Powered by Deep Web Technologies
Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

2

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

3

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

4

V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Informix Genero libpng Integer Overflow Vulnerability 4: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT ASSESSMENT: Medium DISCUSSION: The libpng library used by IBM Informix Genero contains an integer overflow vulnerability. If you use IBM Informix Genero to handle PNG (Portable Network Graphics) image files and an attacker causes your IBM Informix Genero program to open or display a malicious PNG file, your IBM Informix

5

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

6

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

7

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

8

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

9

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

10

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

11

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

12

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

13

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

14

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

15

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

16

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

17

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

18

U-181: IBM WebSphere Application Server Information Disclosure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere Application Server Information Disclosure 1: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere Application Server 8.0.x ABSTRACT: The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information. Reference Links: Secunia Advisory 49352 CVE-2012-2170 Vendor Advisory IMPACT ASSESSMENT: High Discussion: WebSphere Application Server Administration Console is vulnerable to cross-site scripting, caused by improper validation of user-supplied input

19

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

20

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

22

V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: IBM Tivoli Federated Identity Manager Signature Verification 3: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes January 21, 2013 - 12:15am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes PLATFORM: Tivoli Federated Identity Manager versions 6.2.0, 6.2.1, 6.2.2 ABSTRACT: A vulnerability was reported in IBM Tivoli Federated Identity Manager. REFERENCE LINKS: IBM Security Bulletin: 1615744 SecurityTracker Alert ID: 1028011 CVE-2012-6359 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not check that all attributes have been signed. A remote user with the ability to conduct a man-in-the-middle attack can modify

23

U-116: IBM Tivoli Provisioning Manager Express for Software Distribution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM Tivoli Provisioning Manager Express for Software 6: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities March 5, 2012 - 7:00am Addthis PROBLEM: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities PLATFORM: IBM Tivoli Provisioning Manager Express for Software Distribution 4.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system. reference LINKS: Secunia Advisory SA48216 CVE-2012-0198 CVE-2012-0199 IMPACT ASSESSMENT: High Discussion: Certain input passed via "Printer.getPrinterAgentKey" to the SoapServlet

24

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

25

U-114: IBM Personal Communications WS File Processing Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: IBM Personal Communications WS File Processing Buffer 14: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability March 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM Personal Communications, which can be exploited by malicious people to compromise a user's system. PLATFORM: versions 5.9.0 through 5.9.7 and 6.0.0 through 6.0.3. ABSTRACT: A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications. reference LINKS: Vendor Advisory Secunia Advisory 48185 CVE-2012-0201 IMPACT ASSESSMENT: High Discussion:

26

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for z/OS Arbitrary Command 4: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability December 25, 2012 - 12:08am Addthis PROBLEM: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability PLATFORM: IBM HTTP Server for z/OS Version 5.3 ABSTRACT: A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS REFERENCE LINKS: Security vulnerability Reference #:1620945 Xforce: 80684 Secunia Advisory SA51656 CVE-2012-5955 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to compromise a vulnerable

27

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740 Seclist.org CVE-2013-0590 CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate

28

T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM WebSphere Commerce Edition Input Validation Holes Permit 2: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks September 21, 2011 - 8:15am Addthis PROBLEM: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks. PLATFORM: WebSphere Commerce Edition V7.0 ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: IBM Recommended Fixes for WebSphere Commerce IBM Support SecurityTracker Alert ID: 1026074

29

V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support 1: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information October 26, 2012 - 6:00am Addthis PROBLEM: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Software version: 6.2.3, 6.2.3.1 ABSTRACT: A vulnerability was reported in IBM Tivoli Monitoring. REFERENCE LINKS: IBM Support Document: 1614003 IBM Support Portal SecurityTracker Alert ID: 1027692 IMPACT ASSESSMENT: High DISCUSSION: A remote user may be able to conduct HTTP TRACE and HTTP TRACK attacks to access sensitive information from the HTTP headers.

30

V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM TRIRIGA Application Platform Multiple Cross-Site 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are reported in versions 2.1, 2.5, 2.6, and 2.7. REFERENCE LINKS: Secunia Advisory SA54641 CVE-2013-4003 IBM Security Bulletin IMPACT ASSESSMENT: Low DISCUSSION: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks.

31

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of 686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August 8, 2011 - 3:00pm Addthis PROBLEM: A vulnerability in the Java Runtime Environment allows unauthenticated network attacks ( i.e. it may be exploited over a network without the need for a username and password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061 Secunia Advisory: SA45556 CVE-2010-4476 IMPACT ASSESSMENT: Medium Discussion: IBM has acknowledged a vulnerability in IBM Tivoli Integrated Portal, which can be exploited by malicious people to cause a DoS (Denial of Service).

32

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

211: IBM iNotes Multiple Vulnerabilities 211: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related to MIME mail is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) An integer overflow error within the DWA9W ActiveX control can be exploited to execute arbitrary code.

33

T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Rational System Architect ActiveBar ActiveX Control Lets 5: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code May 4, 2011 - 7:15am Addthis PROBLEM: A vulnerability was reported in IBM Rational System Architect. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: IBM Rational System 11.4 and prior versions ABSTRACT: There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect. reference LINKS: IBM Advisory: 21497689 SecurityTracker Alert ID: 1025464 CVE-2011-1207 Secunia Advisory: SA43399 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted HTML that, when loaded by the

34

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

35

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

36

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Stack-based buffer overflow in oninit in IBM Informix 9: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution February 17, 2011 - 7:00am Addthis PROBLEM: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution. PLATFORM: IBM Informix Dynamic Server (IDS) 11.50 ABSTRACT: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement. reference LINKS: Security Database - Reference - CVE-2011-1033 CVE Details - Reference - CVE-2011-1033

37

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

38

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

39

U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM WebSphere Commerce User Information Disclosure 2: IBM WebSphere Commerce User Information Disclosure Vulnerability U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability October 2, 2012 - 6:00am Addthis PROBLEM: IBM WebSphere Commerce User Information Disclosure Vulnerability PLATFORM: WebSphere Commerce Versions 6.0.0.0 to 6.0.0.11 WebSphere Commerce Versions 7.0.0.0 to 7.0.0.6 ABSTRACT: A vulnerability in WebSphere Commerce could allow disclosure of user personal data. reference LINKS: IBM Security Bulletin 1612484 X-Force Vulnerability Database (78867) Secunia Advisory SA50821 CVE-2012-4830 IMPACT ASSESSMENT: Medium Discussion: A remote unauthenticated attacker could exploit a security vulnerability in WebSphere Commerce to expose user personal data. The attack can be performed manually and the effort required is comparatively low.

40

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Rational AppScan Import/Load Function Flaws Let Remote 7: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code October 10, 2011 - 9:15am Addthis PROBLEM: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code. PLATFORM: Version(s): 7.8, 7.8.0.1, 7.8.0.2, 7.9, 7.9.0.1, 7.9.0.2, 7.9.0.3, 8.0, 8.0.0.1, 8.0.0.2 ABSTRACT: Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: IBM Security Advisory Document ID: 1515110 IBM Fix Pack Document ID: 4030774 SecurityTracker Alert ID: 1026154 IMPACT ASSESSMENT: High Discussion: A high risk security vulnerability in the "Import functionality" of IBM

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

42

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

43

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion 61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability February 21, 2011 - 7:00am Addthis PROBLEM: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability. PLATFORM: The following Java products are affected: Java SE: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK 5.0 Update 27 and prior for Solaris 9 Oracle SDK 1.4.2_29 and prior for Solaris 8 IBM JDK 6 Update SR9 and prior IBM JDK 5 Update SR12-FP3 and prior IBM JDK 1.4.2 Update SR13-FP8 and prior Java for Business: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK and JRE 5.0 Update 27 and prior for Windows, Solaris, and Linux

44

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

45

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: IBM Rational ClearQuest ActiveX Control Buffer Overflow 54: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability April 24, 2012 - 7:00am Addthis PROBLEM: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability PLATFORM: Versions 7.1.1 through 7.1.2.5, 8.0, and 8.0.0.1. ABSTRACT: A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. reference links: SecurityTracker Alert ID: 1026958 Secunia Advisory SA48933 CVE-2012-0708 IMPACT ASSESSMENT: High Discussion: The vulnerability is caused due to a function prototype mismatch in the "RegisterSchemaRepoFromFileByDbSet()" function in the IBM Rational ClearQuest ActiveX control (cqole.dll). This can be exploited to cause a

46

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: IBM Rational ClearQuest ActiveX Control Buffer Overflow 54: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability April 24, 2012 - 7:00am Addthis PROBLEM: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability PLATFORM: Versions 7.1.1 through 7.1.2.5, 8.0, and 8.0.0.1. ABSTRACT: A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. reference links: SecurityTracker Alert ID: 1026958 Secunia Advisory SA48933 CVE-2012-0708 IMPACT ASSESSMENT: High Discussion: The vulnerability is caused due to a function prototype mismatch in the "RegisterSchemaRepoFromFileByDbSet()" function in the IBM Rational ClearQuest ActiveX control (cqole.dll). This can be exploited to cause a

47

IBM Research Report  

E-Print Network (OSTI)

Jun 5, 2007 ... Copies may be requested from IBM T. J. Watson Research Center , P. ... Research supported in part by an IBM Open Collaborative Research ...

48

U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

024: IBM Lotus Sametime Configuration Servlet Lets Remote Users 024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data November 1, 2011 - 8:15am Addthis PROBLEM: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data. PLATFORM: All Sametime Platforms : 7.0, 7.5, 7.5.1, 7.5.1.1, 7.5.1.2, 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.1.1, 8.5.2 ABSTRACT: A remote user can obtain configuration information. reference lINKS: IBM Sametime Security Bulletin SecurityTracker Alert ID: 1026255 CVE-2011-1370 IMPACT ASSESSMENT: Medium Discussion: The Sametime server contains a configuration servlet that is accessed by several Sametime server processes. By default, this servlet does not require authentication, which could potentially allow an unauthorized user

49

IBM POWER6 microarchitecture  

Science Conference Proceedings (OSTI)

This paper describes the implementation of the IBM POWER6™ microprocessor, a two-way simultaneous multithreaded (SMT) dual-core chip whose key features include binary compatibility with IBM POWER5™ microprocessor-based systems; increased ...

H. Q. Le; W. J. Starke; J. S. Fields; F. P. O'Connell; D. Q. Nguyen; B. J. Ronchetti; W. M. Sauer; E. M. Schwarz; M. T. Vaden

2007-11-01T23:59:59.000Z

50

U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service 11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service February 27, 2012 - 6:27am Addthis PROBLEM: A vulnerability was reported in IBM AIX. A remote user can cause denial of service conditions. PLATFORM: version(s): 5.3, 6.1, and 7.1 ABSTRACT: A remote user can send a specially crafted ICMP packet to cause the target service to crash. reference LINKS: Vendor Advisory Security Tracker ID 1026742 CVE-2011-1385 IMPACT ASSESSMENT: Medium Discussion: There is an error in the handling of a particular ICMP packet in which a remote user can cause a denial of service. Impact: Denial of service on AIX via network. Solution: The vendor has issued a fix. 5.3.12: APAR IV03369 6.1.5: APAR IV13672 6.1.6: APAR IV13554

51

IBM intelligent Bricks project: petabytes and beyond  

Science Conference Proceedings (OSTI)

This paper provides an overview of the Intelligent Bricks project in progress at IBM Research. It describes common problems faced by data center operators and proposes a comprehensive solution based on brick architectures. Bricks are hardware building ...

W. W. Wilcke; R. B. Garner; C. Fleiner; R. F. Freitas; R. A. Golding; J. S. Glider; D. R. Kenchammana-Hosekote; J. L. Hafner; K. M. Mohiuddin; K. K. Rao; R. A. Becker-Szendy; T. M. Wong; O. A. Zaki; M. Hernandez; K. R. Fernandez; H. Huels; H. Lenk; K. Smolin; M. Ries; C. Goettert; T. Picunko; B. J. Rubin; H. Kahn; T. Loo

2006-03-01T23:59:59.000Z

52

IBM Research Report  

E-Print Network (OSTI)

Feb 2, 2006 ... (Part of this research was carried out when Andrea Lodi was Herman Goldstine Fellow of the IBM T. J. Watson Research Center). Research ...

53

IBM Research Report  

E-Print Network (OSTI)

Aug 15, 2008... or legally obtained copies of the article (e.g. , payment of royalties). Copies may be requested from IBM T. J. Watson Research Center , P.

54

IBM Research Report  

E-Print Network (OSTI)

May 25, 2010 ... Technion - Israel Institute of Technology ... distribution outside of IBM prior to publication should be limited to peer communications and specific.

55

IBM POWER7 systems  

Science Conference Proceedings (OSTI)

This paper describes the system architectures and designs of the IBM POWER7® servers. From the smallest single-processor socket blade to the largest 32-processor-socket 256-core enterprise rack server, each system is designed to fully ...

R. X. Arroyo; R. J. Harrington; S. P. Hartman; T. Nguyen

2011-05-01T23:59:59.000Z

56

IBM Certification White Paper  

E-Print Network (OSTI)

IBM Certification White Paper The value of IT Certification #12;The value of IT Certification White · Respect and admiration of peers · Entrance into a community of like-minded professionals This white paper that can be evaluated in terms of ROI. Those most often #12;The value of IT Certification White paper

57

IBM Presentation Template Full Version  

U.S. Energy Information Administration (EIA) Indexed Site

10 IBM Corporation 10 IBM Corporation Smart Grid: Impacts on Electric Power Supply and Demand 2010 Energy Conference: Short-Term Stresses, Long-Term Change Michael Valocchi, Global Energy and Utilities Industry Leader, IBM Global Business Services April, 2010 © 2010 IBM Corporation 2 Discussion Topics The Business Model will Evolve The Consumer Value Model will Transform A New Energy Consumer will Emerge Customers Segmentation will be Done in a Different Manner Information and Data Sources will Change © 2010 IBM Corporation 3 The emerging value chain will allow consumers to have a different relationship with their energy providers © 2010 IBM Corporation 4 1. Smart, Connected Devices 2. Integrated Communication Networks 3. System Integration

58

IBM's New Flat Panel Displays  

NLE Websites -- All DOE Office Websites (Extended Search)

by J. Sthr (SSRL), M. Samant (IBM), J. Lning (SSRL) Today's laptop computers utilize flat panel displays where the light transmission from the back to the front of the display...

59

IBM Systems and Technology Electronics IBM CMOS 7HV for  

E-Print Network (OSTI)

of wireless communication in PV systems can improve reliability, reduce cost and increase the granularity, reliability, and safety of PV systems. Specific application areas include optimization of energy generation, intelligent power control and wireless monitoring of PV modules for health and reliability. IBM CMOS 7HV

60

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

IBM References | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transfer Data Transfer Debugging & Profiling Performance Tools & APIs Software & Libraries IBM References Intrepid/Challenger/Surveyor Tukey Eureka / Gadzooks Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] IBM References Contents IBM Redbooks A2 Processor Manual QPX Vector Instruction Set Architecture XL Compiler Documentation MASS Documentation Back to top IBM Redbooks IBM System Blue Gene Solution: Blue Gene/Q Application Development Manual - Application and library developers wants this one. This documents options for MPI, OpenMP, and other features of interest to most users. IBM System Blue Gene Solution: Blue Gene/Q Code Development and Tools Interface - Low-level tools; developers may find this useful.

62

IBM AND NIST LAUNCH COOPERATIVE EFFORT TO ...  

Science Conference Proceedings (OSTI)

... free lamps, catalysts and other new materials containing rare-earth elements. ... are available on the Internet, via the IBM Home Page available ...

63

STATEMENT OF CONSIDERATIONS REQUEST BY IBM FOR AN ADVANCE WAIVER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IBM's Petition, Petition Answer 1. In addition, IBM would like to assert copyright in computer software and delay the immediate release of unpublished technical data. Finally, the...

64

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

65

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

66

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

67

V-073: IBM Tivoli Federated Identity Manager Signature Verification...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities...

68

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August...

69

Integrated Building Management System (IBMS)  

SciTech Connect

This project provides a combination of software and services that more easily and cost-effectively help to achieve optimized building performance and energy efficiency. Featuring an open-platform, cloud- hosted application suite and an intuitive user experience, this solution simplifies a traditionally very complex process by collecting data from disparate building systems and creating a single, integrated view of building and system performance. The Fault Detection and Diagnostics algorithms developed within the IBMS have been designed and tested as an integrated component of the control algorithms running the equipment being monitored. The algorithms identify the normal control behaviors of the equipment without interfering with the equipment control sequences. The algorithms also work without interfering with any cooperative control sequences operating between different pieces of equipment or building systems. In this manner the FDD algorithms create an integrated building management system.

Anita Lewis

2012-07-01T23:59:59.000Z

70

August 15, 2001: IBM ASCI White  

Energy.gov (U.S. Department of Energy (DOE))

August 15, 2001Lawrence Livermore National Laboratory dedicates the "world's fastest supercomputer," the IBM ASCI White supercomputer with 8,192 processors that perform 12.3 trillion operations per...

71

IBM POWER7 multicore server processor  

Science Conference Proceedings (OSTI)

The IBM POWER® processor is the dominant reduced instruction set computing microprocessor in the world today, with a rich history of implementation and innovation over the last 20 years. In this paper, we describe the key features of ...

B. Sinharoy; R. Kalla; W. J. Starke; H. Q. Le; R. Cargnoni; J. A. Van Norstrand; B. J. Ronchetti; J. Stuecheli; J. Leenstra; G. L. Guthrie; D. Q. Nguyen; B. Blaner; C. F. Marino; E. Retter; P. Williams

2011-05-01T23:59:59.000Z

72

IBM HPCT on BG/P Systems | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

IBM HPCT on BGP Systems References IBM System Blue Gene Solution: High Performance Computing Toolkit for Blue GeneP - IBM Redbook describing HPCT and other performance tools...

73

Thermal Storage Systems at IBM Facilities  

E-Print Network (OSTI)

In 1979, IBM commissioned its first large scale thermal storage system with a capacity of 2.7 million gallons of chilled water and 1.2 million gallons of reclaimed, low temperature hot water. The stored cooling energy represents approximately 27,000 ton hours. Through reduced chiller plant capacity and annual operating cost savings in primarily electric demand charges the payback will be approximately 3 1/2 years. The water is stored in multiple, insulated tanks, located above the ground. A similar but smaller system at IBM's Charlotte, North Carolina plant has no provisions for heat reclaim. Instead, it uses cooling tower water directly in the chilled water circuit when outside conditions permit. This paper presents system designs, control modes and economic considerations and describes IBM's experience to date with large volume storage systems.

Koch, G.

1981-01-01T23:59:59.000Z

74

Scaling up parallel scientific applications on the IBM SP  

E-Print Network (OSTI)

Understanding and Using the SP Switch NERSC IBM SPMemory Page NERSC MPI-I/O Page RS/6000 SP 375MHz POWER3 SMPon the IBM SP David Skinner, NERSC HPCF Table of Contents

Skinner, David

2004-01-01T23:59:59.000Z

75

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which...

