Sample records for access memory ram

  1. HReRAM: A Hybrid Reconfigurable Resistive Random-Access Memory

    E-Print Network [OSTI]

    Liebling, Michael

    and memristive modes, enabling optimization for both endurance and energy consumption. Our simulation results validate that the proposed hybrid system achieves 1.5-7x reduction in energy consumption in comparisonHReRAM: A Hybrid Reconfigurable Resistive Random-Access Memory Miguel Angel Lastras

  2. Evaluating STT-RAM as an Energy-Efficient Main Memory Alternative

    E-Print Network [OSTI]

    1 Evaluating STT-RAM as an Energy-Efficient Main Memory Alternative Emre K¨ult¨ursay, Mahmut substantial power savings. Towards this goal, we first analyze the performance and energy of STT- RAM write and row buffer write bypass, we show that STT-RAM main memory performance and energy can

  3. Paging memory from random access memory to backing storage in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Inglett, Todd A; Ratterman, Joseph D; Smith, Brian E

    2013-05-21T23:59:59.000Z

    Paging memory from random access memory (`RAM`) to backing storage in a parallel computer that includes a plurality of compute nodes, including: executing a data processing application on a virtual machine operating system in a virtual machine on a first compute node; providing, by a second compute node, backing storage for the contents of RAM on the first compute node; and swapping, by the virtual machine operating system in the virtual machine on the first compute node, a page of memory from RAM on the first compute node to the backing storage on the second compute node.

  4. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  5. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  6. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  7. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    DOE Patents [OSTI]

    Ohmacht, Martin

    2014-09-09T23:59:59.000Z

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  8. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-07-27T23:59:59.000Z

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  9. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02T23:59:59.000Z

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  10. Direct access inter-process shared memory

    DOE Patents [OSTI]

    Brightwell, Ronald B; Pedretti, Kevin; Hudson, Trammell B

    2013-10-22T23:59:59.000Z

    A technique for directly sharing physical memory between processes executing on processor cores is described. The technique includes loading a plurality of processes into the physical memory for execution on a corresponding plurality of processor cores sharing the physical memory. An address space is mapped to each of the processes by populating a first entry in a top level virtual address table for each of the processes. The address space of each of the processes is cross-mapped into each of the processes by populating one or more subsequent entries of the top level virtual address table with the first entry in the top level virtual address table from other processes.

  11. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

    2011-02-15T23:59:59.000Z

    DMA transfer completion notification includes: inserting, by an origin DMA engine on an origin node in an injection first-in-first-out (`FIFO`) buffer, a data descriptor for an application message to be transferred to a target node on behalf of an application on the origin node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying a packet header for a completion notification packet; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; sending, by the origin DMA engine, the completion notification packet to a local reception FIFO buffer using a local memory FIFO transfer operation; and notifying, by the origin DMA engine, the application that transfer of the message is complete in response to receiving the completion notification packet in the local reception FIFO buffer.

  12. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2014-03-18T23:59:59.000Z

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  13. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A.; Miller, Douglas R.

    2013-01-01T23:59:59.000Z

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  14. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2012-10-23T23:59:59.000Z

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  15. Efficient Memory Access with NumPy Global Arrays using Local Memory Access

    SciTech Connect (OSTI)

    Daily, Jeffrey A.; Berghofer, Dan C.

    2013-08-03T23:59:59.000Z

    This paper discusses the work completed working with Global Arrays of data on distributed multi-computer systems and improving their performance. The tasks completed were done at Pacific Northwest National Laboratory in the Science Undergrad Laboratory Internship program in the summer of 2013 for the Data Intensive Computing Group in the Fundamental and Computational Sciences DIrectorate. This work was done on the Global Arrays Toolkit developed by this group. This toolkit is an interface for programmers to more easily create arrays of data on networks of computers. This is useful because scientific computation is often done on large amounts of data sometimes so large that individual computers cannot hold all of it. This data is held in array form and can best be processed on supercomputers which often consist of a network of individual computers doing their computation in parallel. One major challenge for this sort of programming is that operations on arrays on multiple computers is very complex and an interface is needed so that these arrays seem like they are on a single computer. This is what global arrays does. The work done here is to use more efficient operations on that data that requires less copying of data to be completed. This saves a lot of time because copying data on many different computers is time intensive. The way this challenge was solved is when data to be operated on with binary operations are on the same computer, they are not copied when they are accessed. When they are on separate computers, only one set is copied when accessed. This saves time because of less copying done although more data access operations were done.

  16. Improving Data Locality Using Dynamic Page Migration based on Memory Access Histograms

    E-Print Network [OSTI]

    Stamatakis, Alexandros

    Improving Data Locality Using Dynamic Page Migration based on Memory Access Histograms Jie Tao userlevel page migration. It uses memory access histograms gathered by hardware monitors to make applications show the potential for a significant gain in speedup. In addition, a graphical user inter face

  17. CMOS Interface Circuits for Spin Tunneling Junction Based Magnetic Random Access Memories

    SciTech Connect (OSTI)

    Ganesh Saripalli

    2002-12-31T23:59:59.000Z

    Magneto resistive memories (MRAM) are non-volatile memories which use magnetic instead of electrical structures to store data. These memories, apart from being non-volatile, offer a possibility to achieve densities better than DRAMs and speeds faster than SRAMs. MRAMs could potentially replace all computer memory RAM technologies in use today, leading to future applications like instan-on computers and longer battery life for pervasive devices. Such rapid development was made possible due to the recent discovery of large magnetoresistance in Spin tunneling junction devices. Spin tunneling junctions (STJ) are composite structures consisting of a thin insulating layer sandwiched between two magnetic layers. This thesis research is targeted towards these spin tunneling junction based Magnetic memories. In any memory, some kind of an interface circuit is needed to read the logic states. In this thesis, four such circuits are proposed and designed for Magnetic memories (MRAM). These circuits interface to the Spin tunneling junctions and act as sense amplifiers to read their magnetic states. The physical structure and functional characteristics of these circuits are discussed in this thesis. Mismatch effects on the circuits and proper design techniques are also presented. To demonstrate the functionality of these interface structures, test circuits were designed and fabricated in TSMC 0.35{micro} CMOS process. Also circuits to characterize the process mismatches were fabricated and tested. These results were then used in Matlab programs to aid in design process and to predict interface circuit's yields.

  18. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    DOE Patents [OSTI]

    Gala, Alan; Ohmacht, Martin

    2014-09-02T23:59:59.000Z

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  19. The temperature sensitivity of a bistable RAM

    E-Print Network [OSTI]

    Brown, Janet Kay

    1986-01-01T23:59:59.000Z

    is applied to the polycrystalline-silicon resistor of a new bistable RAM cell. The effect of temperature on the resistor is explored with respect to the operation of the RAM cell's refresh mechanism. A temperature range of 0 ? 100'C is investigated... of user defined function, DER 16. TB, fpiy verses doping concentration 17. TB, f ty verses temperature range Page 16 17 26 27' 28 29 30 CHAPTER I INTRODUCTION The search for small, dense memories has led to the dynamic RAM cell which...

  20. Directoryless shared memory architecture using thread migration and remote access

    E-Print Network [OSTI]

    Shim, Keun Sup

    2014-01-01T23:59:59.000Z

    Chip multiprocessors (CMPs) have become mainstream in recent years, and, for scalability reasons, high-core-count designs tend towards tiled CMPs with physically distributed caches. In order to support shared memory, current ...

  1. access memory devices: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Information Sciences Websites Summary: magnetic disks, such as lower access latency, lower power consumption, lack of noise, and shock resistance of traditional...

  2. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A; Mamidala, Amith R

    2014-02-11T23:59:59.000Z

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  3. Fencing direct memory access data transfers in a parallel active messaging interface of a parallel computer

    DOE Patents [OSTI]

    Blocksome, Michael A.; Mamidala, Amith R.

    2013-09-03T23:59:59.000Z

    Fencing direct memory access (`DMA`) data transfers in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI including data communications endpoints, each endpoint including specifications of a client, a context, and a task, the endpoints coupled for data communications through the PAMI and through DMA controllers operatively coupled to segments of shared random access memory through which the DMA controllers deliver data communications deterministically, including initiating execution through the PAMI of an ordered sequence of active DMA instructions for DMA data transfers between two endpoints, effecting deterministic DMA data transfers through a DMA controller and a segment of shared memory; and executing through the PAMI, with no FENCE accounting for DMA data transfers, an active FENCE instruction, the FENCE instruction completing execution only after completion of all DMA instructions initiated prior to execution of the FENCE instruction for DMA data transfers between the two endpoints.

  4. Directoryless Shared Memory Architecture using Thread Migration and Remote Access

    E-Print Network [OSTI]

    Gifford, David K.

    , Mieszko Lis, Omer Khan and Srinivas Devadas Massachusetts Institute of Technology, Cambridge, MA: the data must be brought to the core where the thread is running, incurring delays and energy costs, a database request might result in a series of phases, each consisting of many accesses to contiguous

  5. Renewable Auction Mechanism (RAM)

    Broader source: Energy.gov [DOE]

    The Renewable Auction Mechanism (RAM), approved by the California Public Utilities Commission (CPUC) in December 2010, is expected to result in 1,299 megawatts (MW) of new distributed generation ...

  6. A random access memory immune to single event upset using a T-Resistor

    DOE Patents [OSTI]

    Ochoa, A. Jr.

    1987-10-28T23:59:59.000Z

    In a random access memory cell, a resistance ''T'' decoupling network in each leg of the cell reduces random errors caused by the interaction of energetic ions with the semiconductor material forming the cell. The cell comprises two parallel legs each containing a series pair of complementary MOS transistors having a common gate connected to the node between the transistors of the opposite leg. The decoupling network in each leg is formed by a series pair of resistors between the transistors together with a third resistor interconnecting the junction between the pair of resistors and the gate of the transistor pair forming the opposite leg of the cell. 4 figs.

  7. Analyzing the Energy and Power Consumption of Remote Memory Accesses in the OpenSHMEM Model

    SciTech Connect (OSTI)

    Jana, Siddhartha [University of Houston, Houston] [University of Houston, Houston; Hernandez, Oscar R [ORNL] [ORNL; Poole, Stephen W [ORNL] [ORNL; Hsu, Chung-Hsing [ORNL] [ORNL; Chapman, Barbara [University of Houston, Houston] [University of Houston, Houston

    2014-01-01T23:59:59.000Z

    PGAS models like OpenSHMEM provide interfaces to explicitly initiate one-sided remote memory accesses among processes. In addition, the model also provides synchronizing barriers to ensure a consistent view of the distributed memory at different phases of an application. The incorrect use of such interfaces affects the scalability achievable while using a parallel programming model. This study aims at understanding the effects of these constructs on the energy and power consumption behavior of OpenSHMEM applications. Our experiments show that cost incurred in terms of the total energy and power consumed depends on multiple factors across the software and hardware stack. We conclude that there is a significant impact on the power consumed by the CPU and DRAM due to multiple factors including the design of the data transfer patterns within an application, the design of the communication protocols within a middleware, the architectural constraints laid by the interconnect solutions, and also the levels of memory hierarchy within a compute node. This work motivates treating energy and power consumption as important factors while designing compute solutions for current and future distributed systems.

  8. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

    2007-09-25T23:59:59.000Z

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  9. Ferroelectric tunneling element and memory applications which utilize the tunneling element

    DOE Patents [OSTI]

    Kalinin, Sergei V. (Knoxville, TN) [Knoxville, TN; Christen, Hans M. (Knoxville, TN) [Knoxville, TN; Baddorf, Arthur P. (Knoxville, TN) [Knoxville, TN; Meunier, Vincent (Knoxville, TN) [Knoxville, TN; Lee, Ho Nyung (Oak Ridge, TN) [Oak Ridge, TN

    2010-07-20T23:59:59.000Z

    A tunneling element includes a thin film layer of ferroelectric material and a pair of dissimilar electrically-conductive layers disposed on opposite sides of the ferroelectric layer. Because of the dissimilarity in composition or construction between the electrically-conductive layers, the electron transport behavior of the electrically-conductive layers is polarization dependent when the tunneling element is below the Curie temperature of the layer of ferroelectric material. The element can be used as a basis of compact 1R type non-volatile random access memory (RAM). The advantages include extremely simple architecture, ultimate scalability and fast access times generic for all ferroelectric memories.

  10. Performance improvement of gadolinium oxide resistive random access memory treated by hydrogen plasma immersion ion implantation

    SciTech Connect (OSTI)

    Wang, Jer-Chyi, E-mail: jcwang@mail.cgu.edu.tw; Hsu, Chih-Hsien; Ye, Yu-Ren [Department of Electronic Engineering, Chang Gung University, Kweishan 333, Taoyuan, Taiwan (China); Ai, Chi-Fong; Tsai, Wen-Fa [Institute of Nuclear Energy Research, Atomic Energy Council, Longtan 325, Taoyuan, Taiwan (China)

    2014-03-15T23:59:59.000Z

    Characteristics improvement of gadolinium oxide (Gd{sub x}O{sub y}) resistive random access memories (RRAMs) treated by hydrogen plasma immersion ion implantation (PIII) was investigated. With the hydrogen PIII treatment, the Gd{sub x}O{sub y} RRAMs exhibited low set/reset voltages and a high resistance ratio, which were attributed to the enhanced movement of oxygen ions within the Gd{sub x}O{sub y} films and the increased Schottky barrier height at Pt/Gd{sub x}O{sub y} interface, respectively. The resistive switching mechanism of Gd{sub x}O{sub y} RRAMs was dominated by Schottky emission, as proved by the area dependence of the resistance in the low resistance state. After the hydrogen PIII treatment, a retention time of more than 10{sup 4}?s was achieved at an elevated measurement temperature. In addition, a stable cycling endurance with the resistance ratio of more than three orders of magnitude of the Gd{sub x}O{sub y} RRAMs can be obtained.

  11. Renewable Auction Mechanism (RAM) (California)

    Broader source: Energy.gov [DOE]

    The Renewable Auction Mechanism (RAM), approved by the California Public Utilities Commission (CPUC) in December 2010, is expected to result in 1,299 megawatts (MW) of new distributed generation...

  12. Appeared in Proceedings of First International ACM/IEEE Symposium on Code Generation and Optimization, 2003 Optimizing Memory Accesses For Spatial Computation

    E-Print Network [OSTI]

    Budiu, Mihai

    many efficient and powerful optimizations it cannot be easily applied in the presence of pointers and Optimization, 2003 Optimizing Memory Accesses For Spatial Computation Mihai Budiu and Seth C. Goldstein present the internal representation and optimizations used by the CASH compiler for improving the memory

  13. Ram Village South Chiller Plant

    E-Print Network [OSTI]

    North Carolina at Chapel Hill, University of

    Winston Ram Village South Chiller Plant Dental Craige Campus Alumni Swain Stacy Thermal Student Planetarium Ackland Art Museum Research Chiller D 114 Chase Ave. APCF- Grounds Medical Morehead Stalling- Evans Sports Medicine Center Cobb Hall Ernie School Old Hospital Chiller Hanes Art Coker Wilson Battle

  14. Trip Report: RAM-PAC International

    SciTech Connect (OSTI)

    Jaques, Al; /Fermilab

    1988-09-09T23:59:59.000Z

    In the final design of the DO Detector, the three cryostats (CC and both EC's) will ride on a pair of hardened ways so as to move the EC's out and away from the CC cryostat to provide access between cryostats for repairs and such. Each of the cryostats sits on a carriage which has a pair of Tychoway rollers placed at each corner to roll on the hardened ways. When in position, the full weight of the cryostats is to be relieved from the rollers with the use of a pair of 90-ton jacks flanking the pair of rollers at each corner. Due to confined space, these jacks had to be custom made, triple cylinder, single block units. Five manufacturers were presented with the problem and three came back with proposals. All three satisfied the technical requirements but Ram-Pac International was easily the lowest priced.

  15. Perpendicular spin transfer torque magnetic random access memories with high spin torque efficiency and thermal stability for embedded applications (invited)

    SciTech Connect (OSTI)

    Thomas, Luc, E-mail: luc.thomas@headway.com; Jan, Guenole; Zhu, Jian; Liu, Huanlong; Lee, Yuan-Jen; Le, Son; Tong, Ru-Ying; Pi, Keyu; Wang, Yu-Jen; Shen, Dongna; He, Renren; Haq, Jesmin; Teng, Jeffrey; Lam, Vinh; Huang, Kenlin; Zhong, Tom; Torng, Terry; Wang, Po-Kang [TDK-Headway Technologies, Inc., Milpitas, California 95035 (United States)

    2014-05-07T23:59:59.000Z

    Magnetic random access memories based on the spin transfer torque phenomenon (STT-MRAMs) have become one of the leading candidates for next generation memory applications. Among the many attractive features of this technology are its potential for high speed and endurance, read signal margin, low power consumption, scalability, and non-volatility. In this paper, we discuss our recent results on perpendicular STT-MRAM stack designs that show STT efficiency higher than 5?k{sub B}T/?A, energy barriers higher than 100?k{sub B}T at room temperature for sub-40?nm diameter devices, and tunnel magnetoresistance higher than 150%. We use both single device data and results from 8?Mb array to demonstrate data retention sufficient for automotive applications. Moreover, we also demonstrate for the first time thermal stability up to 400?C exceeding the requirement of Si CMOS back-end processing, thus opening the realm of non-volatile embedded memory to STT-MRAM technology.

  16. Memory abstractions for parallel programming

    E-Print Network [OSTI]

    Lee, I-Ting Angelina

    2012-01-01T23:59:59.000Z

    A memory abstraction is an abstraction layer between the program execution and the memory that provides a different "view" of a memory location depending on the execution context in which the memory access is made. Properly ...

  17. HyRAM Testing Script.

    SciTech Connect (OSTI)

    Parkins, Owen

    2014-12-01T23:59:59.000Z

    The testing script is to provide a method of inspections to HyRAM (v1.0.0.244 Alpha) application features. This document will lead participants through the use of the application to make sure the application performs as designed. If a feature of the application becomes non-working, this script will relay useful information back to the designers of the application so that the feature can be fixed. This is essential to keep the application updated and performing as designed so that the users of this program can be satisfied. There will be frequent updates of this document to ensure proper testing of future application versions.

  18. Ram Power | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro Industries Pvt Ltd Jump to: navigation, search Name: Raghuraji AgroRajaramWyoming: EnergyRam

  19. Evaluation of the colossal electroresistance (CER) effect and its application in the non-volatile Resistive Random Access Memory (RRAM)

    E-Print Network [OSTI]

    Wicaksono, Aulia Tegar

    2009-01-01T23:59:59.000Z

    Flash memory, the current leading technology for non-volatile memory (NVM), is projected by many to run obsolete in the face of future miniaturization trend in the semiconductor devices due to some of its technical ...

  20. HyRAM Testing Strategy and Quality Design Elements.

    SciTech Connect (OSTI)

    Reynolds, John Thomas

    2014-12-01T23:59:59.000Z

    Strategy document and tentative schedule for testing of HyRAM, a software toolkit that integrates data and methods relevant to assessing the safety of hydrogen fueling and storage infrastructure. Because proposed and existing features in HyRAM that support testing are important factors in this discussion, relevant design considerations of HyRAM are also discussed. However, t his document does not cover all of HyRAM desig n, nor is the full HyRAM software development schedule included.

  1. RAMS (Risk Analysis - Modular System) methodology

    SciTech Connect (OSTI)

    Stenner, R.D.; Strenge, D.L.; Buck, J.W. [and others

    1996-10-01T23:59:59.000Z

    The Risk Analysis - Modular System (RAMS) was developed to serve as a broad scope risk analysis tool for the Risk Assessment of the Hanford Mission (RAHM) studies. The RAHM element provides risk analysis support for Hanford Strategic Analysis and Mission Planning activities. The RAHM also provides risk analysis support for the Hanford 10-Year Plan development activities. The RAMS tool draws from a collection of specifically designed databases and modular risk analysis methodologies and models. RAMS is a flexible modular system that can be focused on targeted risk analysis needs. It is specifically designed to address risks associated with overall strategy, technical alternative, and `what if` questions regarding the Hanford cleanup mission. RAMS is set up to address both near-term and long-term risk issues. Consistency is very important for any comparative risk analysis, and RAMS is designed to efficiently and consistently compare risks and produce risk reduction estimates. There is a wide range of output information that can be generated by RAMS. These outputs can be detailed by individual contaminants, waste forms, transport pathways, exposure scenarios, individuals, populations, etc. However, they can also be in rolled-up form to support high-level strategy decisions.

  2. SECURITY REFRESH: PROTECTING PHASE-CHANGE MEMORY AGAINST

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    SOFTWARE. ......Given the grim prospect of technology scaling in flash memories and dynamic RAM (DRAM), designers are seeking alternative memory technologies to continue the prophecy of Moore's law for memories device totally useless in a matter of minutes because it has a faster ac- cess speed than flash

  3. We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)

    E-Print Network [OSTI]

    Saxena, Nitesh

    2009-01-01T23:59:59.000Z

    Random number generation is a fundamental security primitive for RFID devices. However, even this relatively simple requirement is beyond the capacity of today's average RFID tag. A recently proposed solution, Fingerprint Extraction and Random Number Generation in SRAM (FERNS) [14, 15], involves the use of onboard RAM as the source of "true" randomness. Unfortunately, practical considerations prevent this approach from reaching its full potential. First, this method must compete with other system functionalities for use of memory. Thus, the amount of uninitialized RAM available for utilization as a randomness generator may be severely restricted. Second, RAM is subject to data remanence; there is a time period after losing power during which stored data remains intact in memory. This means that after a portion of memory has been used for entropy collection once it will require a relatively extended period of time without power before it can be reused. In a usable RFID based security application, which require...

  4. appraisal measure ram: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are characterized by kinematic modes of even order, m0 and m2, corresponding to a ram wind perpendicular and parallel to the gas disk, respectively. Long-term consequences of ram...

  5. The form, function, and interrelationships of naval rams: a study of naval rams from antiquity

    E-Print Network [OSTI]

    Pridemore, Matthew Garnett

    1996-01-01T23:59:59.000Z

    The discovery of several naval rams from sites around the Mediterranean has given scholars a brief glimpse of one of the most widely used naval weapons of the ancient world. Examining these physical examples provides information that is unavailable...

  6. Static Performance of Power Augmented Ram Platform

    E-Print Network [OSTI]

    Collins, Gary S.

    Static Performance of Power Augmented Ram Platform Eliana Rodriguez (Advisor: Dr. Matveev) REU Site experiment that was conducted similar to the first experiment, but instead of a straight platform, a slanted platform positioned at five degrees to a horizontal plane was used. As before, an air nozzle

  7. The form, function, and interrelationships of naval rams: a study of naval rams from antiquity

    E-Print Network [OSTI]

    Pridemore, Matthew Garnett

    1996-01-01T23:59:59.000Z

    . C. ). (Afier van Doorninck, 1982, fig. 7) . . . . . . . . . . . . . . . . . . . . . . . Fig. 4. Ship types depicted on Medmet Habu relief (c. 1200 B. C. ). (After Wachsmann, 1981, figs. 3 and 4...) . . . . . . . . . . . . :. .. . . . . . . . . . . . . . . . . . . 11 Fig. 5. Possible ramming scene (c. 760-735 B. C. ). (After Morrison and Wdliams, 1968, pl. 2B) . . . . . . 18 Fig. 6. Ship equipped with pomted ram (c. 760-735 B. C. ). (Afier Morrison and Williams, 1968, pL 1E...

  8. Ram pressure stripping of tilted galaxies

    E-Print Network [OSTI]

    Jachym, P; Palous, J; Combes, F

    2009-01-01T23:59:59.000Z

    Ram pressure stripping of galaxies in clusters can yield gas deficient disks. Previous numerical simulations based on various approaches suggested that, except for near edge-on disk orientations, the amount of stripping depends very little on the inclination angle. Following our previous study of face-on stripping, we extend the set of parameters with the disk tilt angle and explore in detail the effects of the ram pressure on the interstellar content (ISM) of tilted galaxies that orbit in various environments of clusters, with compact or extended distributions of the intra-cluster medium (ICM). We further study how results of numerical simulations could be estimated analytically. A grid of numerical simulations with varying parameters is produced using the tree/SPH code GADGET with a modified method for calculating the ISM-ICM interaction. These SPH calculations extend the set of existing results obtained from different codes using various numerical techniques. The simulations confirm the general trend of le...

  9. Wakes of ram pressure stripped disc galaxies

    E-Print Network [OSTI]

    E. Roediger; M. Brueggen; M. Hoeft

    2006-03-21T23:59:59.000Z

    Spiral galaxies that move through the intracluster medium lose a substantial amount of their gas discs due to ram pressure stripping. The recent observations of NGC 4388 by Oosterloo & van Gorkom 2005 reveal a tail of stripped gas of ~ 100 kpc behind the source galaxy. We present first 3D hydrodynamical simulations of the evolution of such ram pressure stripped tails. We find that if the ICM wind does not vary significantly over a period of a few 100 Myr, subsonic galaxies produce a tail with regular features similar to a von-Karman vortex street. In this case, the tail widens systematically by about 45 kpc per 100 kpc distance behind the source galaxy. The widening rate is independent of the galaxy's inclination for a large range of inclinations. For supersonic galaxies, the tail is more irregular than for subsonic ones. The tail observed for NGC 4388 is narrower than the tails in our simulations. Reasons for this difference may be additional physical processes such as heat conduction or viscosity. In addition, we conclude that the observed S-shape of this tail is not due to von Karman oscillations, because this galaxy is likely to move supersonically. A reason for the observed shape may be motions in the ambient ICM. Finally, we discuss implications for the distribution of metals in the ICM due to ram pressure stipping.

  10. Low leakage Ru-strontium titanate-Ru metal-insulator-metal capacitors for sub-20?nm technology node in dynamic random access memory

    SciTech Connect (OSTI)

    Popovici, M., E-mail: Mihaela.Ioana.Popovici@imec.be; Swerts, J.; Redolfi, A.; Kaczer, B.; Aoulaiche, M.; Radu, I.; Clima, S.; Everaert, J.-L.; Van Elshocht, S.; Jurczak, M. [Imec, Leuven 3001 (Belgium)

    2014-02-24T23:59:59.000Z

    Improved metal-insulator-metal capacitor (MIMCAP) stacks with strontium titanate (STO) as dielectric sandwiched between Ru as top and bottom electrode are shown. The Ru/STO/Ru stack demonstrates clearly its potential to reach sub-20?nm technology nodes for dynamic random access memory. Downscaling of the equivalent oxide thickness, leakage current density (J{sub g}) of the MIMCAPs, and physical thickness of the STO have been realized by control of the Sr/Ti ratio and grain size using a heterogeneous TiO{sub 2}/STO based nanolaminate stack deposition and a two-step crystallization anneal. Replacement of TiN with Ru as both top and bottom electrodes reduces the amount of electrically active defects and is essential to achieve a low leakage current in the MIM capacitor.

  11. Performance evaluation of NUMA and COMA distributed shared-memory multiprocessors

    E-Print Network [OSTI]

    Holzrichter, Michael Warren

    1995-01-01T23:59:59.000Z

    Memory architecture is an important component in a distributed shared-memory parallel computer. This thesis studies three shared-memory architectures-Non-Uniform Memory Access (NUMA) with full-mapped directories, Cache-Only Memory Architecture (COMA...

  12. RAM Capital Management Group | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I GeothermalPotentialBiopowerSolidGenerationMethod JumpGeorgia: Energy Resources JumpRAM Capital Management

  13. E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing

    E-Print Network [OSTI]

    Scott, Michael L.

    E cient Use of Memory-Mapped Network Interfaces for Shared Memory Computing Nikolaos Hardavellas@cs.rochester.edu Abstract Memory-mapped network interfaces provide users with fast and cheap access to remote memory access capabilities of these networks suggest the need to re-evaluate the assumptions underlying

  14. Wakes of ram pressure stripped disc galaxies

    E-Print Network [OSTI]

    Roediger, E; Hoeft, M

    2006-01-01T23:59:59.000Z

    Spiral galaxies that move through the intracluster medium lose a substantial amount of their gas discs due to ram pressure stripping. The recent observations of NGC 4388 by Oosterloo & van Gorkom 2005 reveal a tail of stripped gas of ~ 100 kpc behind the source galaxy. We present first 3D hydrodynamical simulations of the evolution of such ram pressure stripped tails. We find that if the ICM wind does not vary significantly over a period of a few 100 Myr, subsonic galaxies produce a tail with regular features similar to a von-Karman vortex street. In this case, the tail widens systematically by about 45 kpc per 100 kpc distance behind the source galaxy. The widening rate is independent of the galaxy's inclination for a large range of inclinations. For supersonic galaxies, the tail is more irregular than for subsonic ones. The tail observed for NGC 4388 is narrower than the tails in our simulations. Reasons for this difference may be additional physical processes such as heat conduction or viscosity. In ad...

