Proposal General User proposals are peer reviewed for scientific merit by a Proposal Review Panel (PRP). General User proposals compete for beamtime with other General User Proposals based on scientific merit. Once the original proposal and beam time request is reviewed and rated in the PASS System, additional beam time requests can be submitted against the original proposal for its lifetime, a period of up to six cycles (two years). Data taken during experiments associated with a General User proposal is considered to be in the public domain. There is no charge for General User beamtime. Rapid Access Rapid Access proposals are a subset of General User proposals available for

405

Accounts & Access | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Account Information Accounts and Access FAQ Connect & Log In Using CRYPTOCards SSH Keys on Surveyor Disk Space Quota Management Allocations Decommissioning of BG/P Systems and Resources Blue Gene/Q Versus Blue Gene/P Mira/Cetus/Vesta Intrepid/Challenger/Surveyor Tukey Eureka / Gadzooks Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Accounts & Access Account Information Account Information: All computing carried out on the ALCF systems is associated with a user "account." This account is used to log onto the login servers and run jobs on the resources. Using CRYPTOcards Using CRYPTOCards: Useful information to guide you in using and troubleshooting your CRYPTOcard.

406

Easy Access to Energy Improvement Funds  

NLE Websites -- All DOE Office Websites (Extended Search)

EASY ACCESS TO ENERGY IMPROVEMENT EASY ACCESS TO ENERGY IMPROVEMENT FUNDS IN THE PUBLIC SECTOR Are you postponing the installation of energy efficiency projects because the money is not in your current budget? Do you find yourself weighing the benefits of installing energy efficiency equipment today against the hassles and expense of requesting new or additional debt? Are energy efficiency projects being delayed because you are understaffed? If you answered "YES" to any of these questions, you will be happy to know there are several simple, fast, legal, and well-tested financing alternatives that may address your concerns. In the public sector, two of the most popular mechanisms for financing energy efficiency projects are performance contracts and tax- exempt lease-purchase agreements. A

407

Safety testing for LHC access system  

E-Print Network (OSTI)

In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of systemâ??s models through an automatic systemâ??s state space exploration against some property formulas.

Valentini, F; Ninin, P; Scibile, S

2008-01-01T23:59:59.000Z

408

Open Access Transmission and Renewable Energy Technologies  

Science Conference Proceedings (OSTI)

In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

Porter, K.

1996-09-01T23:59:59.000Z

409

Direct match data flow memory for data driven computing  

DOE Patents (OSTI)

A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

1997-01-01T23:59:59.000Z

410

Performance implications of fence-based memory models  

Science Conference Proceedings (OSTI)

Most mainstream shared-memory parallel programming languages are converging to a memory model, or shared variable semantics, centered on providing sequential consistency for most data-race-free programs. OpenMP, along with a small number of other languages, ... Keywords: OpenMP, atomic operations, critical sections, fences, locks, memory model

Hans-J. Boehm

2011-06-01T23:59:59.000Z

411

Guide wire extension for shape memory polymer occlusion removal devices  

DOE Patents (OSTI)

A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

Maitland, Duncan J. (Pleasant Hill, CA); Small, IV, Ward (Livermore, CA); Hartman, Jonathan (Sacramento, CA)

2009-11-03T23:59:59.000Z

412

Quantum interference of electromagnetic fields from remote quantum memories  

E-Print Network (OSTI)

We observe quantum, Hong-Ou-Mandel, interference of fields produced by two remote atomic memories. High-visibility interference is obtained by utilizing the finite atomic memory time in four-photon delayed coincidence measurements. Interference of fields from remote atomic memories is a crucial element in protocols for scalable generation of multi-node remote qubit entanglement.

T. Chaneliere; D. N. Matsukevich; S. D. Jenkins; S. -Y. Lan; R. Zhao; T. A. B. Kennedy; A. Kuzmich

2006-09-27T23:59:59.000Z

413

Nonlinear quantization on Hebbian-type associative memories  

Science Conference Proceedings (OSTI)

Hebbian-type associative memory is characterized by its simple architecture. However, the hardware implementation of Hebbian-type associative memories is normally complicated when there are a huge number of patterns stored. To simplify the interconnection ... Keywords: Hebbian-type associative memory, Interconnection, Neuron, Nonlinear quantization, Probability of direct convergence

Chishyan Liaw; Ching-Tsorng Tsai; Chao-Hui Ko

2012-06-01T23:59:59.000Z

414

Energy Efficient Proactive Thermal Management in Memory Subsystem  

E-Print Network (OSTI)

Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

Simunic, Tajana

415

Self-Optimizing Memory Controllers: A Reinforcement Learning Approach  

Science Conference Proceedings (OSTI)

Efficiently utilizing off-chip DRAM bandwidth is a critical issuein designing cost-effective, high-performance chip multiprocessors(CMPs). Conventional memory controllers deliver relativelylow performance in part because they often employ fixed,rigid ... Keywords: Chip Multiprocessors, Memory Systems, Memory Controller, Machine Learning, Reinforcement Learning

Engin Ipek; Onur Mutlu; José F. Martínez; Rich Caruana

2008-06-01T23:59:59.000Z

416

Buffer memory optimization for video codec application modeled in Simulink  

Science Conference Proceedings (OSTI)

Reduction of the on-chip memory size is a key issue in video codec system design. Because video codec applications involve complex algorithms that are both data-intensive and control-dependent, memory optimization based on global and precise analysis ... Keywords: Simulink, memory size reduction, video codec application

Sang-Il Han; Xavier Guerin; Soo-Ik Chae; Ahmed A. Jerraya

2006-07-01T23:59:59.000Z

417

A memory aid with remote communication using distributed technology  

Science Conference Proceedings (OSTI)

Electronic memory aids have been used successfully to give reminders to individuals with memory problems. These aids usually present short action reminders that are acknowledged by the user. The recent enhancement of handheld computers with wireless ... Keywords: Elderly, Memory-impaired users, Personal digital assistant, Remote communication

Andrea Szymkowiak; Kenny Morrison; Peter Gregor; Prveen Shah; J. Evans; A. Wilson

2005-01-01T23:59:59.000Z

418

Accessibility in 5-Axis Milling Environment  

E-Print Network (OSTI)

Using algorithms from computer graphics, namely hidden line and surface removal, techniques have been constructed to derive the 3-axis visible or millable set of a computer model from a given orientation or simulate and verify machining toolpaths. In this paper, an approach that reduces the accessibility problem of 5-axis milling using a flat end tool into a 3-axis accessibility problem is discussed. Using this approach, global detection of possible gouging into other parts, while a 5-axis flat end mill is in use, is made feasible and collisions can be avoided. Key Words: NURBs, accessibility, 5-axis machining. 1 Introduction Several methods are in use, when freeform computer models are realized using milling machines. Possibly the most common approach utilizes a ball end tool with three degrees of freedom, namely translation in x, y, and z [1, 2, 4, 5, 6, 7]. The ball end center of the tool follows an offset [8] to the model by the tool radius while the ball end surface is tangent to...