76

Quantum computing: an IBM perspective  

Science Conference Proceedings (OSTI)

Quantum physics provides an intriguing basis for achieving computational power to address certain categories of mathematical problems that are completely intractable with machine computation as we know it today. We present a brief overview of the current ...

M. Steffen; D. P. DiVincenzo; J. M. Chow; T. N. Theis; M. B. Ketchen

2011-09-01T23:59:59.000Z

77

V-211: IBM iNotes Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability

78

IBM's Linux Watch: The Challenge of Miniaturization  

Science Conference Proceedings (OSTI)

Nearly four years in development, the IBM Linux watch contains a complete computer system that runs Linux, displays X11 graphics, and has wireless connectivity. The system fits in a case that could pass as a slightly unusual analog timepiece with a somewhat ...

Chandra Narayanaswami; Noboru Kamijoh; Mandayam Raghunath; Tadanobu Inoue; Thomas Cipolla; Jim Sanford; Eugene Schlig; Sreekrishnan Venkiteswaran; Dinakar Guniguntala; Vishal Kulkarni; Kazuhiko Yamazaki

2002-01-01T23:59:59.000Z

79

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network (OSTI)

. http://docs.info.apple.com/article.html?artnum=303411 BEA Systems - 2007 Daylight Savings Time ChangesIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Shellcode Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The 2007 Daylight

80

SoftwareIBM Cognos Lab Services TM1 Health Check Service  

E-Print Network (OSTI)

of IBM Cognos 8 Planning, IBM Cognos 8 Controller, and IBM Cognos 8 Business Intelligence, IBM Cognos TM1 and Performance Management IBM Cognos business intelligence (BI) and performance management solutions deliver in the United States, other countries, or both. If these and other IBM trademarked terms are marked

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

82

IBM Research Report Intractability of Approximate Multi-dimensional ...  

E-Print Network (OSTI)

Jan 28, 2010 ... Technion - Israel Institute of Technology ... distribution outside of IBM prior to publication should be limited to peer communications and specific.

83

IBM Research Report Nonlinear Optimization over a Weighted ...  

E-Print Network (OSTI)

Mar 11, 2008 ... Technion - Israel Institute of Technology ... distribution outside of IBM prior to publication should be limited to peer communications and specific.

84

V-044: IBM Informix Buffer Overflow in Processing SQL Statements...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High DISCUSSION: IBM Informix is vulnerable to a buffer overflow caused by improper handling of unspecified SQL statements. A remote attacker with valid authentication...

85

V-073: IBM Tivoli Federated Identity Manager Signature Verification...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Web Server HTTP TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities...

86

IBM: parameter symmetry, hidden symmetries and transformations of boson operators  

E-Print Network (OSTI)

A symmetry of the parameter space of interacting boson models IBM-1 and IBM-2 is studied. The symmetry is associated with linear canonical transformations of boson operators, or, equivalently, with the existence of different realizations of the symmetry algebras of the models. The relevance of the parameter symmetry to physical observables is discussed.

A. M. Shirokov; N. A. Smirnova; Yu. F. Smirnov; O. Castaños; A. Frank

1999-04-07T23:59:59.000Z

87

IBM parameter symmetry, hidden symmetries and transformations of boson operators  

E-Print Network (OSTI)

A symmetry of the parameter space of interacting boson models IBM-1 and IBM-2 is studied. The symmetry is associated with linear canonical transformations of boson operators, or, equivalently, with the existence of different realizations of the symmetry algebras of the models. The relevance of the parameter symmetry to physical observables is discussed.

Shirokov, A M; Smirnov, Yu F; Castaños, O; Frank, A I; Smirnov, Yu. F.

1999-01-01T23:59:59.000Z

88

Petascale Debugging via Allinea DDT for IBM Blue Gene /P  

E-Print Network (OSTI)

@allinea.com> Senior Systems Engineer, Allinea Software Inc. ALCF L2P Workshop, May 23, 2012 #12;Outline ExperienceArchitecture #12;Current Status IBM Blue Gene /P Acceptance testing at ALCF (Allinea DDT 3.1) ­ Scale (Allinea DDT 3.2) ­ Early access for IBM Blue Gene /Q expected July 2012 ALCF requirement ­ Scale for Mira

Kemner, Ken

89

V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Tivoli Monitoring Web Server HTTP TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-011: IBM Tivoli Monitoring Web Server HTTP TRACETRACK...

90

Integrated Building Management System (IBMS) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Management System Building Management System (IBMS) Integrated Building Management System (IBMS) The U.S. Department of Energy (DOE) is currently conducting research into an integrated building management system (IBMS). Project Description This project seeks to develop an open integration framework that allows multivendor systems to interoperate seamlessly using internet protocols. The applicant will create an integrated control platform for implementing new integrated control strategies and to enable additional enterprise control applications, such as demand response. The project team seeks to develop several strategies that take advantage of the sensors and functionality of heating, ventilation, and air conditioning (HVAC); security; and information and communication technologies (ICT) subsystems;

91

IBM: Building the IT Function for a Global Business  

E-Print Network (OSTI)

In 1993, CEO Louis Gerstner initiated a transformation at IBM that Sam Palmisano continued when he took the reins in 2003. The transformation involved a change from a hardware and software business to a solutions and ...

Woerner, Stephanie L.

2010-12-01T23:59:59.000Z

92

Pre-engagement process improvement in IBM PC services  

E-Print Network (OSTI)

The front end of the IBM PC factory integration & deployment process is a pre-engagement process. In this study, the pre-engagement process, was analyzed. The organizational structure in the pre-engagement process and the ...

Zuo, Jie, M. Eng. Massachusetts Institute of Technology

2007-01-01T23:59:59.000Z

93

STATEMENT OF CONSIDERATIONS REQUEST BY IBM WATSON RESEARCH CENTER FOR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IBM WATSON RESEARCH CENTER FOR IBM WATSON RESEARCH CENTER FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN PATENT RIGHTS UNDER LBNL SUBCONTRACT NO. 6720363; DOE WAIVER NO. W(A)-05-056 The Petitioner, IBM Watson Research Center (IBM), has requested an Advance Waiver of the Government's domestic and foreign rights to inventions made under the above cited research and development subcontract (Subcontract) with the Lawrence Berkeley National Laboratory (LBNL). The objective of the Subcontract, which is issued by the LBNL on behalf of DOE's Office of Mathematical, Information and Computational Sciences (SC-21), which is part of the Office of Advance Scientific Computing Research (OASCR), is to provide support and lead basic development (i.e. preparing derivative works) on core parts of the K42 code base system.

94

IBM Blue Gene Parallel Supercomputer, Brookhaven National Laboratory, (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

L L Overview Simple Example: Compile, Link, Run Compiler Invocation Compile and Link Tips Batch Job Submission Applications Support Math Libraries MPI Version IBM Fortran Blue Gene & Linux Manuals (IBM Redbooks) Much of the info you need will be in the Linux manual, but there is also some Blue Gene-specific info in the Blue Gene manual. Current Fortran compiler version number can be determined on fen by typing: ls /opt/ibmcmp/xlf/bg, will be highest number listed. IBM C/C++ Blue Gene & Linux Manuals (IBM Redbooks) Much of the info you need will be in the Linux manual, but there is also some Blue Gene-specific info in the Blue Gene manual. Linux Manual: Go to XL C/C++ for Linux, choose the Product Library link, then select current version number in tab at page top. (Current C/C++

95

International Business Machines Corp IBM | Open Energy Information  

Open Energy Info (EERE)

Machines Corp IBM Machines Corp IBM Jump to: navigation, search Name International Business Machines Corp (IBM) Place Armonk, New York Zip 10504 Sector Services Product IBM is a technology company supplying hardware, software and Information Technology services. Coordinates 41.119417°, -73.708388° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.119417,"lon":-73.708388,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

96

IBM Research Report An Algorithmic Framework for MINLP with ...  

E-Print Network (OSTI)

Jun 17, 2009... IBM prior to publication should be limited to peer communications and specific ... advances in technology for convex MINLP will immediately give our ... of time, technology for the global optimization of convex MINLP (i.e., the ...

97

Science at LLNL with IBM Blue Gene/Q  

Science Conference Proceedings (OSTI)

Lawrence Livermore National Laboratory (LLNL) has a long history of working with IBM on Blue Gene® supercomputers. Beginning in November 2001 with the joint announcement of a partnership to expand the Blue Gene research project (including Blue Gene®/L ...

B. Carnes, B. Chan, E. W. Draeger, J.-L. Fattebert, L. Fried, J. Glosli, W. D. Krauss, S. H. Langer, R. McCallen, A. A. Mirin, F. Najjar, A. L. Nichols, T. Oppelstrup, J. A. Rathkopf, D. Richards, F. Streitz, P. M. Vranas, J. J. Rice, J. A. Gunnels, V. Gurev, C. Kim, J. Magerlein, M. Reumann, H.-F. Wen

2013-01-01T23:59:59.000Z

98

IBM system z10 processor cache subsystem microarchitecture  

Science Conference Proceedings (OSTI)

With the introduction of the high-frequency IBM System z10™ processor design, a new, robust cache hierarchy was needed to enable up to 80 of these processors aggregated into a tightly coupled symmetric multiprocessor (SMP) system to ...

P. Mak; C. R. Walters; G. E. Strait

2009-01-01T23:59:59.000Z

99

IBM References for BG/P | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Blue GeneP System Administration, SG24-7417 IBM System Blue Gene Solution: High Performance Computing Toolkit for Blue GeneP Universal Performance Counters Unit User Manual V3.0...

100

IBM system z10 I/O subsystem  

Science Conference Proceedings (OSTI)

The performance, reliability, and functionality of a large server are greatly influenced by the design characteristics of its I/O subsystem. The critical components of the IBM System z10™ I/O subsystem have, therefore, been significantly ...

E. W. Chencinski; M. A. Check; C. DeCusatis; H. Deng; M. Grassi; T. A. Gregg; M. M. Helms; A. D. Koenig; L. Mohr; K. Pandey; T. Schlipf; T. Schober; H. Ulrich; C. R. Walters

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Microscopic derivation of IBM and structural evolution in nuclei  

SciTech Connect

A Hamiltonian of the interacting boson model (IBM) is derived based on the mean-field calculations with nuclear energy density functionals (EDFs). The multi-nucleon dynamics of the surface deformation is simulated in terms of the boson degrees of freedom. The interaction strengths of the IBM Hamiltonian are determined by mapping the potential energy surfaces (PESs) of a given EDF with quadrupole degrees of freedom onto the corresponding PES of IBM. A fermion-to-boson mapping for a rotational nucleus is discussed in terms of the rotational response, which reflects a specific time-dependent feature. Ground-state correlation energy is evaluated as a signature of structural evolution. Some examples resulting from the present spectroscopic calculations are shown for neutron-rich Pt, Os and W isotopes including exotic ones.

Nomura, Kosuke [Department of Physics, University of Tokyo, Hongo, Bunkyo-ku, Tokyo 113-0033 (Japan)

2011-05-06T23:59:59.000Z

102

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service...

103

U.S. Department of Energy and IBM to Collaborate in Advancing...  

Office of Science (SC) Website

11.15.06 U.S. Department of Energy and IBM to Collaborate in Advancing Supercomputing Technology Lawrence Livermore and Argonne National Lab Scientists to Work with IBM...

104

T-615: IBM Rational System Architect ActiveBar ActiveX Control...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users...

105

IBM Human Ability and Accessibility Center Executive brief  

E-Print Network (OSTI)

. · Reinforce your public image as a strong, corporate-responsibility leader. Working with IBM, you can utilize. And anticipate and meet the needs of a rapidly changing consumer base. With an infrastructure of accessible of the population, including aging consumers and people with disabilities. Approximately 420 million people

106

Parallel volume rendering on the IBM Blue Gene/P  

Science Conference Proceedings (OSTI)

Parallel volume rendering is implemented and tested on an IBM Blue Gene distributed-memory parallel architecture. The goal of studying the cost of parallel rendering on a new class of supercomputers such as the Blue Gene/P is not necessarily to achieve ...

Tom Peterka; Hongfeng Yu; Robert Ross; Kwan-Liu Ma

2008-04-01T23:59:59.000Z

107

International Border Management Systems (IBMS) Program : visions and strategies.  

SciTech Connect

Sandia National Laboratories (SNL), International Border Management Systems (IBMS) Program is working to establish a long-term border security strategy with United States Central Command (CENTCOM). Efforts are being made to synthesize border security capabilities and technologies maintained at the Laboratories, and coordinate with subject matter expertise from both the New Mexico and California offices. The vision for SNL is to provide science and technology support for international projects and engagements on border security.

McDaniel, Michael; Mohagheghi, Amir Hossein

2011-02-01T23:59:59.000Z

108

U-272: IBM WebSphere Commerce User Information Disclosure Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user personal data. reference LINKS: IBM Security Bulletin 1612484 X-Force Vulnerability Database (78867) Secunia Advisory SA50821 CVE-2012-4830 IMPACT ASSESSMENT: Medium...

109

T-559: Stack-based buffer overflow in oninit in IBM Informix...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

execute arbitrary code on vulnerable installations of IBM Informix Database Server. SQL query execution privileges are required to exploit this vulnerability. The specific flaw...

110

IBM SmartSCOR - a SCOR based supply chain transformation platform through simulation and optimization techniques  

Science Conference Proceedings (OSTI)

Identified as a strategic area, supply chain transformation plays a critical role in today's IBM business. In this paper, we introduce an effort in IBM Research Division named SmartSCOR, which provides a comprehensive framework and methodology for On-Demand ...

Jin Dong; Hongwei Ding; Changrui Ren; Wei Wang

2006-12-01T23:59:59.000Z

111

U.S. Department of Energy and IBM to Collaborate in Advancing  

Office of Science (SC) Website

and IBM to Collaborate in Advancing Supercomputing and IBM to Collaborate in Advancing Supercomputing Technology News Featured Articles Science Headlines 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 Presentations & Testimony News Archives Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 11.15.06 U.S. Department of Energy and IBM to Collaborate in Advancing Supercomputing Technology Lawrence Livermore and Argonne National Lab Scientists to Work with IBM Designers Print Text Size: A A A Subscribe FeedbackShare Page Lawrence Livermore and Argonne National Lab Scientists to Work with IBM Designers November 15, 2006 WASHINGTON, DC - The U.S. Department of Energy (DOE) announced today that its Office of Science, the National Nuclear Security Administration (NNSA)

112

PRIMARY SHIELDING CALCULATIONS ON THE IBM 650 (ROC CODES)  

SciTech Connect

Four programs written for the IBM 650 to calculate the gamma dose rates in the primary shielding of thermal reactors are described. Their functions are outlined as follows: Program 651-calculates the core attenuation coefficient and equivalent core gamma volumetric source values for a specific core. Program 652- calculates the activation gamma source data in the shield and prepares tabular data in machine storage for Programs 653 and 654. Program 653- calculates the gamma dose rates in the shield due to gammas arising from activation of shield materials. Program 654calculates the gamma dose rates in the shield due to gammas arising in the core. Gamma photo source values are obtained on the basis of two group neutron flux distributions throughout the reactor core and shield. (W.D.M.)

Rosen, S.S.; Oby, P.V.; Caton, R.L.

1958-10-15T23:59:59.000Z

113

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Flaws Let Remote Users Execute Arbitrary Code T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code U-126: Cisco...

114

Thin-film multichip module packages for high-end IBM servers  

Science Conference Proceedings (OSTI)

A new generation of multilevel thin-film packages has been developed for IBM high-end S/390® and AS/400® systems. Thin-film structures in these packages are nonplanar and can be fabricated by either pattern electroplating ...

E. D. Perfecto; A. P. Giri; R. R. Shields; H. P. Longworth; J. R. Pennacchia; M. P. Jeanneret

1998-09-01T23:59:59.000Z

115

Packaging design of the IBM system z10 enterprise class platform central electronic complex  

Science Conference Proceedings (OSTI)

The IBM System z10™ Enterprise Class mainframe addresses the modern data center requirements for minimizing floor space while increasing computing power efficiency. These objectives placed challenges on the z10™ packaging ...

J. G. Torok; F. E. Bosco; W. L. Brodsky; E. F. Furey; G. F. Goth; D. J. Kearney; J. J. Loparco; M. T. Peets; K. L. Pizzolato; D. W. Porter; G. Ruehle; W. H. White

2009-01-01T23:59:59.000Z

116

IBM, Endicott eleventh quarterly report, April 1, 1997--June 30, 1997  

Science Conference Proceedings (OSTI)

IBM Endicott, Assembly Process Design, has completed the tenth quarter of development activity on work concerned with high performance, low cost interconnections for flip attach. The scope of work this quarter included paste deposition process development and chip bonding process development.

NONE

1995-11-01T23:59:59.000Z

117

Engineering PFLOTRAN for Scalable Performance on Cray XT and IBM BlueGene Architectures  

E-Print Network (OSTI)

Engineering PFLOTRAN for Scalable Performance on Cray XT and IBM BlueGene Architectures Richard University, Raleigh, NC 27695-8206 3 Department of Civil, Construction, and Environmental Engineering, North the release of a hypothetical uranium plume at the Hanford 300 Area in southeastern Washington state

118

The IBM speech-to-speech translation system for smartphone: Improvements for resource-constrained tasks  

Science Conference Proceedings (OSTI)

This paper describes our recent improvements to IBM TRANSTAC speech-to-speech translation systems that address various issues arising from dealing with resource-constrained tasks, which include both limited amounts of linguistic resources and training ... Keywords: Low-resourced languages, Machine translation, Mobiles, Speech recognition, Speech-to-speech translation, Text-to-speech

Bowen Zhou; Xiaodong Cui; Songfang Huang; Martin Cmejrek; Wei Zhang; Jian Xue; Jia Cui; Bing Xiang; Gregg Daggett; Upendra Chaudhari; Sameer Maskey; Etienne Marcheret

2013-02-01T23:59:59.000Z

119

A power, packaging, and cooling overview of the IBM eServer z900  

Science Conference Proceedings (OSTI)

This paper provides an overview of the power, packaging, and cooling aspects of the IBM eServer z900 design. The semiconductor processor chips must be supported and protected in a mechanical structure that has to provide electrical interconnects while ...

P. Singh; S. J. Ahladas; W. D. Becker; F. E. Bosco; J. P. Corrado; G. F. Goth; S. Iruvanti; M. A. Nobile; B. D. Notohardjono; J. H. Quick; E. J. Seminaro; K. M. Soohoo; C. Wu

2002-11-01T23:59:59.000Z

120

IBM Research Report Solving Maximum-Entropy Sampling ...  

E-Print Network (OSTI)

Feb 28, 2005 ... This fundamental problem in the design of experiments was introduced in [18] and first used .... An alternative to Algorithm 1 that we experimented with (referred to as ... a path along the feasible set of normalized matrices. Even if .... Unfortunately, we have found it difficult to provide any guidelines on which.

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Simulation Technology Research Division assessment of the IBM RISC SYSTEM/6000 Model 530 workstation  

SciTech Connect

A workstation manufactured by International Business Machines Corporation (IBM) was loaned to the Simulation Technology Research Division for evaluation. We have found that these new UNIX workstations from IBM have superior cost to performance ratios compared to the CRAY supercomputers and Digital's VAX machines. Our appraisal of this workstation included floating-point performance, system and environment functionality, and cost effectiveness. Our assessment was based on a suite of radiation transport codes developed at Sandia that constitute the bulk of our division's computing workload. In this report, we also discuss our experience with features that are unique to this machine such as the AIX operating system and the XLF Fortran Compiler. The interoperability of the RS/6000 workstation with Sandia's network of CRAYs and VAXs was also assessed.