  15. Vehicle barrier with access delay

    DOE Patents [OSTI]

    Swahlan, David J; Wilke, Jason

    2013-09-03T23:59:59.000Z

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  16. Memory Optimization for Phase-field Simulations

    SciTech Connect (OSTI)

    Derek Gaston; John Peterson; Andrew Slaughter; Cody Permann; David Andrs

    2014-08-01T23:59:59.000Z

    Phase-field simulations are computationally and memory intensive applications. Many of the phase-field simulations being conducted in support of NEAMS were not capable of running on normal clusters with 2-4GB of RAM per core, and instead required specialized big-memory clusters with 64GB per core. To address this issue, the MOOSE team developed a new Python-based utility called MemoryLogger, and applied it to locate, diagnose, and eradicate memory bottlenecks within the MOOSE framework. MemoryLogger allows for a better understanding of the memory usage of an application being run in parallel across a cluster. Memory usage information is captured for every individual process in a parallel job, and communicated to the head node of the cluster. Console text output from the application itself is automatically matched with this memory usage information to produce a detailed picture of memory usage over time, making it straightforward to identify the subroutines which contribute most to the applications peak memory usage. The information produced by the MemoryLogger quickly and effectively narrows the search for memory optimizations to the most data-intensive parts of the simulation.

  17. New River Geothermal Exploration (Ram Power Inc.)

    SciTech Connect (OSTI)

    Miller, Clay

    2013-11-15T23:59:59.000Z

    The New River Geothermal Exploration (DOE Award No. EE0002843) is located approximately 25km south of the Salton Sea, near town of Brawley in Imperial County and approximately 150km east of San Diego, California. A total of 182 MT Logger sites were completed covering the two separate Mesquite and New River grids. The data was collected over a frequency range of 320Hz to 0.001Hz with variable site spacing. A number of different inversion algorithms in 1D, 2D and 3D were used to produce resistivity-depth profiles and maps of subsurface resistivity variations over the survey area. For 2D inversions, a total of eighteen lines were constructed in east-west and north-south orientations crossing the entire survey area. For MT 3D inversion, the New River property was divided in two sub-grids, Mesquite and New River areas. The report comprises of two parts. For the first part, inversions and geophysical interpretation results are presented with some recommendations of the potential targets for future follow up on the property. The second part of the report describes logistics of the survey, survey parameters, methodology and the survey results (data) in digital documents. The report reviews a Spartan MT survey carried out by Quantec Geoscience Limited over the New River Project in California, USA on behalf of Ram Power Inc. Data was acquired over a period of 29 days from 2010/06/26 to 2010/07/24.

  18. New River Geothermal Exploration (Ram Power Inc.)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Miller, Clay

    The New River Geothermal Exploration (DOE Award No. EE0002843) is located approximately 25km south of the Salton Sea, near town of Brawley in Imperial County and approximately 150km east of San Diego, California. A total of 182 MT Logger sites were completed covering the two separate Mesquite and New River grids. The data was collected over a frequency range of 320Hz to 0.001Hz with variable site spacing. A number of different inversion algorithms in 1D, 2D and 3D were used to produce resistivity-depth profiles and maps of subsurface resistivity variations over the survey area. For 2D inversions, a total of eighteen lines were constructed in east-west and north-south orientations crossing the entire survey area. For MT 3D inversion, the New River property was divided in two sub-grids, Mesquite and New River areas. The report comprises of two parts. For the first part, inversions and geophysical interpretation results are presented with some recommendations of the potential targets for future follow up on the property. The second part of the report describes logistics of the survey, survey parameters, methodology and the survey results (data) in digital documents. The report reviews a Spartan MT survey carried out by Quantec Geoscience Limited over the New River Project in California, USA on behalf of Ram Power Inc. Data was acquired over a period of 29 days from 2010/06/26 to 2010/07/24.

  19. Wrap spring clutch syringe ram and frit mixer

    DOE Patents [OSTI]

    Simpson, Frank B.

    2006-07-25T23:59:59.000Z

    A wrap spring clutch syringe ram pushes at least one syringe with virtually instantaneous starting and stopping, and with constant motion at a defined velocity during the intervening push. The wrap spring clutch syringe ram includes an electric motor, a computer, a flywheel, a wrap spring clutch, a precision lead screw, a slide platform, and syringe reservoirs, a mixing chamber, and a reaction incubation tube. The electric motor drives a flywheel and the wrap spring clutch couples the precision lead screw to the flywheel when a computer enables a solenoid of the wrap spring clutch. The precision lead screw drives a precision slide which causes syringes to supply a portion of solution into the mixing chamber and the incubation tube. The wrap spring clutch syringe ram is designed to enable the quantitative study of solution phase chemical and biochemical reactions, particularly those reactions that occur on the subsecond time scale.

  20. Application of RAM to Facility/Laboratory Design

    SciTech Connect (OSTI)

    Mohammadi, K

    2008-04-14T23:59:59.000Z

    Reliability, Availability, and Maintainability (RAM) studies are extensively used for mission critical systems (e.g., weapons systems) to predict the RAM parameters at the preliminary design phase. A RAM methodology is presented for predicting facility/laboratory inherent availability (i.e., availability that only considers the steady-state effects of design) at the preliminary design phase in support of Department of Energy (DOE) Order 430.1A (Life Cycle Asset Management) and DOE Order 420.1B (Facility Safety). The methodology presented identifies the appropriate system-level reliability and maintainability metrics and discusses how these metrics are used in a fault tree analysis for predicting the facility/laboratory inherent availability. The inherent availability predicted is compared against design criteria to determine if changes to the facility/laboratory preliminary design are necessary to meet the required availability objective in the final design.

  1. The Leadership Cluster Memorial Union

    E-Print Network [OSTI]

    Escher, Christine

    The Leadership Cluster Memorial Union Student Leadership and Involvement Student Media Something New @ OSU #12;Access Diversity "Leadership/Citizenship" Community Connection Health & Wellness Housing & Dining Administrative Leadership #12;Student Leadership & Involvement SLI-Activities Program Club

  2. Cyber Security Major R&D Challenges Ram Krishnan

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Cyber Security Major R&D Challenges Ram Krishnan http://engineering.utsa.edu/~krishnan/ Cyber Security Research Institute (CSRI) Cyber Security R&D Workshop April 19-20, 2012 World-Leading Research with Real-World Impact! Institute for Cyber Security Prof. Ravi Sandhu conveys his regrets for inability

  3. TIME REVERSAL IN CHANGING ENVIRONMENT GUILLAUME BAL AND RAM

    E-Print Network [OSTI]

    Bal, Guillaume

    TIME REVERSAL IN CHANGING ENVIRONMENT GUILLAUME BAL #3; AND RAM #19; ON VER #19; ASTEGUI y Abstract of the refocused signal as the backward propagation medium departs from the forward propagation medium, Wigner transform, changing environment. AMS subject classi#12;cations. 35R60 35L40 78A45 82D30 1

  4. RAM: a Relativistic Adaptive Mesh Refinement Hydrodynamics Code

    SciTech Connect (OSTI)

    Zhang, Wei-Qun; /KIPAC, Menlo Park; MacFadyen, Andrew I.; /Princeton, Inst. Advanced Study

    2005-06-06T23:59:59.000Z

    The authors have developed a new computer code, RAM, to solve the conservative equations of special relativistic hydrodynamics (SRHD) using adaptive mesh refinement (AMR) on parallel computers. They have implemented a characteristic-wise, finite difference, weighted essentially non-oscillatory (WENO) scheme using the full characteristic decomposition of the SRHD equations to achieve fifth-order accuracy in space. For time integration they use the method of lines with a third-order total variation diminishing (TVD) Runge-Kutta scheme. They have also implemented fourth and fifth order Runge-Kutta time integration schemes for comparison. The implementation of AMR and parallelization is based on the FLASH code. RAM is modular and includes the capability to easily swap hydrodynamics solvers, reconstruction methods and physics modules. In addition to WENO they have implemented a finite volume module with the piecewise parabolic method (PPM) for reconstruction and the modified Marquina approximate Riemann solver to work with TVD Runge-Kutta time integration. They examine the difficulty of accurately simulating shear flows in numerical relativistic hydrodynamics codes. They show that under-resolved simulations of simple test problems with transverse velocity components produce incorrect results and demonstrate the ability of RAM to correctly solve these problems. RAM has been tested in one, two and three dimensions and in Cartesian, cylindrical and spherical coordinates. they have demonstrated fifth-order accuracy for WENO in one and two dimensions and performed detailed comparison with other schemes for which they show significantly lower convergence rates. Extensive testing is presented demonstrating the ability of RAM to address challenging open questions in relativistic astrophysics.

  5. Web Accessibility Accessibility

    E-Print Network [OSTI]

    Oklahoma, University of

    Web Accessibility #12;Accessibility Webaim This is a pre-y prolific site that vary based on the type of web content. StaFc, content managed and dynamic web sites can benefit from our accessibility review service. Rich media

  6. A Low-power, Low-memory System for Wavelet-based Image Compression

    E-Print Network [OSTI]

    Walker, James S.

    of the components of our particular method of wavelet transform based image compression. 2 Wavelet transformsA Low-power, Low-memory System for Wavelet-based Image Compression James S. Walker Department the following advan- tages: low-power utilization, low RAM requirements, embedded bit-plane compression, scal

  7. AVTA: Chrysler RAM Experimental PHEV Pickup Truck Recovery Act Project Testing Results- Phase 2

    Broader source: Energy.gov [DOE]

    The following reports describe results of testing done on a 2011 Chrysler RAM PHEV, a demonstration vehicle not currently available for sale.

  8. A Kinematic Measurement of Ram Pressure in the Outer Disk of Regular Galaxies

    E-Print Network [OSTI]

    Haan, Sebastian

    2014-01-01T23:59:59.000Z

    While most ram pressure studies have focused on ram pressure stripping in galaxy clusters, we devise a novel approach based on a kinematic measurement of ram pressure perturbations in HI velocity fields for intergalactic material (IGM) densities and relative velocities that are one to two orders of magnitude lower than in galaxies showing ram pressure stripping. Our model evaluates ram pressure induced kinematic terms in gas disks with constant inclination as well as those with a warped geometry. Ram pressure perturbations are characterized by kinematic modes of even order, m=0 and m=2, corresponding to a ram wind perpendicular and parallel to the gas disk, respectively. Long-term consequences of ram pressure, such as warped disks as well as uncertainties in the disk geometry typically generate uneven modes (m=1 and m=3), that are clearly distinguishable from the kinematic ram pressure terms. We have applied our models to three nearby isolated galaxies, utilizing Markov Chain Monte Carlo fitting routines to d...

  9. Data Partitioning for Reconfigurable Architectures with Distributed Block RAM Wenrui Gong Gang Wang Ryan Kastner

    E-Print Network [OSTI]

    Sherwood, Tim

    Data Partitioning for Reconfigurable Architectures with Distributed Block RAM Wenrui Gong Gang Wang {gong, wanggang, kastner}@ece.ucsb.edu Abstract Modern, high performance reconfigurable architectures

  10. Siri Ram Syal Hydro Power Pvt Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with form HistoryRistmaSinosteel Corporation Jump to: navigation,Siri Ram Syal

  11. Carbon Dioxide Capture from Coal-Fired Power Plants: A Real Options Analysis Ram Chandra Sekar

    E-Print Network [OSTI]

    Carbon Dioxide Capture from Coal-Fired Power Plants: A Real Options Analysis by Ram Chandra Sekar;2 #12;3 Carbon Dioxide Capture in Coal-Fired Power Plants: A Real Options Analysis by Ram Chandra Sekar less expensive (pre-investment IGCC). All coal-fired power plants can be retrofitted to capture CO2

  12. Enhancing Compiler Techniques for Memory Energy Optimizations

    E-Print Network [OSTI]

    Kuzmanovic, Aleksandar

    in the total energy consumption equation. 1 Introduction As the market for embedded systems continues to grow for Memory Energy Optimizations 365 tend to increase code size. This increased code size is an important. An increase in instruction memory size, in turn, increases both per access dynamic energy consumption and leak

  13. RAM analysis helps cut turbine-generator systems costs

    SciTech Connect (OSTI)

    Cockerill, A.W. (Delta Tech. Systems, Cobourg, Ontario (CA)); Lavoie, M. (Ontario Hydro, Tiverton, Ontario (CA))

    1990-07-01T23:59:59.000Z

    Maintenance is effective when it improves equipment availability and reduces costs. Reduced costs stem from increased availability, which is the primary objective of this study. As a result, overall operating costs decrease. RAM analysis requires a logical approach to the problem through the use of techniques such as FMEA, FTA and goal trees. To illustrate the steps of this method, the authors used a simplified T-G system. This method is to rank critical components in terms of the severity of failure. On the basis of ranking, it is possible to assign the preventive maintenance tasks in order of priority. Other options are available. Examples are revised procedures, more detailed outage plans using PC-based programs and better spare parts management.

  14. Reversible harmless interruption of testicular blood supply in the ram

    SciTech Connect (OSTI)

    van Vliet, J.; De Ruiter-Bootsma, A.L.; Oei, Y.H.; Hoekstra, A.; De Rooij, D.G.; Wensing, C.J.

    1987-03-01T23:59:59.000Z

    An effective method of interrupting testicular blood flow temporarily and repeatedly in the ram has been developed. Blockade of flow has been achieved mechanically by an inflatable occluder placed around the testicular artery at the level of the spermatic cord. The effect of the blockade on total testicular blood supply was investigated using Doppler flowmetry and a percutaneous Xenon-133 injection method. With both approaches, the blood flow changes after inflation or deflation of the occluders could be estimated satisfactorily. A substantial decrease of testicular blood flow was achieved in eight of the 10 testes with inflated occluders. However, there were indications that in the remaining two testes blockade of the arterial flow was not complete. After deflation of the occluders, blood flow was restored rapidly and completely in all testes. Macro- and microscopic examinations revealed no long-term damage to the testis after blood flow interruptions lasting 30 or 60 minutes.

  15. System and method for programmable bank selection for banked memory subsystems

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Hoenicke, Dirk (Seebruck-Seeon, DE); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Sugavanam, Krishnan (Mahopac, NY)

    2010-09-07T23:59:59.000Z

    A programmable memory system and method for enabling one or more processor devices access to shared memory in a computing environment, the shared memory including one or more memory storage structures having addressable locations for storing data. The system comprises: one or more first logic devices associated with a respective one or more processor devices, each first logic device for receiving physical memory address signals and programmable for generating a respective memory storage structure select signal upon receipt of pre-determined address bit values at selected physical memory address bit locations; and, a second logic device responsive to each of the respective select signal for generating an address signal used for selecting a memory storage structure for processor access. The system thus enables each processor device of a computing environment memory storage access distributed across the one or more memory storage structures.

  16. Rise and fall of a tactic: the ram in nineteenth century naval doctrine

    E-Print Network [OSTI]

    Johnson, Robert Leroy

    1989-01-01T23:59:59.000Z

    collision between a steamer and another vessel at anchor which resulted in the sinking of the latter. In 1846, George L. Schuyler proposed a ram to Congress, supporting his concept with the evidence of two maritime accidents. The first occurred when... THE EMERGENCE OF THE RAM IN THE 1860'S About 1860, two important events happened that mark a new phase in the history of the ram, as well as naval history in general. In 1858, the French laid down the first ocean-going ironclad warship, the Gloire, to which...

  17. 1 A Case for Intelligent RAM: IRAM (To appear in IEEE Micro, April 1997) A Case for Intelligent RAM: IRAM

    E-Print Network [OSTI]

    Yelick, Katherine

    . Introduction and Why there is a Problem The division of the semiconductor industry into microprocessor system performance. System architects have attempted to bridge the processormemory performance gap

  18. Relationships between wool follicle, fleece and body characteristics of Rambouillet rams

    E-Print Network [OSTI]

    Kott, Rodney Wade

    1976-01-01T23:59:59.000Z

    of MASTER OF SCIENCE August 1976 Major Subject: Animal Science RELATIONSHIPS BETWEEN WOOL FOLLICLE, FLEECE AND BODY CHARACTERISTICS OF RAMBOUILLET RAMS A Thesi. s by RODNEY WADE KOTT Approved as to style and content by: (Chairman of Committee...) (Head o f Dep ar tm nt) ~j 7 (Member) (Memb er) August 1976 ABSTRACT Relationships Between Wool Follicle, Fleece and Body Characteristics of Rambouillet Rams. (August 1976) Rodney Wade Kott, B ~ S ~ , Texas A&M University Chairman of Advisory...

  19. Circuit design for embedded memory in low-power integrated circuits

    E-Print Network [OSTI]

    Qazi, Masood

    2012-01-01T23:59:59.000Z

    This thesis explores the challenges for integrating embedded static random access memory (SRAM) and non-volatile memory-based on ferroelectric capacitor technology-into lowpower integrated circuits. First considered is the ...

  20. An Efficient Transparent Test Scheme for Embedded Word-Oriented Memories

    E-Print Network [OSTI]

    Li, Jin-Fu; Wey, Chin-Long

    2011-01-01T23:59:59.000Z

    Memory cores are usually the densest portion with the smallest feature size in system-on-chip (SOC) designs. The reliability of memory cores thus has heavy impact on the reliability of SOCs. Transparent test is one of useful technique for improving the reliability of memories during life time. This paper presents a systematic algorithm used for transforming a bit-oriented march test into a transparent word-oriented march test. The transformed transparent march test has shorter test complexity compared with that proposed in the previous works [Theory of transparent BIST for RAMs, A transparent online memory test for simultaneous detection of functional faults and soft errors in memories]. For example, if a memory with 32-bit words is tested with March C-, time complexity of the transparent word-oriented test transformed by the proposed scheme is only about 56% or 19% time complexity of the transparent word-oriented test converted by the scheme reported in [Theory of transparent BIST for RAMs] or [A transparent...

  1. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN), Blocksome; Michael A. (Rochester, MN), Parker; Jeffrey J. (Rochester, MN)

    2011-02-15T23:59:59.000Z

    Methods, systems, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA on an origin node in an origin injection FIFO, a data descriptor for an application message; inserting, by the origin DMA, a reflection descriptor in the origin injection FIFO, the reflection descriptor specifying a remote get operation for injecting a completion notification descriptor in a reflection injection FIFO on a reflection node; transferring, by the origin DMA to a target node, the message in dependence upon the data descriptor; in response to completing the message transfer, transferring, by the origin DMA to the reflection node, the completion notification descriptor in dependence upon the reflection descriptor; receiving, by the origin DMA from the reflection node, a completion packet; and notifying, by the origin DMA in response to receiving the completion packet, the origin node's processing core that the message transfer is complete.

  2. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Parker, Jeffrey J. (Rochester, MN)

    2010-08-17T23:59:59.000Z

    Methods, apparatus, and products are disclosed for DMA transfer completion notification that include: inserting, by an origin DMA engine on an origin compute node in an injection FIFO buffer, a data descriptor for an application message to be transferred to a target compute node on behalf of an application on the origin compute node; inserting, by the origin DMA engine, a completion notification descriptor in the injection FIFO buffer after the data descriptor for the message, the completion notification descriptor specifying an address of a completion notification field in application storage for the application; transferring, by the origin DMA engine to the target compute node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that the transfer of the message is complete, including performing a local direct put operation to store predesignated notification data at the address of the completion notification field.

  3. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target...

  4. 1. Karan K. Mehta, Jason S. Orcutt, and Rajeev J. Ram, "Fano line shapes in transmission spectra of silicon photonic crystal resonators," Applied Physics Letters, to appear 2013.

    E-Print Network [OSTI]

    Ram, Rajeev J.

    , and R.J. Ram, "Thin Thermoelectric Generator System for Body Energy Harvesting," Journal of Electronic, S.; Ram, R.J.; Juodawlkis, P.W.; , "Super-Homogeneous Saturation of Microwave-Photonic Gain

  5. Flexible and Transparent Memory

    E-Print Network [OSTI]

    KIM, SUNG MIN

    2012-01-01T23:59:59.000Z

    H. Seo and K. L. Wang. , Flexible and Transparent Memory2] S. Kim and J. Lee Flexible Organic Transistor MemoryMemory Transistors for Flexible Sensor Arrays Science, Vol.

  6. A Robust RAM-THP Architecture for Downlink Multiuser MISO Transmission with User Scheduling

    E-Print Network [OSTI]

    Gulak, P. Glenn

    A Robust RAM-THP Architecture for Downlink Multiuser MISO Transmission with User Scheduling Saeed-Forcing Tomlinson-Harashima Precoding (ZF-THP) for multi-user trans- mission in a multiple-input-single-output (MU-MISO-THP, zero-forcing, multi- user MISO, precoding, scheduling. I. INTRODUCTION Multiple-Input Multiple

  7. Evaluating the Health of California's Loop Sensor Network Ram Rajagopal1 and Pravin Varaiya

    E-Print Network [OSTI]

    Varaiya, Pravin

    Evaluating the Health of California's Loop Sensor Network Ram Rajagopal1 and Pravin Varaiya The California Department of Transportation (Caltrans) freeway sensor network has two compo- nents: the sensor system of 25,000 inductive loop sensors grouped into 8,000 vehicle detector sta- tions (VDS) and covering

  8. Minority-Carrier Thermoelectric Devices Kevin P. Pipe and Rajeev J. Ram

    E-Print Network [OSTI]

    Minority-Carrier Thermoelectric Devices Kevin P. Pipe and Rajeev J. Ram Research Laboratory the thermoelectric performance of the electronic devices themselves. Recognizing that minority carriers play for thermoelectric effects in a p-n diode (a prototypical electronic and optoelectronic component) where diffusion

  9. A Generalization of the Entropy Power Inequality with Applications \\Lambda Ram Zamir and Meir Feder

    E-Print Network [OSTI]

    Zamir, Ram

    Gaussian vector with independent components becomes ``closer'' to Gaussianity after a linear transformation, where Power Inequality Consider the (joint) differentialentropy h(Ax), of a linear transformation y = AxA Generalization of the Entropy Power Inequality with Applications \\Lambda Ram Zamir and Meir Feder

  10. 3D Tracking of Human Locomotion: A Tracking as Recognition Approach Tao Zhao Ram Nevatia

    E-Print Network [OSTI]

    Southern California, University of

    3D Tracking of Human Locomotion: A Tracking as Recognition Approach Tao Zhao Ram Nevatia, tracking re- quires knowledge of initial state; this is a difficult problem and a user often specifies it manually. These difficulties call for stronger prior knowledge on the motion being studied and stronger

  11. architectural accessibility: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Decoupled Access DRAM Architecture CiteSeer Summary: This paper discusses an approach to reducing memory latency in...

  12. Optical memory

    DOE Patents [OSTI]

    Mao, Samuel S; Zhang, Yanfeng

    2013-07-02T23:59:59.000Z

    Optical memory comprising: a semiconductor wire, a first electrode, a second electrode, a light source, a means for producing a first voltage at the first electrode, a means for producing a second voltage at the second electrode, and a means for determining the presence of an electrical voltage across the first electrode and the second electrode exceeding a predefined voltage. The first voltage, preferably less than 0 volts, different from said second voltage. The semiconductor wire is optically transparent and has a bandgap less than the energy produced by the light source. The light source is optically connected to the semiconductor wire. The first electrode and the second electrode are electrically insulated from each other and said semiconductor wire.

  13. Predicting carcass cutability of Rambouillet rams using live or carcass measures

    E-Print Network [OSTI]

    Snowder, Gary Douglas

    1980-01-01T23:59:59.000Z

    and hind weights were repeated three times. Muscling and finish scores were calculated from 8 to 12 judges. Repeatabiiity of these measures was computed by analysis of variance of between individuals and between measurements, within individuals (Becker...PREDICTING CARCASS CUTABILITY OF RAMBOUILLET RAMS USING LIVE OR CARCASS MEASURES A Thesis by GARY DOUGLAS SNOIVDER Submitted to the Graduate College of Texas ABM University in partial fulfillment of the requirement for the degree of MASTER...

  14. Incentives for use of inelastic analysis in RAM transport container design

    SciTech Connect (OSTI)

    Ammerman, D.J.; Heinstein, M.W.

    1992-12-31T23:59:59.000Z

    The use of inelastic analysis methods instead of the traditional elastic analysis methods in the design of radioactive material (RAM) transport packagings leads to a better understanding of the response ofthe package to mechanical loadings. Thus, better assessment of the containment, thermal protection, and shielding integrity of the package after a structural accident event can be made. A more accurate prediction of the package response can lead to enhanced safety and also allow for a more efficient use of materials, possibly leading to a package with higher capacity and/or lower weight. This paper discusses the incentives for using inelastic analysis in the design of RAM shipping packages. Inelastic analysis provides an improved knowledge of the package behavior. It must be demonstrated that the use of inelastic analysis provides a better design to overcome the difficulties associated with this type of analysis. In this paper, comparisons between elastic and inelastic analyses are made to illustrate the differences in the two analysis techniques for two different types of packages. One is a package to transport a large quantity of RAM by rail with lead gamma shielding,and the other is a package to transport RAM by truck with depleteduranium gamma shielding. Analyses of the center-of-gravity-over-corner impacts will be compared for each package. The comparisons indicate thata package designed to just meet the elastic design criteria will actually undergo some yielding in the locations of highest stress. This results in two consequences in the predicted behavior of the cask. First,the overprediction of the stiffness of these yielded regions by theelastic analysis technique results in an underestimation of the stresses in other portions of the structure. Secondly, in an inelastic analysis, the yielding of a portion of a structure causes the force in thatregion to rise less rapidly than forces in adjacent regions.

  15. Incentives for use of inelastic analysis in RAM transport container design

    SciTech Connect (OSTI)

    Ammerman, D.J.; Heinstein, M.W.

    1992-01-01T23:59:59.000Z

    The use of inelastic analysis methods instead of the traditional elastic analysis methods in the design of radioactive material (RAM) transport packagings leads to a better understanding of the response ofthe package to mechanical loadings. Thus, better assessment of the containment, thermal protection, and shielding integrity of the package after a structural accident event can be made. A more accurate prediction of the package response can lead to enhanced safety and also allow for a more efficient use of materials, possibly leading to a package with higher capacity and/or lower weight. This paper discusses the incentives for using inelastic analysis in the design of RAM shipping packages. Inelastic analysis provides an improved knowledge of the package behavior. It must be demonstrated that the use of inelastic analysis provides a better design to overcome the difficulties associated with this type of analysis. In this paper, comparisons between elastic and inelastic analyses are made to illustrate the differences in the two analysis techniques for two different types of packages. One is a package to transport a large quantity of RAM by rail with lead gamma shielding,and the other is a package to transport RAM by truck with depleteduranium gamma shielding. Analyses of the center-of-gravity-over-corner impacts will be compared for each package. The comparisons indicate thata package designed to just meet the elastic design criteria will actually undergo some yielding in the locations of highest stress. This results in two consequences in the predicted behavior of the cask. First,the overprediction of the stiffness of these yielded regions by theelastic analysis technique results in an underestimation of the stresses in other portions of the structure. Secondly, in an inelastic analysis, the yielding of a portion of a structure causes the force in thatregion to rise less rapidly than forces in adjacent regions.

  16. DEVELOPMENT OF BURN TEST SPECIFICATIONS FOR FIRE PROTECTION MATERIALS IN RAM PACKAGES

    SciTech Connect (OSTI)

    Gupta, N.

    2010-03-03T23:59:59.000Z

    The regulations in 10 CFR 71 require that the radioactive material (RAM) packages must be able to withstand specific fire conditions given in 10 CFR 71.73 during Hypothetical Accident Conditions (HAC). This requirement is normally satisfied by extensive testing of full scale test specimens under required test conditions. Since fire test planning and execution is expensive and only provides a single snapshot into a package performance, every effort is made to minimize testing and supplement tests with results from computational thermal models. However, the accuracy of such thermal models depends heavily on the thermal properties of the fire insulating materials that are rarely available at the regulatory fire temperatures. To the best of authors knowledge no test standards exist that could be used to test the insulating materials and derive their thermal properties for the RAM package design. This paper presents a review of the existing industry fire testing standards and proposes testing methods that could serve as a standardized specification for testing fire insulating materials for use in RAM packages.

  17. System Verification Through Reliability, Availability, Maintainability (RAM) Analysis & Technology Readiness Levels (TRLs)

    SciTech Connect (OSTI)

    Emmanuel Ohene Opare, Jr.; Charles V. Park

    2011-06-01T23:59:59.000Z

    The Next Generation Nuclear Plant (NGNP) Project, managed by the Idaho National Laboratory (INL), is authored by the Energy Policy Act of 2005, to research, develop, design, construct, and operate a prototype fourth generation nuclear reactor to meet the needs of the 21st Century. A section in this document proposes that the NGNP will provide heat for process heat applications. As with all large projects developing and deploying new technologies, the NGNP is expected to meet high performance and availability targets relative to current state of the art systems and technology. One requirement for the NGNP is to provide heat for the generation of hydrogen for large scale productions and this process heat application is required to be at least 90% or more available relative to other technologies currently on the market. To reach this goal, a RAM Roadmap was developed highlighting the actions to be taken to ensure that various milestones in system development and maturation concurrently meet required availability requirements. Integral to the RAM Roadmap was the use of a RAM analytical/simulation tool which was used to estimate the availability of the system when deployed based on current design configuration and the maturation level of the system.