Gershon Elber

1997-01-01T23:59:59.000Z

419

Alternative Fuels Data Center: Access to State Alternative Fueling Stations  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Access to State Access to State Alternative Fueling Stations to someone by E-mail Share Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Facebook Tweet about Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Twitter Bookmark Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Google Bookmark Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Delicious Rank Alternative Fuels Data Center: Access to State Alternative Fueling Stations on Digg Find More places to share Alternative Fuels Data Center: Access to State Alternative Fueling Stations on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Access to State Alternative Fueling Stations

420

Predicting locality phases for dynamic memory optimization  

Science Conference Proceedings (OSTI)

Dynamic data, cache, and memory adaptation can significantly improve program performance when they are applied on long continuous phases of execution that have dynamic but predictable locality. To support phase-based adaptation, this paper defines the ... Keywords: Dynamic optimization, Locality analysis and optimization, Phase hierarchy, Program phase prediction, Reconfigurable architecture

Xipeng Shen; Yutao Zhong; Chen Ding

2007-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

A Memory Efficient 3-D DWT Architecture  

Science Conference Proceedings (OSTI)

This paper proposes a memory efficientreal-time 3-D DWT algorithm and its architectural implementation. As the running JD-DWT refreshes the wavelet coefficients with the arrival of every two newframes, the latency of the conventional 3D-DWT reduces by ...

B. Das; Swapna Banerjee

2003-01-01T23:59:59.000Z

422

Memory in the system: trajectory-environment  

E-Print Network (OSTI)

In the paper the memory effect in the system consisting from a trajectory of process and an environment is considered. The environment is presented by scalar potential and noise. The evolution of system is interpreted as process of the continuous "measurement" of a trajectory by an environment and\\or on the contrary. In this sense the measured value is entropy-the information about embedding of the trajectory into configurations space. The concepts "measurement" and "interaction" are identified alike in quantum theory. Thus, the entropy evolution is not only the effect of dynamics, but also its cause, if it is possible to speak about causality in this case. It is shown, that such non-elastic interaction leads to occurrence of memory in the system. The reflex memory mechanism is realized as a real conformal dynamic metrics. The metastable event (attractor) is defined and time of its life is estimated. It is shown, that in the system there is a change of dynamic modes from spatial localization to random walk (fluctuation, relaxation). On scale of the attractors dynamics the memory is appearing as a semi-regular (in some information sense) drift of the image of fluctuations in a power spectrum of environment to absolute minimum. The latter properties (topological convergence) attract the attention to algorithmic aspect of a considered system.

Maxim Budaev

2007-08-10T23:59:59.000Z

423

Verifying concurrent memory reclamation algorithms with grace  

Science Conference Proceedings (OSTI)

Memory management is one of the most complex aspects of modern concurrent algorithms, and various techniques proposed for it--such as hazard pointers, read-copy-update and epoch-based reclamation--have proved very challenging for formal reasoning. In ...

Alexey Gotsman; Noam Rinetzky; Hongseok Yang

2013-03-01T23:59:59.000Z

424

Evaluating operating system vulnerability to memory errors  

Science Conference Proceedings (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While ... Keywords: DRAM failures, fault-tolerance, operating systems

Kurt B. Ferreira; Kevin Pedretti; Ron Brightwell; Patrick G. Bridges; David Fiala; Frank Mueller

2012-06-01T23:59:59.000Z

425

A performance study of memory consistency models  

Science Conference Proceedings (OSTI)

Recent advances in technology are such that the speed of processors is increasing faster than memory latency is decreasing. Therefore the relative cost of a cache miss is becoming more important. However, the full cost of a cache miss need not be paid ...

Richard N. Zucker; Jean-Loup Baer

1992-04-01T23:59:59.000Z

426

Cohesion: a hybrid memory model for accelerators  

Science Conference Proceedings (OSTI)

Two broad classes of memory models are available today: models with hardware cache coherence, used in conventional chip multiprocessors, and models that rely upon software to manage coherence, found in compute accelerators. In some systems, both types ... Keywords: accelerator, cache coherence, computer architecture

John H. Kelm; Daniel R. Johnson; William Tuohy; Steven S. Lumetta; Sanjay J. Patel

2010-06-01T23:59:59.000Z

427

Hybrid cache architecture with disparate memory technologies  

Science Conference Proceedings (OSTI)

Caching techniques have been an efficient mechanism for mitigating the effects of the processor-memory speed gap. Traditional multi-level SRAM-based cache hierarchies, especially in the context of chip multiprocessors (CMPs), present many challenges ... Keywords: hybrid cache architecture, three-dimensional ic

Xiaoxia Wu; Jian Li; Lixin Zhang; Evan Speight; Ram Rajamony; Yuan Xie

2009-06-01T23:59:59.000Z

428

Alternative Fuels Data Center: Public Access to State Compressed Natural  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Public Access to State Public Access to State Compressed Natural Gas (CNG) Fueling Stations to someone by E-mail Share Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Facebook Tweet about Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Twitter Bookmark Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Google Bookmark Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Delicious Rank Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on Digg Find More places to share Alternative Fuels Data Center: Public Access to State Compressed Natural Gas (CNG) Fueling Stations on