Valdez, G.D. (Applied Methods, Inc., Albuquerque, NM (USA)); Halbleib, J.A.; Kensek, R.P.; Lorence, L.J. (Sandia National Labs., Albuquerque, NM (USA))

1990-11-01T23:59:59.000Z

122

IBM-1 description of the fission products $^{108,110,112}$Ru  

E-Print Network (OSTI)

IBM-1} calculations for the fission products $^{108,110,112}$Ru have been carried out. The even-even isotopes of Ru can be described as transitional nuclei situated between the U(5) (spherical vibrator) and SO(6) ($\\gamma$-unstable rotor) symmetries of the Interacting Boson Model. At first, a Hamiltonian with only one- and two-body terms has been used. Excitation energies and $B$(E2) ratios of gamma transitions have been calculated. A satisfactory agreement has been obtained, with the exception of the odd-even staggering in the quasi-$\\gamma$ bands of $^{110,112}$Ru. The observed pattern is rather similar to the one for a rigid triaxial rotor. A calculation based on a Hamiltonian with three-body terms was able to remove this discrepancy. The relation between the IBM and the triaxial rotor model was also examined.

I. Stefanescu; A. Gelberg; J. Jolie; P. Van Isacker; P. Von Brentano; Y. X. Luo; S. J. Zhu; J. O. Rasmussen; J. H. Hamilton; A. V. Ramayya; X. L. Che

2007-06-12T23:59:59.000Z

123

IBM-1 description of the fission products $^{108,110,112}$Ru  

E-Print Network (OSTI)

IBM-1} calculations for the fission products $^{108,110,112}$Ru have been carried out. The even-even isotopes of Ru can be described as transitional nuclei situated between the U(5) (spherical vibrator) and SO(6) ($\\gamma$-unstable rotor) symmetries of the Interacting Boson Model. At first, a Hamiltonian with only one- and two-body terms has been used. Excitation energies and $B$(E2) ratios of gamma transitions have been calculated. A satisfactory agreement has been obtained, with the exception of the odd-even staggering in the quasi-$\\gamma$ bands of $^{110,112}$Ru. The observed pattern is rather similar to the one for a rigid triaxial rotor. A calculation based on a Hamiltonian with three-body terms was able to remove this discrepancy. The relation between the IBM and the triaxial rotor model was also examined.

Stefanescu, I; Jolie, J; Van Isacker, P; Von Brentano, P; Luo, Y X; Zhu, S J; Rasmussen, J O; Hamilton, J H; Ramayya, A V; Che, X L

2007-01-01T23:59:59.000Z

124

Porting Charm++/NAMD to IBM Blue Gene/Q Wei Jiang Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Porting Charm++/NAMD to IBM Blue Gene/Q Porting Charm++/NAMD to IBM Blue Gene/Q Wei Jiang Argonne Leadership Computing Facility 7 th , March NAMD_esp NAMD - Parallel molecular dynamics code designed for high-performance simulation of large biomolecular systems Portable to all popular supercomputing platforms Great scalability based on Charm++ parallel objects Scientific aims on Blue Gene/Q Ensemble run that launches large number of replicas concurrently - mainly for energetic simulation High throughput simulation for large scale systems ~100M atoms Requirements for charm++ New communication layer that supports parallel/parallel runs Enable charm++ programming paradigm on Parallel Active Messaging Interface (PAMI) Parallel Structure of NAMD Hybrid force/spatial decomposition Adaptive Overlap of Communication and Computation

125

Computing Legacy Software Behavior to Understand Functionality and Security Properties: An IBM/370 Demonstration  

Science Conference Proceedings (OSTI)

Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address the current threat environment. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation to conduct a demonstration project to compute behavior of legacy IBM Assembly Language code for a federal agency. The ultimate goal is to understand functionality and security vulnerabilities as a basis for code modernization. This paper reports on the first phase, to define functional semantics for IBM Assembly instructions and conduct behavior computation experiments.

Linger, Richard C [ORNL; Pleszkoch, Mark G [ORNL; Prowell, Stacy J [ORNL; Sayre, Kirk D [ORNL; Ankrum, Scott [MITRE Corporation

2013-01-01T23:59:59.000Z

126

Qualification of the IBM CSC factory in Singapore : resource estimation and allocation in software and hardware services  

E-Print Network (OSTI)

The CSC department of IBM Singapore has been established two years ago. It provides a variety of hardware and software services for its customers. Due to the complex mix of products and the different ways of completing the ...

Li, Chengguang, M. Eng. Massachusetts Institute of Technology

2007-01-01T23:59:59.000Z

127

Description of Even-Even Xe isotopes in the transitional region of IBM  

E-Print Network (OSTI)

Properties of Xe isotopes isotopes are studied in the U(5)O(6) transitional region of Interacting Boson Model (IBM-1). The energy levels and B(E2)transition rates are calculated via the affine SU(1,1)Lie Algebra. The agreement with the most recent experimental is acceptable. The evaluated Hamiltonian control parameters suggest a spherical to (/gamma)-soft shape transition and propose the Xe(A=130)nucleus as the best candidate for the E(5)symmetry.

M. A. Jafarizadeh; N. Fouladi; H. Sabri

2012-05-01T23:59:59.000Z

128

BOAST II for the IBM 3090 and RISC 6000  

SciTech Connect

BOAST II simulates isothermal, darcy flow in three dimensions. It assumes that reservoir liquids can be described in three fluid phases (oil, gas, and water) of constant composition, with physical properties that depend on pressure, only. These reservoir fluid approximations are acceptable for a large percentage of the world's oil and gas reservoirs. Consequently, BOAST II has a wide range of applicability. BOAST II can simulate oil and/or gas recovery by fluid expansion, displacement, gravity drainage, and capillary imbibition mechanisms. Typical field production problems that BOAST II can handle include primary depletion studies, pressure maintenance by water and/or gas injection, and evaluation of secondary recovery waterflooding and displacement operations. Technically, BOAST II is a finite, implicit pressure, explicit saturation (IMPES) numerical simulator. It applies both direct and iterative solution techniques for solving systems of algebraic equations. The well model allows specification of rate or pressure constraints on well performance, and the user is free to add or to recomplete wells during the simulation. In addition, the user can define multiple rock and PVT regions and can choose from three aquifer models. BOAST II also provides flexible initialization, a bubble-point tracking scheme, automatic time-step control, and a material balance check on solution stability. The user controls output, which includes a run summary and line-printer plots of fieldwide performance.

Hebert, P.; Bourgoyne, A.T. Jr.; Tyler, J.

1993-05-01T23:59:59.000Z

129

IBM, Endicott second year annual report. Executive summary  

Science Conference Proceedings (OSTI)

PMSP (Polymer Metal Solvent Paste) material must be deposited on a five inch wafer with 100% bump survival. The target geometry is 0.010{double_prime} diameter, and 0.004{double_prime} high with a flat surface. Accomplishments: The photobumping process has been refined to yield bumps that are 0.010{double_prime} in diameter and greater than 0.0035{double_prime} high. The surface is flat and bonding results in a strong bond with no air entrapment between the chip bump and card pad. Initial work with photobumping yielded a bump surface that was concave. In photobumping, 0.004{double_prime} thick photoresist is imaged to create apertures. These apertures are filled with PMSP in two passes with a solvent drying process that occurs between the first and the second pass After the first pass filling, solvent from the PM SP interacted with the photoresist and caused the top surface, at the circumference of the aperture, to shrink. On the second pass filling, this slightly depressed surface fills up with PM SP. We call this blooming because the diameter of the bump is extended at the surface. When the photoresist is stripped, the thin surface extension of the bump diameter is folded over on top of the bump. This fold created a ridge at the circumference of the bump that would make initial contact with the card surface during bonding. The result was a high probability of air entrapment at the joint interface. The blooming problem was corrected by changing from an aqueous to a semiaqueous photorcsist that was more solvent resistant. Flat surface bumps are made with 100% yield on five inch wafers. Double layers of 0.002{double_prime} photoresist are used to define the nearly 0.004{double_prime} high bumps. Work is in progress to use single layers of 0.003{double_prime} and 0.004{double_prime} photoresist. A single layer should eliminate perturbations from a straight side wall profile that exist near the interface of a double photoresist layup.

Gaynes, M.A.

1996-11-01T23:59:59.000Z

130

AN IBM 7090 FORTRAN PROGRAM FOR ASME UNFIRED PRESSURE VESSEL DESIGN AND PRELIMINARY COST ESTIMATION  

SciTech Connect

An IBM 7090 FORTRAN program was written for the preliminary design and cost estimation of unfired pressure vessels with or without a jacket. Both vessel and jacket designs conform to the 1959 ASME Boiler and Pressure Vessel Code, Section VIII, Unfired Pressure Vessels. Vessels and jackets from 5 in. pipe through 84 in. o.d. and 1/4 in. through 1 1/2 in. in metal thickness may be designed by this program as written. Total vessel cost is the sum of metal and fabrication costs, each on a weight basis. (auth)

Prince, C.E.; Milford, R.P.

1962-10-17T23:59:59.000Z

131

IBM History of Far Eastern Languages in Computing, Part 1: Requirements and Initial Phonetic Product Solutions in the 1960s  

Science Conference Proceedings (OSTI)

This article begins a three-part series, presenting an overview of events in IBM that preceded todayýs versatility in handling Far Eastern languages in the IT arena. Here, Part 1 analyzes the complexities and characteristics of the Japanese, Korean, ... Keywords: Kanji, Katakana, Hiragana, Hangul, Hanzi, Thai, Korean, Chinese, BCD, EBCDIC

Kurt Hensch

2005-01-01T23:59:59.000Z

132

Area schools get new computers through Los Alamos National Laboratory, IBM  

NLE Websites -- All DOE Office Websites (Extended Search)

Area schools get new computers Area schools get new computers Area schools get new computers through Los Alamos National Laboratory, IBM partnership Northern New Mexico schools are recipients of fully loaded desktop and laptop computers. May 8, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Contact Steve Sandoval

133

Common Air Conditioner Problems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Air Conditioner Problems Common Air Conditioner Problems Common Air Conditioner Problems May 30, 2012 - 6:41pm Addthis A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. What does this mean for me? You can eliminate the most common air conditioner problems before hiring an air conditioning technician. You can do some air conditioner maintenance and repair tasks yourself. One of the most common air conditioning problems is improper operation. If your air conditioner is on, be sure to close your home's windows and outside doors. For room air conditioners, isolate the room or a group of connected rooms as much as possible from the rest of your home.

134

Common Air Conditioner Problems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Air Conditioner Problems Common Air Conditioner Problems Common Air Conditioner Problems May 30, 2012 - 6:41pm Addthis A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. What does this mean for me? You can eliminate the most common air conditioner problems before hiring an air conditioning technician. You can do some air conditioner maintenance and repair tasks yourself. One of the most common air conditioning problems is improper operation. If your air conditioner is on, be sure to close your home's windows and outside doors. For room air conditioners, isolate the room or a group of connected rooms as much as possible from the rest of your home.

135

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution  

Energy.gov (U.S. Department of Energy (DOE))

Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

136

Intelligent Bioreactor Management Information System (IBM-IS) for Mitigation of Greenhouse Gas Emissions  

DOE Green Energy (OSTI)

Methane is an important contributor to global warming with a total climate forcing estimated to be close to 20% that of carbon dioxide (CO2) over the past two decades. The largest anthropogenic source of methane in the US is 'conventional' landfills, which account for over 30% of anthropogenic emissions. While controlling greenhouse gas emissions must necessarily focus on large CO2 sources, attention to reducing CH4 emissions from landfills can result in significant reductions in greenhouse gas emissions at low cost. For example, the use of 'controlled' or bioreactor landfilling has been estimated to reduce annual US greenhouse emissions by about 15-30 million tons of CO2 carbon (equivalent) at costs between $3-13/ton carbon. In this project we developed or advanced new management approaches, landfill designs, and landfill operating procedures for bioreactor landfills. These advances are needed to address lingering concerns about bioreactor landfills (e.g., efficient collection of increased CH4 generation) in the waste management industry, concerns that hamper bioreactor implementation and the consequent reductions in CH4 emissions. Collectively, the advances described in this report should result in better control of bioreactor landfills and reductions in CH4 emissions. Several advances are important components of an Intelligent Bioreactor Management Information System (IBM-IS).

Paul Imhoff; Ramin Yazdani; Don Augenstein; Harold Bentley; Pei Chiu

2010-04-30T23:59:59.000Z

137

[Paste deposition and chip bonding process development]. IBM, Endicott tenth quarterly report  

Science Conference Proceedings (OSTI)

The scope of Endicott activity during this quarter includes: paste deposition process development and chip bonding process development. It was discovered that small voids exist in the photobumps. These are typically at the base of the bump and are believed to have always been present. Although the reliability test results have been positive and no failure is attributed to voids, the process development work during the last quarter has focused on understanding how these form and how to reduce them. High feed pressure, slow nozzle speed and lower viscosity reduce void formation. Nozzle design changes have been identified. One change will increase the shearing of the paste during feed, thus reducing the viscosity, a second change will allow higher feed pressures. Chip bonding process development has focused on correlating bonding results between the IBM in-house chip bonder made by Research Devices, Inc. and the Universal development bond tool. Two variables have been identified that correlate with poor bond results. The report describes more detail of the activity during the tenth quarter for paste deposition and chip bonding in each of these areas.

NONE

1997-05-01T23:59:59.000Z

138

GENERAL REACTOR ANALYSIS COMPUTER PROGRAM FOR THE IBM 704, PROGRAM GEORGE  

SciTech Connect

Program George is an IBM 704 ccde that combines standard ANPD reactor analysis methcds for computing multiplication constant and spatial distribution of flux and power, as well as other nuclear parameters, in aircraft (heterogeneous) reactors. The elapsed time and the chance for human error between initial input and final output are greatly reduced in Program George. A matched set of reflector savings for a reflected, cylindrical core, which was formerly obtained by hand, is now computed by the program. In the C/sub 2/ pcrtion of Program George, the ccde computes the neutron slowingdown density and flux at 19 lethargy levels plus a thermal group in bare, homogeneous compositions with normal mode, ene ngy-dependent bucklings. The diffusion coefficient contains a transport correction as well as a Behrens correction for heterogeneous structure. Flux-depression factors at thermal and two epithermal levels are computed in annular, cylindrical geometry by one-energy, P/sub 3/ transport theory approximation in the I/sub 2/ pontion of the program, or they may be given as input. Flux weighting of various cross sections, transmission factors, and other parameters are computed in a multigroup representation. Two-energy-group constants from the regional compositions are supplied in the F/sub 2/ portion of the program, in which a two-energy group, one-space-dimensional, multiregion diffusion calculation yields multiplication constant, normalized fission density, fast flux, and slow flux in each onedimensional reactor pontrayed. If a reactivity match is requested, the reflector savings of the specified compositions are adjusted until the multiplication constant i n the radial F/sub 2/, longitudinal F/sub 2/, and the reference bare equivalent core of a cylindrical reflected reactor converge to the same value. (auth)

Hoffman, T.A.; Henderson, W.B.

1959-10-01T23:59:59.000Z

139

2012 IBM Corporation IBM operates in 170  

E-Print Network (OSTI)

JAUS specifies no components required the By combining smart sensors and traversability grids-time GPOS and VSS data and to marshal traversability grids. UNIFYING SENSOR INPUT WITH SMART SENSORS The smart sensor architecture is based on the idea that each sensor processes its data independently and pro

Chen, Keh-Hsun

140

BOAST II for the IBM 3090 and RISC 6000. Final report  

SciTech Connect

BOAST II simulates isothermal, darcy flow in three dimensions. It assumes that reservoir liquids can be described in three fluid phases (oil, gas, and water) of constant composition, with physical properties that depend on pressure, only. These reservoir fluid approximations are acceptable for a large percentage of the world`s oil and gas reservoirs. Consequently, BOAST II has a wide range of applicability. BOAST II can simulate oil and/or gas recovery by fluid expansion, displacement, gravity drainage, and capillary imbibition mechanisms. Typical field production problems that BOAST II can handle include primary depletion studies, pressure maintenance by water and/or gas injection, and evaluation of secondary recovery waterflooding and displacement operations. Technically, BOAST II is a finite, implicit pressure, explicit saturation (IMPES) numerical simulator. It applies both direct and iterative solution techniques for solving systems of algebraic equations. The well model allows specification of rate or pressure constraints on well performance, and the user is free to add or to recomplete wells during the simulation. In addition, the user can define multiple rock and PVT regions and can choose from three aquifer models. BOAST II also provides flexible initialization, a bubble-point tracking scheme, automatic time-step control, and a material balance check on solution stability. The user controls output, which includes a run summary and line-printer plots of fieldwide performance.

Hebert, P.; Bourgoyne, A.T. Jr.; Tyler, J.

1993-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

IBM Research Report  

E-Print Network (OSTI)

The hydraulic head is the total energy per unit of weight of the water, and it is expressed in terms of a ..... clean way for AMPL to pass such information to the solver. .... market. 4.1.1 The famous New York instance. The New York instance was ...

142

IBM Blue Gene Architecture  

NLE Websites -- All DOE Office Websites (Extended Search)

How to use Open|SpeedShop to Analyze the Performance of Parallel Codes. Donald Frederick LLNL LLNL---PRES---508651 Performance Analysis is becoming more important Complex...

143

IBM Software Information Management  

E-Print Network (OSTI)

instances of private data so that they can be fully protected · Support compliance with privacy regulations protecting that data--and the applications that hold that data--makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organizations must

144

Tackling Energy Problems For America's Tribal Nations | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tackling Energy Problems For America's Tribal Nations Tackling Energy Problems For America's Tribal Nations Tackling Energy Problems For America's Tribal Nations June 20, 2012 - 6:07pm Addthis Julia Bovey, First Wind; Tracey LeBeau; Neil Kiely, First Wind; and Bob Springer (NREL) at First Wind's new Rollins project near Lincoln, Maine. Julia Bovey, First Wind; Tracey LeBeau; Neil Kiely, First Wind; and Bob Springer (NREL) at First Wind's new Rollins project near Lincoln, Maine. Tracey A. LeBeau Director, Office of Indian Energy Policy & Programs What Is START? It provides tribal communities with technical assistance to accelerate clean energy project development. Helps to advance energy self-sufficiency. And creates jobs across the country. At the Tribal Nations Conference last December, President Obama noted that

145

The Impact of IBM Cell Technology on the Programming Paradigm in the Context of Computer Systems for Climate and Weather Models  

SciTech Connect

The call for ever-increasing model resolutions and physical processes in climate and weather models demands a continual increase in computing power. The IBM Cell processor's order-of-magnitude peak performance increase over conventional processors makes it very attractive to fulfill this requirement. However, the Cell's characteristics, 256KB local memory per SPE and the new low-level communication mechanism, make it very challenging to port an application. As a trial, we selected the solar radiation component of the NASA GEOS-5 climate model, which: (1) is representative of column physics components (half the total computational time), (2) has an extremely high computational intensity: the ratio of computational load to main memory transfers, and (3) exhibits embarrassingly parallel column computations. In this paper, we converted the baseline code (single-precision Fortran) to C and ported it to an IBM BladeCenter QS20. For performance, we manually SIMDize four independent columns and include several unrolling optimizations. Our results show that when compared with the baseline implementation running on one core of Intel's Xeon Woodcrest, Dempsey, and Itanium2, the Cell is approximately 8.8x, 11.6x, and 12.8x faster, respectively. Our preliminary analysis shows that the Cell can also accelerate the dynamics component (~;;25percent total computational time). We believe these dramatic performance improvements make the Cell processor very competitive as an accelerator.