  18. Instruction sets for Parallel Random Access Machines

    SciTech Connect (OSTI)

    Trahan, J.L.

    1988-01-01T23:59:59.000Z

    The computational powers of time-bounded Parallel Random Access Machines (PRAMs) with different instruction sets are compared. A basic PRAM can perform the following operations in unit-time: addition, subtraction, Boolean operations, comparisons, and indirect addressing. Multiple processors may concurrently read and concurrently write a single cell. This thesis establishes that the class of languages accepted in polynomial time on a PRAM(*, {up arrow}, {down arrow}) contains the class of languages accepted in exponential time on a nondeterministic Turing machine (NEXPTIME) and is contained in the class of languages accepted in exponential space on a Turing machine. Efficient simulations are presented of PRAMs with enhanced instruction sets by sequential RAMs with the same instruction sets; also simulations of probabilistic PRAMs by deterministic PRAMs, using parallelism to replace randomness. Also given are simulations of PRAM(op)s by PRAMs, where both the simulated machine and the simulating machine are exclusive-read, exclusive-write machines.

  19. Edison memory upgrade

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Edison memory upgraded during the maintenance in Jan 13-16, 2015 Edison memory upgraded during the maintenance in Jan 13-16, 2015 January 16, 2015 (0 Comments) Edison compute node...

  20. Drifting absence :: drafting memory

    E-Print Network [OSTI]

    Kuhn, Marlene Eva

    2006-01-01T23:59:59.000Z

    The emotive power of a memorial derives from its ability to engage the viewer in active remembrance. The project considers the limitations of a monumentality which embraces a distinct division between viewer and memorial. ...

  1. Using DMA for copying performance counter data to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W

    2013-12-31T23:59:59.000Z

    A device for copying performance counter data includes hardware path that connects a direct memory access (DMA) unit to a plurality of hardware performance counters and a memory device. Software prepares an injection packet for the DMA unit to perform copying, while the software can perform other tasks. In one aspect, the software that prepares the injection packet runs on a processing core other than the core that gathers the hardware performance data.

  2. Waste Feed Delivery System Phase 1 Preliminary RAM Analysis [SEC 1 and 2

    SciTech Connect (OSTI)

    DYKES, A.A.

    2000-10-11T23:59:59.000Z

    This report presents the updated results of the preliminary reliability, availability, and maintainability (RAM) analysis of selected waste feed delivery (WFD) operations to be performed by the Tank Farm Contractor (TFC) during Phase I activities in support of the Waste Treatment and Immobilization Plant (WTP). For planning purposes, waste feed tanks are being divided into five classes in accordance with the type of waste in each tank and the activities required to retrieve, qualify, and transfer waste feed. This report reflects the baseline design and operating concept, as of the beginning of Fiscal Year 2000, for the delivery of feed from three of these classes, represented by source tanks 241-AN-102, 241-AZ-101 and 241-AN-105. The preliminary RAM analysis quantifies the potential schedule delay associated with operations and maintenance (OBM) field activities needed to accomplish these operations. The RAM analysis is preliminary because the system design, process definition, and activity planning are in a state of evolution. The results are being used to support the continuing development of an O&M Concept tailored to the unique requirements of the WFD Program, which is being documented in various volumes of the Waste Feed Delivery Technical Basis (Carlson. 1999, Rasmussen 1999, and Orme 2000). The waste feed provided to the WTP must: (1) meet limits for chemical and radioactive constituents based on pre-established compositional envelopes (i.e., feed quality); (2) be in acceptable quantities within a prescribed sequence to meet feed quantities; and (3) meet schedule requirements (i.e., feed timing). In the absence of new criteria related to acceptable schedule performance due to the termination of the TWRS Privatization Contract, the original criteria from the Tank Waste Remediation System (77443s) Privatization Contract (DOE 1998) will continue to be used for this analysis.

  3. Rise and fall of a tactic: the ram in nineteenth century naval doctrine

    E-Print Network [OSTI]

    Johnson, Robert Leroy

    1989-01-01T23:59:59.000Z

    . , 158; "A Royal Navy Officer", "Tactical Results of Recent Naval Construction, " Naval Science, Vol. 2 No. 2 (AP '1, 1873), 1397 Ed d J 2 d, ~0 ~ld 88 ((. o d: JoR M 9, 1869), 20. Baxter, Introduction of the Ironclad Warshi , 100. U. S. , Department...? son ( ~&ember) J. Richard St (Member) L rry D. Hill (He d of Department) December 1989 ABSTRACT Rise and Fall of a Tactic: The Ram in Nineteenth Century Naval Doctrine. (December 1989) Robert Leroy Johnson II, B. A. , Kansas State University...

  4. SeaRAM: A DOE evaluation of maritime accident risk assessment data and methods

    SciTech Connect (OSTI)

    Sprung, J.L.; Ammerman, D.J.; Koski, J.A.

    1998-03-01T23:59:59.000Z

    The SeaRAM Program conducted for the US Department of Energy by Sandia National Laboratories has developed estimates of the frequencies of occurrence of ship fires and ship collisions, the fraction of all ship fires and ship collisions that might be sufficiently severe to challenge the integrity of a Type B spent fuel transportation cask, the magnitude of the radioactive source terms that might be released from a Type B spent fuel transportation cask due to loss of cask integrity, and the magnitude of the radiological consequences that might be caused by the radioactive release.

  5. Metal Enrichment of the Intra-Cluster Medium: Ram-Pressure Stripping of Cluster Galaxies

    E-Print Network [OSTI]

    W. Domainko; W. Kapferer; S. Schindler; E. van Kampen; S. Kimeswenger; M. Mair; M. Ruffert

    2004-05-28T23:59:59.000Z

    We present numerical simulations of the dynamical and chemical evolution of galaxy clusters. X-ray spectra show that the intra-cluster medium contains a significant amount of metals. As heavy elements are produced in the stars of galaxies material from the galaxies must have been expelled to enrich the ambient medium. We have performed hydrodynamic simulations investigating various processes. In this presentation we show the feedback from gas which is stripped from galaxies by ram-pressure stripping. The efficiency, resulting spatial distribution of the metals and the time dependency of this enrichment process on galaxy cluster scale is shown.

  6. Remote File Access 2010

    E-Print Network [OSTI]

    University of Technology, Sydney

    Remote File Access 2010 Mac Users Guide #12;Remote File Access: MAC Users Guide 2010 2 Table Remote File Access 11 Part IV: Using Remote File Access 15 Part V: FAQ 24 #12;Remote File Access: MAC Users Guide 2010 3 1. What is Remote File Access? UTS Remote File Access service is provided to enable

  7. To appear in A. Ram & D.B. Leake, editors, Goal-Driven Learning, MIT Press/Bradford Books. Learning as Goal-Driven Inference

    E-Print Network [OSTI]

    Michalski, Ryszard S.

    "toolbox"), the inferential theory of learning proposes a taxonomy of the types of inferencesTo appear in A. Ram & D.B. Leake, editors, Goal-Driven Learning, MIT Press/Bradford Books. Chapter 21 Learning as Goal-Driven Inference Ryszard S. Michalski and Ashwin Ram 1 Inferential Theory

  8. Practical Thermal Evaluation Methods For HAC Fire Analysis In Type B Radiaoactive Material (RAM) Packages

    SciTech Connect (OSTI)

    Abramczyk, Glenn; Hensel, Stephen J; Gupta, Narendra K.

    2013-03-28T23:59:59.000Z

    Title 10 of the United States Code of Federal Regulations Part 71 for the Nuclear Regulatory Commission (10 CFR Part 71.73) requires that Type B radioactive material (RAM) packages satisfy certain Hypothetical Accident Conditions (HAC) thermal design requirements to ensure package safety during accidental fire conditions. Compliance with thermal design requirements can be met by prototype tests, analyses only or a combination of tests and analyses. Normally, it is impractical to meet all the HAC using tests only and the analytical methods are too complex due to the multi-physics non-linear nature of the fire event. Therefore, a combination of tests and thermal analyses methods using commercial heat transfer software are used to meet the necessary design requirements. The authors, along with his other colleagues at Savannah River National Laboratory in Aiken, SC, USA, have successfully used this 'tests and analyses' approach in the design and certification of several United States' DOE/NNSA certified packages, e.g. 9975, 9977, 9978, 9979, H1700, and Bulk Tritium Shipping Package (BTSP). This paper will describe these methods and it is hoped that the RAM Type B package designers and analysts can use them for their applications.

  9. Accessing PDSF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean WaterAccessing HPSS

  10. Open Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTest and Evaluation |quasicrystals65 (9/12) Page 1 of

  11. Memorial Self-Service A Step-by-Step Guide for

    E-Print Network [OSTI]

    Oyet, Alwell

    on Memorial Self-Service. Step 2: Enter your "User ID" and "PIN" and click Login. First time user. Forgot your PIN? Enter in your User ID and click the Forgot PIN? Button. Follow the steps to reset your PIN. #12;"How do I access Memorial Self-Service?" Step 3: After successfully entering your temporary

  12. Cache directory look-up re-use as conflict check mechanism for speculative memory requests

    DOE Patents [OSTI]

    Ohmacht, Martin

    2013-09-10T23:59:59.000Z

    In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

  13. OPEN ACCESS

    E-Print Network [OSTI]

    Thomas F. Kresina; Robert Lubran

    Abstract: Providing access to and utilization of medication assisted treatment (MAT) for the treatment of opioid abuse and dependence provides an important opportunity to improve public health. Access to health services comprising MAT in the community is fundamental to achieve broad service coverage. The type and placement of the health services comprising MAT and integration with primary medical care including human immunodeficiency virus (HIV) prevention, care and treatment services are optimal for addressing both substance abuse and co-occurring infectious diseases. As an HIV prevention intervention, integrated (same medical record for HIV services and MAT services) MAT with HIV prevention, care and treatment programs provides the best one stop shopping approach for health service utilization. Alternatively, MAT, medical and HIV services can be separately managed but co-located to allow convenient utilization of primary care, MAT and HIV services. A third approach is coordinated care and treatment, where primary care, MAT and HIV services are provided at distinct locations and case managers, peer facilitators, or others promote direct service utilization at the various locations. Developing a continuum of care for patients with opioid dependence throughout

  14. Not All Nanodisk Magnetic Vortices Are Created Equally

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    high-tech community because of their potential application in nonvolatile random access memory (RAM) data storage systems. A team of researchers led by Peter Fischer and Mi-Young...

  15. [MRO] Oligocrystalline Shape Memory Alloys

    E-Print Network [OSTI]

    Chen, Ying

    Copper-based shape memory alloys (SMAs) exhibit excellent shape memory properties in single crystalline form. However, when they are polycrystalline, their shape memory properties are severely compromised by brittle fracture ...

  16. Technology strategy for the semiconductor memory market

    E-Print Network [OSTI]

    Nakamura, Tomohiko

    2012-01-01T23:59:59.000Z

    Solid state memories are used in a variety of applications as data and code storages. A non-volatile memory is a memory that retains information when its power supply is off. Flash memory is a type of nonvolatile memory ...

  17. AVTA: Chrysler RAM Experimental PHEV Pickup Truck Recovery Act Project Testing Results Phase 1

    Broader source: Energy.gov [DOE]

    The Vehicle Technologies Office's Advanced Vehicle Testing Activity carries out testing on a wide range of advanced vehicles and technologies on dynamometers, closed test tracks, and on-the-road. These results provide benchmark data that researchers can use to develop technology models and guide future research and development. The American Recovery and Reinvestment Act supported a number of projects that together made up the largest ever deployment of plug-in electric vehicles and charging infrastructure in the U.S. The following reports describe results of testing done on a 2011 Chrysler RAM PHEV, a demonstration vehicle not currently available for sale. The baseline performance testing provides a point of comparison for the other test results. Taken together, these reports give an overall view of how this vehicle functions under extensive testing. This research was conducted by Idaho National Laboratory.

  18. AVTA: Chrysler RAM Experimental PHEV Pickup Truck Recovery Act project map

    Broader source: Energy.gov [DOE]

    The Vehicle Technologies Office's Advanced Vehicle Testing Activity carries out testing on a wide range of advanced vehicles and technologies on dynamometers, closed test tracks, and on-the-road. These results provide benchmark data that researchers can use to develop technology models and guide future research and development. The American Recovery and Reinvestment Act supported a number of projects that together made up the largest ever deployment of plug-in electric vehicles and charging infrastructure in the U.S. The following map describes the distribution of vehicles for a project with the 2011 Chrysler RAM PHEV, a demonstration vehicle not currently available for sale. This research was conducted by Idaho National Laboratory.

  19. A methodology for memory chip stress levels prediction

    E-Print Network [OSTI]

    Sharma, Kartik

    2006-10-30T23:59:59.000Z

    xiii CODES CODE PROGRAM NAME 1 1206.asm 2 1206ram2.asm 3 1206ram 3.asm 4 1.asm 5 IncrementsRAM.asm 6 IncrementsRAMwdelay.asm 7 Zerosnfswesc.asm 8 Zerosnfswescndelay.asm. SET CODE PROGRAM NAME 9 SRAM more -FLASH... .................................................................................................... x NOMENCLATURE.................................................................................................. xii CODES...................................................................................................................... xiii...

  20. Selection Conditions in Main Memory KENNETH A. ROSS

    E-Print Network [OSTI]

    Ross, Kenneth A.

    Architectures]; H.2.2 [Database Manage- ment]: Physical Design--access methods; H.2.4 [Database Management was supported by National Science Foundation grants IIS-98-12014, IIS-01-20939, EIA-98-76739, and EIA-00 memory. In Proceedings of the ACM Symposium on Principles of Database Systems. ACM, New York, 109

  1. Computer memory management system

    DOE Patents [OSTI]

    Kirk, III, Whitson John (Greenwood, MO)

    2002-01-01T23:59:59.000Z

    A computer memory management system utilizing a memory structure system of "intelligent" pointers in which information related to the use status of the memory structure is designed into the pointer. Through this pointer system, The present invention provides essentially automatic memory management (often referred to as garbage collection) by allowing relationships between objects to have definite memory management behavior by use of coding protocol which describes when relationships should be maintained and when the relationships should be broken. In one aspect, the present invention system allows automatic breaking of strong links to facilitate object garbage collection, coupled with relationship adjectives which define deletion of associated objects. In another aspect, The present invention includes simple-to-use infinite undo/redo functionality in that it has the capability, through a simple function call, to undo all of the changes made to a data model since the previous `valid state` was noted.

  2. Memory with memory: Soft assignment in Genetic Programming

    E-Print Network [OSTI]

    Poli, Riccardo

    Keywords Genetic Programming, Linear GP, Soft assignment, Memory with memory, Symbolic regressionMemory with memory: Soft assignment in Genetic Programming Nicholas Freitag McPhee Division was carried over to most versions of genetic programming (GP) that had state and assignments. This includes

  3. Memory with Memory: Soft Assignment in Genetic Programming

    E-Print Network [OSTI]

    Fernandez, Thomas

    Keywords Genetic Programming, Linear GP, Soft assignment, Memory with memory, Symbolic regressionMemory with Memory: Soft Assignment in Genetic Programming Nicholas Freitag McPhee Division was carried over to most versions of genetic programming (GP) that had state and assignments. This includes

  4. Collective Memory Transfers for Multi-Core Chips

    SciTech Connect (OSTI)

    Michelogiannakis, George; Williams, Alexander; Shalf, John

    2013-11-13T23:59:59.000Z

    Future performance improvements for microprocessors have shifted from clock frequency scaling towards increases in on-chip parallelism. Performance improvements for a wide variety of parallel applications require domain-decomposition of data arrays from a contiguous arrangement in memory to a tiled layout for on-chip L1 data caches and scratchpads. How- ever, DRAM performance suffers under the non-streaming access patterns generated by many independent cores. We propose collective memory scheduling (CMS) that actively takes control of collective memory transfers such that requests arrive in a sequential and predictable fashion to the memory controller. CMS uses the hierarchically tiled arrays formal- ism to compactly express collective operations, which greatly improves programmability over conventional prefetch or list- DMA approaches. CMS reduces application execution time by up to 32% and DRAM read power by 2.2, compared to a baseline DMA architecture such as STI Cell.

  5. An analog memory using a CCD memory cell

    E-Print Network [OSTI]

    Murray, James Ray

    1983-01-01T23:59:59.000Z

    . Charge Storage . B. Charge Transfer C. Charge Injection D. Charge Detection CHAPTER III. DESIGN OF THE 4K ANALOG MEMORY A. Overview of the 4K Analog Memory B. NMOS Process . C. CCD Memory Cell D. Address Decoding . Page iv vi vii I 12 18 23... Gain Buffer . 18. ADC-DAC Loop . 19. Memory with Addressing Scheme 20. Memory with AD Loop and Addressing Scheme Page 13 15 16 17 20 21 24 26 ix 21. Floor Plan of the 4K Analog Memory 22. Overhead Plot of Memory Cell 23. Side View...

  6. Capital Access Program (Vermont)

    Broader source: Energy.gov [DOE]

    The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

  7. Mondriaan memory protection

    E-Print Network [OSTI]

    Witchel, Emmett Jethro, 1970-

    2004-01-01T23:59:59.000Z

    Reliability and security are quickly becoming users' biggest concern due to the increasing reliance on computers in all areas of society. Hardware-enforced, fine-grained memory protection can increase the reliability and ...

  8. Schema and memory consolidation

    E-Print Network [OSTI]

    Tse, Dorothy

    2011-06-27T23:59:59.000Z

    The traditional view of systems memory consolidation is that it is a gradual process that takes place over days or weeks. Within this approach, the hippocampus (HPC) is thought to be involved in the rapid encoding of ...

  9. Profiling Transactional Memory Applications Mohammad Ansari, Kim Jarvis, Christos Kotselidis, Mikel Lujan, Chris Kirkham and Ian Watson

    E-Print Network [OSTI]

    Singer, Jeremy

    Profiling Transactional Memory Applications Mohammad Ansari, Kim Jarvis, Christos Kotselidis, Mikel:{ansari, kotselidis, jarvis, mikel, chris, watson}@cs.manchester.ac.uk Abstract--Transactional Memory (TM) has become multiprocessors [3]. TM requires a programmer to mark code blocks that access shared data as transactions

  10. Motor Representations In Memory And Mental Models: The Embodied Zork Daniel C. Richardson (dcr18@cornell.edu)

    E-Print Network [OSTI]

    Richardson, Daniel C.

    Motor Representations In Memory And Mental Models: The Embodied Zork Daniel C. Richardson (dcr18 suggested that motor systems can participate in what were thought to be purely perceptual tasks. Extending stimulus accessed from memory can activate potential motor interactions. Other research has shown

  11. DESIGN AND IMPLEMENTATION OF AN ORDERED MEMORY ACCESS ARCHITECTURE1

    E-Print Network [OSTI]

    Data Flow (SDF) refers to a sub- class of data flow graphs where the actors lack data depen- dency in their firing patterns [5]. Thus in SDF graphs the number of tokens produced and consumed in each of the output of DSP algorithms fall into the SDF paradigm. In our group at Berkeley, we have imple- mented Gabriel

  12. Materials Selection for Oxide-based Resistive Random Access Memories

    E-Print Network [OSTI]

    Guo, Yuzheng; Robertson, John

    2014-12-05T23:59:59.000Z

    , work function of the parent metal. eV Hbulk Hvac (O- poor limit) E(0/2+) ?Emig Hfrenk Parent metal work function HfO2 -5.9 0.2 -4.2 0.7 8.0 3.9 TiO2 -4.8 0.5 -4.3 0.7 6.1 4.3 Ta2O5 -4.3 0.1 -5.0 0.3 1.0 4.0 4.25 Al2O3 -6.8 1.5 -5.8 1.7 12...

  13. Low latency remote memory access on the Intel Paragon

    SciTech Connect (OSTI)

    Rosing, M. [Pacific Northwest Lab., Richland, WA (United States); Pierce, P. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1994-06-20T23:59:59.000Z

    We describe a cooperative project between Pacific Northwest Laboratory and Intel on providing low latency communications on the Intel Paragon. Our interest is in developing modules that are tailored to specific types of communication and are optimized for these cases. The modules described are implemented as simple extensions to the Paragon operating system. The first extension supports remote reads, writes, and accumulates on subsections of matrices. This module is intended to be used where the communication pattern is not known until run time. The second extension is designed to support low latency communication for short messages in a pipelined fashion. Finally, an interface for doing highly structured communication where the patterns of communication are well understood ahead of time is described. This is intended to be used in global communications such as global reduction.

  14. Dynamic Random Access Memory: A Survey Tulika Mitra

    E-Print Network [OSTI]

    Mitra, Tulika

    for graphics. The goal of this report is to provide a comprehensive survey of DRAM operations and the recent prehensive survey of DRAM operations, technology and architectures. Most of the surveys on DRAM [Bur97, Jon92 a comprehensive survey of DRAM operations, and various new DRAM architectures from a computer system designer

  15. BUILDING MANAGEMENT & RESTRICTED ACCESS

    E-Print Network [OSTI]

    Johnston, Daniel

    BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

  16. Search for cold and hot gas in the ram pressure stripped Virgo dwarf galaxy IC3418

    E-Print Network [OSTI]

    Jachym, P; Ruzicka, A; Sun, M; Combes, F; Palous, J

    2013-01-01T23:59:59.000Z

    We present IRAM 30m sensitive upper limits on CO emission in the ram pressure stripped dwarf Virgo galaxy IC3418 and in a few positions covering HII regions in its prominent 17 kpc UV/Ha gas-stripped tail. In the central few arcseconds of the galaxy, we report a possible marginal detection of about 1x10^6 M_sun of molecular gas (assuming a Galactic CO-to-H_2 conversion factor) that could correspond to a surviving nuclear gas reservoir. We estimate that there is less molecular gas in the main body of IC3418, by at least a factor of 20, than would be expected from the pre-quenching UV-based star formation rate assuming the typical gas depletion timescale of 2 Gyr. Given the lack of star formation in the main body, we think the H_2-deficiency is real, although some of it may also arise from a higher CO-to-H_2 factor typical in low-metallicity, low-mass galaxies. The presence of HII regions in the tail of IC3418 suggests that there must be some dense gas; however, only upper limits of < 1x10^6 M_sun were found...

  17. The effect of cargo on the crush loading of RAM transportation packages in ship collisions

    SciTech Connect (OSTI)

    Radloff, H.D.; Ammerman, D.J.

    1998-03-01T23:59:59.000Z

    Recent intercontinental radioactive material shipping campaigns have focused public and regulatory attention on the safety of transport of this material by ocean-going vessels. One major concern is the response of the vessel and onboard radioactive material (RAM) packages during a severe ship-to-ship collision. These collisions occur at velocities less than the velocity obtained in the Type B package regulatory impact event and the bow of the striking ship is less rigid than the unyielding target used in those tests (Ammerman and Daidola, 1996). This implies that ship impact is not a credible scenario for damaging the radioactive material packages during ship collisions. It is possible, however, for these collisions to generate significant amounts of crush force by the bow of the impacting ship overrunning the package. It is the aim of this paper to determine an upper bound on the magnitude of this crush force taking into account the strength of the radioactive material carrying vessel and any other cargo that may be stowed in the same hold as the radioactive material.

  18. Evaluation of architectural paradigms for addressing theprocessor-memory gap

    SciTech Connect (OSTI)

    Oliker, Leonid; Gorden, Grime; Husbands, Parry; Chame, Jacqualine

    2003-07-04T23:59:59.000Z

    Many high performance applications run well below the peak arithmetic performance of the underlying machine, with inefficiencies often attributed to poor memory system behavior. In the context of scientific computing we examine three emerging processors designed to address the well-known gap between processor and memory performance through the exploitation of data parallelism. The VIRAM architecture uses novel PIM technology to combine embedded DRAM with a vector co-processor for exploiting its large bandwidth potential. The DIVA architecture incorporates a collection of PIM chips as smart-memory coprocessors to a conventional microprocessor, and relies on superword-level parallelism to make effective use of the available memory bandwidth. The Imagine architecture provides a stream-aware memory hierarchy to support the tremendous processing potential of SIMD controlled VLIW clusters. First we develop a scalable synthetic probe that allows us to parametize key performance attributes of VIRAM, DIVA and Imagine while capturing the performance crossover points of these architectures. Next we present results for scientific kernels with different sets of computational characteristics and memory access patterns. Our experiments allow us to evaluate the strategies employed to exploit data parallelism, isolate the set of application characteristics best suited to each architecture and show a promising direction towards interfacing leading-edge processor technology with high-end scientific computations.

  19. An analog memory using a CCD memory cell

    E-Print Network [OSTI]

    Murray, James Ray

    1983-01-01T23:59:59.000Z

    23 26 29 E. Digital-to-Analog Converter F. Analog-to-Digital Converter G. Operation CHAPTER IV. ANALYSIS OF THE CIRCUIT A. Testing of Major Components B. Performance of the Memory C. Comparison with Digital Memories D. Proposed Modifications... of Memory Cell 24. Four Interconnected Memory Cells 25. Four-to-Sixteen Converter 26. Column Address Decoding Circuit. 27. Row Address Decoding Circuit 28. Digital-to-Analog Converter 29. Comparator Circuit Diagram . 30. DC Transfer Function...

  20. Cache Memories ALAN JAY SMITH

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Cache Memories ALAN JAY SMITH Unwersity of California, Berkeley, Californm 94720 Cache memories 1982 #12;474 * A. J. Smith CONTENTS INTRODUCTION Definltlonand Rationale Overwew of Cache Deslgn Cache

  1. Ubiquitous Memory Introspection (Preliminary Manuscript)

    E-Print Network [OSTI]

    Zhao, Qin

    2006-09-25T23:59:59.000Z

    Modern memory systems play a critical role in the performance ofapplications, but a detailed understanding of the application behaviorin the memory system is not trivial to attain. It requires timeconsuming simulations of ...

  2. Shape memory polymer medical device

    DOE Patents [OSTI]

    Maitland, Duncan (Pleasant Hill, CA); Benett, William J. (Livermore, CA); Bearinger, Jane P. (Livermore, CA); Wilson, Thomas S. (San Leandro, CA); Small, IV, Ward (Livermore, CA); Schumann, Daniel L. (Concord, CA); Jensen, Wayne A. (Livermore, CA); Ortega, Jason M. (Pacifica, CA); Marion, III, John E. (Livermore, CA); Loge, Jeffrey M. (Stockton, CA)

    2010-06-29T23:59:59.000Z

    A system for removing matter from a conduit. The system includes the steps of passing a transport vehicle and a shape memory polymer material through the conduit, transmitting energy to the shape memory polymer material for moving the shape memory polymer material from a first shape to a second and different shape, and withdrawing the transport vehicle and the shape memory polymer material through the conduit carrying the matter.

  3. Memorial to James Allan Bennyhoff

    E-Print Network [OSTI]

    Hughes, Richard E

    1994-01-01T23:59:59.000Z

    REFERENCES Anonymous 1993 James Allan Bennyhoff. Society forMemorial to James Allan Bennyhoff (January 3, 1926 - August

  4. An Adaptive Memory Interface Controller for Improving Bandwidth Utilization of Hybrid and Reconfigurable Systems

    SciTech Connect (OSTI)

    Castellana, Vito G.; Tumeo, Antonino; Ferrandi, Fabrizio

    2014-05-30T23:59:59.000Z

    Emerging applications such as data mining, bioinformatics, knowledge discovery, social network analysis are irregular. They use data structures based on pointers or linked lists, such as graphs, unbalanced trees or unstructures grids, which generates unpredictable memory accesses. These data structures usually are large, but difficult to partition. These applications mostly are memory bandwidth bounded and have high synchronization intensity. However, they also have large amounts of inherent dynamic parallelism, because they potentially perform a task for each one of the element they are exploring. Several efforts are looking at accelerating these applications on hybrid architectures, which integrate general purpose processors with reconfigurable devices. Some solutions, which demonstrated significant speedups, include custom-hand tuned accelerators or even full processor architectures on the reconfigurable logic. In this paper we present an approach for the automatic synthesis of accelerators from C, targeted at irregular applications. In contrast to typical High Level Synthesis paradigms, which construct a centralized Finite State Machine, our approach generates dynamically scheduled hardware components. While parallelism exploitation in typical HLS-generated accelerators is usually bound within a single execution flow, our solution allows concurrently running multiple execution flow, thus also exploiting the coarser grain task parallelism of irregular applications. Our approach supports multiple, multi-ported and distributed memories, and atomic memory operations. Its main objective is parallelizing as many memory operations as possible, independently from their execution time, to maximize the memory bandwidth utilization. This significantly differs from current HLS flows, which usually consider a single memory port and require precise scheduling of memory operations. A key innovation of our approach is the generation of a memory interface controller, which dynamically maps concurrent memory accesses to multiple ports. We present a case study on a typical irregular kernel, Graph Breadth First search (BFS), exploring different tradeoffs in terms of parallelism and number of memories.