429

Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Limited Speed Vehicle Limited Speed Vehicle Access to Roadways to someone by E-mail Share Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Facebook Tweet about Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Twitter Bookmark Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Google Bookmark Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Delicious Rank Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on Digg Find More places to share Alternative Fuels Data Center: Limited Speed Vehicle Access to Roadways on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Limited Speed Vehicle Access to Roadways A limited speed vehicle is defined as a vehicle that is capable of

430

Solar/Wind Access Policy | Open Energy Information  

Open Energy Info (EERE)

Solar/Wind Access Policy Solar/Wind Access Policy < Solar Jump to: navigation, search Solar and wind access laws are designed to establish a right to install and operate a solar or wind energy system at a home or other facility. Some solar access laws also ensure a system owner's access to sunlight. These laws may be implemented at both the state and local levels. In some states, access rights prohibit homeowners associations, neighborhood covenants and local ordinances from restricting a homeowner's right to use solar energy. Easements, the most common form of solar access law, allow for the rights to existing access to a renewable resource on the part of one property owner to be secured from an owner whose property could be developed in such a way as to restrict that resource. An easement is

431

Web accessibility compliance of government web sites in Korea  

Science Conference Proceedings (OSTI)

This paper introduces Korean web accessibility activities, such as relational laws, ordinances, policies, guidelines. It also presents analytical result of the investigation on web-contents accessibilities of the 39 Korean government agencies. The result ...

Joonho Hyun; Doojin Choi; Sukil Kim

2007-07-01T23:59:59.000Z

432

Re: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the topics of data access, third party usage and privacy as they relate to consumers energy usage information and the Smart Grid. Re: NBP RFI: Data Access More Documents &...

433

Auctions to gas transmission access : the British experience  

E-Print Network (OSTI)

When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

McDaniel, Tanga

2002-01-01T23:59:59.000Z

434

Green Button: Providing Consumers with Access to Their Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Button: Providing Consumers with Access to Their Energy Data Green Button: Providing Consumers with Access to Their Energy Data January 19, 2012 - 2:54pm Addthis Aneesh...

435

Foundation for a time interval access control model  

Science Conference Proceedings (OSTI)

A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a “time interval access graph.” The time ...

Francis B. Afinidad; Timothy E. Levin; Cynthia E. Irvine; Thuy D. Nguyen

2005-09-01T23:59:59.000Z

436

Femtocell access control strategy in UMTS and LTE  

Science Conference Proceedings (OSTI)

Femtocells have become an attractive device for operators to offer extended services on their licensed UMTS/LTE spectrum. In this article we focus on the access control strategy -- a crucial aspect for operators to give preferential access to femtocells ...

Assen Golaup; Mona Mustapha; Leo Boonchin Patanapongpibul

2009-09-01T23:59:59.000Z

437

Questions_and_Answers_on_the_New_Access_Control_System  

NLE Websites -- All DOE Office Websites (Extended Search)

Questions and Answers on the New Access Control System for HQ Security Areas September 15, 2010 Question: Why is the current access control system to security areas being changed?...

438

Access Rate Control System | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support...

439

IEEE TRANSACTIONS ON ELECTRON DEVICES, VOL. 55, NO. 10, OCTOBER 2008 2785 Mechanically Operated Random Access Memory  

E-Print Network (OSTI)

, 19 2001 . 4 H. Lee, R. A. Coutu, S. Mall, and K. D. Leddy, J. Micromech. Microeng. 16, 557 2006 . 5 D

Yoon, Jun-Bo

440

Gender and lexical access in Bulgarian  

E-Print Network (OSTI)

Two procedures were used to explore the effects of semantic and grammatical gender on the recognition and processing of Bulgarian nouns, in relation to other factors that are known to affect lexical access. This study in a three-gender language was modeled on previous work in Italian, a two-gender language (Bates, Devescovi, Pizzamiglio, D’Amico, & Hernandez, 1995). Words were presented auditorily in randomized lists in two tasks: (1) repeat the word as quickly as possible and (2) determine the grammatical gender of the noun as soon as possible and indicate the decision by pressing a button. Reaction times in both tasks were influenced by phonological factors, word frequency, and irregularity of gender marking, but semantic and grammatical gender affected only gender monitoring. The significant contribution of semantic gender to processing in Bulgarian contrasts with previous findings for Italian. Also, we obtained an interaction between sex of the subject and noun gender, reflecting a bias toward one’s own grammatical gender “counterpart ” (especially for females). Reanalysis of the prior study in Italian showed a similar interaction but confirmed no effects of the semantic gender of the noun, suggesting that these two natural gender effects can dissociate. Possible reasons for cross-linguistic differences are discussed, with implications for comparative studies of gender and lexical access. Recently, there has been a surge of interest in the nature

Elena Andonova; Antonella Devescovi

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Risk-based access control systems built on fuzzy inferences  

Science Conference Proceedings (OSTI)

Fuzzy inference is a promising approach to implement risk-based access control systems. However, its application to access control raises some novel problems that have not been yet investigated. First, because there are many different fuzzy operations, ... Keywords: access control, fuzzy inference, risk

Qun Ni; Elisa Bertino; Jorge Lobo

2010-04-01T23:59:59.000Z

442

Oblivious transfer with complex attribute-based access control  

Science Conference Proceedings (OSTI)

In this paper, we present oblivious transfer with complex attribute-based access control policies. The protocol allows a database server to directly enforce "and" and "or" access control policies (c11 ? c12 ... Keywords: access control, attribute-based encryption, oblivious transfer

Lingling Xu; Fangguo Zhang

2010-12-01T23:59:59.000Z

443

Achieving distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user an access right to the stored information. It is essential for future real sensor network deployment in which sensors may provide users with different services in terms of data ... Keywords: Elliptic Curve Cryptography, Public key cryptography, Sensor networks, User access control

Haodong Wang; Qun Li

2012-05-01T23:59:59.000Z

444

Trading in risk: using markets to improve access control  

Science Conference Proceedings (OSTI)

With the increasing need to securely share information, current access control systems are proving too in flexible and difficult to adapt. Recent work on risk-based access control systems has shown promise at resolving the inadequacies of traditional ... Keywords: market, risk, risk-based access control