Zhou, Shujia; Duffy, Daniel; Clune, Thomas; Suarez, Max; Williams, Samuel; Halem, Milton

2009-01-10T23:59:59.000Z

146

cutting stock problem  

Science Conference Proceedings (OSTI)

NIST. cutting stock problem. (classic problem). Definition: Find the best arrangement of shapes on rectangles to minimize ...

2013-08-23T23:59:59.000Z

147

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

148

Plastics' Color Problem: How a New Device Will Prevent Waste | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Plastics' Color Problem: How a New Device Will Prevent Waste Plastics' Color Problem: How a New Device Will Prevent Waste Plastics' Color Problem: How a New Device Will Prevent Waste July 22, 2010 - 3:20pm Addthis This is a probe for use in an extruder, similar to the one being developed by Guided Wave of Rancho Cordova, Calif. | Photo courtesy of Guided Wave. This is a probe for use in an extruder, similar to the one being developed by Guided Wave of Rancho Cordova, Calif. | Photo courtesy of Guided Wave. What are the key facts? Commercial plastics made at 752 degrees Fahrenheit and 2,000 psi Conventional plastic color detectors break at high temps and pressures Plastics with incorrect colors, require rerunning production - wasting energy $250,000 DOE grant to support development of improved probe Color can make or break commercial plastics. And commercial or extruded

149

Cognos SoftwareIBM Cognos platform The IBM Cognos Platform  

E-Print Network (OSTI)

to the Center for Business Intelligence ("CBI"). Rather, the requestor states that he will give up several days be paid #12;2 for by the sponsor of the conference, the Center for Business Intelligence ("CBI"), a "forState of Colorado INDEPENDENT ETHICS COMMISSION 633 17th St., Ste. 1300, Denver, CO 80202 Ph.: 303

150

IBM Global Business Services IBM Institute for Business Value  

E-Print Network (OSTI)

were satisfied with leaving all the decisions about their energy supply to their trusted providers radically redefining that relationship. Our recent surveys of 1,900 energy consumers and nearly 100 industry past, as long as the energy flowed when and where required, residential and small commercial customers

151

Symmetry in Scheduling Problems  

E-Print Network (OSTI)

Nov 16, 2010 ... 2 Problem Symmetry and Fundamental Domains ...... Handbook of Computational Group Theory (Discrete Mathematics and Its Applica- tions).

152

Troubleshoot HRSG corrosion problems  

SciTech Connect

Heat-recovery steam generators (HRSGs) have come of age. At the same time, these boilers are more complex as designs are refined to maximize heat recovery. Hundreds of units are installed and now have years of operating experience providing valuable information that can benefit all HRSG owners. Experienced troubleshooters can anticipate potential problem areas and recommend cost-effective solutions. The HRSG corrosion problems summarized here--and the means by which they were identified and solved--are useful examples to alert other HRSG owners and operators to potential problem areas. Steps involved include thorough inspection and documentation, problem and cost/benefit analyses, and planning around outages.

Stanley, L.

1996-07-01T23:59:59.000Z

153

Drinking Water Problems: Copper  

E-Print Network (OSTI)

High levels of copper in drinking water can cause health problems. This publication explains the effects of copper in water and methods of removing it. 4 pp.

Dozier, Monty; McFarland, Mark L.; Lesikar, Bruce J.

2006-01-25T23:59:59.000Z

154

ITOUGH2 sample problems  

DOE Green Energy (OSTI)

This report contains a collection of ITOUGH2 sample problems. It complements the ITOUGH2 User`s Guide [Finsterle, 1997a], and the ITOUGH2 Command Reference [Finsterle, 1997b]. ITOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media [Preuss, 1987, 1991a]. The report ITOUGH2 User`s Guide [Finsterle, 1997a] describes the inverse modeling framework and provides the theoretical background. The report ITOUGH2 Command Reference [Finsterle, 1997b] contains the syntax of all ITOUGH2 commands. This report describes a variety of sample problems solved by ITOUGH2. Table 1.1 contains a short description of the seven sample problems discussed in this report. The TOUGH2 equation-of-state (EOS) module that needs to be linked to ITOUGH2 is also indicated. Each sample problem focuses on a few selected issues shown in Table 1.2. ITOUGH2 input features and the usage of program options are described. Furthermore, interpretations of selected inverse modeling results are given. Problem 1 is a multipart tutorial, describing basic ITOUGH2 input files for the main ITOUGH2 application modes; no interpretation of results is given. Problem 2 focuses on non-uniqueness, residual analysis, and correlation structure. Problem 3 illustrates a variety of parameter and observation types, and describes parameter selection strategies. Problem 4 compares the performance of minimization algorithms and discusses model identification. Problem 5 explains how to set up a combined inversion of steady-state and transient data. Problem 6 provides a detailed residual and error analysis. Finally, Problem 7 illustrates how the estimation of model-related parameters may help compensate for errors in that model.

Finsterle, S.

1997-11-01T23:59:59.000Z

155

Corrosion Problems and Solutions  

Science Conference Proceedings (OSTI)

Table 5   Typical deaerator corrosion problems...General corrosion of vessels and piping GC Layup, CH V, high iron in feedwater None N/A (a) CF, corrosion fatigue;

156

Swaging Problems and Solutions  

Science Conference Proceedings (OSTI)

Table 5   Some swaging problems, potential causes, and possible solutions...causes Solutions Difficult feeding Work material too hard Anneal or stress relieve to remove effects of cold

157

The Magnetotelluric Inverse Problem  

E-Print Network (OSTI)

1572–1592. Banks, R. , 1969: Geomagnetic variations and theThe inverse problem in geomagnetic induction. Z. Geophys. ,sound inferences from geomagnetic sounding, doi:10.1016/j.

Medin, Ashley E

2008-01-01T23:59:59.000Z

158

The magnetotelluric inverse problem  

E-Print Network (OSTI)

1572–1592. Banks, R. , 1969: Geomagnetic variations and theThe inverse problem in geomagnetic induction. Z. Geophys. ,sound inferences from geomagnetic sounding, doi:10.1016/j.

Medin, Ashley E.

2008-01-01T23:59:59.000Z

159

Hydrostatic Adjustment: Lamb's Problem  

Science Conference Proceedings (OSTI)

The prototype problem of hydrostatic adjustment for large-scale atmospheric motions is Presented. When a horizontally infinite layer of compressible fluid, initially at rest, is instantaneously heated, the fluid is no longer in hydrostatic ...

Peter R. Bannon

1995-05-01T23:59:59.000Z

160

The Sedov Test Problem  

SciTech Connect

The Sedov test is classically defined as a point blast problem. The Sedov problem has led us to advances in algorithms and in their understanding. Vorticity generation can be physical or numerical. Both play a role in Sedov calculations. The RAGE code (Eulerian) resolves the shock well, but produces vorticity. The source definition matters. For the FLAG code (Lagrange), CCH is superior to SGH by avoiding spurious vorticity generation. FLAG SGH currently has a number of options that improve results over traditional settings. Vorticity production, not shock capture, has driven the Sedov work. We are pursuing treatments with respect to the hydro discretization as well as to artificial viscosity.

Fung, Jimmy [Los Alamos National Laboratory; Masser, Thomas [Los Alamos National Laboratory; Morgan, Nathaniel R. [Los Alamos National Laboratory

2012-06-25T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Solving quantified constraint satisfaction problems  

Science Conference Proceedings (OSTI)

We make a number of contributions to the study of the Quantified Constraint Satisfaction Problem (QCSP). The QCSP is an extension of the constraint satisfaction problem that can be used to model combinatorial problems containing contingency or uncertainty. ... Keywords: Arc consistency, Quantified Boolean formulas, Quantified constraint satisfaction problems, Random problems, Search algorithms

Ian P. Gent; Peter Nightingale; Andrew Rowley; Kostas Stergiou

2008-04-01T23:59:59.000Z

162

Drinking Water Problems: Radionuclides  

E-Print Network (OSTI)

Radionuclides in drinking water can cause serious health problems for people. This publication explains what the sources of radionuclides in water are, where high levels have been found in Texas, how they affect health and how to treat water to remove them.

Lesikar, Bruce J.; Melton, Rebecca; Hare, Michael; Hopkins, Janie; Dozier, Monty

2006-08-04T23:59:59.000Z

163

Pemex: Problems and Policy Options  

E-Print Network (OSTI)

American Studies University of California, Berkeley Pemex: Problems and Policy Options David Shields Independent Energy

Shields, David

2006-01-01T23:59:59.000Z

164

Solving the Fast Clock Problem  

Science Conference Proceedings (OSTI)

This power quality (PQ) case study troubleshoots then solves the problem of digital clocks running fast.

2003-12-31T23:59:59.000Z

165

Problem 2-Lexicographic Order  

E-Print Network (OSTI)

Problem: For complex numbers z = a + bi ? C and w = c + di ? C define ”z ? w ” if either a ordering of C”. (Question I) Prove that this turns C into and ordered set. (Question II) Is this an ordered field? (no) (Question III) Does it have the least-upper-bound property? (no) We will first review the definitions of order and ordered set from Rudin [R]. We will then show that under the lexicographic ordering C is an ordered set. Definition 1. Let S be a set. An order on S is a relation, denoted by ?, with the following two properties: (i) If x ? S and y ? S then one and only one of the statements is true. x ? y, x = y, y ? x (ii) If x, y, z ? S, if x ? y and y ? z, then x ? z.

Jacob Bower

2008-01-01T23:59:59.000Z

166

Kolkata Restaurant Problem as a generalised El Farol Bar Problem  

E-Print Network (OSTI)

Generalisation of the El Farol bar problem to that of many bars here leads to the Kolkata restaurant problem, where the decision to go to any restaurant or not is much simpler (depending on the previous experience of course, as in the El Farol bar problem). This generalised problem can be exactly analysed in some limiting cases discussed here. The fluctuation in the restaurant service can be shown to have precisely an inverse cubic behavior, as widely seen in the stock market fluctuations.

Chakrabarti, Bikas K

2007-01-01T23:59:59.000Z

167

Applying problem-structuring methods to problems in computer security  

Science Conference Proceedings (OSTI)

Solutions to security problems, particularly ones involving cryptography, have typically been approached through the Inside-Out Threat Model, "this is our solution and whatever it addresses is the threat". Email encryption/signing and SSL/TLS are two ... Keywords: problem-structuring methods, soft operations research, soft systems methodology, wicked problems

Peter Gutmann

2011-09-01T23:59:59.000Z

168

TA Orientation 2005 Activity 6 Problem Solving: Cowboy Bob Problem  

E-Print Network (OSTI)

TA Orientation 2005 Activity 6 Problem Solving: Cowboy Bob Problem Page 61 Below is a problem from the outlaws. #12;TA Orientation 2005 Activity 6 (continued) Page 62 Notes: #12;TA Orientation 2005 Activity 7. #12;TA Orientation 2005 Activity 7 (continued) Page 64 Answer Sheet for Activity 7 1. Examine your

Minnesota, University of

169

T-668: Vulnerability in a BlackBerry Enterprise Server component could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Vulnerability in a BlackBerry Enterprise Server component 8: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service July 14, 2011 - 7:20am Addthis PROBLEM: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service PLATFORM: Affected Software >> BlackBerry Enterprise Server (BES) version(s) 5.0.0 for API/MS Exchange (Admin API Option Only), BES/Express version 5.0.2 & 5.0.3 IBM Lotus Domino , BES 5.0.1, 5.0.2 & 5.0.3 for MS Exchange, IBM Lotus Domino, BlackBerry Enterprise Server versions 5.0.1 for GroupWise ABSTRACT: This advisory describes a security issue in the BlackBerry Administration

170

Optimal control problems, curves of pursuit.  

E-Print Network (OSTI)

??We study a class of problems known as pursuit-evasion problems (PE). These problems can be understood as special cases of optimal control problems. After describing… (more)

Moiseeva, Svetlana

2011-01-01T23:59:59.000Z

171

Two problems in Classical Mechanics  

E-Print Network (OSTI)

A problem about the present structure of dimensional analysis, and another one about the differences between solids and fluids are suggested. Both problems appear to have certain foundational aspects.

E. E. Rosinger

2004-07-09T23:59:59.000Z

172

Hospitals - Medical - Backup Generator Problems  

Science Conference Proceedings (OSTI)

This power quality (PQ) case study presents the investigation of problems while testing a backup generator at a hospital.

2003-12-31T23:59:59.000Z

173

Problem frames and software engineering  

Science Conference Proceedings (OSTI)

A general account is given of the problem frames approach to the development of software-intensive systems, assuming that the reader is already familiar with its basic ideas. The approach is considered in the light of the long-standing aspiration of ... Keywords: Problem frame, Problems, Software

Michael Jackson

2005-11-01T23:59:59.000Z

174

Anglers' fishing problem  

E-Print Network (OSTI)

The considered model will be formulated as related to "the fishing problem" even if the other applications of it are much more obvious. The angler goes fishing. He uses various techniques and he has at most two fishing rods. He buys a fishing ticket for a fixed time. The fishes are caught with the use of different methods according to the renewal processes. The fishes' value and the inter arrival times are given by the sequences of independent, identically distributed (i.i.d.) random variables with the known distribution functions. It forms the marked renewal--reward process. The angler's measure of satisfaction is given by the difference between the utility function, depending on the value of the fishes caught, and the cost function connected with the time of fishing. In this way, the angler's relative opinion about the methods of fishing is modelled. The angler's aim is to have as much satisfaction as possible and additionally he has to leave the lake before a fixed moment. Therefore his goal is to find two...

Karpowicz, Anna

2011-01-01T23:59:59.000Z

175

The Consent Problem in International Law  

E-Print Network (OSTI)

nuclear   weapons.     More   problems   implicating   more   people   make   the   consent   problem   more   complex  

Guzman, Andrew

2011-01-01T23:59:59.000Z

176

Pooling problems: relaxations and discretizations  

E-Print Network (OSTI)

The classical minimum cost network flow problem seeks to find the optimal way of sending ... The front-end scheduling, also referred to as the crude oil operation.

177

Moods, wicked problems, and learning  

Science Conference Proceedings (OSTI)

Wicked problems and learning environments present tough mood challenges for leaders and teachers. Telepresence and sensory gadgets are unlikely to replace physical presence in these areas.

Peter J. Denning

2013-03-01T23:59:59.000Z

178

Problems in High Energy Astrophysics  

E-Print Network (OSTI)

This contribution discusses some of the main problems in high energy astrophysics, and the perspectives to solve them using different types of "messengers": cosmic rays, photons and neutrinos

Lipari, Paolo

2008-01-01T23:59:59.000Z

179

Problems in High Energy Astrophysics  

E-Print Network (OSTI)

This contribution discusses some of the main problems in high energy astrophysics, and the perspectives to solve them using different types of "messengers": cosmic rays, photons and neutrinos

Paolo Lipari

2008-08-04T23:59:59.000Z

180

Hedging Problems with Stochastic Parameters  

NLE Websites -- All DOE Office Websites (Extended Search)

the problems of quadratic hedging and mean-variance portfolio selection in an incomplete market with continuous trading, multiple assets, and Brownian information. In particular,...

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

The Split Variational Inequality Problem  

E-Print Network (OSTI)

Sep 20, 2010 ... lines of research related to our notion of the CVIP. ...... Imaging, Therapy Planning and Inverse Problems, Medical Physics Pub# lishing ...

182

The underwater radiance distribution problem  

E-Print Network (OSTI)

THE UNDERWATER RADIANCE DISTRIBUTION PROBLEM S. Q. DuntleyFunction of Depth in an Underwater Environment," which firsta Function of Depth in an Underwater Environment," which has

Duntley, Seibert Q

1959-01-01T23:59:59.000Z

183

Boundary stabilization of transmission problems  

E-Print Network (OSTI)

We study the transmission problem in bounded domains with dissipative boundary conditions. Under some natural assumptions, we prove uniform bounds of the corresponding resolvents on the real axis at high frequency, and as a consequence, we obtain free of eigenvalues regions. As an application, we get exponential decay of the energy of the solutions of the correpsonding mixed boundary value problems.

Fernando Cardoso; Georgi Vodev

2009-10-20T23:59:59.000Z

184

Spreadsheet modelling for solving combinatorial problems: The vendor selection problem  

E-Print Network (OSTI)

Spreadsheets have grown up and became very powerful and easy to use tools in applying analytical techniques for solving business problems. Operations managers, production managers, planners and schedulers can work with them in developing solid and practical Do-It-Yourself Decision Support Systems. Small and Medium size organizations, can apply OR methodologies without the presence of specialized software and trained personnel, which in many cases cannot afford anyway. This paper examines an efficient approach in solving combinatorial programming problems with the use of spreadsheets. A practical application, which demonstrates the approach, concerns the development of a spreadsheet-based DSS for the Multi Item Procurement Problem with Fixed Vendor Cost. The DSS has been build using exclusively standard spreadsheet feature and can solve real problems of substantial size. The benefits and limitations of the approach are also discussed.

Ipsilandis, Pandelis G

2008-01-01T23:59:59.000Z

185

Inverse Problems in Heat Transfer  

E-Print Network (OSTI)

This chapter presents a stochastic modeling and statistical inference approach to the solution of inverse problems in thermal transport systems. Of particular interest is the inverse heat conduction problem (IHCP) of estimating an unknown boundary heat flux in a conducting solid given temperature data within the domain. Even though deterministic sequential and whole time domain estimation methods have been applied with success over the years for the solution of such problems, we herein introduce stochastic approaches to representing and solving the IHCP. As most engineering systems and processes operate in an uncertain environment, it becomes increasingly important to address their analysis and inverse design in a stochastic manner using statistical data-driven prior and concurrent information on the system response. Recent advances in spectral stochastic modeling, computational Bayesian and spatial statistics enable complete and e#cient solution procedures to such problems. Two distinct approaches to the IHCP are presented in this chapter one based on spectral stochastic modeling and the other on Bayesian inference. Although these techniques are discussed in the context of the IHCP, the methodologies presented are general and applicable to design and estimation problems in other more complex problems in thermal transport systems including problems in the presence of convection, radiation and conduction. 1

Nicholas Zabaras

2004-01-01T23:59:59.000Z

186

Parallel solution of recurrence problems  

Science Conference Proceedings (OSTI)

An mth-order recurrence problem is defined as the computation of the sequence x1,..., xN, where x1 = f(ai, xi-1,...,xi-m), ...