  5. Open Access Task Force Open Access to

    E-Print Network [OSTI]

    Jiang, Huiqiang

    Libraries Initiative launched by National Science Foundation; Social Sciences Research Network (SSRN Library System rgmiller@pitt.edu #12;Open Access Task Force Open Access is... A family of copyright The only constraint on reproduction and distribution, and the only role for copyright in this domain

  6. Accessibility to dental services

    E-Print Network [OSTI]

    Evenden, Craig Andrew

    2007-08-15T23:59:59.000Z

    . Accessibility indexes need to be developed that incorporate a number of characteristics that are currently affecting accessibility to dental services. More research needs to be conducted at a local level to provide better advice to health planners and policy...

  7. Global aspects of radiation memory

    E-Print Network [OSTI]

    J. Winicour

    2014-10-11T23:59:59.000Z

    Gravitational radiation has a memory effect represented by a net change in the relative positions of test particles. Both the linear and nonlinear sources proposed for this radiation memory are of the "electric" type, or E mode, as characterized by the even parity of the polarization pattern. Although "magnetic" type, or B mode, radiation memory is mathematically possible, no physically realistic source has been identified. There is an electromagnetic counterpart to radiation memory in which the velocity of charged particles obtain a net "kick". Again, the physically realistic sources of electromagnetic radiation memory that have been identified are of the electric type. In this paper, a global null cone description of the electromagnetic field is applied to establish the non-existence of B mode radiation memory and the non-existence of E mode radiation memory due to a bound charge distribution.

  8. Performance analysis of memory hierachies in high performance systems

    SciTech Connect (OSTI)

    Yogesh, A.

    1993-07-01T23:59:59.000Z

    This thesis studies memory bandwidth as a performance predictor of programs. The focus of this work is on computationally intensive programs. These programs are the most likely to access large amounts of data, stressing the memory system. Computationally intensive programs are also likely to use highly optimizing compilers to produce the fastest executables possible. Methods to reduce the amount of data traffic by increasing the average number of references to each item while it resides in the cache are explored. Increasing the average number of references to each cache item reduces the number of memory requests. Chapter 2 describes the DLX architecture. This is the architecture on which all the experiments were performed. Chapter 3 studies memory moves as a performance predictor for a group of application programs. Chapter 4 introduces a model to study the performance of programs in the presence of memory hierarchies. Chapter 5 explores some compiler optimizations that can help increase the references to each item while it resides in the cache.

  9. The memory glasses : wearable computing for just-in-time memory support

    E-Print Network [OSTI]

    DeVaul, Richard W. (Richard Wayne), 1971-

    2004-01-01T23:59:59.000Z

    This thesis documents a body of wearable computing research surrounding the development of the Memory Glasses, a new type of proactive memory support technology. The Memory Glasses combines features of existing memory ...

  10. TED KYCIA MEMORIAL SYMPOSIUM.

    SciTech Connect (OSTI)

    LITTENBERG, L.; RUBINSTEIN, R.; SAMIOS, N.; LI, K.; GIACOMELLI, G.; MOCKETT, P.; CARROLL, A.; JOHNSON, R.; BRYMAN, D.; TIPPENS, B.

    2000-05-19T23:59:59.000Z

    On the afternoon of May 19 2000, a Memorial Seminar was held in the BNL physics Large Seminar Room to honor the memory of Ted Kyeia, a prominent particle physicist who had been a member of the BNL staff for 40 years. Although it was understandably a somewhat sad occasion because Ted was no longer with us, nevertheless there was much for his colleagues and friends to celebrate in recalling the outstanding contributions that he had made in those four decades. The Seminar speakers were all people who had worked with Ted during that period; each discussed one aspect of his career, but also included anecdotes and personal reminiscences. This booklet contains the Seminar program, listing the speakers, and also copies of transparencies of the talks (and one paper which was a later expansion of a talk); sadly, not all of the personal remarks appeared on the transparencies.

  11. Shape memory alloy actuator

    DOE Patents [OSTI]

    Varma, Venugopal K. (Knoxville, TN)

    2001-01-01T23:59:59.000Z

    An actuator for cycling between first and second positions includes a first shaped memory alloy (SMA) leg, a second SMA leg. At least one heating/cooling device is thermally connected to at least one of the legs, each heating/cooling device capable of simultaneously heating one leg while cooling the other leg. The heating/cooling devices can include thermoelectric and/or thermoionic elements.

  12. Gifts in Memory of LEHIGH UNIVERSITY 1 Anonymous, in memory of

    E-Print Network [OSTI]

    Gilchrist, James F.

    . Brown, in memory of Lawrence J. Varnerin, Jr. '91P R. N. Brummer, in memory of James W. Niemeyer '43 '68. Campbell, in memory of Gerald G. Leeman '71P '10GP Michael J. Caruso '67, in memory of Gerald G. Leeman '71, in memory of James E. Schierloh '51 Martin D. Cohen, in memory of Gerald G. Leeman '71P '10GP Kathleen

  13. Demystifying Open Access

    SciTech Connect (OSTI)

    Mele, Salvatore

    2007-05-14T23:59:59.000Z

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  14. Identity and Access Management: Access Management Survey 1 Access Management Survey Questions

    E-Print Network [OSTI]

    Maroncelli, Mark

    Identity and Access Management: Access Management Survey 1 Access Management Survey Questions has developed a survey to solicit your input for Access Management. Please take a moment to complete be submitted by Friday May 14, 2010. #12;Identity and Access Management: Access Management Survey 2 Group

  15. Nitinol-reinforced shape-memory polymers

    E-Print Network [OSTI]

    Di Leo, Claudio V

    2010-01-01T23:59:59.000Z

    Reinforced shape-memory polymers have been developed from an acrylate based thermoset shape-memory polymer and nitinol wires. A rectangular shape-memory polymer measuring approximately 1 by 2 by 0.1 inches has a ten fold ...

  16. Memory with Memory in Tree-Based Genetic Programming

    E-Print Network [OSTI]

    Poli, Riccardo

    was carried over to most versions of genetic programming (GP) that had state and assign- ments (see [8 of assignment in a linear GP system can significantly improve performance on a variety of symbolic regressionMemory with Memory in Tree-Based Genetic Programming Riccardo Poli1 , Nicholas F. McPhee2 , Luca

  17. Memory Considerations for Carver

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembers HomeMemory

  18. Internet architecture Access networks

    E-Print Network [OSTI]

    access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

  19. ATLAS Data Access Policy

    E-Print Network [OSTI]

    The ATLAS collaboration

    2015-01-01T23:59:59.000Z

    ATLAS has fully supported the principle of open access in its publication policy. This document outlines the policy of ATLAS as regards open access to data at different levels as described in the DPHEP model. The main objective is to make the data available in a usable way to people external to the ATLAS collaboration.

  20. Shape memory alloy thaw sensors

    SciTech Connect (OSTI)

    Shahinpoor, Mohsen (Albuquerque, NM); Martinez, David R. (Albuquerque, NM)

    1998-01-01T23:59:59.000Z

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the Austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states.

  1. Paver Program Oklahoma Memorial Union

    E-Print Network [OSTI]

    Oklahoma, University of

    Paver Program Oklahoma Memorial Union The UniversiTy of oklahoma Alumni Association Pave the Way in the Oklahoma Memorial Union Courtyard. Now you can. The UniversiTy of oklahoma Alumni Association 900 Asp Ave of Oklahoma is an equal opportunity institution. This brochure was printed at no cost to the taxpayers

  2. Multiassociative Memory John F. Kolen

    E-Print Network [OSTI]

    Pollack, Jordan B.

    Multiassociative Memory John F. Kolen Jordan B. Pollack The Laboratory for AI Research Department)292-7402 kolen-j@cis.ohio-state.edu pollack@cis.ohio-state.edu Abstract This paper discusses the problem of how Conference of the Cognitive Science Society. August 7-10, 1991. #12;Multiassociative Memory1 John F. Kolen

  3. Multiassociative Memory John F. Kolen

    E-Print Network [OSTI]

    Pollack, Jordan B.

    Multiassociative Memory John F. Kolen Jordan B. Pollack The Laboratory for AI Research Department)2927402 kolenj@cis.ohiostate.edu pollack@cis.ohiostate.edu Abstract This paper discusses the problem of how Conference of the Cognitive Science Society. August 710, 1991. #12; Multiassociative Memory 1 John F. Kolen

  4. Hybrid analysis of memory references and its application to automatic parallelization

    E-Print Network [OSTI]

    Rus, Silvius Vasile

    2009-05-15T23:59:59.000Z

    Transformations . . . . . . . . . . . . . . . . 20 a. Removing Flow Dependences . . . . . . . . . . . 20 b. Removing Storage Related Dependences . . . . . 21 c. Results in Automatic Parallelization . . . . . . . 21 3. Run Time Parallelization Techniques... . . . . . . . . . . . . . . . . . . . . . 33 2. Background: the Linear Memory Access Descriptor . . 33 3. Abstraction of Set Operations . . . . . . . . . . . . . . 35 viii CHAPTER a. Set Intersection . . . . . . . . . . . . . . . . . . . 35 b. Set Di erence...

  5. MUN WATER PLEDGE In signing this pledge, the Memorial University of Newfoundland community pledges to

    E-Print Network [OSTI]

    Oyet, Alwell

    MUN WATER PLEDGE In signing this pledge, the Memorial University of Newfoundland community pledges to: 1. Progressively and systematically eliminate the distribution of plastic bottled water at all of a university community that is bottled water free. 2. Conduct a University-wide Public Water Access Audit

  6. Access Management Software Requirements Specification

    E-Print Network [OSTI]

    Maroncelli, Mark

    with a digital identity record. Attributes may be general or personal. A subset of all attributes defines. IAM Defined #12; Access to Protected Library Resources Library Staff Access to Integrated Library System Access to Library Public Workstations HMC Affiliate Access to Library Resources Access

  7. access study access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  8. RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory of J. Ronald Miner, an

    E-Print Network [OSTI]

    Tullos, Desiree

    RON MINER MEMORIAL BIOENGINEERING SCHOLARSHIP The Ron Miner Memorial Scholarship honors the memory of J. Ronald Miner, an Agricultural Engineering professor at OSU for over thirty years. Ron came to OSU from the Ron Miner Memorial Scholarship which resides with the OSU Foundation. The name

  9. Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture

    SciTech Connect (OSTI)

    Gebis, Joseph; Oliker, Leonid; Shalf, John; Williams, Samuel; Yelick, Katherine

    2009-01-12T23:59:59.000Z

    The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software controlled scratchpad memories, such as the Cell local store, attempt to ameliorate this discrepancy by enabling precise control over memory movement; however, scratchpad technology confronts the programmer and compiler with an unfamiliar and difficult programming model. In this work, we present the Virtual Vector Architecture (ViVA), which combines the memory semantics of vector computers with a software-controlled scratchpad memory in order to provide a more effective and practical approach to latency hiding. ViVA requires minimal changes to the core design and could thus be easily integrated with conventional processor cores. To validate our approach, we implemented ViVA on the Mambo cycle-accurate full system simulator, which was carefully calibrated to match the performance on our underlying PowerPC Apple G5 architecture. Results show that ViVA is able to deliver significant performance benefits over scalar techniques for a variety of memory access patterns as well as two important memory-bound compact kernels, corner turn and sparse matrix-vector multiplication -- achieving 2x-13x improvement compared the scalar version. Overall, our preliminary ViVA exploration points to a promising approach for improving application performance on leading microprocessors with minimal design and complexity costs, in a power efficient manner.

  10. CHARACTERIZATION OF SHAPE MEMORY ALLOY BEHAVIOR AND

    E-Print Network [OSTI]

    Valasek, John

    CHARACTERIZATION OF SHAPE MEMORY ALLOY BEHAVIOR AND POSITION CONTROL USING REINFORCEMENT LEARNING for Intelligent Bio-Nano Materials and Structures for Aerospace Vehicles Problem: Shape Memory Alloy and Structures for Aerospace Vehicles 4 Shape Memory Alloys (SMAs) Metallic Alloys used as actuators Shape Memory

  11. Thermomechanical behavior of shape memory elastomeric composites

    E-Print Network [OSTI]

    Mather, Patrick T.

    Thermomechanical behavior of shape memory elastomeric composites Qi Ge a , Xiaofan Luo b,c , Erika September 2011 Available online 1 October 2011 Keywords: Shape memory Shape memory polymers Soft active materials Thermomechanical behaviors Constitutive models a b s t r a c t Shape memory polymers (SMPs) can

  12. Special Access Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-03-29T23:59:59.000Z

    This Order is for OFFICIAL USE ONLY and will not be distributed on the Directives' Portal. For distribution, please contact the Executive Secretary of the Special Access Program Oversight Committee at (202) 586-3345. Does not cancel other directives.

  13. Virginia Capital Access Program (Virginia)

    Broader source: Energy.gov [DOE]

    The Virginia Capital Access Program (CAP), in partnership with Virginias Small Business Financing Authority, provides access to capital for small businesses. Businesses must apply to...

  14. Capital Access Program (CAP) (Michigan)

    Broader source: Energy.gov [DOE]

    The Capital Access Program (CAP), utilizes public resources to generate private financing for small business in Michigan seeking access to capital. Funding from the Michigan Strategic Fund is...

  15. External-Memory Computational Geometry

    E-Print Network [OSTI]

    Goodrich, Michael T.; Tsay, Jyh-Jong; Vengroff, Darren Erik; Vitter, Jeffrey Scott

    1993-01-01T23:59:59.000Z

    the rst known optimal al- gorithms for a wide range of two-level and hierarchical multilevel memory models, including parallel models. The algorithms are optimal both in terms of I/O cost and internal computation....

  16. Shape memory alloy thaw sensors

    DOE Patents [OSTI]

    Shahinpoor, M.; Martinez, D.R.

    1998-04-07T23:59:59.000Z

    A sensor permanently indicates that it has been exposed to temperatures exceeding a critical temperature for a predetermined time period. An element of the sensor made from shape memory alloy changes shape when exposed, even temporarily, to temperatures above the austenitic temperature of the shape memory alloy. The shape change of the SMA element causes the sensor to change between two readily distinguishable states. 16 figs.

  17. Energy Efficient Memory Speculation With Memory Latency Tolerance Supporting Sequential Consistency Without A Coherence Protocol

    E-Print Network [OSTI]

    Munday, David Alexander

    2013-01-01T23:59:59.000Z

    117, Sept. 2006. [35] Derek Hower. Acoherent shared memory.memory consistency models. Derek Hower [35] pro- posed the

  18. Accessing HPSS at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean WaterAccessing HPSS Accessing

  19. Ram Pressure Stripping of Hot Coronal Gas from Group and Cluster Galaxies and the Detectability of Surviving X-ray Coronae

    E-Print Network [OSTI]

    Vijayaraghavan, Rukmani

    2015-01-01T23:59:59.000Z

    Ram pressure stripping can remove hot and cold gas from galaxies in the intracluster medium (ICM), as shown by observations of X-ray and HI galaxy wakes in nearby clusters of galaxies. However, ram pressure stripping, including pre-processing in group environments, does not remove all the hot coronal gas from cluster galaxies. Recent high-resolution Chandra observations have shown that $\\sim 1 - 4$ kpc extended, hot galactic coronae are ubiquitous in group and cluster galaxies. To better understand this result, we simulate ram pressure stripping of a cosmologically motivated population of galaxies in isolated group and cluster environments. The galaxies and the host group and cluster are composed of collisionless dark matter and hot gas initially in hydrostatic equilibrium with the galaxy and host potentials. We show that the rate at which gas is lost depends on the galactic and host halo mass. Using synthetic X-ray observations, we evaluate the detectability of stripped galactic coronae in real observations ...

  20. Optimizing TLB entries for mixed page size storage in contiguous memory

    DOE Patents [OSTI]

    Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Kriegel, Jon K.; Ohmacht, Martin; Steinmacher-Burow, Burkhard

    2013-04-30T23:59:59.000Z

    A system and method for accessing memory are provided. The system comprises a lookup buffer for storing one or more page table entries, wherein each of the one or more page table entries comprises at least a virtual page number and a physical page number; a logic circuit for receiving a virtual address from said processor, said logic circuit for matching the virtual address to the virtual page number in one of the page table entries to select the physical page number in the same page table entry, said page table entry having one or more bits set to exclude a memory range from a page.

  1. Characterization of Shape Memory Alloys Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    1 Characterization of Shape Memory Alloys Using Artificial Neural Networks Jim Henrickson, Kenton Shape Memory Alloys Artificial Neural Networks Process Implement Shape Memory Alloy Model;3 Introduction Shape memory alloys (SMAs) Active material: material that undergoes macroscopic change

  2. Library Guide Access ... 3

    E-Print Network [OSTI]

    Steiner, Ullrich

    ____________________________ Library Guide 2014-2015 #12;Contents Access ... 3 Finding things ... 4-6 Layout and classification... 7 Floor plans ... 8-9 Borrowing things ... 10 Renewing and returning things;Sidney Sussex Library Guide 2014-2015 Welcome to the Richard Powell Library Tel: (01223) 338852 e

  3. Library Guide Access ... 3

    E-Print Network [OSTI]

    Steiner, Ullrich

    ____________________________ Library Guide 2012-2013 #12;Contents Access ... 3 Finding things ... 4-6 Layout and classification... 7 Floor plans ... 8-9 Borrowing things ... 10 Renewing and returning things;Sidney Sussex Library Guide 2012-2013 Welcome to the Richard Powell Library Tel: (01223) 338852 e

  4. acquired immunologic memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and investigates urinary metabolomic biomarkers (more) Skappak, Christopher Dustin 163 Memory traces of trace memories: neurogenesis, synaptogenesis and Biology and...

  5. Rerun: Exploiting Episodes for Lightweight Memory Race Recording

    E-Print Network [OSTI]

    Derek R. Hower; Mark D. Hill

    Multiprocessor deterministic replay has many potential uses in the era of multicore computing, including enhanced debugging, fault tolerance, and intrusion detection. While sources of nondeterminism in a uniprocessor can be recorded efficiently in software, it seems likely that hardware support will be needed in a multiprocessor environment where the outcome of memory races must also be recorded. We develop a memory race recording mechanism, called Rerun, that uses small hardware state (~166 bytes/core), writes a small race log (~4 bytes/kiloinstruction), and operates well as the number of cores per system scales (e.g., to 16 cores). Rerun exploits the dual of conventional wisdom in race recording: Rather than record information about individual memory accesses that conflict, we record how long a thread executes without conflicting with other threads. In particular, Rerun passively creates atomic episodes. Each episode is a dynamic instruction sequence that a thread happens to execute without interacting with other threads. Rerun uses Lamport Clocks to order episodes and enable replay of an equivalent execution. 1.

  6. Hipikat: A Project Memory for Software Development

    E-Print Network [OSTI]

    van der Hoek, Andr

    Hipikat: A Project Memory for Software Development Davor CCubranicc, Gail C. Murphy, Member, IEEE's usefulness in software modification tasks. One study evaluated the usefulness of Hipikat's recommendations Terms--Software development teams, project memory, software artifacts, recommender system, user studies

  7. Program Transformations in Weak Memory Models

    E-Print Network [OSTI]

    Sevcik, Jaroslav

    2009-01-01T23:59:59.000Z

    We analyse the validity of common optimisations on multi-threaded programs in two memory modelsthe DRF guarantee and the Java Memory Model. Unlike in the single-threaded world, even simple program transformations, such ...

  8. Exploring the interaction between working memory and long-term memory: Evidence for the workspace model

    E-Print Network [OSTI]

    van der Meulen, Marian

    There is a large range of models of working memory, each with different scopes and emphases. Current interest focuses strongly on the interaction of working memory with long-term memory, as it has become clear that models of working memory alone...

  9. A study of analog memories

    E-Print Network [OSTI]

    Ott, Joseph Michael

    1983-01-01T23:59:59.000Z

    A STUDY OF ANALOG MEMORIES A Thesis by JOSEPH MICHAEL OTT Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirements tor the degree of MASTER OF SCIENCE August 1983 Major Subject: Electrical... Fngineering A STUDY OF ANALOG MEMORIES A Thesis JOSEPH MZCHAEL OTT Approved as to style and content by: P. E. Allen (Chairman of Committee) N. R. Strader (Member) W. M. Lxvely (Member) W. B. Jones (Head of Department) August 1983 , 0 AS STRA C...

  10. Memory Usage Considerations on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembersMemoryMemory

  11. Government User Session Translation Memory TechnologyTranslation Memory Technology

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Rachael Richardson Tucker Maney Naval Research Laboratory Carol Van Ess-Dykema Susan Converse John S Requirements for Multi-Genre Translation · Motivations for TM Technology Assessment · Pilot Study · ResultsPoint slides, etc. #12;Government User Session Translation Memory Technology Assessment: Pilot Study Goals

  12. Shape memory polymer foams for endovascular therapies

    DOE Patents [OSTI]

    Wilson, Thomas S. (Castro Valley, CA); Maitland, Duncan J. (Pleasant Hill, CA)

    2012-03-13T23:59:59.000Z

    A system for occluding a physical anomaly. One embodiment comprises a shape memory material body wherein the shape memory material body fits within the physical anomaly occluding the physical anomaly. The shape memory material body has a primary shape for occluding the physical anomaly and a secondary shape for being positioned in the physical anomaly.

  13. Configurable memory system and method for providing atomic counting operations in a memory device

    DOE Patents [OSTI]

    Bellofatto, Ralph E. (Ridgefield, CT); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Ohmacht, Martin (Yorktown Heights, NY)

    2010-09-14T23:59:59.000Z

    A memory system and method for providing atomic memory-based counter operations to operating systems and applications that make most efficient use of counter-backing memory and virtual and physical address space, while simplifying operating system memory management, and enabling the counter-backing memory to be used for purposes other than counter-backing storage when desired. The encoding and address decoding enabled by the invention provides all this functionality through a combination of software and hardware.

  14. Accessibility-based transit planning

    E-Print Network [OSTI]

    Busby, Jeffrey R

    2004-01-01T23:59:59.000Z

    A method for evaluating transit planning proposals using accessibility metrics is advanced in this research. A transit-accessibility model is developed intended for use by in-house transit agency planning staff as a ...

  15. Mentoring@Memorial Mentor Application

    E-Print Network [OSTI]

    Oyet, Alwell

    Mentoring@Memorial Mentor Application The Department of Human Resources offers a mentoring program for staff, administrative leaders, and academic leaders. To participate in the program, we require mentors Mentoring Agreement; Provide evaluative feedback by completing an evaluation form; and Agree to disclose

  16. Mentoring@Memorial Mentee Application

    E-Print Network [OSTI]

    Oyet, Alwell

    Mentoring@Memorial Mentee Application The Department of Human Resources offers a mentoring program for staff, administrative leaders, and academic leaders. To participate in the program, we require mentors Mentoring Agreement; Provide evaluative feedback by completing an evaluation form; and Agree to disclose

  17. Role-Based Access Controls

    E-Print Network [OSTI]

    Ferraiolo, David F

    2009-01-01T23:59:59.000Z

    While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC.

  18. Access for All

    E-Print Network [OSTI]

    Stearns, Linda Lea Merenda

    2012-07-16T23:59:59.000Z

    ?s Algebra 1 final grades to examine correlation with the students? grade in Algebra. Each scatter plot contained a solid linear regression line and a dashed line, y = x. The data points with a square shape represent the scores of students who were Waived... classes in a central Texas school district to determine if there is fair and equitable access for all students. The paper contains two major components. The first is quantitative study of the four entrance requirements for 8th grade Algebra I Pre-AP at a...

  19. LANL access restrictions lifted

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as ReadyAppointedKyungmin Ham, Ph.D.access restrictions

  20. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In theACME -ToggleAccess to the ALS Print

  1. Accessibility | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In theACME -ToggleAccess to the ALS

  2. Shape memory alloy/shape memory polymer tools

    DOE Patents [OSTI]

    Seward, Kirk P.; Krulevitch, Peter A.

    2005-03-29T23:59:59.000Z

    Micro-electromechanical tools for minimally invasive techniques including microsurgery. These tools utilize composite shape memory alloy (SMA), shape memory polymer (SMP) and combinations of SMA and SMP to produce catheter distal tips, actuators, etc., which are bistable. Applications for these structures include: 1) a method for reversible fine positioning of a catheter tip, 2) a method for reversible fine positioning of tools or therapeutic catheters by a guide catheter, 3) a method for bending articulation through the body's vasculature, 4) methods for controlled stent delivery, deployment, and repositioning, and 5) catheters with variable modulus, with vibration mode, with inchworm capability, and with articulated tips. These actuators and catheter tips are bistable and are opportune for in vivo usage because the materials are biocompatible and convenient for intravascular use as well as other minimal by invasive techniques.

  3. LHAPDF6: parton density access in the LHC precision era

    E-Print Network [OSTI]

    Andy Buckley; James Ferrando; Stephen Lloyd; Karl Nordstrom; Ben Page; Martin Ruefenacht; Marek Schoenherr; Graeme Watt

    2015-03-05T23:59:59.000Z

    The Fortran LHAPDF library has been a long-term workhorse in particle physics, providing standardised access to parton density functions for experimental and phenomenological purposes alike, following on from the venerable PDFLIB package. During Run 1 of the LHC, however, several fundamental limitations in LHAPDF's design have became deeply problematic, restricting the usability of the library for important physics-study procedures and providing dangerous avenues by which to silently obtain incorrect results. In this paper we present the LHAPDF 6 library, a ground-up re-engineering of the PDFLIB/LHAPDF paradigm for PDF access which removes all limits on use of concurrent PDF sets, massively reduces static memory requirements, offers improved CPU performance, and fixes fundamental bugs in multi-set access to PDF metadata. The new design, restricted for now to interpolated PDFs, uses centralised numerical routines and a powerful cascading metadata system to decouple software releases from provision of new PDF data and allow completely general parton content. More than 200 PDF sets have been migrated from LHAPDF 5 to the new universal data format, via a stringent quality control procedure. LHAPDF 6 is supported by many Monte Carlo generators and other physics programs, in some cases via a full set of compatibility routines, and is recommended for the demanding PDF access needs of LHC Run 2 and beyond.

  4. Work In Progress: Conquest--Combining Battery-Backed RAM and Threshold-Based Storage Scheme to Conserve Power

    E-Print Network [OSTI]

    Wang, Andy

    accesses, which account for 8% of the power usage for laptops, 20% for web servers, and up to 70% for disk, Computer Science Department, UCLA, popek@cs.ucla.edu Energy conservation has become a pressing re- search performance and more features. Due to rising energy costs, the server market is also becoming sensitive

  5. Ram Orientation Summer 2014

    E-Print Network [OSTI]

    Diane Burton Judi Bryant Cori Wong Cindy Adamy Jordan Ervin Director Assistant Program Acad. Support

  6. Ram Review1.PDF

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronic Input Options Gary L. Hirsch SNL 2001a,Summary; i-C C1 1

  7. Pennsylvania Capital Access Program (Pennsylvania)

    Broader source: Energy.gov [DOE]

    The Pennsylvania Capital Access Program provides loan guarantees for all businesses for the purchase of land, buildings, machinery, equipment and working capital through participating banks. The...

  8. Immunological Memory is Associative Derek J. Smith

    E-Print Network [OSTI]

    Somayaji, Anil

    Immunological Memory is Associative Derek J. Smith Department of Computer Science University of New , 1989; Nara & Goudsmit, 1990; Smith, 1994). Immunologists refer to associative recall as a cross

  9. Improving Memory Error Handling Using Linux

    SciTech Connect (OSTI)

    Carlton, Michael Andrew [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Blanchard, Sean P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Debardeleben, Nathan A. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-07-25T23:59:59.000Z

    As supercomputers continue to get faster and more powerful in the future, they will also have more nodes. If nothing is done, then the amount of memory in supercomputer clusters will soon grow large enough that memory failures will be unmanageable to deal with by manually replacing memory DIMMs. "Improving Memory Error Handling Using Linux" is a process oriented method to solve this problem by using the Linux kernel to disable (offline) faulty memory pages containing bad addresses, preventing them from being used again by a process. The process of offlining memory pages simplifies error handling and results in reducing both hardware and manpower costs required to run Los Alamos National Laboratory (LANL) clusters. This process will be necessary for the future of supercomputing to allow the development of exascale computers. It will not be feasible without memory error handling to manually replace the number of DIMMs that will fail daily on a machine consisting of 32-128 petabytes of memory. Testing reveals the process of offlining memory pages works and is relatively simple to use. As more and more testing is conducted, the entire process will be automated within the high-performance computing (HPC) monitoring software, Zenoss, at LANL.