Ian Molloy; Pau-Chen Cheng; Pankaj Rohatgi

2009-08-01T23:59:59.000Z

445

First record of single event upset on the ground, Cray-1 computer memory at Los Alamos in 1976  

SciTech Connect

Records of bit flips in the Cray-1 computer installed at Los Alamos in 1976 lead to an upset rate in the Cray-1 's bipolar SRAMs that correlates with the SEUs being induced by the atmospheric neutrons. In 1976 the Cray Research Company delivered its first supercomputer, the Cray-1, installing it at Los Alamos National Laboratory. Los Alamos had competed with the Lawrence Livermore National Laboratory for the Cray-1 and won, reaching an agreement with Seymour Cray to install the machine for a period of six months for free, after which they could decide whether to buy, lease or return it. As a result, Los Alamos personnel kept track of the computer reliability and performance and so we know that during those six months of operation, 152 memory parity errors were recorded. The computer memory consisted of approximately 70,000 1Kx1 bipolar ECL static RAMs, the Fairchild 10415. What the Los Alamos engineers didn't know is that those bit flips were the result of single event upsets (SEUs) caused by the atmospheric neutrons. Thus, these 152 bit flips were the first recorded SEUs on the earth, and were observed 2 years before the SEUs in the Intel DRAMs that had been found by May and Woods in 1978. The upsets in the DRAMs were shown to have been caused by alpha particles from the chip packaging material. In this paper we will demonstrate that the Cray-1 bit flips, which were found through the use of parity bits in the Cray-1, were likely due to atmospheric neutrons. This paper will follow the same approach as that of the very first paper to demonstrate single event effects, which occurred in satellite flip-flop circuits in 1975. The main difference is that in the four events that occurred over the course of 17 satellite years of operation were shown to be due to single event effects just a few years after those satellite anomalies were recorded. In the case of the Cray-1 bit flips, there has been a delay of more than 30 years between the occurrence of the bit flips and the identification of their cause as SEUs induced by the atmospheric neutrons.

Michalak, Sarah E [Los Alamos National Laboratory; Quinn, Heather M [Los Alamos National Laboratory; Grider, Gary A [Los Alamos National Laboratory; Iwanchuk, Paul N [Los Alamos National Laboratory; Morrison, John F [Los Alamos National Laboratory; Wender, Stephen A [Los Alamos National Laboratory; Normand, Eugene [EN ASSOCIATES, LLC; Wert, Jerry L [BOEING RESEARCH AND TEC; Johnson, Steve [CRAY, INC.

2010-01-01T23:59:59.000Z

446

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Magnetic Memory Print Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

447

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Magnetic Memory Print Disorder-Induced Microscopic Magnetic Memory Print The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

448

Disorder-Induced Microscopic Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

Disorder-Induced Microscopic Disorder-Induced Microscopic Magnetic Memory Disorder-Induced Microscopic Magnetic Memory Print Wednesday, 26 October 2005 00:00 The magnetic-recording industry deliberately introduces carefully controlled disorder into its materials to obtain the desired magnetic properties. But as the density of magnetic disks climbs, the size of the magnetic domains responsible for storage must decrease, posing new challenges. Beautiful theories based on random microscopic disorder have been developed over the past ten years. To directly compare these theories with precise experiments, an American-European team, led by researchers from the University of Washington, Seattle, first developed and then applied coherent x-ray speckle metrology to microscopic magnetic domains in a series of thin multilayer perpendicular magnetic materials of varying disorder. Their results, at odds with all previous theories, have set a new reference point for future theories.

449

FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS  

Science Conference Proceedings (OSTI)

FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contents of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk. COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever-increasing number of vulnerable computers on the Internet the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.

Jared Stimson Edward Murphy

2007-06-01T23:59:59.000Z

450

Complex bodies with memory: linearized setting  

E-Print Network (OSTI)

The mechanics of complex bodies with memory effects is discussed in linearized setting. The attention is focused on the characterization of free energies in terms of minimum work and maximum recoverable work in the bulk and along a discontinuity surface endowed with its own surface energy, a surface internal to the body. To this aim, use is made of techniques proposed by Del Piero. Consequences of the Clausius-Duhem inequality are investigated for complex bodies with instantaneous linear elastic response.

Paolo Maria Mariano; Paolo Paoletti

2008-05-28T23:59:59.000Z

451

Optimal superdense coding over memory channels  

SciTech Connect

We study the superdense coding capacity in the presence of quantum channels with correlated noise. We investigate both the cases of unitary and nonunitary encoding. Pauli channels for arbitrary dimensions are treated explicitly. The superdense coding capacity for some special channels and resource states is derived for unitary encoding. We also provide an example of a memory channel where nonunitary encoding leads to an improvement in the superdense coding capacity.

Shadman, Z.; Kampermann, H.; Bruss, D.; Macchiavello, C. [Institute fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, DE-40225 Duesseldorf (Germany); Dipartimento di Fisica ''A. Volta'' and INFM-Unita di Pavia, Via Bassi 6, IT-27100 Pavia (Italy)

2011-10-15T23:59:59.000Z

452

Shape Memory Polymer Therapeutic Devices for Stroke  

SciTech Connect

Shape memory polymers (SMPs) are attracting a great deal of interest in the scientific community for their use in applications ranging from light weight structures in space to micro-actuators in MEMS devices. These relatively new materials can be formed into a primary shape, reformed into a stable secondary shape, and then controllably actuated to recover their primary shape. The first part of this presentation will be a brief review of the types of polymeric structures which give rise to shape memory behavior in the context of new shape memory polymers with highly regular network structures recently developed at LLNL for biomedical devices. These new urethane SMPs have improved optical and physical properties relative to commercial SMPs, including improved clarity, high actuation force, and sharper actuation transition. In the second part of the presentation we discuss the development of SMP based devices for mechanically removing neurovascular occlusions which result in ischemic stroke. These devices are delivered to the site of the occlusion in compressed form, are pushed through the occlusion, actuated (usually optically) to take on an expanded conformation, and then used to dislodge and grip the thrombus while it is withdrawn through the catheter.