P. M. Kogge

1974-03-01T23:59:59.000Z

187

Connectivity problem in wireless networks  

Science Conference Proceedings (OSTI)

We study the complexity of the following connectivity problem in wireless networks: for a given placement of n nodes in the plane, the goal is to compute a channel and power assignment that forms strongly connected communication structure spanning ...

Dariusz R. Kowalski; Mariusz A. Rokicki

2010-09-01T23:59:59.000Z

188

Surrogate Guderley Test Problem Definition  

SciTech Connect

The surrogate Guderley problem (SGP) is a 'spherical shock tube' (or 'spherical driven implosion') designed to ease the notoriously subtle initialization of the true Guderley problem, while still maintaining a high degree of fidelity. In this problem (similar to the Guderley problem), an infinitely strong shock wave forms and converges in one-dimensional (1D) cylindrical or spherical symmetry through a polytropic gas with arbitrary adiabatic index {gamma}, uniform density {rho}{sub 0}, zero velocity, and negligible pre-shock pressure and specific internal energy (SIE). This shock proceeds to focus on the point or axis of symmetry at r = 0 (resulting in ostensibly infinite pressure, velocity, etc.) and reflect back out into the incoming perturbed gas.

Ramsey, Scott D. [Los Alamos National Laboratory; Shashkov, Mikhail J. [Los Alamos National Laboratory

2012-07-06T23:59:59.000Z

189

U-198: IBM Lotus Expeditor Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system..

190

IBM Research TREC 2003 Genomics Track  

Science Conference Proceedings (OSTI)

... matching heuristics con- sider this behavior, and much of our pre-submission work involved experiments to determine which heu- ristics provide the ...

2004-02-12T23:59:59.000Z

191

IBM Research and Columbia University TRECVID-2012 ...  

Science Conference Proceedings (OSTI)

... A typical output, for example, is: ”A Sin- gle Person does Violent Action to a Home Appliance using a Knife at a Kitchen or at a Laundry Room, with ...

2012-11-29T23:59:59.000Z

192

ibm.com/redbooks Migrating from Microsoft  

E-Print Network (OSTI)

responsible manner. I have conducted the pre-job briefing, and all workers have been briefed. I have ensured: _______________________________________________________________ Pre-Job Brief Content What are the critical steps or phases of this activity? How can we make, and controls and commit to follow them? Pre-Job Brief Attendance Roster By signing below as required, I agree

193

IBM Research TREC-2002 Video Retrieval System  

Science Conference Proceedings (OSTI)

... for effectively searching and filtering digital video content. ... In A. Kent, editor, Encyclopedia of Library and In ... In IS&T/SPIE Sym- posium on Electronic ...

2003-02-13T23:59:59.000Z

194

IBM'S LVCSR SYSTEM FOR TRANSCRIPTION OF ...  

Science Conference Proceedings (OSTI)

... For both the PE and UE tests, iter- ative MLLR is used to adapt the baseline robust model for both the speaker and the F-condition. ...

2011-08-22T23:59:59.000Z

195

Mathematical Problems of Thermoacoustic Tomography  

E-Print Network (OSTI)

Thermoacoustic tomography (TAT) is a newly emerging modality in biomedical imaging. It combines the good contrast of electromagnetic and good resolution of ultrasound imaging. The mathematical model of TAT is the observability problem for the wave equation: one observes the data on a hyper-surface and reconstructs the initial perturbation. In this dissertation, we consider several mathematical problems of TAT. The first problem is the inversion formulas. We provide a family of closed form inversion formulas to reconstruct the initial perturbation from the observed data. The second problem is the range description. We present the range description of the spherical mean Radon transform, which is an important transform in TAT. The next problem is the stability analysis for TAT. We prove that the reconstruction of the initial perturbation from observed data is not H¨older stable if some observability condition is violated. The last problem is the speed determination. The question is whether the observed data uniquely determines the ultrasound speed and initial perturbation. We provide some initial results on this issue. They include the unique determination of the unknown constant speed, a weak local uniqueness, a characterization of the non-uniqueness, and a characterization of the kernel of the linearized operator.

Nguyen, Linh V.

2010-08-01T23:59:59.000Z

196

The Consistent Vehicle Routing Problem  

SciTech Connect

In the small package shipping industry (as in other industries), companies try to differentiate themselves by providing high levels of customer service. This can be accomplished in several ways, including online tracking of packages, ensuring on-time delivery, and offering residential pickups. Some companies want their drivers to develop relationships with customers on a route and have the same drivers visit the same customers at roughly the same time on each day that the customers need service. These service requirements, together with traditional constraints on vehicle capacity and route length, define a variant of the classical capacitated vehicle routing problem, which we call the consistent VRP (ConVRP). In this paper, we formulate the problem as a mixed-integer program and develop an algorithm to solve the ConVRP that is based on the record-to-record travel algorithm. We compare the performance of our algorithm to the optimal mixed-integer program solutions for a set of small problems and then apply our algorithm to five simulated data sets with 1,000 customers and a real-world data set with more than 3,700 customers. We provide a technique for generating ConVRP benchmark problems from vehicle routing problem instances given in the literature and provide our solutions to these instances. The solutions produced by our algorithm on all problems do a very good job of meeting customer service objectives with routes that have a low total travel time.

Groer, Christopher S [ORNL; Golden, Bruce [University of Maryland; Edward, Wasil [American University

2009-01-01T23:59:59.000Z

197

Key-Based Problem Decomposition for Relational Constraint Satisfaction Problems  

Science Conference Proceedings (OSTI)

Constraint satisfaction problems (CSP) are often posed over data residing in relational database systems, which serve as passive data-storage back ends. Several studies have demonstrated a number of important advantages to having database systems capable ... Keywords: constraint processing, databases, decomposition

James J. Lu; Sebastien Siva

2011-11-01T23:59:59.000Z

198

Steam Boiler Control Specification Problem:  

E-Print Network (OSTI)

Our solution to the specification problem in the specification language TLA+ is based on a model of operation where several components proceed synchronously. Our first specification concerns a simplified controller and abstracts from many details given in the informal problem description. We successively add modules to build a model of the state of the steam boiler, detect failures, and model message transmission. We give a more detailed controller specification and prove that it refines the abstract controller. We also address the relationship between the physical state of the steam boiler and the model maintained by the controller and discuss the reliability of failure detection. Finally, we discuss the implementability of our specification.

Tla Solution Frank; Frank Le Ke; Stephan Merz

1996-01-01T23:59:59.000Z

199

Exotic Species What's the Problem?  

E-Print Network (OSTI)

are estimated to cost about $138 billion in environmental damage and losses each year. Non-native plants $100 million annually in damage to water pipes and filtration systems, and in control costs. · Brown-300 power outages/yr, numerous bites of children, etc. #12;What's the Problem? · Melaleuca tree --destroyed

Callender, Craig

200

Inverse scattering problem with isobars  

SciTech Connect

The inverse scattering problem is solved for a covariant, isobar-dominated scattering amplitude (including inelasticity). Application is made to the ..pi..N P/sub 33/ channel, with the ..pi..N ..delta.. vertex function and isobar bare mass as results.

Londergan, J.T.; Moniz, E.J.

1977-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Substation automation problems and possibilities  

SciTech Connect

The evolutionary growth in the use and application of microprocessors in substations has brought the industry to the point of considering integrated substation protection, control, and monitoring systems. An integrated system holds the promise of greatly reducing the design, documentation, and implementation cost for the substation control, protection, and monitoring systems. This article examines the technical development path and the present implementation problems.

Smith, H.L.

1996-10-01T23:59:59.000Z

202

Open Problems in $?$ Particle Condensation  

E-Print Network (OSTI)

$\\alpha$ particle condensation is a novel state in nuclear systems. We briefly review the present status on the study of $\\alpha$ particle condensation and address the open problems in this research field: $\\alpha$ particle condensation in heavier systems other than the Hoyle state, linear chain and $\\alpha$ particle rings, Hoyle-analogue states with extra neutrons, $\\alpha$ particle condensation related to astrophysics, etc.

Y. Funaki; M. Girod; H. Horiuchi; G. Roepke; P. Schuck; A. Tohsaki; T. Yamada

2010-03-05T23:59:59.000Z

203

The metro map layout problem  

Science Conference Proceedings (OSTI)

We initiate a new problem of automatic metro map layout. In general, a metro map consists of a set of lines which have intersections or overlaps. We define a set of aesthetic criteria for good metro map layouts and present a method to produce ...

Seok-Hee Hong; Damian Merrick; Hugo A. D. do Nascimento

2004-09-01T23:59:59.000Z

204

Drinking Water Problems: Radionuclides (Spanish)  

E-Print Network (OSTI)

Radionuclides in drinking water can cause serious health problems for people. This publication explains what the sources of radionuclides in water are, where high levels have been found in Texas, how they affect health and how to treat water to remove them.

Lesikar, Bruce J.; Melton, Rebecca; Hare, Michael; Hopkins, Janie; Dozier, Monty

2006-12-21T23:59:59.000Z

205

A nonlinear programming test problem  

Science Conference Proceedings (OSTI)

Figure 1 is a flow diagram of the chemical process. The test problem was a hydrocarbon refrigeration process in which the feed stream (stream number 1 of Figure 1) is a vapor mixture of ethane, propane, and n-butane (subscripts e, p and b, respectively) ...

D. M. Himmelblau

1979-07-01T23:59:59.000Z

206

Semidefinite Relaxations of Ordering Problems  

E-Print Network (OSTI)

Jan 19, 2011 ... The quadratic ordering problem does not seem to have attracted ... 2 Linear Ordering as a Linear Program in 0-1 variables .... Instead of the Lovász-Schrijver lifting procedure, ...... Review of Economics and Statistics, 18, 1936. ... IEEE Transactions on Systems, Man, and Cybernetics, 11(2):109–125, 1981.

207

Statistical Inference in Inverse Problems  

E-Print Network (OSTI)

Inverse problems have gained popularity in statistical research recently. This dissertation consists of two statistical inverse problems: a Bayesian approach to detection of small low emission sources on a large random background, and parameter estimation methods for partial differential equation (PDE) models. Source detection problem arises, for instance, in some homeland security applications. We address the problem of detecting presence and location of a small low emission source inside an object, when the background noise dominates. The goal is to reach the signal-to-noise ratio levels on the order of 10^-3. We develop a Bayesian approach to this problem in two-dimension. The method allows inference not only about the existence of the source, but also about its location. We derive Bayes factors for model selection and estimation of location based on Markov chain Monte Carlo simulation. A simulation study shows that with sufficiently high total emission level, our method can effectively locate the source. Differential equation (DE) models are widely used to model dynamic processes in many fields. The forward problem of solving equations for given parameters that define the DEs has been extensively studied in the past. However, the inverse problem of estimating parameters based on observed state variables is relatively sparse in the statistical literature, and this is especially the case for PDE models. We propose two joint modeling schemes to solve for constant parameters in PDEs: a parameter cascading method and a Bayesian treatment. In both methods, the unknown functions are expressed via basis function expansion. For the parameter cascading method, we develop the algorithm to estimate the parameters and derive a sandwich estimator of the covariance matrix. For the Bayesian method, we develop the joint model for data and the PDE, and describe how the Markov chain Monte Carlo technique is employed to make posterior inference. A straightforward two-stage method is to first fit the data and then to estimate parameters by the least square principle. The three approaches are illustrated using simulated examples and compared via simulation studies. Simulation results show that the proposed methods outperform the two-stage method.

Xun, Xiaolei

2012-05-01T23:59:59.000Z

208

Matroids, secretary problems, and online mechanisms  

Science Conference Proceedings (OSTI)

We study a generalization of the classical secretary problem which we call the "matroid secretary problem". In this problem, the elements of a matroid are presented to an online algorithm in random order. When an element arrives, the algorithm observes ...

Moshe Babaioff; Nicole Immorlica; Robert Kleinberg

2007-01-01T23:59:59.000Z

209

Annual Inventory Troubleshooting Checklist Problem Solutions  

E-Print Network (OSTI)

Annual Inventory Troubleshooting Checklist Problem Solutions Duplicate tag number Send email to am;Annual Inventory Troubleshooting Checklist Problem Solutions Personal property Send email to am

Li, Mo

210

Test instances for the traffic assignment problem  

E-Print Network (OSTI)

Test instances for the traffic assignment problem. F. Babonneau. ?. J.-P. Vial. ?. January 8, 2008. Abstract. This short note on the Traffic Assignment Problem ...

211

An Oil Pipeline Design Problem  

Science Conference Proceedings (OSTI)

We consider a given set of offshore platforms and onshore wells producing known (or estimated) amounts of oil to be connected to a port. Connections may take place directly between platforms, well sites, and the port, or may go through connection points ... Keywords: Algorithms: interactive branch-and-bound with valid inequalities. industries, Applications: design problem-formulation and analysis. programming, Integer, Networks/graphs, Petroleum/natural gas: oil pipeline network design

Jack Brimberg; Pierre Hansen; Keh-Wei Lin; Nenad Mladenovic; Michèle Breton

2003-03-01T23:59:59.000Z

212

On the equivalence of linear complementarity problems  

Science Conference Proceedings (OSTI)

We show that the Extended Linear Complementarity Problem (ELCP) can be recast as a standard Linear Complementarity Problem (LCP) provided that the surplus variables or the feasible set of the ELCP are bounded. Since many extensions of the LCP are special ... Keywords: Complementarity problems, Integer programming, Linear complementarity problem, Nonlinear algorithms, Optimization

B. De Schutter; W. P. M. H. Heemels; A. Bemporad

2002-08-01T23:59:59.000Z

213

Physics problems of thermonuclear reactors  

SciTech Connect

From topical conference on energy; Philadelphia, Pennsylvania, USA (Nov 1973). A problem common to all controlled fusion reactors is that of the burning deuterium --tritium fuel under conditions of plasma confinement which approach the ideal limit as nearly as possible. After ignitlon, the balance between alpha- particle energy deposition and plasma losses (radiation plus thermal and particle diffusion) determines the stability or instability of the burn in toroidal systems. Tokamak systems are described both with unstable, injection-regulated burn cycles and stabilized steady-state burn conditions. In the theta-pinch reactor an unstable burn occurs, some, what regulated by high-beta plasma expansion, which is quenched by a programmed plasma decompression. The plasma expansion during the constant-pressure burn provides direct'' conversion of plasma thermonuclear heat to electrical output, in addition to the electrical power derived from the neutron energy through conventional thermal conversion equipment. The open-ended mirror reactor is characterized by a direct conversion system for recovering end-loss plasma energy and converting it to electrical energy for reinjection into the plasma. This allows a favorable reactor energy balance and an amplification factor Q (= thermonuclear energy output/injected plasma energy) which is compatible with classical collisional losses. For the three reactor types considered the ramifications of burn and confinement conditions for reactor configuration, energy balance, economy, fuel handling, materials problems, and environmentalradiological factors are considered. (auth)

Ribe, F.L.

1974-01-01T23:59:59.000Z

214

The ANgel Problem, Positional Games, . . .  

E-Print Network (OSTI)

This thesis is about combinatorial games—mostly. It is also about graphs, directed graphs and hypergraphs, to a large extent; and it deals with the complexity of certain computational problems from these two areas. We study three different problems that share several of the above aspects, yet, they form three individual subjects and so we treat them independently in three self-contained chapters: The angel-devil game. In the first chapter, we present improved strategies for an infinite game played on an infinite chess board, which has been introduced by Berlekamp, Conway, and Guy [8]. The angel, a chess person who jumps from square to square, tries to escape his opponent, the devil, who intends to strand the angel by placing obstacles on the board. The open question about this game is, whether some angel who is allowed to make sufficiently large but bounded steps in each move, will be able to escape forever. Conway [11] has shown that certain quite natural escape attempts are bound to fail.

Martin Kutz

2004-01-01T23:59:59.000Z

215

Virtual Human Problem Solving Environments  

SciTech Connect

Abstract. Interest in complex integrated digital or virtual human modeling has seen a significant increase over the last decade. Coincident with that increased interest, Oak Ridge National Laboratory (ORNL) initiated the development of a human simulation tool, the Virtual Human. The Virtual Human includes a problem-solving environment (PSE) for implementing the integration of physiological models in different programming languages and connecting physiological function to anatomy. The Virtual Human PSE (VHPSE) provides the computational framework with which to develop the concept of a "Virtual Human." Supporting the framework is a data definition for modeling parameters, PhysioML, a Virtual Human Database (VHDB), and a Web-based graphical user interface (GUI) developed using Java. Following description of the VHPSE, we discuss four example implementations of models within the framework. Further expansion of a human modeling environment was carried out in the Defense Advanced Research Projects Agency Virtual Soldier Project. SCIRun served as the Virtual Soldier problem solving environment (VSPSE). We review and compare specific developments in these projects that have significant potential for the future of Virtual Human modeling and simulation. We conclude with an evaluation of areas of future work that will provide important extensions to the VHPSE and VSPSE and make possible a fully-integrated environment for human anatomical and physiological modeling: the Virtual Human.

Ward, Richard C [ORNL; Pouchard, Line Catherine [ORNL; Munro, Nancy B [ORNL; Fischer, Sarah Kathleen [ORNL

2008-01-01T23:59:59.000Z

216

Supercomputers Tackle Biofuel Production Problems  

NLE Websites -- All DOE Office Websites (Extended Search)

V V E R C O M I N G P L A N T R E C A L C I T R A N C E Supercomputers Tackle BIOFUEL Production Problems If you have ever dealt with an uncooperative, fractious kid or a combative employee, you understand the meaning of "recalcitrance" - over-the-top stubbornness, disobedience, and noncompliance. But recalcitrance is not just a human trait - plants can be recalcitrant, too, and for them it is a matter of survival. Over millions of years, plants have evolved complex structural and chemical mechanisms to ward off assaults on their structural sugars by microbial and animal marauders. So it should be no surprise that when humans attempt to turn plant biomass into biofuels to meet our energy needs, we discover how stubborn and noncompliant our vegetative friends can be. Plant recalcitrance is one of

217

Studies of Nonlinear Problems, I  

NLE Websites -- All DOE Office Websites (Extended Search)

. . . ~0s ALAMOS SCIENTIFIC LABORATORY of the UNIVERSITY OF CALIFORNIA ' . c' . .: . Report written: May 1955 Report distributed: LA-1940 h .1 STUDIES OF NONLINEAR PROBLEMS. I . - 4 . . . ._~ Work done by: E. Fermi J. Pasta S. Ulam M. Tsingou PHYSICS Report written by: E. Fermi J. Pasta S. Ulam DISCLAIMER Portions of this document may be illegible in electronic image products. Images are produced from the best available document. original . - . * * , . ' ABSTRACT " .*. . A one-dimensional dynamical system of 64 particles with forces be- . . . tween neighbors containing nonlinear terms has been studied on the Los Alamos computer MANIAC I. The nonlinear terms considered are quadratic, cubic, and broken linear types. The results are analyzed into Fourier

218

The 3He Supply Problem  

Science Conference Proceedings (OSTI)

One of the main uses for 3He is in gas proportional counters for neutron detection. Radiation portal monitors deployed for homeland security and non-proliferation use such detectors. Other uses of 3He are for research detectors, commercial instruments, well logging detectors, dilution refrigerators, for targets or cooling in nuclear research, and for basic research in condensed matter physics. The US supply of 3He comes almost entirely from the decay of tritium used in nuclear weapons by the US and Russia. A few other countries contribute a small amount to the world’s 3He supply. Due to the large increase in use of 3He for homeland security, the supply has dwindled, and can no longer meet the demand. This white paper reviews the problems of supply, utilization, and alternatives.