  10. Video Stores, Media Technologies, and Memory

    E-Print Network [OSTI]

    Wilken, Rowan

    2010-01-01T23:59:59.000Z

    a collection entitled Mobile Technology & Place (Routledge,Identity, in Mobile Technologies: From Telecommunicationsin an essay on mobile media technologies and memory, Nicola

  11. Battelle Memorial Institute Technologies Available for Licensing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Fuels Wind Energy Partners (27) Visual Patent Search Success Stories News Events Battelle Memorial Institute Technologies Available for Licensing Battelle is the world's...

  12. Shape memory response of ni2mnga and nimncoin magnetic shape memory alloys under compression

    E-Print Network [OSTI]

    Brewer, Andrew Lee

    2009-05-15T23:59:59.000Z

    In this study, the shape memory response of Ni2MnGa and NiMnCoIn magnetic shape memory alloys was observed under compressive stresses. Ni2MnGa is a magnetic shape memory alloy (MSMA) that has been shown to exhibit fully reversible, stressassisted...

  13. Energy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems

    E-Print Network [OSTI]

    Conte, Thomas M.

    hybrid system using a commodity DRAM cache. Keywords-Memory Controller, DRAM, PCM, Energy I. INTRODUCTIONEnergy Efficient Phase Change Memory Based Main Memory for Future High Performance Systems Abstract system of similar storage size. Our proposed system is highly energy efficient and provides 35

  14. Cu-based shape memory microwires : towards complex structures

    E-Print Network [OSTI]

    Gager, Mac (Brian McClure, Jr.)

    2014-01-01T23:59:59.000Z

    Shape memory alloys are a distinctive type of material that exhibits the fascinating properties of the shape memory effect and superelasticity. Shape memory properties are characterized by the diffusionless phase transformation ...

  15. Grain constraint and size effects in shape memory alloy microwires

    E-Print Network [OSTI]

    Ueland, Stian Melhus

    2013-01-01T23:59:59.000Z

    Shape memory alloys exhibit interesting and useful properties, such as the shape memory effect and superelasticity. Among the many alloy families that have been shown to exhibit shape memory properties the ones based on ...

  16. September 2011 Comparison of PCIe SLC Flash cards

    E-Print Network [OSTI]

    PC CPU, 3= FPGA, 4=450 usable Flash (650 raw), 5=RAM, 6=Super capacitors Each flash memory chip contains of the lower data access time compared to Flash. Large capacitors on the card protect the data as it moves

  17. Querying Schemas With Access Restrictions

    E-Print Network [OSTI]

    Benedikt, Michael; Ley, Clemens

    2012-01-01T23:59:59.000Z

    We study verification of systems whose transitions consist of accesses to a Web-based data-source. An access is a lookup on a relation within a relational database, fixing values for a set of positions in the relation. For example, a transition can represent access to a Web form, where the user is restricted to filling in values for a particular set of fields. We look at verifying properties of a schema describing the possible accesses of such a system. We present a language where one can describe the properties of an access path, and also specify additional restrictions on accesses that are enforced by the schema. Our main property language, AccLTL, is based on a first-order extension of linear-time temporal logic, interpreting access paths as sequences of relational structures. We also present a lower-level automaton model, Aautomata, which AccLTL specifications can compile into. We show that AccLTL and A-automata can express static analysis problems related to "querying with limited access patterns" that h...

  18. Data Representation for Efficient and Reliable Storage in Flash Memories

    E-Print Network [OSTI]

    Wang, Yue

    2013-05-02T23:59:59.000Z

    challenges. In addition, we present an overview of related works on ash memories. 1.1 Flash Memories and Their Properties Flash memory, invented by Dr. Fujio Masuoka, is a type of non-volatile memory that can be electrically erased and reprogrammed... years have witnessed a proliferation of ash memories as an emerging storage technology with wide applications in many important areas. Like magnetic recording and optimal recording, ash memories have their own distinct properties and usage...

  19. A quantum access network

    E-Print Network [OSTI]

    Bernd Frhlich; James F. Dynes; Marco Lucamarini; Andrew W. Sharpe; Zhiliang Yuan; Andrew J. Shields

    2014-09-02T23:59:59.000Z

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realising multi-user QKD networks with resource efficiency and brings QKD closer to becoming the first widespread technology based on quantum physics.

  20. Using on-package memory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUserHadoopon-package memory Using

  1. Memory Usage Considerations on Franklin

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home andDispositionMechanicalAboutMembersMemory

  2. Modesto Memorial Hospital Space Heating Low Temperature Geothermal...

    Open Energy Info (EERE)

    Memorial Hospital Space Heating Low Temperature Geothermal Facility Jump to: navigation, search Name Modesto Memorial Hospital Space Heating Low Temperature Geothermal Facility...

  3. attention working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and working memory. (more) Mayer, Jamie F. 2010-01-01 30 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  4. associative memory models: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David 1971-01-01 2 COMPLEX ASSOCIATIVE MEMORY NEURAL NETWORK MODEL FOR INVARIANT PATTERN RECOGNITION Engineering Websites Summary: COMPLEX ASSOCIATIVE MEMORY NEURAL...

  5. associative memory model: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David 1971-01-01 2 COMPLEX ASSOCIATIVE MEMORY NEURAL NETWORK MODEL FOR INVARIANT PATTERN RECOGNITION Engineering Websites Summary: COMPLEX ASSOCIATIVE MEMORY NEURAL...

  6. Memorial University of Newfoundland Indirect Costs Report

    E-Print Network [OSTI]

    deYoung, Brad

    Memorial University of Newfoundland Indirect Costs Report 2012-13 The grant provided through the Government of Canada Indirect Costs Program (ICP) is essential to Memorial's research success. Funding and impact can be found in the following section. Total 2013 Indirect Costs Grant: $4,318,814 Management

  7. Cultural differences on the children's memory scale

    E-Print Network [OSTI]

    Cash, Deborah Dyer

    2009-05-15T23:59:59.000Z

    ) is an assessment instrument used to identify memory and learning deficits and strengths in children ages five through 16. This study investigated the impact of culture and parent educational level (PEL) on student performance on the Childrens Memory Scale using...

  8. How Minds Work Memories and Learning

    E-Print Network [OSTI]

    Memphis, University of

    & Learning 7 Types of Human Learning Requiring Distinct Mechanisms Perceptual learning Identify1 How Minds Work Memories and Learning Stan Franklin Computer Science Division & Institute for Intelligent Systems The University of Memphis #12;How Minds Work: Memory & Learning 2 Human Learning

  9. Learning and Memory Eric R. Kandel

    E-Print Network [OSTI]

    Ulanovsky, Nachum

    and memory we are interested in several questions. What are the major forms of P.1228 learning? What types of information about the environment are learned most easily? Do different types of learning give riseBack 62 Learning and Memory Eric R. Kandel Irving Kupfermann Susan Iversen BEHAVIOR IS THE RESULT

  10. Shape memory polymer actuator and catheter

    DOE Patents [OSTI]

    Maitland, Duncan J. (Pleasant Hill, CA); Lee, Abraham P. (Walnut Creek, CA); Schumann, Daniel L. (Concord, CA); Matthews, Dennis L. (Moss Beach, CA); Decker, Derek E. (Byron, CA); Jungreis, Charles A. (Pittsburgh, PA)

    2007-11-06T23:59:59.000Z

    An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

  11. Shape memory polymer actuator and catheter

    SciTech Connect (OSTI)

    Maitland, Duncan J.; Lee, Abraham P.; Schumann, Daniel L.; Matthews, Dennis L.; Decker, Derek E.; Jungreis, Charles A.

    2004-05-25T23:59:59.000Z

    An actuator system is provided for acting upon a material in a vessel. The system includes an optical fiber and a shape memory polymer material operatively connected to the optical fiber. The shape memory polymer material is adapted to move from a first shape for moving through said vessel to a second shape where it can act upon said material.

  12. Online Data Structures in External Memory

    E-Print Network [OSTI]

    Vitter, Jeffrey Scott

    1999-01-01T23:59:59.000Z

    /output communication (or I/O) between the external and internal memories. In this paper we discuss a variety of online data structures for external memory, some very old and some very new, such as hashing (for dictionaries), B-trees (for dictionaries and 1-D range...

  13. Tier identification (TID) for tiered memory characteristics

    DOE Patents [OSTI]

    Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

    2014-03-25T23:59:59.000Z

    A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

  14. Synaptic plasticity and memory Richard Kempter

    E-Print Network [OSTI]

    Kempter, Richard

    Synaptic plasticity and memory Richard Kempter 1,2,3 & Dietmar Schmitz 2,3 1 Institute in the central nervous system. In its most general form, the "synaptic plasticity and memory hypothesis" states, and that synaptic plasticity is both necessary and sufficient for the storage of information underlying

  15. Access Digital Library, Search, News and more

    E-Print Network [OSTI]

    Goodrich, Lisa V.

    [General] Access Digital Library, Search, News and more [Education] Access MyCourses content [Research] Access Digital Library, NCBI Blast and more [Personal] Access your portable bookmarks using My and 500 textbooks via the Digital Library, one click access to NCBI Blast sequence databases. [General

  16. Data Movement Dominates: Advanced Memory Technology to Address the Real Exascale Power Problem

    SciTech Connect (OSTI)

    Bergman, Keren

    2014-08-28T23:59:59.000Z

    Energy is the fundamental barrier to Exascale supercomputing and is dominated by the cost of moving data from one point to another, not computation. Similarly, performance is dominated by data movement, not computation. The solution to this problem requires three critical technologies: 3D integration, optical chip-to-chip communication, and a new communication model. The central goal of the Sandia led "Data Movement Dominates" project aimed to develop memory systems and new architectures based on these technologies that have the potential to lower the cost of local memory accesses by orders of magnitude and provide substantially more bandwidth. Only through these transformational advances can future systems reach the goals of Exascale computing with a manageable power budgets. The Sandia led team included co-PIs from Columbia University, Lawrence Berkeley Lab, and the University of Maryland. The Columbia effort of Data Movement Dominates focused on developing a physically accurate simulation environment and experimental verification for optically-connected memory (OCM) systems that can enable continued performance scaling through high-bandwidth capacity, energy-efficient bit-rate transparency, and time-of-flight latency. With OCM, memory device parallelism and total capacity can scale to match future high-performance computing requirements without sacrificing data-movement efficiency. When we consider systems with integrated photonics, links to memory can be seamlessly integrated with the interconnection network-in a sense, memory becomes a primary aspect of the interconnection network. At the core of the Columbia effort, toward expanding our understanding of OCM enabled computing we have created an integrated modeling and simulation environment that uniquely integrates the physical behavior of the optical layer. The PhoenxSim suite of design and software tools developed under this effort has enabled the co-design of and performance evaluation photonics-enabled OCM architectures on Exascale computing systems.

  17. PHYSICAL REVIEW B 83, 134205 (2011) Atomic structure and electronic properties of the SixSb100-x phase-change memory material

    E-Print Network [OSTI]

    Svane, Axel Torstein

    2011-01-01T23:59:59.000Z

    .134205 PACS number(s): 64.70.dg, 61.20.Gy, 71.15.Mb, 71.15.Pd I. INTRODUCTION Most phase-change random access into the heating electrode (write or rewrite steps) that may result in degradation of the memory device. Further

  18. Adiabatic Quantum Optimization for Associative Memory Recall

    E-Print Network [OSTI]

    Hadayat Seddiqi; Travis S. Humble

    2014-12-12T23:59:59.000Z

    Hopfield networks are a variant of associative memory that recall information stored in the couplings of an Ising model. Stored memories are fixed points for the network dynamics that correspond to energetic minima of the spin state. We formulate the recall of memories stored in a Hopfield network using energy minimization by adiabatic quantum optimization (AQO). Numerical simulations of the quantum dynamics allow us to quantify the AQO recall accuracy with respect to the number of stored memories and the noise in the input key. We also investigate AQO performance with respect to how memories are stored in the Ising model using different learning rules. Our results indicate that AQO performance varies strongly with learning rule due to the changes in the energy landscape. Consequently, learning rules offer indirect methods for investigating change to the computational complexity of the recall task and the computational efficiency of AQO.

  19. Temperature and electrical memory of polymer fibers

    SciTech Connect (OSTI)

    Yuan, Jinkai; Zakri, Ccile; Grillard, Fabienne; Neri, Wilfrid; Poulin, Philippe [Centre de Recherche Paul Pascal - CNRS, University of Bordeaux, Avenue Schweitzer, 33600 Pessac (France)

    2014-05-15T23:59:59.000Z

    We report in this work studies of the shape memory behavior of polymer fibers loaded with carbon nanotubes or graphene flakes. These materials exhibit enhanced shape memory properties with the generation of a giant stress upon shape recovery. In addition, they exhibit a surprising temperature memory with a peak of generated stress at a temperature nearly equal to the temperature of programming. This temperature memory is ascribed to the presence of dynamical heterogeneities and to the intrinsic broadness of the glass transition. We present recent experiments related to observables other than mechanical properties. In particular nanocomposite fibers exhibit variations of electrical conductivity with an accurate memory. Indeed, the rate of conductivity variations during temperature changes reaches a well defined maximum at a temperature equal to the temperature of programming. Such materials are promising for future actuators that couple dimensional changes with sensing electronic functionalities.

  20. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J. (Rochester, MN); Dozsa, Gabor (Ardsley, NY); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2012-04-17T23:59:59.000Z

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  1. Performing an allreduce operation using shared memory

    SciTech Connect (OSTI)

    Archer, Charles J; Dozsa, Gabor; Ratterman, Joseph D; Smith, Brian E

    2014-06-10T23:59:59.000Z

    Methods, apparatus, and products are disclosed for performing an allreduce operation using shared memory that include: receiving, by at least one of a plurality of processing cores on a compute node, an instruction to perform an allreduce operation; establishing, by the core that received the instruction, a job status object for specifying a plurality of shared memory allreduce work units, the plurality of shared memory allreduce work units together performing the allreduce operation on the compute node; determining, by an available core on the compute node, a next shared memory allreduce work unit in the job status object; and performing, by that available core on the compute node, that next shared memory allreduce work unit.

  2. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  3. access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  4. accessibility: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  5. Dynamic, Flexible, and Optimistic Access Control

    E-Print Network [OSTI]

    Peisert, Sean; Bishop, Matt

    2013-01-01T23:59:59.000Z

    and N. Dulay. Rumpole: A Flexible Break-Glass Access ControlDynamic, Flexible, and Optimistic Access Control Seannor are they intended to be flexible enough to reduce access

  6. Florida Capital Access Program (Florida)

    Broader source: Energy.gov [DOE]

    The Florida Capital Access Program, run by the Florida Department of Economic Development, is a loan portfolio insurance program enabling lenders to make loans to credit-worthy small businesses. ...

  7. Access Business Systems | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Business Systems Dash provides access to select Argonne business systems without VPN. Dash is a secure platform, based on Citrix, for accessing Argonne business systems. Dash is...

  8. Learning, Memory, and Education Lessons for the Classroom

    E-Print Network [OSTI]

    Rose, Michael R.

    Learning, Memory, and Education Lessons for the Classroom Michael A. Yassa, M.A. Ph.D. Candidate memory? How can we optimize individual learning? How do lessons from memory apply to the classroom? Brain individual learning? How do lessons from memory apply to the classroom? Brain-based learning: fact or fiction

  9. UTILIZING THE SHAPE MEMORY EFFECT TO ENABLE FLEXIBLE ELECTRONICS

    E-Print Network [OSTI]

    Petta, Jason

    UTILIZING THE SHAPE MEMORY EFFECT TO ENABLE FLEXIBLE ELECTRONICS Abhishek Raj The University under strain #12;The Shape Memory Effect Shape-memory polymer (SMP) orthopedic cast 4 #12;Polymer Glass Transition Temperature Yakacki CM, Willis S, Luders C, and Gall K. Deformation Limits in Shape-Memory

  10. Organizational Memory: Processes, Boundary Objects, and Trajectories Mark S. Ackerman

    E-Print Network [OSTI]

    Ackerman, Mark S.

    Organizational Memory: Processes, Boundary Objects, and Trajectories Mark S. Ackerman Information 7751 krys@watson.ibm.com Abstract The term organizational memory is due for an overhaul. Memory appears and analyzing organizational memory. 1. Introduction After nearly ten years of research, the term organizational

  11. Row Buffer Locality Aware Caching Policies for Hybrid Memories

    E-Print Network [OSTI]

    strengths A hybrid memory system (DRAM-PCM) aims for best of both Problem: How to place data between static energy (no refresh) 6 DRAM PCM CPU MC MC #12;Hybrid Memory Design direction: DRAM as a cache memory devices? 8 DRAM PCM CPU MC MC #12;Outline Background: Hybrid Memory Systems Motivation: Row

  12. Characterization of the angular memory effect of scattered light in biological tissues

    E-Print Network [OSTI]

    Schott, Sam; Lger, Jean-Francois; Bourdieu, Laurent; Gigan, Sylvain

    2015-01-01T23:59:59.000Z

    High resolution optical microscopy is essential in neuroscience but suffers from scattering in biological tissues. It therefore grants access to superficial layers only. Recently developed techniques use scattered photons for imaging by exploiting angular correlations in transmitted light and could potentially increase imaging depths. But those correlations (`angular memory effect') are of very short range and, in theory, only present behind and not inside scattering media. From measurements on neural tissues and complementary simulations, we find that strong forward scattering in biological tissues can enhance the memory effect range (and thus the possible field-of-view) by more than an order of magnitude compared to isotropic scattering for $\\sim$1\\,mm thick tissue layers.

  13. Non-volatile memory for checkpoint storage

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Cipolla, Thomas M.; Coteus, Paul W.; Gara, Alan; Heidelberger, Philip; Jeanson, Mark J.; Kopcsay, Gerard V.; Ohmacht, Martin; Takken, Todd E.

    2014-07-22T23:59:59.000Z

    A system, method and computer program product for supporting system initiated checkpoints in high performance parallel computing systems and storing of checkpoint data to a non-volatile memory storage device. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity. In one embodiment, the non-volatile memory is a pluggable flash memory card.

  14. Securing non-volatile memory regions

    DOE Patents [OSTI]

    Faraboschi, Paolo; Ranganathan, Parthasarathy; Muralimanohar, Naveen

    2013-08-20T23:59:59.000Z

    Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

  15. Laser annealing of amorphous NiTi shape memory alloy thin films to locally induce shape memory properties

    E-Print Network [OSTI]

    Laser annealing of amorphous NiTi shape memory alloy thin films to locally induce shape memory the results of a crystallization study on NiTi shape memory thin films in which amorphous films are annealed by a scanning laser. This technique has the advantage that shape memory properties can be spatially distributed

  16. Instruction sets for Parallel Random Access Machines. Doctoral thesis

    SciTech Connect (OSTI)

    Trahan, J.L.

    1988-08-01T23:59:59.000Z

    An important model of parallel computation is the Parallel Random Access Machine (PRAM), which comprises multiple processors that execute instructions synchronously and share a common memory. Formalized by Fortune and Wyllie (1978) and Goldschlager (1982), the PRAM is a much more natural model of parallel computation than older models such as combinational circuits and alternating Turing machines (Ruzzo, 1981) because the PRAM abstracts the salient features of a modern multiprocessor computer. Eventually an algorithm developed for the PRAM can be implemented on a parallel network computer such as a mesh-connected array computer (Thompson and Kung, 1977), a hypercube machine (Seitz, 1985), a cube-connected cycles machine (Preparata and Vuillemin, 1981) or a bounded degree processor network (Alt et al., 1987); on all network computers the routing of data complicates the implementation of algorithms. The PRAM provides the foundation for the design of highly parallel algorithms (Luby, 1986; Miller and Reif, 1985; among many others). This model permits the exposure of the intrinsic parallelism in a computational problem because it simplifies the communication of data through a shared memory. To quantify differences in computational performance, the time complexities of simulations between PRAMS with different instruction sets are determined. Focus is on the computational complexity of simulations between PRAMs with the following operations: multiplication, division, arbitrary left shift, arbitrary right shift, and probabilistic choice.

  17. Orthopaedic applications of ferromagnetic shape memory alloys

    E-Print Network [OSTI]

    Guo, Weimin, M. Eng. Massachusetts Institute of Technology

    2008-01-01T23:59:59.000Z

    Ferromagnetic shape memory alloys (FSMAs) are a new class of magnetic field-actuated active materials with no current commercial applications. By applying a magnetic field of around 0.4 T, they can exert a stress of ...

  18. Thermomechanical modeling of a shape memory polymer

    E-Print Network [OSTI]

    Ghosh, Pritha B.

    2009-05-15T23:59:59.000Z

    The aim of this work is to demonstrate a Helmholtz potential based approach for the development of the constitutive equations for a shape memory polymer undergoing a thermomechanical cycle. The approach is motivated by the use of a simple spring...

  19. ACOHERENT SHARED MEMORY Derek R. Hower

    E-Print Network [OSTI]

    Hill, Mark D.

    ACOHERENT SHARED MEMORY by Derek R. Hower A dissertation submitted in partial fulfillment. Hower 2012 All Rights Reserved #12;i Abstract The computer industry has entered an era where energy

  20. Thermomechanical modeling of a shape memory polymer

    E-Print Network [OSTI]

    Ghosh, Pritha B.

    2009-05-15T23:59:59.000Z

    The aim of this work is to demonstrate a Helmholtz potential based approach for the development of the constitutive equations for a shape memory polymer undergoing a thermomechanical cycle. The approach is motivated by the use of a simple spring...

  1. Size Effects in Ferromagnetic Shape Memory Alloys

    E-Print Network [OSTI]

    Ozdemir, Nevin

    2012-07-16T23:59:59.000Z

    effects in these mechanisms has both scientific and technological relevance. Superelastic behavior of Ni54Fe19Ga27 shape memory alloy single crystalline pillars was studied under compression as a function of pillar diameter. Multiple pillars...

  2. Funes the Memorious by Jorge Luis Borges

    E-Print Network [OSTI]

    Funes, who, after falling off his horse and receiving a bad head injury, acquired the amazing talent on the morning of April 30, 1882, and he could compare them in his memory with the veins in the marbled binding

  3. Housing memory: architecture, materiality and time

    E-Print Network [OSTI]

    Spanou, Sofia-Irini

    2008-01-01T23:59:59.000Z

    , and cognition and their intricate relationships with material culture, especially architecture, landscapes, practical action and social life, the aim is to suggest a theoretical and methodological framework within which to explore how memory of the past...

  4. Video Stores, Media Technologies, and Memory

    E-Print Network [OSTI]

    Wilken, Rowan

    2010-01-01T23:59:59.000Z

    both for analogue and digital media (e.g. , memory loss duefrom all forms of digital media usage (broadband downloadingin relation to digital media is signal compression and audio

  5. Aggressive children's memory for attachment relevant information

    E-Print Network [OSTI]

    Collie, Claire Futamase

    2004-09-30T23:59:59.000Z

    This study examined a measure of children's memory for information from a story about a hypothetical mother and child, the Story Task, as a potential tool to delineate subtypes of aggressive children based on the pattern of information processing...

  6. Page-Differential Logging: An Efficient and DBMS-independent Approach for Storing Data into Flash Memory

    E-Print Network [OSTI]

    Kim, Yi-Reun; Song, Il-Yeol

    2010-01-01T23:59:59.000Z

    Flash memory is widely used as the secondary storage in lightweight computing devices due to its outstanding advantages over magnetic disks. Flash memory has many access characteristics different from those of magnetic disks, and how to take advantage of them is becoming an important research issue. There are two existing approaches to storing data into flash memory: page-based and log-based. The former has good performance for read operations, but poor performance for write operations. In contrast, the latter has good performance for write operations when updates are light, but poor performance for read operations. In this paper, we propose a new method of storing data, called page-differential logging, for flash-based storage systems that solves the drawbacks of the two methods. The primary characteristics of our method are: (1) writing only the difference (which we define as the page-differential) between the original page in flash memory and the up-to-date page in memory; (2) computing and writing the pag...

  7. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L; Sexton, James C

    2013-10-22T23:59:59.000Z

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  8. Distributed trace using central performance counter memory

    DOE Patents [OSTI]

    Satterfield, David L.; Sexton, James C.

    2013-01-22T23:59:59.000Z

    A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

  9. Post polymerization cure shape memory polymers

    SciTech Connect (OSTI)

    Wilson, Thomas S; Hearon, Michael Keith; Bearinger, Jane P

    2014-11-11T23:59:59.000Z

    This invention relates to chemical polymer compositions, methods of synthesis, and fabrication methods for devices regarding polymers capable of displaying shape memory behavior (SMPs) and which can first be polymerized to a linear or branched polymeric structure, having thermoplastic properties, subsequently processed into a device through processes typical of polymer melts, solutions, and dispersions and then crossed linked to a shape memory thermoset polymer retaining the processed shape.

  10. Associative memory in phasing neuron networks

    SciTech Connect (OSTI)

    Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

    2014-01-01T23:59:59.000Z

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  11. Identity, Credential, and Access Management (ICAM)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-02-19T23:59:59.000Z

    To establish requirements and responsibilities for DOE identity, credential, and access management program.

  12. LOCH: Open Access Implementation Responsibility Matrix

    E-Print Network [OSTI]

    Krzak, Anna

    2015-02-05T23:59:59.000Z

    Draft Responsibility Matrix for College of Medicine and Veterinary Medicine for REF Open Access requirements implementation.

  13. 2020 Vision The Trinity Access Programmes

    E-Print Network [OSTI]

    O'Mahony, Donal E.

    2020 Vision The Trinity Access Programmes Strategic Plan to 2020 #12;2020 VISION - THE TRINITY ACCESS PROGRAMMES STRATEGIC PLAN TO 20202020 VISION - THE TRINITY ACCESS PROGRAMMES STRATEGIC PLAN TO 2020 Trinity Access Programmes "Our vision for 2014 is of a university providing further leadership

  14. Dynamic Modeling and Analysis for Design of Memristive and Static Random Access Memories

    E-Print Network [OSTI]

    Ho, Yenpo

    2014-08-27T23:59:59.000Z

    and giving me helpful suggestions. In addition, I would like to thank Dr. Jos Silva-Martnez and Dr. Guergana Petrova for serving on my committee. Thanks also go to my friends: Wenzong Wang, Hangtian Lei, Tian Lan, Li-Wei Tseng, Saeed Samadi, Ting... ........................... 7 2.1. The Memristor Theory Background ........................................................... 7 2.2. The Memristor Device Models .................................................................. 8 CHAPTER III DYNAMIC BEHAVIOR...

  15. Chaining direct memory access data transfer operations for compute nodes in a parallel computer

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN)

    2010-09-28T23:59:59.000Z

    Methods, systems, and products are disclosed for chaining DMA data transfer operations for compute nodes in a parallel computer that include: receiving, by an origin DMA engine on an origin node in an origin injection FIFO buffer for the origin DMA engine, a RGET data descriptor specifying a DMA transfer operation data descriptor on the origin node and a second RGET data descriptor on the origin node, the second RGET data descriptor specifying a target RGET data descriptor on the target node, the target RGET data descriptor specifying an additional DMA transfer operation data descriptor on the origin node; creating, by the origin DMA engine, an RGET packet in dependence upon the RGET data descriptor, the RGET packet containing the DMA transfer operation data descriptor and the second RGET data descriptor; and transferring, by the origin DMA engine to a target DMA engine on the target node, the RGET packet.