Wilson, T S; Small IV, W; Benett, W J; Bearinger, J P; Maitland, D J

2005-10-11T23:59:59.000Z

453

Performance of memory reclamation for lockless synchronization  

E-Print Network (OSTI)

Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace locks with non-blocking synchronization to protect against deadlock, priority inversion, and convoying. In both cases, dynamic data structures that avoid locking require a memory reclamation scheme that reclaims elements once they are no longer in use. The performance of existing memory reclamation schemes has not been thoroughly evaluated. We conduct the first fair and comprehensive comparison of three recent schemes—quiescent-state-based reclamation, epoch-based reclamation, and hazard-pointer-based reclamation—using a flexible microbenchmark. Our results show that there is no globally optimal scheme. When evaluating lockless synchronization, programmers and algorithm designers should thus carefully consider the data structure, the workload, and the execution environment, each of which can dramatically affect the memory reclamation performance. We discuss the consequences of our results for programmers and algorithm designers. Finally, we describe the use of one scheme, quiescentstate-based reclamation, in the context of an OS kernel—an execution environment which is well suited to this scheme.

Thomas E. Hart; Paul E. McKenney; Angela Demke Brown; Jonathan Walpole

2007-01-01T23:59:59.000Z

454

The Energy Access Situation in Developing Countries | Open Energy  

Open Energy Info (EERE)

Energy Access Situation in Developing Countries Energy Access Situation in Developing Countries Jump to: navigation, search Tool Summary Name: The Energy Access Situation in Developing Countries Agency/Company /Organization: World Health Organization (WHO), United Nations Development Programme (UNDP) Sector: Energy Focus Area: Renewable Energy, Biomass, Energy Efficiency Topics: Co-benefits assessment, - Energy Access, - Health Resource Type: Presentation, Technical report User Interface: Website Website: www.who.int/indoorair/publications/energyaccesssituation/en/index.html Cost: Free A Review focusing on the Least Developed Countries and Sub-Saharan Africa The "Energy Access Situation in Developing Countries - A Review focusing on the Least Developed Countries and Sub-Saharan Africa" report draws

455

City of Boulder - Solar Access Ordinance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Ordinance Access Ordinance City of Boulder - Solar Access Ordinance < Back Eligibility Construction Residential Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Program Info State Colorado Program Type Solar/Wind Access Policy Provider City of Boulder The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted shading by new construction. A solar access permit is available to those who have installed or who plan to install a solar energy system and need more protection than is provided by the ordinance. For new developments, all units which are not planned to

456

UN-Energy-Measuring Energy Access | Open Energy Information  

Open Energy Info (EERE)

UN-Energy-Measuring Energy Access UN-Energy-Measuring Energy Access Jump to: navigation, search Tool Summary LAUNCH TOOL Name: UN-Energy-Measuring Energy Access Agency/Company /Organization: United Nations Energy Knowledge Network (UN-Energy) Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset, Maps Website: www.un-energy.org/measuring-energy-access Cost: Free Language: English UN-Energy-Measuring Energy Access Screenshot References: UN-Energy-Measuring Energy Access[1] "A reliable and comprehensive information base is necessary to inform target-setting and to monitor outcomes. Openly available and visually attractive information presentation can support the design of innovative policies and measures, and underpin detailed analysis. UN-Energy, the

457

Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fuel Alternative Fuel Vehicle (AFV) Access to Tunnels to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Google Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Delicious Rank Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel Vehicle (AFV) Access to Tunnels on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

458

Mozambique-Biofuels, Land Access and Rural Livelihoods | Open Energy  

Open Energy Info (EERE)

Biofuels, Land Access and Rural Livelihoods Biofuels, Land Access and Rural Livelihoods Jump to: navigation, search Name Mozambique-Biofuels, Land Access and Rural Livelihoods Agency/Company /Organization International Institute for Environment and Development Sector Energy, Land Focus Area Biomass, - Biofuels, Forestry, Agriculture Topics Implementation, Co-benefits assessment, - Energy Access, Resource assessment, Background analysis Resource Type Publications, Case studies/examples Website http://www.iied.org/pubs/pdfs/ Country Mozambique UN Region Eastern Africa References Mozambique-Biofuels, Land Access and Rural Livelihoods[1] Mozambique-Biofuels, Land Access and Rural Livelihoods Screenshot Background "This report documents how the spread of biofuels is affecting land access for poorer groups in Mozambique, and what actions are being taken,

459

Access to Climate Change Technology by Developing Countries | Open Energy  

Open Energy Info (EERE)

Access to Climate Change Technology by Developing Countries Access to Climate Change Technology by Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Access to Climate Change Technology by Developing Countries Agency/Company /Organization: International Centre for Trade and Sustainable Development Sector: Energy, Land Focus Area: Renewable Energy Topics: Finance, Implementation Resource Type: Publications, Guide/manual Website: ictsd.org/downloads/2009/11/access-to-climate-change-technology-by-dev Access to Climate Change Technology by Developing Countries Screenshot References: Developing Country-Access to CC Tech[1] "The paper critically examines various approaches that have been suggested for achieving greater access to climate change technology by developing countries, including compulsory licensing, patent pools, patent databases

460

Access Energy Coop | Open Energy Information  

Open Energy Info (EERE)

Coop Coop Jump to: navigation, search Name Access Energy Coop Place Iowa Utility Id 16611 Utility Location Yes Ownership C NERC Location SERC NERC SERC Yes ISO Other Yes Activity Distribution Yes Alt Fuel Vehicle Yes Alt Fuel Vehicle2 Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Interruptible Large Power Rate* Industrial Large Commercial Rate Commercial Large Power Rate Schedule Industrial Residential Single Phase Rate Residential Security Lights HPS 100 W Lighting Security Lights HPS 1000 W Lighting Security Lights HPS 250 W Lighting Security Lights HPS 400 W Lighting

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Template for Discontinuation of Access Eligibility Determination  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MEMORANDUM FOR (SUBJECT'S NAME) MEMORANDUM FOR (SUBJECT'S NAME) FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions (QNSP) signed [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. Your case was submitted to the Office of Personnel Management (OPM) and an investigation dated [insert date] has been received. [Insert a brief description of the circumstances such as: A review of your case reveals that you listed marijuana use 5-10 times from 8/01 to 5/05 on your QNSP. During the personal subject interview with OPM, you stated that the end date for the marijuana use was incorrect and the last time