Kouzes, Richard T.

2009-05-01T23:59:59.000Z

219

Multigrid Methods for Elliptic Problems: A Review  

Science Conference Proceedings (OSTI)

Multigrid methods solve a large class of problems very efficiently. They work by approximating a problem on multiple overlapping grids with widely varying mesh sizes and cycling between thew approximations, using relaxation to reduce the error on ...

Scott R. Fulton; Paul E. Ciesielski; Wayne H. Schubert

1986-05-01T23:59:59.000Z

220

Competitive solutions for online financial problems  

Science Conference Proceedings (OSTI)

This article surveys results concerning online algorihtms for solving problems related to the management of money and other assets. In particular, the survey focucus us search, replacement, and portfolio selection problems

Ran El-Yaniv

1998-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Approximation algorithms for stochastic scheduling problems  

E-Print Network (OSTI)

In this dissertation we study a broad class of stochastic scheduling problems characterized by the presence of hard deadline constraints. The input to such a problem is a set of jobs, each with an associated value, processing ...

Dean, Brian C. (Brian Christopher), 1975-

2005-01-01T23:59:59.000Z

222

Fermi and the ergodic problem Giovanni Gallavotti  

E-Print Network (OSTI)

the esoteric (quasi) ergodic problem. Consider- ing a `{degrees of freedom system, ` > 2, with Hamilto- nian H

Roma "La Sapienza", Università di

223

Quantum Algorithm to Solve Satisfiability Problems  

E-Print Network (OSTI)

A new quantum algorithm is proposed to solve Satisfiability(SAT) problems by taking advantage of non-unitary transformation in ground state quantum computer. The energy gap scale of the ground state quantum computer is analyzed for 3-bit Exact Cover problems. The time cost of this algorithm on general SAT problems is discussed.

Wenjin Mao

2004-11-29T23:59:59.000Z

224

Approximation of Bayesian Inverse Problems for PDEs  

Science Conference Proceedings (OSTI)

Inverse problems are often ill posed, with solutions that depend sensitively on data. In any numerical approach to the solution of such problems, regularization of some form is needed to counteract the resulting instability. This paper is based on an ... Keywords: Bayesian, Markov chain-Monte Carlo, Stokes flow, data assimilation, inverse problem

S. L. Cotter; M. Dashti; A. M. Stuart

2010-04-01T23:59:59.000Z

225

1 July 1996 `The Hard Problem'  

E-Print Network (OSTI)

1 July 1996 Turning `The Hard Problem' Upside Down & Sideways Piet Hut Roger N. Shepard School. As a first option, we reconsider the `hard problem' of the relation between conscious experience and the physical world by thus turning that problem upside down. We also consider a second option: turning the hard

Hut, Piet

226

PROBLEMS OF FORECAST1 Dmitry KUCHARAVY  

E-Print Network (OSTI)

1 PROBLEMS OF FORECAST1 Dmitry KUCHARAVY dmitry.kucharavy@insa-strasbourg.fr Roland DE GUIO roland for the purpose of Innovative Design. First, a brief analysis of problems for existing forecasting methods of the forecast errors. Second, using a contradiction analysis, a set of problems related to technology forecast

Paris-Sud XI, Université de

227

One-dimensional Gromov minimal filling problem  

Science Conference Proceedings (OSTI)

The paper is devoted to a new branch in the theory of one-dimensional variational problems with branching extremals, the investigation of one-dimensional minimal fillings introduced by the authors. On the one hand, this problem is a one-dimensional version of a generalization of Gromov's minimal fillings problem to the case of stratified manifolds. On the other hand, this problem is interesting in itself and also can be considered as a generalization of another classical problem, the Steiner problem on the construction of a shortest network connecting a given set of terminals. Besides the statement of the problem, we discuss several properties of the minimal fillings and state several conjectures. Bibliography: 38 titles.

Ivanov, Alexandr O; Tuzhilin, Alexey A

2012-05-31T23:59:59.000Z

228

Constrained Graph Optimization: Interdiction and Preservation Problems  

SciTech Connect

The maximum flow, shortest path, and maximum matching problems are a set of basic graph problems that are critical in theoretical computer science and applications. Constrained graph optimization, a variation of these basic graph problems involving modification of the underlying graph, is equally important but sometimes significantly harder. In particular, one can explore these optimization problems with additional cost constraints. In the preservation case, the optimizer has a budget to preserve vertices or edges of a graph, preventing them from being deleted. The optimizer wants to find the best set of preserved edges/vertices in which the cost constraints are satisfied and the basic graph problems are optimized. For example, in shortest path preservation, the optimizer wants to find a set of edges/vertices within which the shortest path between two predetermined points is smallest. In interdiction problems, one deletes vertices or edges from the graph with a particular cost in order to impede the basic graph problems as much as possible (for example, delete edges/vertices to maximize the shortest path between two predetermined vertices). Applications of preservation problems include optimal road maintenance, power grid maintenance, and job scheduling, while interdiction problems are related to drug trafficking prevention, network stability assessment, and counterterrorism. Computational hardness results are presented, along with heuristic methods for approximating solutions to the matching interdiction problem. Also, efficient algorithms are presented for special cases of graphs, including on planar graphs. The graphs in many of the listed applications are planar, so these algorithms have important practical implications.

Schild, Aaron V [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

229

Consciousness in Robots: The Hard Problem and Some Less Hard Problems  

E-Print Network (OSTI)

Consciousness in Robots: The Hard Problem and Some Less Hard Problems B. J. MacLennan Department it is also important. Finally we explore the Hard Problem for robots (i.e., whether they can experience sub, intentional- ity, evolutionary psychology, artificial life, autonomous robots, the hard problem I

Tennessee, University of

230

Consciousness in Robots: The Hard Problem and Some Less Hard Problems  

E-Print Network (OSTI)

1 Consciousness in Robots: The Hard Problem and Some Less Hard Problems (Extended Version intrinsic intentionality from consciousness, but argue it is also important. Fi- nally we explore the Hard using "the Hard Problem" to refer to the principal scientific problem of consciousness, which

Tennessee, University of

231

Computational evaluation of two reactor benchmark problems  

E-Print Network (OSTI)

A neutronic evaluation of two reactor benchmark problems was performed. The benchmark problems describe typical PWR uranium and plutonium (mixed oxide) fueled lattices. WIMSd4m, a neutron transport lattice code, was used to evaluate multigroup macroscopic cross sections for various pincell models in each benchmark problem. DEF3D, a multigroup multidimensional diffusion code, was used to evaluate the uranium-fueled lattice benchmark problem of the American Nuclear Society. TWODANT, a multigroup, two-dimensional transport code, was used to evaluate the mixed oxide lattice benchmark problem from the Nuclear Energy Agency. Both benchmark problems yielded results consistent with preliminary results submitted by other participants in the benchmarking exercises. Some suggestions are made to improve future benchmark evaluations.

Cowan, James Anthony

1998-01-01T23:59:59.000Z

232

Hans Bethe and the Global Energy Problems  

E-Print Network (OSTI)

Bethe's view-point on the global energy problems is presented. Bethe claimed that the nuclear power is a necessity in future. Nuclear energetic must be based on breeder reactors. Bethe considered the non-proliferation of nuclear weapons as the main problem of long-range future of nuclear energetics. The solution of this problem he saw in heavy water moderated thermal breeders, using uranium-233, uranium-238 and thorium as a fuel.

Ioffe, B L

2005-01-01T23:59:59.000Z

233

Minimal Achievable Error in the LED problem  

E-Print Network (OSTI)

This paper presents a theoretical model to predict the minimal achievable error, given a noise ratio #, in the LED data set problem. The motivation for developing this theoretical model is to understand and explain some of the results that di#erent systems achieve when they solve the LED problem. Moreover, given a new learning algorithm that solves the LED problem, we can now bound its optimal generalization accuracy.

Xavier Llora; Xavier Llora; David E. Goldberg; David E. Goldberg

2002-01-01T23:59:59.000Z

234

Hans Bethe and the Global Energy Problems  

E-Print Network (OSTI)

Bethe's view-point on the global energy problems is presented. Bethe claimed that the nuclear power is a necessity in future. Nuclear energetic must be based on breeder reactors. Bethe considered the non-proliferation of nuclear weapons as the main problem of long-range future of nuclear energetics. The solution of this problem he saw in heavy water moderated thermal breeders, using uranium-233, uranium-238 and thorium as a fuel.

B. L. Ioffe

2005-07-06T23:59:59.000Z

235

CA Problem is Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

The basic California problem concerning heavy crude oil is price. With the reported cost of the natural-gas-fueled steam for extracting the crude sometimes being as ...

236

Multi-Standard Quadratic Optimization Problems  

E-Print Network (OSTI)

Abstract. A Standard Quadratic Optimization Problem (StQP) consists ... A multi- standard quadratic optimiza- ..... the two sums in the last row above are identical.

237

The Facility Location Problem with Bernoulli Demands  

E-Print Network (OSTI)

Abstract. In this paper we address a discrete capacitated facility location problem in which ...... The type of instance for FLPBD (1, 2, 3, or 4) as described above.

238

Student's algorithm solves real-world problem  

NLE Websites -- All DOE Office Websites (Extended Search)

how to use powerful computers to analyze, model, and solve real-world problems," Jordan Medlock wins supercomputer challenge with his algorithm that automates counting and...

239

On the Transportation Problem with Market Choice  

E-Print Network (OSTI)

Apr 3, 2013 ... Abstract: We study a variant of the classical transportation problem in which suppliers with limited capacities have a choice of which demands ...

240

Optimization Online - The Freight Train Routing Problem  

E-Print Network (OSTI)

Jul 21, 2013 ... Abstract: We consider the following freight train routing problem (FTRP). Given is a transportation network with fixed routes for passenger trains ...

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Quantum Condensates in Nuclear Matter: Problems  

E-Print Network (OSTI)

In connection with the contribution "Quantum Condensates in Nuclear Matter" some problems are given to become more familiar with the techniques of many-particle physics.

G. Ropke; D. Zablocki

2010-01-11T23:59:59.000Z

242

MIRPLib: A Maritime Inventory Routing Problem Library  

E-Print Network (OSTI)

Aug 28, 2013 ... Abstract: This paper presents a detailed description of a particular class of deterministic single product maritime inventory routing problems ...

243

Brief announcement: Exploring the Consistency Problem Space  

E-Print Network (OSTI)

We study formally the consistency problem, for replicated shared data, in the Action-Constraint framework (ACF). ACF can describe a large range of application semantics and replication protocols, including optimistic and/or partial replication. ACF is used to decompose the consistency problem into simpler sub-problems. Each is easily understood. Existing algorithms from the literature can be explained as combinations of concrete sub-problem implementations. Using ACF, we design a new serialisation algorithm that does not cause aborts and only needs pairwise agreement (not global consensus).

Nishith Krishna; Marc Shapiro; Karthikeyan Bhargavan

2005-01-01T23:59:59.000Z

244

Optimization Online - Stochastic Nash Equilibrium Problems ...  

E-Print Network (OSTI)

May 22, 2009 ... Finally, the model is applied to a stochastic Nash equilibrium problem in the electricity market. Keywords: Stochastic Nash equilibrium, ...

245

Test problems for quasi-satellite packing????  

E-Print Network (OSTI)

1. Test problems for quasi-satellite packing: Cylinders packing with behavior constraints and all the optimal solutions known. Chao Che. School of Mechanical  ...

246

The recoverable robust tail assignment problem  

E-Print Network (OSTI)

using column generation in the master and subproblems of the Benders ...... described by (36)-(41) is a network flow problem with one source and multiple sink.

247

Optimization Online - Minimax Robust Unit Commitment Problem ...  

E-Print Network (OSTI)

Oct 19, 2012... Commitment Problem with Demand and Market Price uncertainty ... to energy providers --- consists of finding an energy production plan in ...

248

Integer Solutions to Cutting Stock Problems  

E-Print Network (OSTI)

ting Stock Problem (CSP) that can be described as follows: find the most ... two integer linear programming models for the one-dimensional CSP differing in.

249

Exact Solution of Emerging Quadratic Assignment Problems  

E-Print Network (OSTI)

National Science Foundation under grant No. DMI-. 0400155. .... Process Allocation Problem of Sofianopoulous ([63] and. [64]), the ...... lower bound is tight

250

Designing Optimal Spectral Filters for Inverse Problems  

Science Conference Proceedings (OSTI)

Spectral filtering suppresses the amplification of errors when computing solutions to ill-posed inverse problems; however, selecting good regularization parameters is often expensive. In many applications, data are available from calibration experiments. ... Keywords: Bayes risk, Bayesian risk, Tikhonov, Wiener filter, empirical risk, filtering, ill-posed problem, image deblurring, machine learning, optimal design, optimal filtering, regularization, singular value decomposition, stochastic programming

Julianne Chung; Matthias Chung; Dianne P. O'Leary

2011-11-01T23:59:59.000Z

251

A Remark on the Kramers Problem  

E-Print Network (OSTI)

We present new point of view on the old problem, the Kramers problem. The passage from the Fokker-Planck equation to the Smoluchowski equation, including corrections to the Smoluchowski current, is treated through an asymptotic expansion of the solution of the stochastic dynamical equations. The case of an extremely weak force of friction is also discussed

A. Samoletov

2003-11-10T23:59:59.000Z

252

A Remark on the Kramers Problem  

E-Print Network (OSTI)

We present new point of view on the old problem, the Kramers problem. The passage from the Fokker-Planck equation to the Smoluchowski equation, including corrections to the Smoluchowski current, is treated through an asymptotic expansion of the solution of the stochastic dynamical equations. The case of an extremely weak force of friction is also discussed

Samoletov, A

1999-01-01T23:59:59.000Z

253

Iterative Methods for Neutron Transport Eigenvalue Problems  

Science Conference Proceedings (OSTI)

We discuss iterative methods for computing criticality in nuclear reactors. In general this requires the solution of a generalized eigenvalue problem for an unsymmetric integro-differential operator in six independent variables, modeling transport, scattering, ... Keywords: criticality, generalized eigenvalue problem, inexact inverse iteration, neutron transport, symmetry

Fynn Scheben; Ivan G. Graham

2011-09-01T23:59:59.000Z

254

CALIFORNIA ENERGY Small HVAC Problems and Potential  

E-Print Network (OSTI)

CALIFORNIA ENERGY COMMISSION Small HVAC Problems and Potential Savings Reports Summary of Problems of the Integrated Design of Small Commercial HVAC Systems research project. The reports are a result of funding: Productivity and Interior Environments Integrated Design of Large Commercial HVAC Systems Integrated Design

255

Dual extragradient algorithms extended to equilibrium problems  

Science Conference Proceedings (OSTI)

In this paper we propose two iterative schemes for solving equilibrium problems which are called dual extragradient algorithms. In contrast with the primal extragradient methods in Quoc et al. (Optimization 57(6):749---776, 2008) which require ... Keywords: Complexity, Dual extragradient algorithm, Equilibrium problem, Gap function, Nash-Cournot equilibria

Tran D. Quoc; Pham N. Anh; Le D. Muu

2012-01-01T23:59:59.000Z

256

Steiner Forest Orientation Problems Marek Cygan1  

E-Print Network (OSTI)

Steiner Forest Orientation Problems Marek Cygan1 , Guy Kortsarz2 , and Zeev Nutov3 1 Institute with orientation constra- ints. Given a directed graph D and a collection of ordered node pairs P let P[D] = {(u, v) P : D contains an uv-path}. In the Steiner Forest Orientation problem we are given an undirected

Kortsarz, Guy

257

Steiner Forest Orientation Problems Marek Cygan1  

E-Print Network (OSTI)

Steiner Forest Orientation Problems Marek Cygan1 , Guy Kortsarz2 , and Zeev Nutov3 1 IDSIA with orientation constra- ints. Given a directed graph D and a collection of ordered node pairs P let P[D] = {(u, v) P : D contains a uv-path}. In the Steiner Forest Orientation problem we are given an undirected

Kortsarz, Guy

258

The real problem with Merchant transmission  

SciTech Connect

Current regulatory policy distinguishes transmission investments that have primarily economic benefits from those that primarily enhance reliability. But no such dichotomy exists; congestion and reliability are inter-related in complex ways. Thus, solving the transmission investment problem is more complex than ''fixing'' merchant transmission; investment in the grid must be treated as a systems problem. (author)

Blumsack, Seth; Lave, Lester B.; Ilic, Marija

2008-03-15T23:59:59.000Z

259

Iterated local search in nurse rostering problem  

Science Conference Proceedings (OSTI)

This paper presents how to solve a nurse rostering problem over the real datasets of Centre hospitalier régional de Trois-Rivières hospital in Canada. Due to the complexity of this problem with plenty of hard constraints, we propose an ... Keywords: greedy, iterated local search, nurse rostering, tabu search

Sen Ngoc Vu, Minh H. Nhat Nguyen, Le Minh Duc, Chantal Baril, Viviane Gascon, Tien Ba Dinh

2013-12-01T23:59:59.000Z

260

Quantum Algorithms for Graph Problems -- A Survey  

E-Print Network (OSTI)

In this survey we give an overview about important methods to construct quantum algorithms and quantum lower bounds for graph problems. We show how to use these methods, and we give a summary about the quantum complexity of the most important graph problems. At the end of our paper, we give some interesting questions in this research area.

Sebastian Dörn

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The 2-hop spanning tree problem  

Science Conference Proceedings (OSTI)

A spanning tree in a graph G where each node has distance at most 2 from a root node r is called a 2-hop spanning tree. For given edge weights the 2-hop spanning tree problem is to find a minimum weight 2-hop spanning tree. The problem is NP-hard. We ... Keywords: Hop-constrained spanning tree, Integer programming, Polyhedra

Geir Dahl

1998-08-01T23:59:59.000Z

262

Fuel cycle problems in fusion reactors  

SciTech Connect

Fuel cycle problems of fusion reactors evolve around the breeding, recovery, containment, and recycling of tritium. These processes are described, and their implications and alternatives are discussed. Technically, fuel cycle problems are solvable; economically, their feasibility is not yet known. (auth)

Hickman, R.G.

1976-01-13T23:59:59.000Z

263

Student's algorithm solves real-world problem  

NLE Websites -- All DOE Office Websites (Extended Search)

Student's algorithm solves real-world problem Student's algorithm solves real-world problem Supercomputing Challenge: student's algorithm solves real-world problem Students learn how to use powerful computers to analyze, model, and solve real-world problems. April 3, 2012 Jordon Medlock of Albuquerque's Manzano High School won the 2012 Lab-sponsored Supercomputing Challenge Jordon Medlock of Albuquerque's Manzano High School won the 2012 Lab-sponsored Supercomputing Challenge by creating a computer algorithm that automates the process of counting and analyzing plaques, substances in the blood such as fat and cholesterol found in persons diagnosed with Alzheimer's disease. Contact Kurt Steinhaus (505) 665-7370 Email "The mission of the Supercomputing Challenge is to teach students how to use powerful computers to analyze, model, and solve real-world problems,"

264

Exactly solvable quantum Sturm-Liouville problems  

Science Conference Proceedings (OSTI)

The harmonic oscillator with time-dependent parameters covers a broad spectrum of physical problems from quantum transport, quantum optics, and quantum information to cosmology. Several methods have been developed to quantize this fundamental system, such as the path integral method, the Lewis-Riesenfeld time invariant method, the evolution operator or dynamical symmetry method, etc. In all these methods, solution of the quantum problem is given in terms of the classical one. However, only few exactly solvable problems of the last one, such as the damped oscillator or the Caldirola-Kanai model, have been treated. The goal of the present paper is to introduce a wide class of exactly solvable quantum models in terms of the Sturm-Liouville problem for classical orthogonal polynomials. This allows us to solve exactly the corresponding quantum parametric oscillators with specific damping and frequency dependence, which can be considered as quantum Sturm-Liouville problems.