  16. Conflict-Free Star-Access in Parallel Memory Systems Sajal K. Das

    E-Print Network [OSTI]

    Finocchi, Irene

    popular interconnection network topologies. The proposed conflict-free mappings on these graphs are fast and Distributed Processing Symposium (IPDPS'04), Santa Fe, New Mexico, April 2004 [15]. Part of this work

  17. SCHEDULING FOR MINIMIZING THE NUMBER OF MEMORY ACCESSES IN LOW POWER

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    and circuit levels [1]. Most of the optimization is based on reducing the switch­ ing activity, since power also be reduced by transformations such as subexpression elimination, operation substitution, resource utilization, transition activity reduction etc [2]. Most of the previous work on power optimization has been

  18. AI-Ckpt: Leveraging Memory Access Patterns for Adaptive Asynchronous Incremental Checkpointing

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    the last years in all fields of science and industry. They pro- vide an indispensable tool for new insight Bogdan Nicolae IBM Research Dublin, Ireland bogdan.nicolae@ie.ibm.com Franck Cappello Joint Laboratory for Petascale Computing INRIA, France University of Illinois at Urbana-Champaign, USA fci@lri.fr ABSTRACT

  19. Energy-Performance Trade-offs for Spatial Access Methods on Memory-Resident Data

    E-Print Network [OSTI]

    Gurumurthi, Sudhanva

    , weight, cost and diverse oper- ating conditions. It is widely recognized that battery energy is, perhaps of the system architecture, and the software has a key role to play in conserving the battery energy on mobile devices (PDAs, laptops, etc.) can be subject to very different operating conditions com- pared

  20. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  1. LARGE FORCE SHAPE MEMORY ALLOY LINEAR ACTUATOR JOS R. SANTIAGO ANADN

    E-Print Network [OSTI]

    Florida, University of

    LARGE FORCE SHAPE MEMORY ALLOY LINEAR ACTUATOR By JOS R. SANTIAGO ANADN A THESIS PRESENTED ............................................................................................................1 Shape Memory Basics........................................................................................... 5 The Shape Memory Effect

  2. Open Source in accessibility analyses Open Source in accessibility analyses

    E-Print Network [OSTI]

    Kbben, Barend

    petrol station accessibility in Germany by Stefan Neumeier Johann Heinrich von Thnen-Institut, Federal The paper relates two closely intertwined story lines. A socioeconomic one concentrating on street petrol- sibility of street petrol stations as one core service of general interest important for the overall

  3. California State University, Fullerton Human Resources Access Request Form

    E-Print Network [OSTI]

    de Lijser, Peter

    Resources Access Request Form ** CISO Signature Date Employee Name Date Date I certify that this access

  4. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2012-05-29T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  5. Shape memory system with integrated actuation using embedded particles

    SciTech Connect (OSTI)

    Buckley, Patrick R; Maitland, Duncan J

    2014-04-01T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  6. Shape memory system with integrated actuation using embedded particles

    DOE Patents [OSTI]

    Buckley, Patrick R. (New York, NY); Maitland, Duncan J. (Pleasant Hill, CA)

    2009-09-22T23:59:59.000Z

    A shape memory material with integrated actuation using embedded particles. One embodiment provides a shape memory material apparatus comprising a shape memory material body and magnetic pieces in the shape memory material body. Another embodiment provides a method of actuating a device to perform an activity on a subject comprising the steps of positioning a shape memory material body in a desired position with regard to the subject, the shape memory material body capable of being formed in a specific primary shape, reformed into a secondary stable shape, and controllably actuated to recover the specific primary shape; including pieces in the shape memory material body; and actuating the shape memory material body using the pieces causing the shape memory material body to be controllably actuated to recover the specific primary shape and perform the activity on the subject.

  7. Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

  8. Missing working memory deficit in dyslexia: children writing from memory Erlijn van Genuchtena,b

    E-Print Network [OSTI]

    Cheng, Peter

    Missing working memory deficit in dyslexia: children writing from memory Erlijn van Genuchtena,b (e of writing processes of children with dyslexia, in order to examine the relationship between WM and writing. An experiment was used in which children with dyslexia, and chronological age-matched and reading age

  9. Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms

    E-Print Network [OSTI]

    Jin, Ruoming

    Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms Ruoming that are applicable to a number of common data mining algorithms. These techniques are incorpo- rated in a middleware-alone implementations of individual parallel data mining algorithms. Over- all, our work shows that a common framework

  10. open access journal Public Health

    E-Print Network [OSTI]

    Oakley, Jeremy

    open access journal Journal of Public Health in AfricaeISSN 2038-9930 i www the Journal of Public Health in Africa is a peer-reviewed, electronic quarterly, that focuses on health issues in the African continent. The journal editors seek high quality original articles on public health related issues

  11. LDRD final report : managing shared memory data distribution in hybrid HPC applications.

    SciTech Connect (OSTI)

    Merritt, Alexander M. (Georgia Institute of Technology, Atlanta, GA); Pedretti, Kevin Thomas Tauke

    2010-09-01T23:59:59.000Z

    MPI is the dominant programming model for distributed memory parallel computers, and is often used as the intra-node programming model on multi-core compute nodes. However, application developers are increasingly turning to hybrid models that use threading within a node and MPI between nodes. In contrast to MPI, most current threaded models do not require application developers to deal explicitly with data locality. With increasing core counts and deeper NUMA hierarchies seen in the upcoming LANL/SNL 'Cielo' capability supercomputer, data distribution poses an upper boundary on intra-node scalability within threaded applications. Data locality therefore has to be identified at runtime using static memory allocation policies such as first-touch or next-touch, or specified by the application user at launch time. We evaluate several existing techniques for managing data distribution using micro-benchmarks on an AMD 'Magny-Cours' system with 24 cores among 4 NUMA domains and argue for the adoption of a dynamic runtime system implemented at the kernel level, employing a novel page table replication scheme to gather per-NUMA domain memory access traces.

  12. Experimental Evaluation of the Rheological Properties of Veriflex Shape Memory Polymer

    E-Print Network [OSTI]

    Jan Klesa; Vincent Placet; Emmanuel Foltete; Manuel Collet

    2009-09-16T23:59:59.000Z

    Shape memory polymers (SMPs) are materials with a great potential for future use in smart materials and structures. When heated from cold state (below the transformation temperature, which can either be the glass transition temperature or the melting temperature of the polymer) to hot state (above the transformation temperature) they undergo transformation which can be compared with martensitic transformation of shape memory alloys. This process induces great changes of the mechanical properties and some shape memory phenomenon can be observed. This study is an experimental evaluation of the mechanical properties of SMP Veriflex under different test conditions. Veriflex was chosen because of its easy accessibility. Furthermore its properties are similar to epoxy resins which make it very suitable for usage in a wide variety of technical applications. Dynamic mechanical analysis (DMA) was used to determine evolution of the viscoelastic properties versus temperature and frequency under cyclic harmonic loading. The glass transition temperature clearly appears in a range from 45\\degree C to 60\\degree C depending on loading frequency. The glass transition is noticeably marked by an impressive decrease in the storage modulus of about 4 decades. The master curve of Veriflex was created and allows the time-temperature superposition to be constructed for this material. Thermo-mechanical working cycle of SMP with 100% elongation was also experimentally tested. Finally results from all these experimental investigations were used to design a demonstrator showing the possibility of application in engineering and especially for shape control.

  13. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    1998-01-01T23:59:59.000Z

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  14. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, W.L.; Vanheusden, K.J.R.; Fleetwood, D.M.; Devine, R.A.B.

    1998-11-03T23:59:59.000Z

    An electrically written memory element is disclosed utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element. 19 figs.

  15. Ni-Mn-Ga shape memory nanoactuation

    SciTech Connect (OSTI)

    Kohl, M., E-mail: manfred.kohl@kit.edu; Schmitt, M.; Krevet, B. [Karlsruhe Institute of Technology, IMT, P.O. Box 3640, 76021 Karlsruhe (Germany); Backen, A.; Schultz, L. [IFW Dresden, P.O. Box 270116, 01171 Dresden (Germany); Fhler, S. [IFW Dresden, P.O. Box 270116, 01171 Dresden (Germany); Technische Universitt Chemnitz, Institute of Physics, 09107 Chemnitz (Germany)

    2014-01-27T23:59:59.000Z

    To probe finite size effects in ferromagnetic shape memory nanoactuators, double-beam structures with minimum dimensions down to 100?nm are designed, fabricated, and characterized in-situ in a scanning electron microscope with respect to their coupled thermo-elastic and electro-thermal properties. Electrical resistance and mechanical beam bending tests demonstrate a reversible thermal shape memory effect down to 100?nm. Electro-thermal actuation involves large temperature gradients along the nanobeam in the order of 100?K/?m. We discuss the influence of surface and twin boundary energies and explain why free-standing nanoactuators behave differently compared to constrained geometries like films and nanocrystalline shape memory alloys.

  16. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (Albuquerque, NM); Vanheusden, Karel J. R. (Albuquerque, NM); Fleetwood, Daniel M. (Albuquerque, NM); Devine, Roderick A. B. (St. Martin le Vinoux, FR)

    2000-01-01T23:59:59.000Z

    An electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure laterally through the exposed edges of the silicon dioxide layer during a high temperature anneal in an atmosphere containing hydrogen gas. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronic elements on the same silicon substrate. With the addition of an optically active layer, the memory element becomes an electrically written, optically read optical memory element.

  17. Structural Thermomechanical Models for Shape Memory Alloy Components

    E-Print Network [OSTI]

    Rao, Ashwin

    2014-04-18T23:59:59.000Z

    Thermally responsive shape memory alloys (SMA) demonstrate interesting properties like shape memory effect (SME) and superelasticity (SE). SMA components in the form of wires, springs and beams typically exhibit complex, nonlinear hysteretic...

  18. Early remodeling of the neocortex upon episodic memory encoding

    E-Print Network [OSTI]

    Ericsson, M.

    Understanding the mechanisms by which long-term memories are formed and stored in the brain represents a central aim of neuroscience. Prevailing theory suggests that long-term memory encoding involves early plasticity ...

  19. Intellectual property strategy : analysis of the flash memory industry

    E-Print Network [OSTI]

    Ogura, Tomoko H

    2006-01-01T23:59:59.000Z

    This thesis studies the intellectual property strategy of companies in the flash memory industry, with special emphasis on technology and the development of nitride-based flash, a new and emerging type of memory technology. ...

  20. Main Memory Management for Persistence Antony L. Hosking

    E-Print Network [OSTI]

    Hosking, Antony

    Reachability-based persistence imposes new requirements for main memory management in general, and garbage col memory heap. However, objects may survive from one run of a program to the next, by virtue of being

  1. Linking dopaminergic physiology to working memory related neural circuitry

    E-Print Network [OSTI]

    Bolton, Andrew D. (Andrew Donald)

    2014-01-01T23:59:59.000Z

    Working memory is the ability to hold information "online" over a delay in order to perform a task. This kind of memory is thought to be encoded in the brain by persistent neural activity that outlasts the presentation of ...

  2. Reversible neural inactivation reveals hippocampal particin several memory processesipation

    E-Print Network [OSTI]

    Riedel, G; Micheau, J; Lam, A G M; Roloff, E.v.L.; Martin, Stephen J; Bridge, H; de Hoz, L; Poeschel, B; McCulloch, J; Morris, Richard G M

    Studies of patients and animals with brain lesions have implicated the hippocampal formation in spatial, declarative/relational and episodic types of memory. These and other types of memory consist of a series of ...

  3. Development of Superelastic Effects in Ferrous Shape Memory Alloy

    E-Print Network [OSTI]

    Olson, Scott Michael

    SE: Superelastic effect SME: Shape memory effect Nitinol:shape memory effect, (SME), whereby the material returns toelastic strain. In SMAs, the SME and SE are based on the

  4. Curating Memory: 9/11 Commemoration and Foucault's Archive

    E-Print Network [OSTI]

    Rowe, Sara 1988-

    2012-08-17T23:59:59.000Z

    This study of commemoration of 9/11 on the 10th anniversary is performed at the intersection of public memory and rhetorical studies. Examining the role of the individual within public memory, this study furthers both ...

  5. Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture

    E-Print Network [OSTI]

    Good Programming in Transactional Memory$ Game Theory Meets Multicore Architecture Raphael compatible. Keywords: transactional memory, game theory, multicore architecture, concurrency, contention management, mechanism design, human factors 1. Introduction In traditional single core architecture

  6. Method for refreshing a non-volatile memory

    SciTech Connect (OSTI)

    Riekels, James E. (New Hope, MN); Schlesinger, Samuel (Aventura, FL)

    2008-11-04T23:59:59.000Z

    A non-volatile memory and a method of refreshing a memory are described. The method includes allowing an external system to control refreshing operations within the memory. The memory may generate a refresh request signal and transmit the refresh request signal to the external system. When the external system finds an available time to process the refresh request, the external system acknowledges the refresh request and transmits a refresh acknowledge signal to the memory. The memory may also comprise a page register for reading and rewriting a data state back to the memory. The page register may comprise latches in lieu of supplemental non-volatile storage elements, thereby conserving real estate within the memory.

  7. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean Water Innovations

  8. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Become agovEducationWelcome FinancialScience at

  9. Single-word multiple-bit upsets in static random access devices

    SciTech Connect (OSTI)

    Koga, R.; Pinkerton, S.D.; Lie, T.J.; Crawford, K.B. (Aerospace Corp., Los Angeles, CA (United States))

    1993-12-01T23:59:59.000Z

    Energetic ions and protons can cause single event upsets (SEUs) in static random access memory (SRAM) cells. In some cases multiple bits may be upset as the result of a single event. Space-borne electronics systems incorporating high-density SRAM are vulnerable to single-word multiple-bit upsets (SMUs). The authors review here recent observations of SMU, present the results of a systematic investigation of the physical cell arrangements employed in several currently available SRAM device types, and discuss implications for the occurrence and mitigation of SMU.

  10. Site Access Policy | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Access Policy All visitors to Argonne require appropriate authorization before they are allowed on the Argonne site. For information regarding site access for a U.S. citizen...

  11. City of Boulder- Solar Access Ordinance

    Broader source: Energy.gov [DOE]

    The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

  12. Metropolitan Accessibility and Transportation Sustainability:Sustainability

    E-Print Network [OSTI]

    Papalambros, Panos

    Metropolitan Accessibility and Transportation Sustainability:Sustainability: Comparative Reduce (fulfillment of)Promote Sustainability: Meet needs of (fulfillment of) needs present Institute SMART Sustainable Mobility and Accessibility Research andSMART Sustainable Mobility

  13. Alexandria Digital Library Project Content Access Characterization

    E-Print Network [OSTI]

    Jane, Greg

    Alexandria Digital Library Project Content Access Characterization in Digital Libraries Greg Jane James Frew David Valentine University of California, Santa Barbara #12;Alexandria Digital Library environments e.g., GIS #12;Alexandria Digital Library Project Jane, Frew, Valentine Content Access

  14. Argonne Site Access | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Site Access Argonne National Laboratory is a controlled-access facility. You will need a visitor's pass or a user badge to enter the Argonne campus. You must notify us of...

  15. Fast Access Data Acquisition System

    SciTech Connect (OSTI)

    Dr. Vladimir Katsman

    1998-03-17T23:59:59.000Z

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  16. Subject Access to Your Information

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Subject Access to Your Information Sandy Tucker Texas A&M University Libraries August 1, 2006 Second International Symposium on Transportation Technology Transfer Introduction You have packages ? books, pamphlets, files, electronic documents. You... have records of packages ? cards or an online database. Other? We?re talking about adding subject information to the records of packages. Specifically, we?ll talk about using a ?controlled vocabulary.? Controlled Vocabulary Using a fixed list...

  17. Life-cycle assessment of NAND flash memory

    E-Print Network [OSTI]

    Boyd, Sarah; Horvath, A; Dornfeld, David

    2010-01-01T23:59:59.000Z

    global warming potential (GWP) of ?ash memory are abatement of per?uorinated compounds (PFCs) and reduction of electricity-

  18. Making Memorial Day Plans? Be Sure They're Efficient

    Broader source: Energy.gov [DOE]

    Useful tips from Energy Savers - from cooking, to entertaining, to driving - how to stay energy efficient this Memorial Day weekend.

  19. Development of Superelastic Effects in Ferrous Shape Memory Alloy

    E-Print Network [OSTI]

    Olson, Scott Michael

    titanium shape memory alloy SIM: Stress-induced martensite LOM: Light optical microscopy SEM: Scanning electron microscope EDS: Energy

  20. Shape memory and pseudoelasticity in metal nanowires.

    SciTech Connect (OSTI)

    Zimmerman, Jonathan A.; Park, Harold S.; Gall, Ken

    2005-07-01T23:59:59.000Z

    Structural reorientations in metallic fcc nanowires are controlled by a combination of size, thermal energy, and the type of defects formed during inelastic deformation. By utilizing atomistic simulations, we show that certain fcc nanowires can exhibit both shape memory and pseudoelastic behavior. We also show that the formation of defect-free twins, a process related to the material stacking fault energy, nanometer size scale, and surface stresses is the mechanism that controls the ability of fcc nanowires of different materials to show a reversible transition between two crystal orientations during loading and thus shape memory and pseudoelasticity.

  1. Circular polarization memory in polydisperse scattering media

    E-Print Network [OSTI]

    Macdonald, Callum M; Meglinski, Igor

    2015-01-01T23:59:59.000Z

    We investigate the survival of circularly polarized light in random scattering media. The surprising persistence of this form of polarization has a known dependence on the size and refractive index of scattering particles, however a general description regarding polydisperse media is lacking. Through analysis of Mie theory, we present a means of calculating the magnitude of circular polarization memory in complex media, with total generality in the distribution of particle sizes and refractive indices. Quantification of this memory effect enables an alternate pathway towards recovering particle size distribution, based on measurements of diffusing circularly polarized light.

  2. Shape memory behavior of ultrafine grained NiTi and TiNiPd shape memory alloys

    E-Print Network [OSTI]

    Kockar, Benat

    2009-05-15T23:59:59.000Z

    The cyclic instability in shape memory characteristics of NiTi-based shape memory alloys (SMAs), such as transformation temperatures, transformation and irrecoverable strains and transformation hysteresis upon thermal and mechanical cycling limits...

  3. The nature of the working memory system underlying language processing and its relationship to the long-term memory system

    E-Print Network [OSTI]

    Fedorenko, Evelina Georgievna

    2007-01-01T23:59:59.000Z

    This thesis examines two questions concerning the working memory system underlying language processing: (1) To what extent is the working memory system underlying language processing domain-specific? and (2) What is the ...

  4. Evaluating Memory Energy Efficiency in Parallel I/O Workloads

    E-Print Network [OSTI]

    Zhu, Yifeng

    Evaluating Memory Energy Efficiency in Parallel I/O Workloads Jianhui Yue,Yifeng Zhu , Zhao Cai the ever- widening gap between disk and processor speeds, memory energy efficiency becomes an increasingly management policies heavily influence the overall memory energy efficiency. In partic- ular, under the same

  5. Reinforcement Learning for Active Length Control of Shape Memory Alloys

    E-Print Network [OSTI]

    Valasek, John

    Reinforcement Learning for Active Length Control of Shape Memory Alloys Kenton Kirkpatrick John Valasek Aerospace Engineering Department Texas A&M University AIAA GNC Conference 21 August 2008 Honolulu;Kirkpatrick & Valasek - 5 Shape Memory Alloys (SMA) Metallic Alloys used as actuators Shape Memory Effect

  6. An Instance Theory of Attention and Memory Gordon D. Logan

    E-Print Network [OSTI]

    Logan, Gordon D.

    of attention and memory (ITAM) is presented that integrates formal theories of attention and memory phenomena; objects are categorized by attending to them. ITAM incorporates each of its ancestors as a special case of this heritage, I call the new theory the instance theory of attention and memory (ITAM). Its ancestors on each

  7. Using Multilevel Phase Change Memory to Build Data Storage: A

    E-Print Network [OSTI]

    Zhang, Tong

    cache. It is well known that phase-change material resistance drift gradually reduces memory deviceUsing Multilevel Phase Change Memory to Build Data Storage: A Time-Aware System Design Perspective per cell (MLC) phase-change memory (PCM) in data storage systems such as solid-state disk and disk

  8. Phase Change Memory An Architecture and Systems Perspective

    E-Print Network [OSTI]

    Lee, Benjamin C.

    #12;Phase Change Memory Store data within phase change material [Ovshinsky68] Set phase via currentPhase Change Memory An Architecture and Systems Perspective Benjamin Lee Computer Architecture lifetime 1 B.Lee et al. "Architecting phase change memory as a scalable DRAM alternative." ISCA-36

  9. Coding-based Energy Minimization for Phase Change Memory

    E-Print Network [OSTI]

    -1-4503-1199-1/12/06 ...$10.00. states of the phase-change material. In one state, the ma- terial is amorphous with a highCoding-based Energy Minimization for Phase Change Memory Azalia Mirhoseini Electrical and Computer Phase Change Memory write energy. Our method minimizes the energy required for memory rewrites

  10. Guide wire extension for shape memory polymer occlusion removal devices

    DOE Patents [OSTI]

    Maitland, Duncan J. (Pleasant Hill, CA); Small, IV, Ward (Livermore, CA); Hartman, Jonathan (Sacramento, CA)

    2009-11-03T23:59:59.000Z

    A flexible extension for a shape memory polymer occlusion removal device. A shape memory polymer instrument is transported through a vessel via a catheter. A flexible elongated unit is operatively connected to the distal end of the shape memory polymer instrument to enhance maneuverability through tortuous paths en route to the occlusion.

  11. Design of Innovative Thermoset Shape Memory Polyurethanes (SMPUs)

    E-Print Network [OSTI]

    Dalang, Robert C.

    Design of Innovative Thermoset Shape Memory Polyurethanes (SMPUs) Author: Yaobo Ding Supervisor, cole Polytechnique Fdrale de Lausanne Email: yaobo.ding@epfl.ch Motivation Shape memory polymers-based shape memory polymers, and microfludic devices is one of them. Low cost SMPUs for microfluidics

  12. Shape Memory Polymer Patrick T. Mather,1,2

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape Memory Polymer Research Patrick T. Mather,1,2 Xiaofan Luo,1,2 and Ingrid A. Rousseau3 1-145419 Copyright c 2009 by Annual Reviews. All rights reserved 1531-7331/09/0804-0445$20.00 Key Words shape memory witnessed significant advances in the field of shape memory polymers (SMPs) with the elucidation of new

  13. Introduction Nickel Titanium exhibits shape-memory or

    E-Print Network [OSTI]

    Dalang, Robert C.

    Introduction Nickel Titanium exhibits shape-memory or superelastic effect coupled with good of the implant. Figure 1: (a) Shape-memory effect. (b) Superelastic effect Processing and Characterization of NiTi Shape-Memory Alloys with 3D Interconnected Porosity Antoine Emery Supervisors: Prof. A. Mortensen (EPFL

  14. Shape Memory Assisted Self-Healing Coating Xiaofan Luo

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape Memory Assisted Self-Healing Coating Xiaofan Luo and Patrick T. Mather* Department and characterization of new shape memory assisted self- healing (SMASH) coatings. The coatings feature a phase in a shape memory epoxy matrix. Mechanical damage to the coating can be self-healed via heating, which

  15. Toward Evaluation of Shape Memory Alloy Actuators for Endosurgery

    E-Print Network [OSTI]

    Toward Evaluation of Shape Memory Alloy Actuators for Endosurgery Kaari Koehn and Shahram Payandeh the movements of MIS tools. One such altemative could be the e:lectromechanical shape memory alloy actuators as in teleoperation. Nickel-Titanium (NiTi)alloy is a commerciallyavailable member of the family of Shape Memory

  16. Dynamic Buckling and Recovery of Thin Cylindrical Shape Memory Shells

    E-Print Network [OSTI]

    Nemat-Nasser, Sia

    Dynamic Buckling and Recovery of Thin Cylindrical Shape Memory Shells Mahmoud Reza Amini and Sia@ucsd.edu Phone: (858) 534-6525 FAX: (858) 534-2727 Abstract Shape-memory alloys can sustain relatively large consisting of shape-memory alloys in order to understand the response when used as the core of the sandwich

  17. Shape memory and nanostructure in poly(norbornyl-POSS) copolymers

    E-Print Network [OSTI]

    Mather, Patrick T.

    Shape memory and nanostructure in poly(norbornyl-POSS) copolymers HG Jeon,1 * PT Mather2 and TS Blvd., Edwards AFB, CA 935247680, USA Abstract: The microstructure and shape-memory properties by rapid quenching in LN2. Shape-memory properties of such drawn samples were explored by measuring

  18. A shape memory-based multifunctional structural actuator panel

    E-Print Network [OSTI]

    Wadley, Haydn

    A shape memory-based multifunctional structural actuator panel Dana M. Elzey *, Aarash Y.N. Sofla significant load. The shape change is effected by shape memory alloy face sheet elements, which exploit a ``one-way'' shape memory effect only. Unlike other related designs, no external or bias forces

  19. Characterization of Shape Memory Alloys Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    Characterization of Shape Memory Alloys Using Artificial Neural Networks James V. Henrickson , Kenton Kirkpatrick, and John Valasek Texas A&M University, College Station, Texas 77843-3141 Shape memory of shape memory alloys, however, is often com- plicated by their hysteretic, non-linear, thermo

  20. Combining Pattern Instability and Shape-Memory Hysteresis for Phononic

    E-Print Network [OSTI]

    Combining Pattern Instability and Shape-Memory Hysteresis for Phononic Switching Ji-Hyun Jang Received April 10, 2009 ABSTRACT We report a fully reversible and robust shape-memory effect in a two simulations correctly capture the three steps of the shape-memory cycle observed experimentally. Structures

  1. On the thermomechanical deformation of silver shape memory nanowires

    E-Print Network [OSTI]

    Lin, Xi

    On the thermomechanical deformation of silver shape memory nanowires Harold S. Park *, Changjiang an analysis of the uniaxial thermomechanical deformation of single-crystal silver shape memory nanowires using atomistic simulations. We first demonstrate that silver nanowires can show both shape memory

  2. Model-Free Control of Shape Memory Alloys Antagonistic Actuators

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Model-Free Control of Shape Memory Alloys Antagonistic Actuators Pierre-Antoine Gedouin , C with a first application of the new framework of model-free control to the promising technology of shape memory alloys actuators. In particular antagonistic shape memory alloys actuator. These devices are known

  3. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, George S. (8516 San Francisco NE., Albuquerque, NM 87109); Grafe, Victor Gerald (1909 Saturn Ct. NE., Albuquerque, NM 87112)

    1997-01-01T23:59:59.000Z

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a "fire" signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor.

  4. Direct match data flow memory for data driven computing

    DOE Patents [OSTI]

    Davidson, G.S.; Grafe, V.G.

    1997-10-07T23:59:59.000Z

    A data flow computer and method of computing is disclosed which utilizes a data driven processor node architecture. The apparatus in a preferred embodiment includes a plurality of First-In-First-Out (FIFO) registers, a plurality of related data flow memories, and a processor. The processor makes the necessary calculations and includes a control unit to generate signals to enable the appropriate FIFO register receiving the result. In a particular embodiment, there are three FIFO registers per node: an input FIFO register to receive input information form an outside source and provide it to the data flow memories; an output FIFO register to provide output information from the processor to an outside recipient; and an internal FIFO register to provide information from the processor back to the data flow memories. The data flow memories are comprised of four commonly addressed memories. A parameter memory holds the A and B parameters used in the calculations; an opcode memory holds the instruction; a target memory holds the output address; and a tag memory contains status bits for each parameter. One status bit indicates whether the corresponding parameter is in the parameter memory and one status bit to indicate whether the stored information in the corresponding data parameter is to be reused. The tag memory outputs a ``fire`` signal (signal R VALID) when all of the necessary information has been stored in the data flow memories, and thus when the instruction is ready to be fired to the processor. 11 figs.

  5. Behavioral/Systems/Cognitive Consolidation Patterns of Human Motor Memory

    E-Print Network [OSTI]

    Shadmehr, Reza

    Behavioral/Systems/Cognitive Consolidation Patterns of Human Motor Memory Sarah E. Criscimagna-Hemminger and Reza Shadmehr Laboratory for Computational Motor Control, Department of Biomedical Engineering, Johns of acquiring a new memory that competes with the old, effectively masking it? We considered motor memories

  6. An implementation of SISAL for distributed-memory architectures

    SciTech Connect (OSTI)

    Beard, P.C.

    1995-06-01T23:59:59.000Z

    This thesis describes a new implementation of the implicitly parallel functional programming language SISAL, for massively parallel processor supercomputers. The Optimizing SISAL Compiler (OSC), developed at Lawrence Livermore National Laboratory, was originally designed for shared-memory multiprocessor machines and has been adapted to distributed-memory architectures. OSC has been relatively portable between shared-memory architectures, because they are architecturally similar, and OSC generates portable C code. However, distributed-memory architectures are not standardized -- each has a different programming model. Distributed-memory SISAL depends on a layer of software that provides a portable, distributed, shared-memory abstraction. This layer is provided by Split-C, a dialect of the C programming language developed at U.C. Berkeley, which has demonstrated good performance on distributed-memory architectures. Split-C provides important capabilities for good performance: support for program-specific distributed data structures, and split-phase memory operations. Distributed data structures help achieve good memory locality, while split-phase memory operations help tolerate the longer communication latencies inherent in distributed-memory architectures. The distributed-memory SISAL compiler and run-time system takes advantage of these capabilities. The results of these efforts is a compiler that runs identically on the Thinking Machines Connection Machine (CM-5), and the Meiko Computing Surface (CS-2).