462

Science Open Access Journals - Alerts Help  

Office of Scientific and Technical Information (OSTI)

SOAJ Alerts Fast Facts SOAJ Alerts Fast Facts You can easily create an alert right from the results page. Alerts run automatically, based on the schedule you choose. New relevantly ranked results are automatically sent to you through email or an individual or shared RSS/ATOM feed. There is no limit to the number of alerts you can create. Up to 6 previous sets of alert results may be accessed, with permanent links to the sources where possible. Selected results can be emailed, printed, or downloaded into a citation manager such as EndNote, RefWorks or Bib Tex. Alerts Help Alerts will make your recurring searches even easier by automating your search and sending you the results on a regular basis. To receive alerts on your topic(s) of interest, simply create an Alerts account, specify your

463

HitME: low power Hit MEmory buffer for embedded systems  

Science Conference Proceedings (OSTI)

In this paper, we present a novel HitME (Hit-MEmory) buffer to reduce the energy consumption of memory hierarchy in embedded processors. The HitME buffer is a small direct-mapped cache memory that is added as additional memory into existing cache memory ...

Andhi Janapsatya; Sri Parameswaran; Aleksandar Ignjatovi?

2009-01-01T23:59:59.000Z

464

(Ni,Pt)Ti High Temperature Shape Memory Alloys  

Science Conference Proceedings (OSTI)

About this Abstract. Meeting, Materials Science & Technology 2011. Symposium, Shape Memory Alloys. Presentation Title, Phase Field Modeling of P-Phase ...

465

Determination of the recovery stresses developed by shape memory alloys  

SciTech Connect

A simple relationship has been developed between recovery stresses, temperature, and strain, to explain the mechanical shape memory effect in some alloys which undergo thermoelastic martensitic transformation. (GHT)

Mohamed, H.A.

1978-03-01T23:59:59.000Z

466

Novel and NiTi-based Shape Memory Alloys  

Science Conference Proceedings (OSTI)

Mar 4, 2013 ... Phase Constitution, Mechanical and Shape Memory Properties of (Pt,Co)Ti Alloys: Hideki Hosoda1; Satoshi Tsutsumi1; Masaki Tahara1; ...

467

Superelastic and Shape Memory Effects of Copper-Based Shape ...  

Science Conference Proceedings (OSTI)

Abstract Scope, Shape memory alloys have been considered for applications as sensors, actuators, and energy-absorbing materials because of their impressive ...

468

Whirlpools on the Nanoscale Could Multiply Magnetic Memory  

NLE Websites -- All DOE Office Websites (Extended Search)

cells housed on nanoscale metal disks, instead of the two-bit magnetic domains of standard magnetic memories. In magnetic vortices, parallel electron spins point either...

469

Optimization Online - On Efficiently Combining Limited Memory and ...  

E-Print Network (OSTI)

Nov 25, 2013... the limited memory methods are usually combined with a line search. ... by the Euclidean norm with an insignificant computational overhead ...

470

Y-12 historian assists in Lincoln Memorial University display...  

National Nuclear Security Administration (NNSA)

of Lincoln Memorial University in Harrogate, Tenn. Located in LMU's new Math and Science Building, the display pays tribute to nuclear energy research and the subsequent creation...

471

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(Brochure) (Revised) This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas. 47461.pdf More...

472

Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure)  

Science Conference Proceedings (OSTI)

This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas.

Not Available

2010-03-01T23:59:59.000Z

473

Building Green in Greensburg: Kiowa County Memorial Hospital  

Energy.gov (U.S. Department of Energy (DOE))

This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

474

Fundamentals of Shape Memory and Related Transitions (Electronic ...  

Science Conference Proceedings (OSTI)

Jun 1, 2007 ... These papers are based on presentations prepared for the symposium Fundamentals of Shape Memory and Related Transitions. The original ...

475

Physical and Mechanical Metallurgy of Shape Memory Alloys for ...  

Science Conference Proceedings (OSTI)

Physical and Mechanical Metallurgy of. Shape Memory Alloys for Actuator Applications. Sponsored by. TMS Structural Materials Division (SMD). TMS/ASM:  ...

476

Institute of Computer Science New class of limited-memory ...  

E-Print Network (OSTI)

Institute of Computer Science. Academy of Sciences of the Czech Republic. New class of limited-memory variationally-derived variable metric methods. J. Vlcek ...

477

Institute of Computer Science Limited-memory projective variable ...  

E-Print Network (OSTI)

Institute of Computer Science. Academy of Sciences of the Czech Republic. Limited-memory projective variable metric methods for unconstrained minimization.

478

False Memories of UFO Encounters: An fMRI Investigation .  

E-Print Network (OSTI)

??The idea of ‘false memories’ for traumatic events has powered numerous controversies. For this reason, the present study was designed as an attempt to resolve… (more)

Lambrinos, Angela

2011-01-01T23:59:59.000Z

479

Estimating solar access of typical residential rooftops: A case study in San Jose, CA  

E-Print Network (OSTI)

the solar access of rooftop solar-energy systems, includingthe solar access of rooftop solar-energy systems, includingof shading on residential rooftop solar access in various

Levinson, Ronnen M

2008-01-01T23:59:59.000Z

480

A KNOWLEDGE BASED SYSTEM FOR PROVIDING INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE  

E-Print Network (OSTI)

INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE Steven

Rosenberg, Steven

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access memory ram" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

482

Hybrid NOrec: a case study in the effectiveness of best effort hardware transactional memory  

Science Conference Proceedings (OSTI)

Transactional memory (TM) is a promising synchronization mechanism for the next generation of multicore processors. Best-effort Hardware Transactional Memory (HTM) designs, such as Sun's prototype Rock processor and AMD's proposed Advanced Synchronization ... Keywords: transactional memory

Luke Dalessandro; François Carouge; Sean White; Yossi Lev; Mark Moir; Michael L. Scott; Michael F. Spear