Bueyuekasik, Sirin A.; Pashaev, Oktay K. [Department of Mathematics, Izmir Institute of Technology, Urla, Izmir 35430 (Turkey); Tigrak-Ulas, Esra [Astronomy, Kapteyn Institute, University of Groningen, Zernike Gebouw, Landleven, 12 9747 AD Groningen (Netherlands)

2009-07-15T23:59:59.000Z

265

New directions in enumerative chess problems  

E-Print Network (OSTI)

Normally a chess problem must have a unique solution, and is deemed unsound even if there are alternatives that differ only in the order in which the same moves are played. In an enumerative chess problem, the set of moves in the solution is (usually) unique but the order is not, and the task is to count the feasible permutations via an isomorphic problem in enumerative combinatorics. Almost all enumerative chess problems have been ``series-movers'', in which one side plays an uninterrupted series of moves, unanswered except possibly for one move by the opponent at the end. This can be convenient for setting up enumeration problems, but we show that other problem genres also lend themselves to composing enumerative problems. Some of the resulting enumerations cannot be shown (or have not yet been shown) in series-movers. This article is based on a presentation given at the banquet in honor of Richard Stanley's 60th birthday, and is dedicated to Stanley on this occasion.

Noam D. Elkies

2005-08-31T23:59:59.000Z

266

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Attachmate Reflection Buffer Overflow in FTP Client Lets 3: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code November 22, 2011 - 8:00am Addthis PROBLEM: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code. PLATFORM: 14.1.1173 and prior versions The following product versions are affected: Reflection for HP version 14.x Reflection for UNIX and OpenVMS version 14.x Reflection for ReGIS Graphics version 14.x Reflection for IBM version 14.x Reflection X version 14.x ABSTRACT: A remote server can execute arbitrary code on the connected target system. reference LINKS: Security Updates and Reflection Attachmate Support Lifecycle Attachmate Downloads

267

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Attachmate Reflection Buffer Overflow in FTP Client Lets 3: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code November 22, 2011 - 8:00am Addthis PROBLEM: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code. PLATFORM: 14.1.1173 and prior versions The following product versions are affected: Reflection for HP version 14.x Reflection for UNIX and OpenVMS version 14.x Reflection for ReGIS Graphics version 14.x Reflection for IBM version 14.x Reflection X version 14.x ABSTRACT: A remote server can execute arbitrary code on the connected target system. reference LINKS: Security Updates and Reflection Attachmate Support Lifecycle Attachmate Downloads

268

T-710: Apache HTTP Server Overlapping Ranges Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Apache HTTP Server Overlapping Ranges Denial of Service 10: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability September 6, 2011 - 3:09am Addthis PROBLEM: Apache HTTP Server contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. PLATFORM: Apache HTTP Server versions 2.2.19 and prior ABSTRACT: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. reference LINKS: FreeBSD VuXML Document Advisory ID: cisco-sa-20110830-apache IBM Alert: swg21512087 Red Hat Advisory: RHSA-2011:1245-1 CVE-2011-3192 CVE-2011-3192 (Update2) IMPACT ASSESSMENT: High Discussion: The vulnerability is due to improper processing of certain user-supplied requests by the affected software. An unauthenticated, remote attacker

269

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

270

Houston, we have a problem...: a survey of actual problems in computer games development  

Science Conference Proceedings (OSTI)

This paper presents a survey of problems found in the development process of electronic games. These problems were collected mainly from game postmortems and specialized litterature on game development, allowing a comparison with respect to well-known ... Keywords: electronic games, game development, postmortems, problems in game development, survey

Fábio Petrillo; Marcelo Pimenta; Francisco Trindade; Carlos Dietrich

2008-03-01T23:59:59.000Z

271

SIENA Customer Problem Statement and Requirements  

Science Conference Proceedings (OSTI)

This document describes the problem domain and functional requirements of the SIENA framework. The software requirements and system architecture of SIENA are specified in separate documents (called SIENA Software Requirement Specification and SIENA Software Architecture, respectively). While currently this version of the document describes the problems and captures the requirements within the Analysis domain (concentrating on finite element models), it is our intention to subsequent y expand this document to describe problems and capture requirements from the Design and Manufacturing domains. In addition, SIENA is designed to be extendible to support and integrate elements from the other domains (see SIENA Software Architecture document).

L. Sauer; R. Clay; C. Adams; H. Walther; B. Allan; R. Mariano; C. Poore; B. Whiteside; B. Boughton; J. Dike; E. Hoffman; R. Hogan; C. LeGall

2000-08-01T23:59:59.000Z

272

Inverse hyperbolic problems and optical black holes  

E-Print Network (OSTI)

In this paper we give a more geometrical formulation of the main theorem in [E1] on the inverse problem for the second order hyperbolic equation of general form with coefficients independent of the time variable. We apply this theorem to the inverse problem for the equation of the propagation of light in a moving medium (the Gordon equation). Then we study the existence of black and white holes for the general hyperbolic and for the Gordon equation and we discuss the impact of this phenomenon on the inverse problems.

Gregory Eskin

2008-09-23T23:59:59.000Z

273

Mitigating PQ Problems in Legacy Data Centers  

Science Conference Proceedings (OSTI)

The conclusions of this presentation are: (1) Problems with PQ in legacy data centers still exist and need to be mitigated; (2) Harmonics generated by non-linear IT load can be lowered by passive, active and hybrid cancellation methods; (3) Harmonic study is necessary to find the best way to treat PQ problems; (4) AHF's and harmonic cancellation transformers proved to be very efficient in mitigating PQ problems; and (5) It is important that IT leaders partner with electrical engineering to appropriate ROI statements, justifying many of these expenditures.

Ilinets, Boris; /SLAC

2011-06-01T23:59:59.000Z

274

Modeling the Black Hole Excision Problem  

E-Print Network (OSTI)

We analyze the excision strategy for simulating black holes. The problem is modeled by the propagation of quasi-linear waves in a 1-dimensional spatial region with timelike outer boundary, spacelike inner boundary and a horizon in between. Proofs of well-posed evolution and boundary algorithms for a second differential order treatment of the system are given for the separate pieces underlying the finite difference problem. These are implemented in a numerical code which gives accurate long term simulations of the quasi-linear excision problem. Excitation of long wavelength exponential modes, which are latent in the problem, are suppressed using conservation laws for the discretized system. The techniques are designed to apply directly to recent codes for the Einstein equations based upon the harmonic formulation.

B. Szilagyi; H-O. Kreiss; J. Winicour

2004-12-21T23:59:59.000Z

275

Parallel Displacement Decomposition Solvers for Elasticity Problems  

Science Conference Proceedings (OSTI)

This article describes the displacement decomposition and its benefits for the parallelization of the preconditioned conjugate gradient method for finite element elasticity problems. It deals with both the fixed and variable preconditioning based on ...

Radim Blaheta; Ondrej Jakl; Jiri Stary

2001-09-01T23:59:59.000Z

276

An effective algorithm of motif finding problem  

Science Conference Proceedings (OSTI)

Identification of the short DNA sequence motif, which serves as binding targets for transcription factors, is a fundamental problem in both computer science and molecular biology. Especially, finding the subtle motifs with variable gaps is more challenging. ...

Yong Chen; Guojun Li

2008-05-01T23:59:59.000Z

277

A multiple secretary problem with switch costs  

E-Print Network (OSTI)

In this thesis, we utilize probabilistic reasoning and simulation methods to determine the optimal selection rule for the secretary problem with switch costs, in which a known number of applicants appear sequentially in a ...

Ding, Jiachuan

2007-01-01T23:59:59.000Z

278

ADAM: a problem-oriented symbol processor  

Science Conference Proceedings (OSTI)

Digital computers have evolved in their own technical environment, and to a large degree independently of the problem environment. Thus it was necessary to have computing centers with staffs of programmers as intermediaries between machines and users. ...

A. P. Mullery; R. F. Schauer; R. Rice

1963-05-01T23:59:59.000Z

279

The Logical Problem of Language Change  

E-Print Network (OSTI)

This paper considers the problem of language change. Linguists must explain not only how languages are learned but also how and why they have evolved along certain trajectories and not others. While the language ...

Niyogi, Partha

1995-12-01T23:59:59.000Z

280

Maximum Empirical Likelihood: Empty Set Problem  

E-Print Network (OSTI)

resulted in the extension of ESP into aESP A feedback fromand therefore may be subject to the empty set problem (ESP).In other words, ESP introduces the possibility that for the

Grendar, Marian; Judge, George G

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Online decision problems with large strategy sets  

E-Print Network (OSTI)

In an online decision problem, an algorithm performs a sequence of trials, each of which involves selecting one element from a fixed set of alternatives (the "strategy set") whose costs vary over time. After T trials, the ...

Kleinberg, Robert David

2005-01-01T23:59:59.000Z

282

Numerical solution methods for differential game problems  

E-Print Network (OSTI)

Differential game theory provides a potential means for the parametric analysis of combat engagement scenarios. To determine its viability for this type of analysis, three frameworks for solving differential game problems ...

Johnson, Philip A. (Philip Arthur)

2009-01-01T23:59:59.000Z

283

The Group Diffie-Hellman Problems  

Science Conference Proceedings (OSTI)

In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cryptographic schemes for practical purposes. The Group Computational and the Group Decisional Diffie-Hellman assumptions not only enable one to construct ...

Emmanuel Bresson; Olivier Chevassut; David Pointcheval

2002-08-01T23:59:59.000Z

284

Detached shock problem and related topics  

Science Conference Proceedings (OSTI)

A finite difference method for solving the Cauchy or initial value problem for elliptic partial differential equations as introduced in (1) and further developed in (2) will be the principal topic discussed here. Involved in this discussion, also, will ...

H. M. Lieberstein

1959-09-01T23:59:59.000Z

285

Nogood Recording for Valued Constraint Satisfaction Problems  

Science Conference Proceedings (OSTI)

In the frame of classical Constraint Satisfaction Problems (CSPs), the backtrack tree search, combined with learning methods, presents a double advantage: for static solving, it improves the search speed by avoiding redundant explorations; for dynamic ...

P. Dago; G. Verfailllie

1996-11-01T23:59:59.000Z

286

Solution to the Dark Energy Problem  

E-Print Network (OSTI)

I present a simple, and hopefully convincing, discussion of a solution to the dark energy problem, which arises because the visible universe is well approximated by a black hole.

Frampton, Paul Howard

2010-01-01T23:59:59.000Z

287

Essays on the principal-expert problem  

E-Print Network (OSTI)

This dissertation studies the problem of motivating an expert to help a principal take a decision. The first chapter examines a principal-expert model in which the only source of friction is that the expert must be induced ...

Zermeño Vallés, Luis G. (Luis Guillermo)

2012-01-01T23:59:59.000Z

288

test problem for packing_sumit  

E-Print Network (OSTI)

Test problems of circles in circle packing with constraints and known the optimal solutions*. Hong-fei Teng1, 2**, Chao Che 2, Yu Chen 1, Yi-shou Wang 1. 1.

289

Exact Algorithms for Combinatorial Optimization Problems with ...  

E-Print Network (OSTI)

Fuchs [10] showed that the problem of finding a minimum-power connected network with ... receiving node, in the latter all nodes except the source are addressed. ..... As an alternative, one could use an algorithm for general submodular ...

290

Nonlinear boundary value problem of magnetic insulation  

E-Print Network (OSTI)

On the basis of generalization of upper and lower solution method to the singular two point boundary value problems, the existence theorem of solutions for the system, which models a process of magnetic insulation in plasma is proved.

A. V. Sinitsyn

2000-09-09T23:59:59.000Z

291

Universal Forces and the Dark Energy Problem  

E-Print Network (OSTI)

The Dark Energy problem is forcing us to re-examine our models and our understanding of relativity and space-time. Here a novel idea of Fundamental Forces is introduced. This allows us to perceive the General Theory of Relativity and Einstein's Equation from a new pesrpective. In addition to providing us with an improved understanding of space and time, it will be shown how it leads to a resolution of the Dark Energy problem.

Afsar Abbas

2007-04-01T23:59:59.000Z

292

Universal Forces and the Dark Energy Problem  

E-Print Network (OSTI)

The Dark Energy problem is forcing us to re-examine our models and our understanding of relativity and space-time. Here a novel idea of Fundamental Forces is introduced. This allows us to perceive the General Theory of Relativity and Einstein's Equation from a new pesrpective. In addition to providing us with an improved understanding of space and time, it will be shown how it leads to a resolution of the Dark Energy problem.

Abbas, Afsar

2007-01-01T23:59:59.000Z

293

Geological problems in radioactive waste isolation  

SciTech Connect

The problem of isolating radioactive wastes from the biosphere presents specialists in the fields of earth sciences with some of the most complicated problems they have ever encountered. This is especially true for high level waste (HLW) which must be isolated in the underground and away from the biosphere for thousands of years. Essentially every country that is generating electricity in nuclear power plants is faced with the problem of isolating the radioactive wastes that are produced. The general consensus is that this can be accomplished by selecting an appropriate geologic setting and carefully designing the rock repository. Much new technology is being developed to solve the problems that have been raised and there is a continuing need to publish the results of new developments for the benefit of all concerned. The 28th International Geologic Congress that was held July 9--19, 1989 in Washington, DC provided an opportunity for earth scientists to gather for detailed discussions on these problems. Workshop W3B on the subject, Geological Problems in Radioactive Waste Isolation -- A World Wide Review'' was organized by Paul A Witherspoon and Ghislain de Marsily and convened July 15--16, 1989 Reports from 19 countries have been gathered for this publication. Individual papers have been cataloged separately.

Witherspoon, P.A. (ed.)

1991-01-01T23:59:59.000Z

294

Geological problems in radioactive waste isolation  

SciTech Connect

The problem of isolating radioactive wastes from the biosphere presents specialists in the fields of earth sciences with some of the most complicated problems they have ever encountered. This is especially true for high level waste (HLW) which must be isolated in the underground and away from the biosphere for thousands of years. Essentially every country that is generating electricity in nuclear power plants is faced with the problem of isolating the radioactive wastes that are produced. The general consensus is that this can be accomplished by selecting an appropriate geologic setting and carefully designing the rock repository. Much new technology is being developed to solve the problems that have been raised and there is a continuing need to publish the results of new developments for the benefit of all concerned. The 28th International Geologic Congress that was held July 9--19, 1989 in Washington, DC provided an opportunity for earth scientists to gather for detailed discussions on these problems. Workshop W3B on the subject, Geological Problems in Radioactive Waste Isolation -- A World Wide Review'' was organized by Paul A Witherspoon and Ghislain de Marsily and convened July 15--16, 1989 Reports from 19 countries have been gathered for this publication. Individual papers have been cataloged separately.

Witherspoon, P.A. (ed.)

1991-01-01T23:59:59.000Z

295

Frequency Instability Problems in North American Interconnections  

NLE Websites -- All DOE Office Websites (Extended Search)

Frequency Instability Problems in Frequency Instability Problems in North American Interconnections May 1, 2011 DOE/NETL-2011/1473 Frequency Instability Problems in North American Interconnections Disclaimer This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement,

296

Inverse Problems in Classical and Quantum Physics  

E-Print Network (OSTI)

The subject of this thesis is in the area of Applied Mathematics known as Inverse Problems. Inverse problems are those where a set of measured data is analysed in order to get as much information as possible on a model which is assumed to represent a system in the real world. We study two inverse problems in the fields of classical and quantum physics: QCD condensates from tau-decay data and the inverse conductivity problem. We use a functional method which allows us to extract within rather general assumptions phenomenological parameters of QCD (the condensates) from a comparison of the time-like experimental data with asymptotic space-like results from theory. The price to be paid for the generality of assumptions is relatively large errors in the values of the extracted parameters. Although we do not claim that our method is superior to other approaches, we hope that our results lend additional confidence to the numerical results obtained with the help of methods based on QCD sum rules. In this thesis, also two approaches of EIT image reconstruction are proposed. The first is based on reformulating the inverse problem in terms of integral equations. This method uses only a single set of measurements for the reconstruction. The second approach is an algorithm based on linearisation which uses more then one set of measurements. A promising result is that one can qualitatively reconstruct the conductivity inside the cross-section of a human chest. Even though the human volunteer is neither two-dimensional nor circular, such reconstructions can be useful in medical applications: monitoring for lung problems such as accumulating fluid or a collapsed lung and noninvasive monitoring of heart function and blood flow.

Andrea A. Almasy

2009-12-02T23:59:59.000Z

297

Transport Test Problems for Hybrid Methods Development  

Science Conference Proceedings (OSTI)

This report presents 9 test problems to guide testing and development of hybrid calculations for the ADVANTG code at ORNL. These test cases can be used for comparing different types of radiation transport calculations, as well as for guiding the development of variance reduction methods. Cases are drawn primarily from existing or previous calculations with a preference for cases which include experimental data, or otherwise have results with a high level of confidence, are non-sensitive, and represent problem sets of interest to NA-22.

Shaver, Mark W.; Miller, Erin A.; Wittman, Richard S.; McDonald, Benjamin S.

2011-12-28T23:59:59.000Z

298

Planning lessens problems, gets benefits of underbalance  

Science Conference Proceedings (OSTI)

A horizontal well planned to be drilled underbalanced required special procedures and countermeasures to prevent formation damage from the mud and downhole tool failures from high temperature. Drilling the well underbalanced helped reduce problems from lost returns and from solids entering and plugging the natural fractures in the Austin chalk. The high bottom hole temperature in the deep Austin chalk in central Louisiana complicates drilling, the mud program, and well design. The first of this two-part series covers the planning, procedures, and well design to alleviate these problems. The next article, which will appear in a future issue, addresses complications during the operation and the equipment used.

Joseph, R.A. [OXY U.S.A. Inc., Houston, TX (United States)

1995-03-20T23:59:59.000Z

299

NP-complete Problems and Physical Reality  

E-Print Network (OSTI)

Can NP-complete problems be solved efficiently in the physical universe? I survey proposals including soap bubbles, protein folding, quantum computing, quantum advice, quantum adiabatic algorithms, quantum-mechanical nonlinearities, hidden variables, relativistic time dilation, analog computing, Malament-Hogarth spacetimes, quantum gravity, closed timelike curves, and "anthropic computing." The section on soap bubbles even includes some "experimental" results. While I do not believe that any of the proposals will let us solve NP-complete problems efficiently, I argue that by studying them, we can learn something not only about computation but also about physics.