  7. Energy Efficient Proactive Thermal Management in Memory Subsystem

    E-Print Network [OSTI]

    Simunic, Tajana

    Energy Efficient Proactive Thermal Management in Memory Subsystem Raid Ayoub rayoub management of memory subsystem is challenging due to performance and thermal constraints. Big energy gains appreciable energy savings in memory sub-system and mini- mize thermal problems. We adopt the consolidation

  8. GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS

    E-Print Network [OSTI]

    Schott, Ren - Institut de Mathmatiques lie Cartan, Universit Henri Poincar

    GENETIC HEURISTICS FOR REDUCING MEMORY ENERGY CONSUMPTION IN EMBEDDED SYSTEMS Maha IDRISSI AOUAD.loria.fr/zendra Keywords: Energy consumption reduction, Genetic heuristics, memory allocation management, optimizations on heuristic methods for SPMs careful management in order to reduce memory energy consumption. We propose

  9. Human Resources Security Access Matrix Function Training

    E-Print Network [OSTI]

    Wu, Shin-Tson

    June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

  10. Revised Spring 2008 NIH Public Access Policy

    E-Print Network [OSTI]

    Revised Spring 2008 NIH Public Access Policy Notice Number: NOT-OD-08-033 - (See Notice NOT-OD-08-161 (Consolidated Appropriations Act, 2008), the NIH voluntary Public Access Policy (NOT-OD-05-022) is now mandatory shall implement the public access policy in a manner consistent with copyright law. Specifics 1. The NIH

  11. AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE

    E-Print Network [OSTI]

    Oregon, University of

    AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

  12. Instructions for Accessing FedConnect Postings, June 30, 2009...

    Broader source: Energy.gov (indexed) [DOE]

    Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings and...

  13. Acronyms A AAAP Accelerated Access Authorization Program ACREM...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    S S Secret SRD SecretRestricted Data SAACS Security Alarm and Access Control System SAP Special Access Program SAPOC Special Access Program Oversight Committee SC Office...

  14. Administrative Access Policy Exception Process & Request Form Administrative Access Policy Exception Process

    E-Print Network [OSTI]

    Arnold, Jonathan

    Administrative Access Policy ­ Exception Process & Request Form (Page 1) Administrative Access Policy ­ Exception Process Administrative Access Policy Overview According to the Franklin College Administrative Access Policy , all IT devices with a UGA control number will be setup with user

  15. Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable Memory Architectures

    E-Print Network [OSTI]

    Kavi, Krishna

    Exploring Phase Change Memory and 3D Die-Stacking for Power/Thermal Friendly, Fast and Durable) as a promising candidate to achieve scalable, low power and thermal friendly memory system architecture leakages and retention time. DRAM-based main memory is also consuming an increasing proportion of the power

  16. Protist Web Alert Memories of Times Past

    E-Print Network [OSTI]

    Simpson, Larry

    Protist Web Alert Memories of Times Past The Euglenoid Project (http that the Euglenoids have always fascinated me and so did this site. Micro*scope Astrobiology Institute Web Site from reviewed this site in a previous Web Alert, but it has been revised and updated and so is worth another

  17. Characterizing Flash Memory: Anomalies, Observations, and Applications

    E-Print Network [OSTI]

    Wang, Deli

    ), and reliability of flash memory. In addition, we must understand how different usage patterns affect char- acteristics and show how we can use them to improve responsive- ness and energy consumption begun to make the transi- tion from embedded devices to laptops, desktops, and data cen- ters

  18. Rewritable Memory by Controllable Nanopatterning of DNA

    E-Print Network [OSTI]

    Pierce, Niles A.

    ABSTRACT Fabricating a nanostructure capable of reversibly patterning molecules is a fundamental goal within nanotechnology, underlying diverse processes such as information storage, scaffold functioning of the device as rewritable memory. The bit state of each address is controlled by specific DNA

  19. Memorial University of Newfoundland Diving Safety

    E-Print Network [OSTI]

    deYoung, Brad

    .2 Maintenance and Inspections 17 9.3 Use of Diving Equipment 17 9.4 Equipment Procedures 18 9.5 Inspection PROCEDURES 20 12.1 Planning of Diving Operations 21 12.2 Adherence to Planned Depth Procedures 21 12 safety manual is designed to provide Memorial University scientific divers with standards and procedures

  20. Dahlia Greidinger Memorial Symposium Department of Environmental,

    E-Print Network [OSTI]

    and Agricultural Engineering Organized and supported by: The Dahlia Greidinger Memorial Fund and BARD, The United dynamics and reaction mechanisms, particularly those of nitrogen and phosphorus in crop/food production systems, with special emphasis on interactions with organic loads/wastes and under possible global changes

  1. Finding Memory Leaks in Java with JDeveloper

    E-Print Network [OSTI]

    Livshits, Ben

    believe, Java's garbage collector does not solve all me- mory problems that might occur in practice feature of memory management in Java is its garbage-collected heap. A typical garbage collector that comes all objects reach- able from a set of roots. These reachable objects survive collections because

  2. 11. Memory Limitations in Artificial Intelligence

    E-Print Network [OSTI]

    [424], take the oldest known scien- tific treatise surviving from the ancient world, the surgical confronted to AI for many years. As an example, take the garbage collector problem. Min- sky [551] proposes the first copying garbage collector for LISP; an algorithm using serial secondary memory. The live data

  3. Memory in the system: trajectory-environment

    E-Print Network [OSTI]

    Maxim Budaev

    2007-08-10T23:59:59.000Z

    In the paper the memory effect in the system consisting from a trajectory of process and an environment is considered. The environment is presented by scalar potential and noise. The evolution of system is interpreted as process of the continuous "measurement" of a trajectory by an environment and\\or on the contrary. In this sense the measured value is entropy-the information about embedding of the trajectory into configurations space. The concepts "measurement" and "interaction" are identified alike in quantum theory. Thus, the entropy evolution is not only the effect of dynamics, but also its cause, if it is possible to speak about causality in this case. It is shown, that such non-elastic interaction leads to occurrence of memory in the system. The reflex memory mechanism is realized as a real conformal dynamic metrics. The metastable event (attractor) is defined and time of its life is estimated. It is shown, that in the system there is a change of dynamic modes from spatial localization to random walk (fluctuation, relaxation). On scale of the attractors dynamics the memory is appearing as a semi-regular (in some information sense) drift of the image of fluctuations in a power spectrum of environment to absolute minimum. The latter properties (topological convergence) attract the attention to algorithmic aspect of a considered system.

  4. External Memory Data Structures (Invited Paper)

    E-Print Network [OSTI]

    Arge, Lars

    bottleneck. In this paper we survey recent advances in the development of worst­case I/O­efficient external databases for objects that satisfy certain spatial constraints. Typical queries include reporting the ob­purpose) external memory data structures (or indexes) has always been a main concern in the database community, most

  5. Allegories of Modernity, Geographies of Memory

    E-Print Network [OSTI]

    Jeon, Seenhwa

    2012-10-19T23:59:59.000Z

    imaginary with mirror images and events. The postmodernist narrative of memory in these novels turns the time of the now into a time for the "past as to come," a time to detect the unrealized and unfulfilled possibilities of the past, through retellings...

  6. Subject Access to Your Information

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Lists Transportation Research Thesaurus Your own list Use a Short List or a Long List of Terms? If you have a small collection, a short list of terms is appropriate. If you have a large collection, a longer list of more specific terms..., such as the Transportation Research Thesaurus, may be helpful. Longer list will help describe your packages in more specific ways. Subject Access to Other Kinds of Information People ? Expertise Groups of People Projects Equipment, Facilities Use the same set of subject...

  7. Laboratory Access | Sample Preparation Laboratories

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home asLCLS ExperimentalFiveVentureFrontiers inAccess

  8. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote Access Ames Laboratory

  9. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  10. Quantum Error Correction for Quantum Memories

    E-Print Network [OSTI]

    Barbara M. Terhal

    2015-01-20T23:59:59.000Z

    Active quantum error correction using qubit stabilizer codes has emerged as a promising, but experimentally challenging, engineering program for building a universal quantum computer. In this review we consider the formalism of qubit stabilizer and subsystem stabilizer codes and their possible use in protecting quantum information in a quantum memory. We review the theory of fault-tolerance and quantum error-correction, discuss examples of various codes and code constructions, the general quantum error correction conditions, the noise threshold, the special role played by Clifford gates and the route towards fault-tolerant universal quantum computation. The second part of the review is focused on providing an overview of quantum error correction using two-dimensional (topological) codes, in particular the surface code architecture. We discuss the complexity of decoding and the notion of passive or self-correcting quantum memories. The review does not focus on a particular technology but discusses topics that will be relevant for various quantum technologies.

  11. Accessing graphic information: Challenges of tomorrow

    SciTech Connect (OSTI)

    Frazer, G. Jr. [Power System Engineering, Inc., Madison, WI (United States). AM/FM Service Div.

    1995-12-31T23:59:59.000Z

    During the justification process of AM/FM projects, utilities seek to find as many benefits as possible using AM/FM technology. In many cases the ultimate benefit of simply providing users the ability to access the digital information is overlooked. This paper outlines why access may be overlooked, why providing access is important and what kind of tool is needed in the long term.

  12. SLAC All Access: Laser Labs

    SciTech Connect (OSTI)

    Minitti, Mike; Woods Mike

    2013-03-01T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  13. SLAC All Access: Laser Labs

    ScienceCinema (OSTI)

    Minitti, Mike; Woods Mike

    2014-06-03T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  14. Multi-core and Many-core Shared-memory Parallel Raycasting Volume Rendering Optimization and Tuning

    SciTech Connect (OSTI)

    Howison, Mark

    2012-01-31T23:59:59.000Z

    Given the computing industry trend of increasing processing capacity by adding more cores to a chip, the focus of this work is tuning the performance of a staple visualization algorithm, raycasting volume rendering, for shared-memory parallelism on multi-core CPUs and many-core GPUs. Our approach is to vary tunable algorithmic settings, along with known algorithmic optimizations and two different memory layouts, and measure performance in terms of absolute runtime and L2 memory cache misses. Our results indicate there is a wide variation in runtime performance on all platforms, as much as 254% for the tunable parameters we test on multi-core CPUs and 265% on many-core GPUs, and the optimal configurations vary across platforms, often in a non-obvious way. For example, our results indicate the optimal configurations on the GPU occur at a crossover point between those that maintain good cache utilization and those that saturate computational throughput. This result is likely to be extremely difficult to predict with an empirical performance model for this particular algorithm because it has an unstructured memory access pattern that varies locally for individual rays and globally for the selected viewpoint. Our results also show that optimal parameters on modern architectures are markedly different from those in previous studies run on older architectures. And, given the dramatic performance variation across platforms for both optimal algorithm settings and performance results, there is a clear benefit for production visualization and analysis codes to adopt a strategy for performance optimization through auto-tuning. These benefits will likely become more pronounced in the future as the number of cores per chip and the cost of moving data through the memory hierarchy both increase.

  15. Characterizing Open Access Publishing at Your Institution

    E-Print Network [OSTI]

    Hubbard, David E.; Li, Yu

    2014-11-03T23:59:59.000Z

    Medical Library, 2008) Open Access (OA) digital, online, free of charge, and free of most copyright and licensing restrictions. (Suber, 2012, p. 4) Flavors of Open Access Gold: provide immediate open access, peer reviewed; authors retain copyright...://becker.wustl.edu/services/scholarly/whatis.html. Ali, A., Shah, T. A., & Mirza, I. Z. (2011). Open Access Research Output of the University of Kashmir. Trends in Information Management, 7(2), 237-243. Amos, K., Mower, A., James, M. A., Weber, A., Yaffe, J., & Youngkin, M. (2012). Exploring...

  16. International Electricity Trade - Open Access | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    DOE has consistently expressed its policy that international electricity trade should be subject to the same principles of comparable open access and non-discrimination that apply...

  17. The Ohio Capital Access Program (OCAP) (Ohio)

    Broader source: Energy.gov [DOE]

    The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business...

  18. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Pacific Ocean Science & Technology Kuykendall Annex Information Technology Center Krauss Hall Holmes HallStairs Pond UH Parking Access & Mid-Pacific Institute Exit Dole Street Offices Multipurpose

  19. ACCESS 2010 Level 1 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and modify new databases. Course Goals: Identify the basic components of an Access database. Build the structure of a database. Manage data in tables. Query a database. Design...

  20. Access Control for SAR Systems Stephen Quirolgico

    E-Print Network [OSTI]

    Access Control for SAR Systems Stephen Quirolgico Vincent Hu Tom Karygiannis NIST IR 7815 #12;NIST Systems Stephen Quirolgico Vincent Hu Tom Karygiannis Computer Security Division Information Technology

  1. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified...

  2. Shape Memory Polymer Therapeutic Devices for Stroke

    SciTech Connect (OSTI)

    Wilson, T S; Small IV, W; Benett, W J; Bearinger, J P; Maitland, D J

    2005-10-11T23:59:59.000Z

    Shape memory polymers (SMPs) are attracting a great deal of interest in the scientific community for their use in applications ranging from light weight structures in space to micro-actuators in MEMS devices. These relatively new materials can be formed into a primary shape, reformed into a stable secondary shape, and then controllably actuated to recover their primary shape. The first part of this presentation will be a brief review of the types of polymeric structures which give rise to shape memory behavior in the context of new shape memory polymers with highly regular network structures recently developed at LLNL for biomedical devices. These new urethane SMPs have improved optical and physical properties relative to commercial SMPs, including improved clarity, high actuation force, and sharper actuation transition. In the second part of the presentation we discuss the development of SMP based devices for mechanically removing neurovascular occlusions which result in ischemic stroke. These devices are delivered to the site of the occlusion in compressed form, are pushed through the occlusion, actuated (usually optically) to take on an expanded conformation, and then used to dislodge and grip the thrombus while it is withdrawn through the catheter.

  3. Thermomechanical indentation of shape memory polymers.

    SciTech Connect (OSTI)

    Long, Kevin N. (University of Colorado, Boulder, CO); Nguyen, Thao D.; Castro, Francisco (University of Colorado, Boulder, CO); Qi, H. Jerry (University of Colorado, Boulder, CO); Dunn, Martin L. (University of Colorado, Boulder, CO); Shandas, Robin (University of Colorado, Boulder, CO)

    2007-04-01T23:59:59.000Z

    Shape memory polymers (SMPs) are receiving increasing attention because of their ability to store a temporary shape for a prescribed period of time, and then when subjected to an environmental stimulus, recover an original programmed shape. They are attractive candidates for a wide range of applications in microsystems, biomedical devices, deployable aerospace structures, and morphing structures. In this paper we investigate the thermomechanical behavior of shape memory polymers due to instrumented indentation, a loading/deformation scenario that represents complex multiaxial deformation. The SMP sample is indented using a spherical indenter at a temperature T{sub 1} (>T{sub g}). The temperature is then lowered to T{sub 2} (memory is then activated by increasing the temperature to T{sub 1} (>T{sub g}) during free recovery the indentation impression disappears and the surface of the SMP recovers to its original profile. A recently-developed three-dimensional finite deformation constitutive model for the thermomechanical behavior of SMPs is then used with the finite element method to simulate this process. Measurement and simulation results are compared for cases of free and constrained recovery and good agreement is obtained, suggesting the appropriateness of the simulation approach for complex multiaxial loading/deformations that are likely to occur in applications.

  4. DESIGN OF A VARIABLE STIFFNESS LEG USING SHAPE MEMORY POLYMER COMPOSITES

    E-Print Network [OSTI]

    Collins, Emmanuel

    571 DESIGN OF A VARIABLE STIFFNESS LEG USING SHAPE MEMORY POLYMER COMPOSITES DUNCAN W. HALDANE materials called shape memory polymers. Shape Memory Polymers (SMPs) experience a several order of magnitude a SMP as the resin matrix, a shape memory polymer composite is formed. A shape memory polymer composite

  5. Academic Libraries and Open Access: Policies, Services and Resources for Increasing Access to Scholarship

    E-Print Network [OSTI]

    Rosenblum, Brian

    2010-07-06T23:59:59.000Z

    This presentation will focus on emerging roles for academic libraries in supporting access to scholarship through open access policies and practices. The University of Kansas recently became the first public university in ...

  6. First record of single event upset on the ground, Cray-1 computer memory at Los Alamos in 1976

    SciTech Connect (OSTI)

    Michalak, Sarah E [Los Alamos National Laboratory; Quinn, Heather M [Los Alamos National Laboratory; Grider, Gary A [Los Alamos National Laboratory; Iwanchuk, Paul N [Los Alamos National Laboratory; Morrison, John F [Los Alamos National Laboratory; Wender, Stephen A [Los Alamos National Laboratory; Normand, Eugene [EN ASSOCIATES, LLC; Wert, Jerry L [BOEING RESEARCH AND TEC; Johnson, Steve [CRAY, INC.

    2010-01-01T23:59:59.000Z

    Records of bit flips in the Cray-1 computer installed at Los Alamos in 1976 lead to an upset rate in the Cray-1 's bipolar SRAMs that correlates with the SEUs being induced by the atmospheric neutrons. In 1976 the Cray Research Company delivered its first supercomputer, the Cray-1, installing it at Los Alamos National Laboratory. Los Alamos had competed with the Lawrence Livermore National Laboratory for the Cray-1 and won, reaching an agreement with Seymour Cray to install the machine for a period of six months for free, after which they could decide whether to buy, lease or return it. As a result, Los Alamos personnel kept track of the computer reliability and performance and so we know that during those six months of operation, 152 memory parity errors were recorded. The computer memory consisted of approximately 70,000 1Kx1 bipolar ECL static RAMs, the Fairchild 10415. What the Los Alamos engineers didn't know is that those bit flips were the result of single event upsets (SEUs) caused by the atmospheric neutrons. Thus, these 152 bit flips were the first recorded SEUs on the earth, and were observed 2 years before the SEUs in the Intel DRAMs that had been found by May and Woods in 1978. The upsets in the DRAMs were shown to have been caused by alpha particles from the chip packaging material. In this paper we will demonstrate that the Cray-1 bit flips, which were found through the use of parity bits in the Cray-1, were likely due to atmospheric neutrons. This paper will follow the same approach as that of the very first paper to demonstrate single event effects, which occurred in satellite flip-flop circuits in 1975. The main difference is that in the four events that occurred over the course of 17 satellite years of operation were shown to be due to single event effects just a few years after those satellite anomalies were recorded. In the case of the Cray-1 bit flips, there has been a delay of more than 30 years between the occurrence of the bit flips and the identification of their cause as SEUs induced by the atmospheric neutrons.

  7. On admissible memory kernels for random unitary qubit evolution

    E-Print Network [OSTI]

    Filip A. Wudarski; Pawe? Nale?yty; Gniewomir Sarbicki; Dariusz Chru?ci?ski

    2015-04-12T23:59:59.000Z

    We analyze random unitary evolution of the qubit within memory kernel approach. We provide su?cient conditions which guarantee that the corresponding memory kernel generates physically legitimate quantum evolution. Interestingly, we are able to recover several well known examples and generate new classes of nontrivial qubit evolution. Surprisingly, it turns out that quantum evolution with memory kernel generated by our approach gives rise to vanishing non-Markovianity measure based on the distinguishability of quantum states.

  8. Ram Shenoy | Department of Energy

    Office of Environmental Management (EM)

    officer for ConocoPhillips. An electrical engineer by training, he has twenty years of oil and gas industry experience. Before taking on his current role at ConocoPhillips,...

  9. Chrysler RAM PHEV Report Notes

    Broader source: Energy.gov (indexed) [DOE]

    reporting period. 2 "Overall DC electrical energy consumption (DC Whmi)" is based on net DC electricity discharged from or charged to the plug-in battery pack and distance...

  10. Ram Shenoy | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR - TProcuring SolarNo.Frequency |DepartmentEvent

  11. RAMS Program | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible forPortsmouth/Paducah47,193.70COMMUNITYResponses: QuestionDaniel

  12. Texture memory and strain-texture mapping in a NiTi shape memory alloy

    SciTech Connect (OSTI)

    Ye, B.; Majumdar, B. S.; Dutta, I. [Materials Department, New Mexico Tech, 801 Leroy Place, Socorro, New Mexico 87801 (United States); Center for Materials Science, Naval Postgraduate School, Monterey, California 93943 (United States)

    2007-08-06T23:59:59.000Z

    The authors report on the near-reversible strain hysteresis during thermal cycling of a polycrystalline NiTi shape memory alloy at a constant stress that is below the yield strength of the martensite. In situ neutron diffraction experiments are used to demonstrate that the strain hysteresis occurs due to a texture memory effect, where the martensite develops a texture when it is cooled under load from the austenite phase and is thereafter ''remembered.'' Further, the authors quantitatively relate the texture to the strain by developing a calculated strain-texture map or pole figure for the martensite phase, and indicate its applicability in other martensitic transformations.

  13. autobiographical memory recall: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Inc. All rights reserved Boahen, Kwabena 93 Memory Distortion in People Reporting Abduction by Aliens Susan A. Clancy, Richard J. McNally, Biology and Medicine Websites...

  14. aversive memory recall: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Inc. All rights reserved Boahen, Kwabena 119 Memory Distortion in People Reporting Abduction by Aliens Susan A. Clancy, Richard J. McNally, Biology and Medicine Websites...

  15. Adaptive memory in humans from a comparative perspective

    E-Print Network [OSTI]

    Krause, Mark

    2015-01-01T23:59:59.000Z

    support a specific type of learning (e.g. , taste aversions,appear to be a distinct type of learning or memory process

  16. Building Green in Greensburg: Kiowa County Memorial Hospital

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing Kiowa County Memorial Hospital building in Greensburg, Kansas.

  17. Rebuilding it Better: Greensburg, Kansas, Kiowa County Memorial Hospital (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2010-03-01T23:59:59.000Z

    This brochure details the sustainable and green aspects of the LEED Platinum-designed Kiowa County Memorial Hospital in Greensburg, Kansas.

  18. auditory working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    requires not only attention Sturm, Alexandra Noelle 2013-01-01 9 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  19. Recommendation 196: Alternatives to Memorialize the K-25 Building

    Broader source: Energy.gov [DOE]

    The ORSSAB Recommends to DOE Alternatives to Memorialize the K-25 Building at East Tennessee Technology Park and Manhattan Project Exhibits in Oak Ridge, Tennessee.

  20. Life-cycle assessment of NAND flash memory

    E-Print Network [OSTI]

    Boyd, Sarah; Horvath, A; Dornfeld, David

    2010-01-01T23:59:59.000Z

    paired trends, primary energy consumption per gigabyte (GB)energy consumption per memory capacity (MJ/GB), over ?ve technology nodes relatively ?at. In Fig 3 the trends

  1. Neuromorphic, Digital and Quantum Computation with Memory Circuit Elements

    E-Print Network [OSTI]

    Yuriy V. Pershin; Massimiliano Di Ventra

    2011-09-28T23:59:59.000Z

    Memory effects are ubiquitous in nature and the class of memory circuit elements - which includes memristors, memcapacitors and meminductors - shows great potential to understand and simulate the associated fundamental physical processes. Here, we show that such elements can also be used in electronic schemes mimicking biologically-inspired computer architectures, performing digital logic and arithmetic operations, and can expand the capabilities of certain quantum computation schemes. In particular, we will discuss few examples where the concept of memory elements is relevant to the realization of associative memory in neuronal circuits, spike-timing-dependent plasticity of synapses, digital and field-programmable quantum computing.

  2. Institute of Computer Science A modified limited-memory BNS ...

    E-Print Network [OSTI]

    2014-03-12T23:59:59.000Z

    Institute of Computer Science. Academy of Sciences of the Czech Republic. A modified limited-memory BNS method for unconstrained minimization based on...

  3. Web Accessibility Office of Diversity and Inclusion

    E-Print Network [OSTI]

    Jones, Michelle

    Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

  4. AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS

    E-Print Network [OSTI]

    Samarati, Pierangela

    - ever, XML-based graphics formats such as the Scalable Vector Graphics (SVG) standard are becoming by means of new XML-based standards such as the World Wide Web Consortium's Scalable Vector Graphics (SVG controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector

  5. A Hardware Approach for Trusted Access and

    E-Print Network [OSTI]

    Global is prohibited. IntroductIon In computer systems, access control models management in the database context, trying to ABStrAct ThischapteradvocatestheconvergencebetweenAccessControl(AC)models. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must

  6. Interactive Database Access with Statistics and Graphics

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    DbAccess The Manual Interactive Database Access with Statistics and Graphics Version 2.1.1 D. M and graphical needs of NSTX Physicists. Flexible views and joins are possible, including options for complex SQL General Atomics (GA Plot Objects) adds extensive graphical and interactive capabilities (and documentation

  7. Usability and Accessibility in Consumer Health Informatics

    E-Print Network [OSTI]

    Shneiderman, Ben

    Usability and Accessibility in Consumer Health Informatics Current Trends and Future Challenges, for innovative eHealth systems to have true value and impact, they must first and foremost be usable challenges in the usability and accessibility of consumer health informatics will be described. Consumer

  8. National Radiobiology Archives Distributed Access user's manual

    SciTech Connect (OSTI)

    Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

    1991-11-01T23:59:59.000Z

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

  9. University Library Fact Sheet Sconul Access

    E-Print Network [OSTI]

    Brierley, Andrew

    University Library Fact Sheet Sconul Access Opening Hours Please consult the library website for our current opening hours: http://www.st-andrews.ac.uk/library/ Library Cards To borrow books and access the Library you must bring your card with you to the library on each visit. Please notify

  10. Database Hints for Readex's AccessUN

    E-Print Network [OSTI]

    Stowell, Michael

    Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

  11. Locally Accessible Information and Distillation of Entanglement

    E-Print Network [OSTI]

    Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

    2004-03-18T23:59:59.000Z

    A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  12. Foreign National Access to DOE Cyber Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-01T23:59:59.000Z

    DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

  13. Reinforcement Learning for Characterization of Hysteresis Behavior in Shape Memory Alloys, and Application to

    E-Print Network [OSTI]

    Valasek, John

    Reinforcement Learning for Characterization of Hysteresis Behavior in Shape Memory Alloys & Valasek - 2 Briefing Agenda Shape Memory Alloy Characterization and Control Learning Simulation Results Membrane Air #12;Kirkpatrick & Valasek - 4 Shape Memory Alloys (SMA) Metallic Alloys used as actuators

  14. A microscopically motivated constitutive model for shape memory alloys: formulation, analysis

    E-Print Network [OSTI]

    Rheinisch-Westflische Technische Hochschule Aachen (RWTH)

    A microscopically motivated constitutive model for shape memory alloys: formulation, analysisTi polycrystalline shape memory alloys exhibiting transformations between three solid phases (austenite, R presented. 1 Introduction Shape memory alloys (SMA) are metallic materials exhibiting remarkable properties

  15. Altered gene regulation and synaptic morphology in Drosophila learning and memory mutants

    E-Print Network [OSTI]

    Guan, Zhuo

    Genetic studies in Drosophila have revealed two separable long-term memory pathways defined as anesthesia-resistant memory (ARM) and long-lasting long-term memory (LLTM). ARM is disrupted in radish (rsh) mutants, whereas ...

  16. Simulation of thermal reset transitions in resistive switching memories including quantum effects

    SciTech Connect (OSTI)

    Villena, M. A.; Jimnez-Molinos, F.; Roldn, J. B. [Departamento de Electrnica y Tecnologa de Computadores, Universidad de Granada, Facultad de Ciencias, Avd. Fuentenueva s/n, 18071 Granada (Spain); Gonzlez, M. B.; Campabadal, F. [Institut de Microelectrnica de Barcelona, IMB-CNM (CSIC), Campus UAB, 08193 Bellaterra (Spain); Su, J.; Miranda, E. [Departament d'Enginyeria Electrnica, Universitat Autnoma de Barcelona, Bellaterra Cerdanyola del Valls 08193 (Spain); Romera, E. [Departamento de Fsica Atmica, Molecular y Nuclear and Instituto Carlos I de Fsica Terica y Computacional, Universidad de Granada, Avd. Fuentenueva s/n, 18071 Granada (Spain)

    2014-06-07T23:59:59.000Z

    An in-depth study of reset processes in RRAMs (Resistive Random Access Memories) based on Ni/HfO{sub 2}/Si-n{sup +} structures has been performed. To do so, we have developed a physically based simulator where both ohmic and tunneling based conduction regimes are considered along with the thermal description of the devices. The devices under study have been successfully fabricated and measured. The experimental data are correctly reproduced with the simulator for devices with a single conductive filament as well as for devices including several conductive filaments. The contribution of each conduction regime has been explained as well as the operation regimes where these ohmic and tunneling conduction processes dominate.

  17. An Application Specific Memory Characterization Technique for Co-processor Accelerators

    SciTech Connect (OSTI)

    Alam, Sadaf R [ORNL; Smith, Melissa C [ORNL; Vetter, Jeffrey S [ORNL

    2007-01-01T23:59:59.000Z

    Commodity accelerator technologies including reconfigurable devices and graphical processing units (GPUs) provide an order of magnitude performance improvement compared to mainstream microprocessor systems. A number of compute-intensive, scientific applications, therefore, can potentially benefit from commodity computing devices available in the form of co-processor accelerators. However, there has been little progress in accelerating production-level scientific applications using these technologies due to several programming and performance challenges. One of the key performance challenges is performance sustainability. While computation is often accelerated substantially by accelerator devices, the achievable performance is significantly lower once the data transfer costs and overheads are incorporated. We present an application-specific memory characterization technique for an FPGA-accelerated system that enabled us to reduce data transfer overhead for a scientific application by a factor of 5. We classify large data structures in the application according to their read and write characteristics and access patterns. This classification in turn enabled us to sustain a speedup of over three for a full-scale scientific application. Our proposed technique extends to applications that exhibit similar memory behavior and to co-processor accelerator systems that support data streaming and pipelining, and allow overlapped execution between the host and the accelerator device.