2012-06-01T23:59:59.000Z

483

Strata: wait-free synchronization with efficient memory reclamation by using chronological memory allocation  

Science Conference Proceedings (OSTI)

A locking is the typical mechanism to coordinate the race between multiple threads. But it downgrades the overall system performance due to the waiting time for the locked data to be unlocked. Wait-free synchronization is the one of the schemes to cope ... Keywords: memory management, wait-free synchronization

Eunhwan Shin; Inhyuk Kim; Junghan Kim; Young Ik Eom

2011-06-01T23:59:59.000Z

484

Utilizing Home Node Prediction to Improve the Performance of Software Distributed Shared Memory  

E-Print Network (OSTI)

Many researchers use a home-based lazy release consistent protocol (HLRC) to provide a simple, effective, and scalable way to build software distributed shared memory (DSM) systems. However, the performance of HLRC is notoriously sensitive to the initial page distribution among home nodes. This paper proposes an adaptive HLRC protocol in which the home page designation is able to change according to the observed application sharing pattern. Our system differs from HLRC and other adaptive derivatives in the following respects. First, the number of home nodes for each shared page can be varied, as opposed to having only a single home node. Second, we use prediction in a novel way to dynamically change the the location of home nodes according to different memory access patterns. The home node of each shared page is able to propagate, perish, and migrate. An online home predictor determine whether or not the current node should remain a home node or drop from the current set of home nodes for a given page. Finally, all decisions concerning home node group membership are made locally, eliminating the costly global decision-making communication present in many other systems. Performance evaluations using six well-known DSM benchmarks show that our adaptive protocol outperforms conventional HLRC by up to 60%. 1

Song Peng

2004-01-01T23:59:59.000Z

485

Measuring Energy Access: Supporting a Global Target | Open Energy  

Open Energy Info (EERE)

Measuring Energy Access: Supporting a Global Target Measuring Energy Access: Supporting a Global Target Jump to: navigation, search Tool Summary Name: Measuring Energy Access: Supporting a Global Target Agency/Company /Organization: Columbia University Sector: Energy Focus Area: Renewable Energy, Non-renewable Energy Topics: Co-benefits assessment, - Energy Access Resource Type: Publications Website: www.unido.org/fileadmin/user_media/Services/Energy_and_Climate_Change/ Cost: Free Language: English References: Measuring Energy Access: Supporting a Global Target[1] "This paper first describes the relevant context, definitions, data, and links to national policies and energy planning. Section 2 reviews relevant development and energy metrics. Several options for measuring energy access are then presented in section 3. Finally, Section 4 offers thoughts on

486

OpenEI:Utility data access map | Open Energy Information  

Open Energy Info (EERE)

Utility data access map Utility data access map Jump to: navigation, search Ret Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored and the overall map will become more complete. Try searching for your utility company to see your electricity data access options.

487

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 Automotive Accessibility and Efficiency Meet in the Innovative MV-1 March 11, 2011 - 4:03pm Addthis The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group The MV-1, a new wheelchair accessible, fuel-efficient vehicle | Photo Courtesy of Vehicle Production Group Daniel B. Poneman Daniel B. Poneman Deputy Secretary of Energy Yesterday, the Department of Energy announced that we've now finalized a loan for nearly $50 million to the Vehicle Production Group - or VPG. The project will support the development and manufacturing of a new wheelchair accessible, fuel-efficient car, the MV-1, that will run on compressed natural gas instead of gasoline, produce low emissions, and create 900 jobs

488

Burkina Faso Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Faso Energy Access Project Faso Energy Access Project Jump to: navigation, search Name of project Burkina Faso Energy Access Project Location of project Burkina Faso Year initiated 2007 Organization World Bank Website http://documents.worldbank.org Coordinates 12.238333°, -1.561593° References Document[1] Energy Access Project aims to support Burkina Faso's efforts to increase access to, and use of energy services to improve living conditions in selected rural, peri-urban, and urban areas. The project includes the following components : increasing access to electricity services in the urban, peri-urban and rural areas; woodfuels supply management and inter-fuel substitution initiatives; and institutional strengthening, capacity development, and harmonization. References ↑ "Document"

489

Adjudicative Guidelines for Determining Eligibility for Access to  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adjudicative Guidelines for Determining Eligibility for Access to Adjudicative Guidelines for Determining Eligibility for Access to Classified Information Adjudicative Guidelines for Determining Eligibility for Access to Classified Information Introduction. The following adjudicative guidelines are established for all U.S. government civilian and military personnel, consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified information. They apply to persons being considered for initial or continued eligibility for access to classified information, to include sensitive compartmented information and special access programs, and are to be used by government departments and agencies in all final clearance determinations. Government departments and agencies may also choose to

490

Definition: Open Access Same Time Information Service | Open Energy  

Open Energy Info (EERE)

Access Same Time Information Service Access Same Time Information Service Jump to: navigation, search Dictionary.png Open Access Same Time Information Service An electronic posting system that the Transmission Service Provider maintains for transmission access data and that allows all transmission customers to view the data simultaneously.[1] View on Wikipedia Wikipedia Definition Also Known As Open Access Same-Time Information System (OASIS) Related Terms transmission lines, transmission Service Provider, system, electricity generation, transmission line References ↑ Glossary of Terms Used in Reliability Standards An inli LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ne Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Open_Access_Same_Time_Information_Service&oldid=480308"

491

Overview of Access Authorization Process for Applicants, May, 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 Overview of Access Authorization Process for Applicants, May, 2013 May, 2013 This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization. You are a part of a select group of individuals who are being considered for access to classified information maintained by DOE. As you know, the protection of classified information is very important to our national security. Generally, classified information is official information or material that requires protection in

492

Using Microfinance to Expand Access to Energy Services | Open Energy  

Open Energy Info (EERE)

Using Microfinance to Expand Access to Energy Services Using Microfinance to Expand Access to Energy Services Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Using Microfinance to Expand Access to Energy Services Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Renewable Energy Topics: Co-benefits assessment, - Energy Access, Finance Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: waterwiki.net/images/6/65/File_Energy_Summary_FINAL.pdf Language: English References: Using Microfinance to Expand Access to Energy Services[1] Logo: Using Microfinance to Expand Access to Energy Services "To carry out this research, SES and the SEEP Network invited MFIs in Africa, Asia, Latin America and the Caribbean (LAC) to participate in an

493

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

494

IEA-Electricity Access Database | Open Energy Information  

Open Energy Info (EERE)

IEA-Electricity Access Database IEA-Electricity Access Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: IEA-Electricity Access Database Agency/Company /Organization: International Energy Agency (IEA) Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset Website: www.iea.org/weo/electricity.asp Language: English IEA-Electricity Access Database Screenshot References: Electricity Access Database[1] "In a continuing effort to improve our understanding of the electrification process, we have updated, for the fifth time, the database on electrification rates that we first built for WEO-2002. The database shows detailed data on urban and rural electrification collected from industry, national surveys and international sources. Based on this updated analysis,

495

Allegories of Modernity, Geographies of Memory  

E-Print Network (OSTI)

This dissertation examines how postmodernist narratives of memory in Graham Swift's Waterland, Salman Rushdie's Midnight's Children, and Amitav Ghosh's The Shadow Lines retrieve the stories of those who have been lost or forgotten in official history and refigure the temporal and spatial imaginary in intertwining personal stories of crisis with public history through acts of remembering. Questioning the modernist ideology of progress based on the idea of linear sequence of time, the novels not only retrace the heterogeneous and discontinuous layers of stories overlooked or repressed in official accounts of modern history, but also re-examine the contradictory and contested process by which subjects are situated or positioned, and its effects on the production of knowledge. These postmodern historical novels examine history as a discourse and explore its limits. The narrators of the novels are engaged with an autobiographical act of rewriting their lives, but their efforts to reconstitute themselves in unity and continuity are undermined by the disjunctive narrative form of the novels. The layered narrative of memory through which the novels reconstruct modern history is allegorical in the double sense that it exposes the act of signification by decentering the symbol of the transcendental signifier while telling an allegorical story of personal and familial history that mirrors national history in a fragmented way. In Waterland, Tom Crick retells his personal and familial stories intertwined with local and national history as alternative history lessons and challenges the Idea of Progress by revisiting sites of traumatic memory. Midnight's Children constructs counter-stories of Post-Independence India as multiple alternatives to one official version of history and addresses the limits of history in terms of "a border zone of temporality." In The Shadow Lines, the narrator retells his family history as a story of borders through his struggle with gaps in official history and creates a national imaginary with mirror images and events. The postmodernist narrative of memory in these novels turns the time of the now into a time for the "past as to come," a time to detect the unrealized and unfulfilled possibilities of the past, through retellings of the past.

Jeon, Seenhwa

2012-08-01T23:59:59.000Z

496

Nickel porphyrins for memory optical applications  

DOE Patents (OSTI)

The present invention relates to a nickel-porphyrin derivative in a matrix, the nickel-porphyrin derivative comprising at least two conformational isomers, a lower-energy-state conformer and a higher-energy-state conformer, such that when the higher-energy-state conformer is generated from the lower-energy-state conformer following absorption of a photon of suitable energy, the time to return to the lower-energy-state conformer is greater than 40 nanoseconds at approximately room temperature. The nickel-porphyrin derivative is useful in optical memory applications.

Shelnutt, John A. (Tijeras, NM); Jia, Songling (Albuquerque, NM); Medforth, Craig (Vacaville, CA); Holten, Dewey (St. Louis, MO); Nelson, Nora Y. (Manteca, CA); Smith, Kevin M. (Davis, CA)

2000-01-01T23:59:59.000Z

497

Oil Price Trackers Inspired by Immune Memory  

E-Print Network (OSTI)

We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

Wilson, WIlliam; Aickelin, Uwe

2010-01-01T23:59:59.000Z

498

Highly multimode memory in a crystal  

E-Print Network (OSTI)

We experimentally demonstrate the storage of 1060 temporal modes onto a thulium-doped crystal using an atomic frequency comb (AFC). The comb covers 0.93 GHz defining the storage bandwidth. As compared to previous AFC preparation methods (pulse sequences i.e. amplitude modulation), we only use frequency modulation to produce the desired optical pumping spectrum. To ensure an accurate spectrally selective optical pumping, the frequency modulated laser is self-locked on the atomic comb. Our approach is general and should be applicable to a wide range of rare-earth doped material in the context of multimode quantum memory.

Bonarota, M; Chanelière, T

2010-01-01T23:59:59.000Z

499

Highly multimode memory in a crystal  

E-Print Network (OSTI)

We experimentally demonstrate the storage of 1060 temporal modes onto a thulium-doped crystal using an atomic frequency comb (AFC). The comb covers 0.93 GHz defining the storage bandwidth. As compared to previous AFC preparation methods (pulse sequences i.e. amplitude modulation), we only use frequency modulation to produce the desired optical pumping spectrum. To ensure an accurate spectrally selective optical pumping, the frequency modulated laser is self-locked on the atomic comb. Our approach is general and should be applicable to a wide range of rare-earth doped material in the context of multimode quantum memory.

M. Bonarota; J. -L. Le Gouët; T. Chanelière

2010-09-13T23:59:59.000Z

500

China: International Trade and WTO Accession  

E-Print Network (OSTI)

This Working Paper should not be reported as representing the views of the IMF. The views expressed in this Working Paper are those of the author(s) and do not necessarily represent those of the IMF or IMF policy. Working Papers describe research in progress by the author(s) and are published to elicit comments and to further debate. China’s increasing integration with the global economy has contributed to sustained growth in international trade. Its exports have become more diversified, and greater penetration of industrial country markets has been accompanied by a surge in China’s imports from all regions—especially Asia, where China plays an increasingly central role in regional specialization. Tariff reforms have been implemented in China since the 1980s; and, with its recent WTO accession, China has committed itself to additional reforms that are farreaching and challenging. Sustained implementation of these commitments would further deepen China’s international integration and generate benefits for most partner countries.

Thomas Rumbaugh; Nicolas Blancher; International Monetary; Fund Wp; Prepared Thomas Rumbaugh; Nicolas Blancher

2004-01-01T23:59:59.000Z