  18. Effects of Constrained Aging on the Shape Memory Response of Nickel Rich Niti Shape Memory Alloys

    E-Print Network [OSTI]

    Barrie, Fatmata Haja

    2011-02-22T23:59:59.000Z

    Ni50.6Ti49.4 single and Ni52Ti48 polycrystalline shape memory alloy samples were subjected to aging under a uniaxial stress, to form a single Ni4Ti3 precipitate variant and to investigate the effects of single versus multi-variant coherent...

  19. Oil Price Trackers Inspired by Immune Memory

    E-Print Network [OSTI]

    Wilson, WIlliam; Aickelin, Uwe

    2010-01-01T23:59:59.000Z

    We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

  20. Nickel porphyrins for memory optical applications

    DOE Patents [OSTI]

    Shelnutt, John A. (Tijeras, NM); Jia, Songling (Albuquerque, NM); Medforth, Craig (Vacaville, CA); Holten, Dewey (St. Louis, MO); Nelson, Nora Y. (Manteca, CA); Smith, Kevin M. (Davis, CA)

    2000-01-01T23:59:59.000Z

    The present invention relates to a nickel-porphyrin derivative in a matrix, the nickel-porphyrin derivative comprising at least two conformational isomers, a lower-energy-state conformer and a higher-energy-state conformer, such that when the higher-energy-state conformer is generated from the lower-energy-state conformer following absorption of a photon of suitable energy, the time to return to the lower-energy-state conformer is greater than 40 nanoseconds at approximately room temperature. The nickel-porphyrin derivative is useful in optical memory applications.

  1. Localized quantum walks as secured quantum memory

    E-Print Network [OSTI]

    C. M. Chandrashekar; Th. Busch

    2015-04-21T23:59:59.000Z

    We show that a quantum walk process can be used to construct and secure quantum memory. More precisely, we show that a localized quantum walk with temporal disorder can be engineered to store the information of a single, unknown qubit on a compact position space and faithfully recover it on demand. Since the localization occurss with a finite spread in position space, the stored information of the qubit will be naturally secured from the simple eavesdropper. Our protocol can be adopted to any quantum system for which experimental control over quantum walk dynamics can be achieved.

  2. Remote preparation of an atomic quantum memory

    E-Print Network [OSTI]

    Wenjamin Rosenfeld; Stefan Berner; Juergen Volz; Markus Weber; Harald Weinfurter

    2006-08-29T23:59:59.000Z

    Storage and distribution of quantum information are key elements of quantum information processing and quantum communication. Here, using atom-photon entanglement as the main physical resource, we experimentally demonstrate the preparation of a distant atomic quantum memory. Applying a quantum teleportation protocol on a locally prepared state of a photonic qubit, we realized this so-called remote state preparation on a single, optically trapped 87Rb atom. We evaluated the performance of this scheme by the full tomography of the prepared atomic state, reaching an average fidelity of 82%.

  3. Molecular mechanisms of memory in imprinting

    E-Print Network [OSTI]

    Solomonia, Revaz O.; McCabe, Brian J.

    2014-10-02T23:59:59.000Z

    an ess the chick (s In additi for study, r by the fact robiology o It is also a the recentl trolled, faci changes in or water for tive period animals tha A Fig. 1. Positio of section for mesopallium; vocalize ex which learn Imprinting with proce... . mulated evidence strongly indicates that formation of tion memory of imprinting involves a time-dependent ochemical processes in the IMM. Such processes are essed in the left side of this region. Changes in the right raining, though resembling events...

  4. Painted Ponies: Essays on Memory and Loss

    E-Print Network [OSTI]

    Klayder, Mary

    2008-12-30T23:59:59.000Z

    , and galloping around the neighborhood. I refused to neigh. After I finished reading The Wizard of Oz enough times that I bored my mother with the highlights, someone I have no memory of who took me to the library to check out the other books.... It was a humid June night. A thunderhead rose to the south like a mountain. Clouds like that were so common I used to pretend I lived in Colorado, imagined I could go hiking on the cloud hills, hills that moved to different sides of the town...

  5. Gist Memory in Alzheimer's Disease: Evidence From Categorized Pictures Andrew E. Budson

    E-Print Network [OSTI]

    Schacter, Daniel

    Gist Memory in Alzheimer's Disease: Evidence From Categorized Pictures Andrew E. Budson Edith of items (gist memory; Reyna & Brainerd, 1995; Schacter, Norman, & Koutstaal, 1998). We have argued

  6. A signal-detection-based investigation into the nature of recognition memory

    E-Print Network [OSTI]

    Mickes, Laura Beth

    2010-01-01T23:59:59.000Z

    memory. Memory & Cognition, Speer, N. K. , & Curran, T. (Eichenbaum, 2008; Speer & Curran, 2007; Turriziani, Fadda,unitized familiarity (cf. Speer & Curran, 2007). While this

  7. auditory-verbal working memory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Memory 4 Percept Result of filtering Memphis, University of 4 Working Memory and Dyslexia CiteSeer Summary: Recent research has demonstrated that dyslexic children suffer...

  8. Advanced Concurrency Control for Transactional Memory

    E-Print Network [OSTI]

    Singer, Jeremy

    , Christos Kotselidis, Kim Jarvis, Mikel Lujan, Chris Kirkham, and Ian Watson The University of Manchester {ansari,kotselidis,jarvis,mikel,chris,watson}@cs.manchester.ac.uk Abstract. Concurrency control-grain locking. TM requires developers to mark code blocks that access shared data struc- tures as transactions

  9. Memory as vibration in a disconnecting

    E-Print Network [OSTI]

    Zhang, Wendy

    experimentally accessible well-defined mathematical model Keim, Nagel Keim et al. PRL 06 #12;bubble break 91, Oguz & Prosperetti JFM 93, Burton et al, PRL 05 Gordillo et al, PRL 05 Bergmann et al, PRL 06, Thoroddsen et al, POF 07, Eggers et al PRL 07 #12;Break-up in many parameter regimes conform to prevailing

  10. 2001 Special issue Associative memory in networks of spiking neurons

    E-Print Network [OSTI]

    Wennekers, Thomas

    of the network dynamics. The memory is displayed rhythmically, coded by phase-locked bursts or regular spikes activity and trigger a phase-locked association event within one gamma period. Unlike as under tonic of efcient retrieval varying the memory load, the excitation/inhibition parameters, and background

  11. Rosebud: A Place for Interaction between Memory, Story, and Self

    E-Print Network [OSTI]

    Nehaniv, Chrystopher

    as part of the human­computer interaction. Ullmer & Ishii [55] make a comparison between levels of stories, memories, and identity. We describe the cognitive, social, and psychological aspects of one, identity, stuffed animals, tangible interfaces, memory, children, education. Scenario Susan, an eight year

  12. Immune Inspired Memory Algorithms Applied to Unknown Motif Detection

    E-Print Network [OSTI]

    Aickelin, Uwe

    . Wilson, P. Birkin and U. Aickelin. Oil Price Trackers Inspired by Immune Memory. AISB 2006 Bristol, intuitive and meaningful manner. Motifs help identify relationships in the data and they can aid. W. O. Wilson, P. Birkin and U. Aickelin. Price Trackers Inspired by Im- mune Memory. 5th

  13. Software Verification for Weak Memory via Program Transformation

    E-Print Network [OSTI]

    Krning, Daniel

    on a PowerPC cluster, due to the memory model. We study this bug in detail in Sec. 5. This observation handle the write atomicity relaxation of Power/ARM: generality remains a challenge. Since we want verification w.r.t. weak memory. We present experi- ments for a broad variety of models (from x86-TSO to Power

  14. Forgotten, but Not Gone: Recovering Memories of Emotional Stories

    E-Print Network [OSTI]

    Handy, Justin Dean

    2012-02-14T23:59:59.000Z

    FORGOTTEN, BUT NOT GONE: RECOVERING MEMORIES OF EMOTIONAL STORIES A Thesis by JUSTIN DEAN HANDY Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE December 2011 Major Subject: Psychology Forgotten, but Not Gone: Recovering Memories of Emotional Stories Copyright 2011 Justin Dean Handy FORGOTTEN, BUT NOT GONE...

  15. Silicon optical nanocrystal memory R. J. Walters,a)

    E-Print Network [OSTI]

    Atwater, Harry

    Silicon optical nanocrystal memory R. J. Walters,a) P. G. Kik, J. D. Casperson, and H. A. Atwater (Received 19 January 2004; accepted 22 July 2004) We describe the operation of a silicon optical nanocrystal memory device. The programmed logic state of the device is read optically by the detection of high or low

  16. Memory Scaling: A Systems Architecture Perspective Carnegie Mellon University

    E-Print Network [OSTI]

    @cmu.edu http://users.ece.cmu.edu/omutlu/ Abstract--The memory system is a fundamental performance and energy technology scaling challenges that make the maintenance and enhancement of its capacity, energy, whether they be server, embedded, desktop, mobile, sensor. Memory capacity, energy, cost, performance

  17. Business surveys modelling with Seasonal-Cyclical Long Memory models

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Business surveys modelling with Seasonal-Cyclical Long Memory models Ferrara L. and Guégan D. 2nd business surveys released by the European Commission. We introduce an innovative way for modelling those linear models. Keywords: Euro area, nowcasting, business surveys, seasonal, long memory. JEL

  18. Word learning, phonological short-term memory, phonotactic probability and

    E-Print Network [OSTI]

    Gupta, Prahlad

    for thinking about various types of studies of word learning. We then review a number of themes that in recent as a useful organizing scheme for thinking about various types of studies of word learning. In 2, we reviewWord learning, phonological short-term memory, phonotactic probability and long-term memory

  19. ORIGINAL PAPER Prevention of cerebral ischemia-induced memory deficits

    E-Print Network [OSTI]

    memory impairment produced pharmacologically or genetically. Comparably, much less is known about4 activity in the hippocam- pus. Memory was examined using Morris water-maze and step-through passive avoidance tests in rats subjected to global cerebral ischemia with or without repeated treatment

  20. MEMORY DESIGN AND EXPLORATION FOR LOW POWER, EMBEDDED SYSTEMS

    E-Print Network [OSTI]

    Kambhampati, Subbarao

    by (i) applying memory optimizing transformations such as loop transformations, (ii) storing frequently transformations. In this paper, we describe a procedure for memory design and exploration for low power embedded optimizing transformations such as loop transformations. While there exists a large number of loop

  1. Performance Directed Energy Management for Main Memory and Disks #

    E-Print Network [OSTI]

    Zhou, Yuanyuan

    in the design of computing systems. For batteryoperated mobile devices, energy consumption directly affects]. The storage hierarchy, which includes memory and disks, is a major energy consumer in computer systemsPerformance Directed Energy Management for Main Memory and Disks # Xiaodong Li, Zhenmin Li, Francis

  2. ESSES 2003 2003, Carla Schlatter Ellis Power-Aware Memory

    E-Print Network [OSTI]

    Ellis, Carla

    1 ESSES 2003© 2003, Carla Schlatter Ellis Power-Aware Memory Management 2ESSES 2003© 2003, Carla management · OS page allocation policies · Experimental results · Future work, open questions #12;2 3ESSES Allocation [ASPLOS00] ESSES 2003© 2003, Carla Schlatter Ellis Memory System Power Consumption · Laptop

  3. Algorithms and Data Representations for Emerging Non-Volatile Memories

    E-Print Network [OSTI]

    Li, Yue

    2014-04-29T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii 1. INTRODUCTION... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Basic Concepts of Flash Memory and PCM . . . . . . . . . . . . . . . . 2 1.2 Data Reliability Challenges for Flash Memory and PCM . . . . . . . . . 8 1.3 Overview of Research Directions . . . . . . . . . . . . . . . . . . . . . . 10 2...

  4. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  5. Hybrid Access Control Mechanism in Two-Tier Femtocell Networks

    E-Print Network [OSTI]

    Mantravadi, Sirisha 1987-

    2012-08-21T23:59:59.000Z

    remains a challenge. Decentralized strategies such as femtocell access control have been identified as an effective means to mitigate cross-tier interference in two-tier networks. Femtocells can be configured to be either open access or closed access...

  6. ETSU College of Medicine Onity Door Access Authorization Form

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU College of Medicine Onity Door Access Authorization Form Please grant access to: 6 access. ____ ALL AREAS (ETSU Service Personnel Only) Medical School Research & Training, VA Bldg. #119-Mail: johnsodl@etsu.edu #12;

  7. A Dyslexic Perspective on e-Content Accessibility

    E-Print Network [OSTI]

    Brajnik, Giorgio

    an insight into the issues of web accessibility for users with Dyslexia (and/or other specific learning and accessibility issues of electronic educational content. Keywords: dyslexia, SLD, web accessibility, usability...................................................................................................2 2. Explaining Dyslexia

  8. ad libitum access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  9. Conjunctive Query Containment under Access Limitations

    E-Print Network [OSTI]

    Martinenghi, Davide

    2 both represent city names, and similarly the attributes named Artist represent artist names.1 to access r2. In turn, new tuples from r2 may provide new constants representing city names, that can

  10. Metadata Value Chain for Open Access Journals

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly communication lifecycle...

  11. COMMENTARY Open Access Effectively incorporating selected multimedia

    E-Print Network [OSTI]

    Hammerton, James

    COMMENTARY Open Access Effectively incorporating selected multimedia content into medical Schbel5 , Markus Sellerer6 , Andreas Ziegler1 Abstract Until fairly recently, medical publications have significantly profit from advances in electronic publishing that permit the inclusion of multimedia content

  12. Random access wireless networks with controlled mobility

    E-Print Network [OSTI]

    Modiano, Eytan H.

    This paper considers wireless networks where messages arriving randomly (in time and space) are collected by a mobile receiver. The messages are transmitted to the mobile receiver according to a random access scheme and ...

  13. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  14. Accessing MDS with IDL February 1993

    E-Print Network [OSTI]

    California at San Diego, University of

    Accessing MDS with IDL Reference Manual February 1993 Software Version: MDS 5.2 VAX/VMS Version 4 Equipment Corporation: CDD DECnet VAX DATATRIEVE DECUS VAXcluster DEC MicroVAX VAX Information Architecture

  15. JOBAID-ACCESSING AND MODIFYING TALENT PROFILE

    Broader source: Energy.gov [DOE]

    The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

  16. Metadata Value Chain for Open Access Journals

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly ...

  17. Decision Analysis of Dynamic Spectrum Access Rules

    SciTech Connect (OSTI)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01T23:59:59.000Z

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  18. North Carolina Capital Access Program (North Carolina)

    Broader source: Energy.gov [DOE]

    The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lenders usual standards. The average CAP loan is ...

  19. Radioactive hot cell access hole decontamination machine

    DOE Patents [OSTI]

    Simpson, William E. (Richland, WA)

    1982-01-01T23:59:59.000Z

    Radioactive hot cell access hole decontamination machine. A mobile housing has an opening large enough to encircle the access hole and has a shielding door, with a door opening and closing mechanism, for uncovering and covering the opening. The housing contains a shaft which has an apparatus for rotating the shaft and a device for independently translating the shaft from the housing through the opening and access hole into the hot cell chamber. A properly sized cylindrical pig containing wire brushes and cloth or other disks, with an arrangement for releasably attaching it to the end of the shaft, circumferentially cleans the access hole wall of radioactive contamination and thereafter detaches from the shaft to fall into the hot cell chamber.

  20. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her...

  1. LOCH: Open Access Facilitator Job Description (DRAFT)

    E-Print Network [OSTI]

    McMahon, Jacqueline

    2015-03-23T23:59:59.000Z

    DRAFT Job Description for an Open Access Facilitator job in the University of Edinburgh's College of Humanities and Social Sciences. This draft job description is being made available as part of the Jisc-funded LOCH Project....

  2. Rail Access to Yucca Mountain: Critical Issues

    SciTech Connect (OSTI)

    Halstead, R. J.; Dilger, F.; Moore, R. C.

    2003-02-25T23:59:59.000Z

    The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

  3. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  4. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

  5. NBP RFI: Data Access Honeywell Responses To Request for Information...

    Broader source: Energy.gov (indexed) [DOE]

    on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

  6. Bursting at the Seams: Water Access and Housing in Luanda

    E-Print Network [OSTI]

    Bulfin, Michael Patrick

    2009-01-01T23:59:59.000Z

    constructed areas. The lack of water access and properand how the lack of access to clean water, coupled withmost slum residents lack knowledge about the basics of water

  7. access control scheme: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  8. access control mac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  9. access control transportation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  10. access system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  11. Increasing Community Access to Solar: Designing and Developing...

    Broader source: Energy.gov (indexed) [DOE]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System (Fact Sheet), U.S. Department of Energy (DOE) Increasing Community Access to...

  12. Request Access to the PARSIIe Project Management Lessons Learned...

    Energy Savers [EERE]

    Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository PURPOSE...

  13. accessing integrated genomic: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 RESEARCH ARTICLE Open Access Integrating cytogenetics and genomics in Environmental Sciences and Ecology Websites Summary: RESEARCH ARTICLE Open Access...

  14. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  15. access control policies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Resiliency Policies in Access Control , Mahesh Tripunitara Computer Technologies and Information Sciences Websites Summary: Resiliency Policies in Access...

  16. advanced ground intelligent: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Hearn, Robert A. 2004-06-16 8 FlexRAM: Toward an Advanced Intelligent Memory System Computer Technologies and Information Sciences Websites Summary: FlexRAM: Toward an...

  17. Scalla: Structured Cluster Architecture for Low Latency Access

    SciTech Connect (OSTI)

    Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

    2012-03-20T23:59:59.000Z

    Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

  18. Correlated bursts and the role of memory range

    E-Print Network [OSTI]

    Jo, Hang-Hyun; Kaski, Kimmo; Kertesz, Janos

    2015-01-01T23:59:59.000Z

    Inhomogeneous temporal processes in natural and social phenomena have been described by bursts that are rapidly occurring events within short time periods alternating with long periods of low activity. In addition to the analysis of heavy-tailed inter-event time distributions, higher-order correlations between inter-event times, called \\emph{correlated bursts}, have been studied only recently. As the possible mechanisms underlying such correlated bursts are far from being fully understood, we devise a simple model for correlated bursts by using a self-exciting point process with variable memory range. Here the probability that a new event occurs is determined by a memory function that is the sum of decaying memories of the past events. In order to incorporate the noise and/or limited memory capacity of systems, we apply two memory loss mechanisms, namely either fixed number or variable number of memories. By using theoretical analysis and numerical simulations we find that excessive amount of memory effect ma...

  19. Serotoninmushroom body circuit modulating the formation of anesthesia-resistant memory

    E-Print Network [OSTI]

    Huang, Haimei

    Serotoninmushroom body circuit modulating the formation of anesthesia-resistant memory in Drosophila produces two genetically distinct forms of intermediate-term memories: anesthesia-sensitive memory, which requires the amnesiac gene, and anesthesia- resistant memory (ARM), which requires the radish gene

  20. Identification of Quaternary Shape Memory Alloys with Near-Zero Thermal Hysteresis and Unprecedented

    E-Print Network [OSTI]

    Rubloff, Gary W.

    Identification of Quaternary Shape Memory Alloys with Near-Zero Thermal Hysteresis the class of materials showing a reversible martensitic phase transformation and a shape memory effect (SME fatigue of shape memory alloys (SMAs) resulting in changes of physical, mechan- ical, and shape memory (SM

  1. THE EFFECTS OF LASER FORMING ON SUPERELASTIC NITI SHAPE MEMORY ALLOYS Paper # P529

    E-Print Network [OSTI]

    Yao, Y. Lawrence

    THE EFFECTS OF LASER FORMING ON SUPERELASTIC NITI SHAPE MEMORY ALLOYS Paper # P529 Andrew J Abstract This work focuses on application of the laser forming process to NiTi shape memory alloys. While all NiTi shape memory alloys exhibit both superlasticity and the shape memory effect, this study

  2. Behavior and modeling of superelastic shape memory alloy reinforced concrete beams

    E-Print Network [OSTI]

    Vecchio, Frank J.

    Behavior and modeling of superelastic shape memory alloy reinforced concrete beams Alaa Abdulridha analysis a b s t r a c t The re-centering phenomenon of superelastic Shape Memory Alloy (SMA) reinforced as Shape Memory Alloys (SMAs) has emerged in the research community. Shape memory al- loys have the ability

  3. Age Differences in the Frontal Lateralization of Verbal and Spatial Working Memory

    E-Print Network [OSTI]

    working memory in the human brain (Petrides, Alivisatos, Meyer, & Evans, 1993; Smith & Jonides, 1998; cf

  4. Memory device using movement of protons

    DOE Patents [OSTI]

    Warren, William L. (900 N. Randolph St., Arlington, VA 22203); Vanheusden, Karel J. R. (8401 Spain Rd., Albuquerque, NM 87111); Fleetwood, Daniel M. (5513 Estrellita del Norte, NE., Albuquerque, NM 87111); Devine, Roderick A. B. (12 Impasse de la Liberation, 38950 St. Martin le Vinoux, FR); Archer, Leo B. (3108 Vicky Ct., Garland, TX 75044); Brown, George A. (1512 Ridgeview Dr., Arlington, TX 76012-1940); Wallace, Robert M. (428 Park Bend Dr., Richardson, TX 75081)

    2000-01-01T23:59:59.000Z

    An enhancement of an electrically written memory element utilizing the motion of protons within a dielectric layer surrounded by layers on either side to confine the protons within the dielectric layer with electrode means attached to the surrounding layers to change the spatial position of the protons within the dielectric layer. The device is preferably constructed as a silicon-silicon dioxide-silicon layered structure with the protons being introduced to the structure during an anneal in an atmosphere containing hydrogen gas. Device operation is enhanced by concluding this anneal step with a sudden cooling. The device operates at low power, is preferably nonvolatile, is radiation tolerant, and is compatible with convention silicon MOS processing for integration with other microelectronics elements on the same silicon substrate.

  5. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, Ahmad A. (Bolingbrook, IL)

    1981-01-01T23:59:59.000Z

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  6. Release mechanism utilizing shape memory polymer material

    DOE Patents [OSTI]

    Lee, Abraham P. (Walnut Creek, CA); Northrup, M. Allen (Berkeley, CA); Ciarlo, Dino R. (Livermore, CA); Krulevitch, Peter A. (Pleasanton, CA); Benett, William J. (Livermore, CA)

    2000-01-01T23:59:59.000Z

    Microfabricated therapeutic actuators are fabricated using a shape memory polymer (SMP), a polyurethane-based material that undergoes a phase transformation at a specified temperature (Tg). At a temperature above temperature Tg material is soft and can be easily reshaped into another configuration. As the temperature is lowered below temperature Tg the new shape is fixed and locked in as long as the material stays below temperature Tg. Upon reheating the material to a temperature above Tg, the material will return to its original shape. By the use of such SMP material, SMP microtubing can be used as a release actuator for the delivery of embolic coils through catheters into aneurysms, for example. The microtubing can be manufactured in various sizes and the phase change temperature Tg is determinate for an intended temperature target and intended use.

  7. Solid state engine using nitinol memory alloy

    DOE Patents [OSTI]

    Golestaneh, A.A.

    1980-01-21T23:59:59.000Z

    A device for converting heat energy to mechanical energy includes a reservoir of a hot fluid and a rotor assembly mounted thereabove so a portion of it dips into the hot fluid. The rotor assembly may include a shaft having four spokes extending radially outwardly therefrom at right angles to each other, a floating ring and four flexible elements composed of a thermal memory material having a critical temperature between the temperature of the hot fluid and that of the ambient atmosphere extending between the ends of the spokes and the floating ring. Preferably, the flexible elements are attached to the floating ring through curved leaf springs. Energetic shape recovery of the flexible elements in the hot fluid causes the rotor assembly to rotate.

  8. Hardware support for collecting performance counters directly to memory

    DOE Patents [OSTI]

    Gara, Alan; Salapura, Valentina; Wisniewski, Robert W.

    2012-09-25T23:59:59.000Z

    Hardware support for collecting performance counters directly to memory, in one aspect, may include a plurality of performance counters operable to collect one or more counts of one or more selected activities. A first storage element may be operable to store an address of a memory location. A second storage element may be operable to store a value indicating whether the hardware should begin copying. A state machine may be operable to detect the value in the second storage element and trigger hardware copying of data in selected one or more of the plurality of performance counters to the memory location whose address is stored in the first storage element.

  9. Flash Memory Garbage Collection in Hard Real-Time Systems

    E-Print Network [OSTI]

    Lai, Chien-An

    2012-10-19T23:59:59.000Z

    collection and compare it to that of more proactive schemes. I develop formulas to assess the schedulability of hard real- time periodic task sets under simpli ed memory consumption models. Results show that I prove the proactive schemes achieve the larger... work in the area of ash memory management. Moreover, we review the previous research about garbage collection in real-time system. In Chapter III we will describe a simpli ed ash memory model that will be used throughout the rest of the thesis...

  10. Single-cell atomic quantum memory for light

    E-Print Network [OSTI]

    Tomas Opatrny

    2006-09-29T23:59:59.000Z

    Recent experiments demonstrating atomic quantum memory for light [B. Julsgaard et al., Nature 432, 482 (2004)] involve two macroscopic samples of atoms, each with opposite spin polarization. It is shown here that a single atomic cell is enough for the memory function if the atoms are optically pumped with suitable linearly polarized light, and quadratic Zeeman shift and/or ac Stark shift are used to manipulate rotations of the quadratures. This should enhance the performance of our quantum memory devices since less resources are needed and losses of light in crossing different media boundaries are avoided.

  11. An examination of content similarity within the memory of HPC applications.

    SciTech Connect (OSTI)

    Levy, Scott N. [University of New Mexico; Bridges, Patrick G. [University of New Mexico; Ferreira, Kurt Brian; Thompson, Aidan Patrick; Trott, Christian Robert

    2013-01-01T23:59:59.000Z

    Memory content similarity has been e ectively exploited for more than a decade to reduce memory consumption. By consolidating duplicate and similar pages in the address space of an application, we can reduce the amount of memory it consumes without negatively a ecting the application's perception of the memory resources available to it. In addition to memory de-duplication, there may be many other ways that we can exploit memory content similarity to improve system characteristics. In this paper, we examine the memory content similarity of several HPC applications. By characterizing the memory contents of these applications, we hope to provide a basis for ef- forts to e ectively exploit memory content similarity to improve system performance beyond memory deduplication. We show that several applications exhibit signi cant similarity and consider the source of the similarity.

  12. Open Access Publishing in Particle Physics

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Particle Physics, often referred to as High Energy Physics (HEP), spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-Web era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peerreview system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs...

  13. Access Control Taxonomy for Social Networks Adnan Ahmad, Brian Whitworth

    E-Print Network [OSTI]

    Whitworth, Brian

    of access control models for social networks based on lattice taxonomy where axes represent the properties users should be allowed to perform certain action. There are few access control models for social-Anwar- Zhao [6], Distributed access control [7] and Tie-RBAC [8]. The lattice classifies access control models

  14. California State University, Fullerton Finance System Access Request Form

    E-Print Network [OSTI]

    de Lijser, Peter

    #12;California State University, Fullerton Finance System Access Request Form CISO Signature Employee

  15. ETSU College of Medicine CBORD Door Access Authorization Form

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU College of Medicine CBORD Door Access Authorization Form 6/13/2011 Please grant access to: This access will remain in effect until the individual is no longer an active ETSU faculty list areas this individual will need access to: ____ ALL AREAS - ETSU Service Personnel Only (i

  16. Security and Access Policy Security of and access to campus facilities, including campus residences

    E-Print Network [OSTI]

    Escher, Christine

    Security and Access Policy Security of and access to campus facilities, including campus residences facilities. Residence halls are secured 24 hours a day. Over extended breaks, the doors of all residence halls will be secured around the clock. Some facilities may have individual hours, which may vary

  17. Improving Data Access Efficiency by Using a Tagless Access Buffer (TAB)

    E-Print Network [OSTI]

    Whalley, David

    of the processor's energy expenditure. We describe the implemen- tation and use of a tagless access buffer (TAB University of Technology [perla/mckee/pers]@chalmers.se Abstract The need for energy efficiency continues) that greatly improves data access energy efficiency while slightly im- proving performance. The compiler

  18. The UCSB Access ID Card Application for Department Use Door Access will be needed

    E-Print Network [OSTI]

    Bigelow, Stephen

    of the University and must be returned to the department access controller (DAC) upon demand or when affiliation signature below asserts your identification information is correct and acknowledges your responsibility this or their own department's form/system to document approvals and record authorized access levels. Retention: One

  19. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  20. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    Review your system access with your company's Information Security Officer. Access and downloading of information from laptop computers. Beware that your conversations may not be private or secure to be someone you trust in order to obtain personal or sensitive information. Additional travel security tips