Scott Aaronson

2005-02-12T23:59:59.000Z

300

Problems continue to plague electronic ballast industry  

SciTech Connect

Problems of unreliable components, poor quality due to the lack of performance testing standards, and electromagnetic radiation are preventing the electronic ballast industry from achieving the anticipated 40% electricity savings and have led several manufacturers to drop out of the market. The National Association of Lighting Maintenance Contractors (NALMCO) recognized the problem, and the remaining manufacturers plan to reduce the number of components to improve reliability until standards are developed. Many potential users are waiting for a larger selection and better product before they invest in electronic ballasts. A directory of major lighting equipment manufacturers accompanies the article. (DCK)

Warrock, A.M.

1983-10-17T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

On the geomagnetic directional problem: A uniqueness result  

E-Print Network (OSTI)

On the geomagnetic directional problem: A uniqueness result Ralf Kaiser Fakultat fur Mathematik = f D. This problem is related to the problem of reconstructing the geomagnetic #12;eld outside on S. Key words: Nonlinear boundary value problem, geomagnetism, directional problem 35J65, 86A25 1

Kaiser, Ralf

302

Differential nested lattice encoding for consensus problems  

Science Conference Proceedings (OSTI)

In this paper we consider the problem of transmitting quantized data while performing an average consensus algorithm. Average consensus algorithms are protocols to compute the average value of all sensor measurements via near neighbors communications. ... Keywords: average consensus, coding with side information, consensus, nested lattice coding, predictive coding

Mehmet E. Yildiz; Anna Scaglione

2007-04-01T23:59:59.000Z

303

MIRPLib: A Maritime Inventory Routing Problem Library  

E-Print Network (OSTI)

additional vessels can also be chartered on the spot market. A path-flow ...... On the other hand, if regional information is not specified in the problem, one can create an .... For a more detailed analysis of the tradeoff between speed ...... In Energy, Natural Resources and Environmental Economics, pages 427–439. Springer ...

304

Comonotonic approximations for optimal portfolio selection problems  

E-Print Network (OSTI)

We investigate multiperiod portfolio selection problems in a Black & Scholes type market where a basket of 1 riskfree and m risky securities are traded continuously. We look for the optimal allocation of wealth within the class of ’constant mix ’ portfolios. First, we consider the portfolio selection problem of a decision maker who invests money at predetermined points in time in order to obtain a target capital at the end of the time period under consideration. A second problem concerns a decision maker who invests some amount of money (the initial wealth or provision) in order to be able to fullfil a series of future consumptions or payment obligations. Several optimality criteria and their interpretation within Yaari’s dual theory of choice under risk are presented. For both selection problems, we propose accurate approximations based on the concept of comonotonicity, as studied in Dhaene, Denuit, Goovaerts, Kaas & Vyncke (2002 a,b). Our analytical approach avoids simulation, and hence reduces the computing effort drastically. 1

J. Dhaene; S. Vanduffel; M. J. Goovaerts; R. Kaas; D. Vyncke

2005-01-01T23:59:59.000Z

305

Applying Adaptive Evolutionary Algorithms to Hard Problems  

E-Print Network (OSTI)

Applying Adaptive Evolutionary Algorithms to Hard Problems J.I. van Hemert1 jvhemert into two distinct parts. The main theme is adaptive evolutionary algorithms. The rst part covers. The second part mainly consists of the development of a library. Its use is aimed at evolutionary algorithms

Emmerich, Michael

306

Optimum LDPC decoder: a memory architecture problem  

Science Conference Proceedings (OSTI)

This paper addresses a frequently overlooked problem: designing a memory architecture for an LDPC decoder. We analyze the requirements to support the codes defined in the IEEE 802.11n and 802.16e standards. We show a design methodology for a flexible ... Keywords: LDPC codes, low power architectures, memory optimization

Erick Amador; Renaud Pacalet; Vincent Rezard

2009-07-01T23:59:59.000Z

307

Department of Mathematics Analysis Inverse Problems  

E-Print Network (OSTI)

McLaughlin In this talk we report the application of level-set techniques for reservoir facies for data inversion in reservoir modeling, Inverse Problems, 25 (2009), 035006. [4] M. A. Iglesias and D. McLaughlin.40­14.05 Anastasia Cornelio (Modena, Italy) Regularized Nonlinear Least Squares Methods for Hit Position

Hofmann, Bernd

308

Solving Water Quality Problems in the Home  

E-Print Network (OSTI)

If your drinking water comes from a private water well, there are certain procedures you can follow to make sure the water is safe. This publication explains how to get your water tested and, if treatment is necessary, to select the correct treatment equipment. Tables display common water problems and the equipment used to treat them.

Dozier, Monty; McFarland, Mark L.

2004-02-20T23:59:59.000Z

309

Cyclic coordinate descent in hydrothermal nonsmooth problems  

Science Conference Proceedings (OSTI)

In this paper we present an algorithm, inspired by the cyclic coordinate descent method, which allows the solution of hydrothermal optimization problems involving pumped-storage plants. The proof of the convergence of the succession generated by the ... Keywords: Coordinate descent, Hydrothermal coordination, Optimal control, Zangwill's theorem

Luis Bayón; Jose M. Grau; Maria M. Ruiz; Pedro M. Suárez

2012-02-01T23:59:59.000Z

310

An introduction to the dark energy problem  

E-Print Network (OSTI)

In this work we review briefly the origin and history of the cosmological constant and its recent reincarnation in the form of the dark energy component of the universe. We also comment on the fundamental problems associated to its existence and magnitude which require and urgent solution for the sake of the internal consistency of theoretical physics.

Antonio Dobado; Antonio L. Maroto

2008-02-13T23:59:59.000Z

311

Inverse Problems in Classical and Quantum Physics  

E-Print Network (OSTI)

The subject of this thesis is in the area of Applied Mathematics known as Inverse Problems. Inverse problems are those where a set of measured data is analysed in order to get as much information as possible on a model which is assumed to represent a system in the real world. We study two inverse problems in the fields of classical and quantum physics: QCD condensates from tau-decay data and the inverse conductivity problem. We use a functional method which allows us to extract within rather general assumptions phenomenological parameters of QCD (the condensates) from a comparison of the time-like experimental data with asymptotic space-like results from theory. The price to be paid for the generality of assumptions is relatively large errors in the values of the extracted parameters. Although we do not claim that our method is superior to other approaches, we hope that our results lend additional confidence to the numerical results obtained with the help of methods based on QCD sum rules. In this thesis, als...

Almasy, Andrea A

2009-01-01T23:59:59.000Z

312

Identify the Problem: Reduce Waste By  

E-Print Network (OSTI)

Identify the Problem: Reduce Waste By Banning Plastic Bag Use Define Goal: Is the ban the most The 2008 EPA report asserts that while paper waste has remained relatively constant at approximately 31%, plastic waste has been rising from 0.4% in 1960 to the present value at 12%a. San Francisco sets the goal

Iglesia, Enrique

313

Pathwise Optimization for Optimal Stopping Problems  

Science Conference Proceedings (OSTI)

We introduce the pathwise optimization (PO) method, a new convex optimization procedure to produce upper and lower bounds on the optimal value (the “price”) of a high-dimensional optimal stopping problem. The PO method builds on a dual characterization ... Keywords: American options, Bermudian options, dynamic programming, optimal control, optimal stopping

Vijay V. Desai; Vivek F. Farias; Ciamac C. Moallemi

2012-12-01T23:59:59.000Z

314

The stack loading and unloading problem  

Science Conference Proceedings (OSTI)

When piling a set of items in a single stack, one often does not pay attention to the order. Real-life experience suggests that, whenever a specific item is suddenly requested, we need to dig very deep into the stack to extract it. In this paper we investigate ... Keywords: Computational complexity, Dynamic programming, Stowage problems

Federico Malucelli; Stefano Pallottino; Daniele Pretolani

2008-10-01T23:59:59.000Z

315

Feasible distributed CSP models for scheduling problems  

Science Conference Proceedings (OSTI)

A distributed constraint satisfaction problem (DisCSP) is a CSP in which variables and constraints are distributed among multiple automated agents. Many researchers have developed techniques for solving DisCSPs. They assume for simplicity that each agent ... Keywords: Constraint satisfaction, Distributed CSP, Holonic system, Multi-agent system, Scheduling

Miguel A. Salido; Adriana Giret

2008-08-01T23:59:59.000Z

316

Problems of future GMDH algorithms development  

Science Conference Proceedings (OSTI)

Theories and algorithms developed for pattern recognition can be applied to random processes forecasting and for solution of all another interpolation type problems of artificial intelligence. For this purpose input data sample in the form of time series ... Keywords: approximation, computer software, error analysis, filtering, neural network

A. G. Ivakhnenko; E. A. Savchenko; G. A. Ivakhnenko

2003-10-01T23:59:59.000Z

317

On the Input Problem for Massive Modularity  

Science Conference Proceedings (OSTI)

Jerry Fodor argues that the massive modularity thesis -- the claim that (human) cognition is wholly served by domain specific, autonomous computational devices, i.e., modules -- is a priori ... Keywords: Fodor, Sperber, input problem, language faculty, massive modularity, theory of mind

J. Collins

2005-02-01T23:59:59.000Z

318

Relay placement problem in smart grid deployment  

Science Conference Proceedings (OSTI)

In this paper, we give an overview of power grid, smart grid, Advanced Metering Infrastructure (AMI), and the deployment cost analysis step by step. The importance between Relay Placement Problem (RPP) and the deployment cost in an AMI system is highlighted. ...

Wei-Lun Wang; Quincy Wu

2010-10-01T23:59:59.000Z

319

Optimization neural network for solving flow problems  

Science Conference Proceedings (OSTI)

This paper describes a neural network for solving flow problems, which are of interest in many areas of application as in fuel, hydro, and electric power scheduling. The neural network consist of two layers: a hidden layer and an output layer. The hidden ...

R. Perfetti

1995-09-01T23:59:59.000Z

320

Handling class imbalance problem in cultural modeling  

Science Conference Proceedings (OSTI)

Cultural modeling is an emergent and promising research area in social computing. It aims at developing behavioral models of groups and analyzing the impact of culture factors on group behavior using computational methods. Machine learning methods in ... Keywords: ROC analysis, class imbalance problem, classification, cultural modeling, sampling

Peng Su; Wenji Mao; Daniel Zeng; Xiaochen Li; Fei-Yue Wang

2009-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Initialization of the Benders master problem using valid inequalities applied to fixed-charge network problems  

Science Conference Proceedings (OSTI)

Network problems concern the selection of arcs in a graph in order to satisfy, at minimum cost, some flow requirements, usually expressed in the form of node-node pair demands. Benders decomposition methods, based on the idea of partitioning of the initial ... Keywords: Benders decomposition, Fixed-charge network problem, Mixed integer programming, Refinery, Scheduling of crude oil, Valid inequalities

Georgios K. D. Saharidis; Maria Boile; Sotiris Theofanis

2011-06-01T23:59:59.000Z

322

Environmental WindowsEnvironmental Windows Real Problems and PotentialReal Problems and Potential  

E-Print Network (OSTI)

Environmental WindowsEnvironmental Windows Real Problems and PotentialReal Problems and Potential Window - a period during which dredging may occur Seasonal Restriction - a period during which dredging and effective management guidelines such as dredging windows..." #12;Schubel et al. 1979. A conceptual framework

US Army Corps of Engineers

323

Linear PDEs and eigenvalue problems corresponding to ergodic stochastic optimization problems on compact manifolds  

E-Print Network (OSTI)

We consider long term average or `ergodic' optimal control poblems with a special structure: Control is exerted in all directions and the control costs are proportional to the square of the norm of the control field with respect to the metric induced by the noise. The long term stochastic dynamics on the manifold will be completely characterized by the long term density $\\rho$ and the long term current density $J$. As such, control problems may be reformulated as variational problems over $\\rho$ and $J$. We discuss several optimization problems: the problem in which both $\\rho$ and $J$ are varied freely, the problem in which $\\rho$ is fixed and the one in which $J$ is fixed. These problems lead to different kinds of operator problems: linear PDEs in the first two cases and a nonlinear PDE in the latter case. These results are obtained through through variational principle using infinite dimensional Lagrange multipliers. In the case where the initial dynamics are reversible we obtain the result that the optimally controlled diffusion is also symmetrizable. The particular case of constraining the dynamics to be reversible of the optimally controlled process leads to a linear eigenvalue problem for the square root of the density process.

Joris Bierkens; Vladimir Y. Chernyak; Michael Chertkov; Hilbert J. Kappen

2013-03-01T23:59:59.000Z

324

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Vulnerability in the PDF distiller of the BlackBerry 4: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server January 13, 2011 - 2:30pm Addthis PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version 5.0.1 and 5.0.2 for Microsoft Exchange * BlackBerry Enterprise Server Express version 5.0.2 for IBM Lotus Domino * BlackBerry Enterprise Server versions 4.1.3 through 5.0.2 for Microsoft Exchange and IBM Lotus Domino * BlackBerry Enterprise Server versions 4.1.3 through 5.0.1 for Novell GroupWise * BlackBerry Professional Software version 4.1.4 for Microsoft Exchange and

325

T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in 02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks April 14, 2011 - 5:07am Addthis PROBLEM: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for Microsoft Exchange, 5.0.2 for IBM Lotus Domino, 5.0.0 through 5.0.3 for Microsoft Exchange and IBM Lotus Domino, and version 5.0.1 for Novell GroupWise. OS Platform(s): Windows (2000), Windows (2003), Windows (2008) ABSTRACT: The BlackBerry Web Desktop Manager not properly filter HTML code from

326

An approximative inference method for solving ??SO satisfiability problems  

Science Conference Proceedings (OSTI)

This paper considers the fragment ??SO of second-order logic. Many interesting problems, such as conformant planning, can be naturally expressed as finite domain satisfiability problems of this logic. Such satisfiability problems are computationally ...

Hanne Vlaeminck; Joost Vennekens; Marc Denecker; Maurice Bruynooghe

2012-09-01T23:59:59.000Z

327

The DynCOAA algorithm for dynamic constraint optimization problems  

Science Conference Proceedings (OSTI)

Numerous problems in software coordination, operations research, manufacturing control and others can be transformed in constraint optimization problems (COPs). Moreover, most practical problems change constantly, requiring algorithms that can handle ... Keywords: ACO, distributed constraint optimization, dynamic

Koenraad Mertens; Tom Holvoet; Yolande Berbers

2006-05-01T23:59:59.000Z

328

A Heuristic Approach for Big Bucket Production Planning Problems  

E-Print Network (OSTI)

Oct 4, 2006 ... Multi-level production planning problems in which multiple items ... setup costs, lot-sizing problems seek a minimum-cost production plan that ...

329

Simulation Problem Analysis and Research Kernel | Open Energy...  

Open Energy Info (EERE)

Simulation Problem Analysis and Research Kernel Jump to: navigation, search Tool Summary Name: Simulation Problem Analysis and Research Kernel AgencyCompany Organization:...

330

Many small consumers, one growing problem: Achieving energy savings...  

NLE Websites -- All DOE Office Websites (Extended Search)

Many small consumers, one growing problem: Achieving energy savings for electronic equipment operating in low power modes Title Many small consumers, one growing problem: Achieving...

331

The robust vehicle routing problem with time windows  

E-Print Network (OSTI)

Oct 2, 2012 ... Abstract: This paper addresses the robust vehicle routing problem with time windows. We are motivated by a problem that arises in maritime ...

332

design problem | OpenEI Community  

Open Energy Info (EERE)

27 27 Varnish cache server Home Groups Community Central Green Button Applications Developer Utility Rate FRED: FRee Energy Database More Public Groups Private Groups Features Groups Blog posts Content Stream Documents Discussions Polls Q & A Events Notices My stuff Energy blogs 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142229527 Varnish cache server design problem Home Dc's picture Submitted by Dc(15) Member 15 November, 2013 - 13:26 Living Walls ancient building system architect biomimicry building technology cooling cu daylight design problem energy use engineer fred andreas geothermal green building heat transfer heating living walls metabolic adjustment net zero pre-electricity Renewable Energy Solar university of colorado utility grid

333

Green's function of the cosmological thermalization problem  

E-Print Network (OSTI)

Energy release in the early Universe leads to spectral distortions of the cosmic microwave background (CMB) which in the future might allow probing different physical processes in the pre-recombination (z>~10^3) epoch. Depending on the energy injection history, the associated distortion partially thermalizes due to the combined action of Compton scattering, double Compton scattering and Bremsstrahlung emission, a problem that in general is hard to solve. Various analytic approximations describing the resulting distortion exist, however, for small distortions and fixed background cosmology the Green's function of the problem can be computed numerically. Here we show that this approach gives very accurate results for general thermal histories, allowing fast and quasi-exact computation of the spectral distortion given the energy release rate. Our method can thus be used to forecast possible constraints on early-universe physics obtained from future measurements of the CMB spectrum.

Chluba, Jens

2013-01-01T23:59:59.000Z

334

Ergonomics problems and solutions in biotechnology laboratories  

SciTech Connect

The multi-functional successful ergonomics program currently implemented at Lawrence Livermore National Laboratory (LLNL) will be presented with special emphasis on recent findings in the Biotechnology laboratory environment. In addition to a discussion of more traditional computer-related repetitive stress injuries and associated statistics, the presentation will cover identification of ergonomic problems in laboratory functions such as pipetting, radiation shielding, and microscope work. Techniques to alleviate symptoms and prevent future injuries will be presented.

Coward, T.W.; Stengel, J.W.; Fellingham-Gilbert, P.

1995-03-01T23:59:59.000Z

335

A Remark on the Kramers Problem  

E-Print Network (OSTI)

We present new point of view on the old problem, the Kramers problem. The passage from the Fokker-Planck equation to the Smoluchowski equation, including corrections to the Smoluchowski current, is treated through an asymptotic expansion of the solution of the stochastic dynamical equations. The case of an extremely weak force of friction is also discussed. KEY WORDS: Kramers problem; Klyatskin-Novikov theory; stochastic equation; current. 1. Evolution of a physical system can be ordered in multi-timescales. Details of evolution on short-time-scale do not need for description in a closed form of a system evolution on long-time-scale and appears on this scale only in an average form. The prototype of such kind physical systems is dissipative Brownian motion of a particle in an external potential field. In this problem, with the exception of extremely short characteristic time scales of random forces, there are two time scales: (1) time scales of a particle motion in an external field; (2) time scales of relaxation (rate of dissipation) of Brownian particle in a media. It is intuitively absolutely clear that, if the friction force is strong enough (time of free motion is extremely short), then probability distribution of a particle velocity to be rapidly relaxed to the Maxwell distribution and on this background a particle position will be undergoing to slow process of diffusion. In the following we deal with the consideration of approximate reduction of the Fokker-Planck equation for phase-space probability density to the Smoluchowski equation which deals with probability density of a particle position only. In the opposite case of extremely weak force of friction we have energy (or action)

Alex A. Samoletov

2003-01-01T23:59:59.000Z

336

Prof. Rich Kozick Some Logic Problems  

E-Print Network (OSTI)

. Problem 2 The Nellbuck Corp. has four boilers, A,B,C, and D. Boiler A can supply 50% of the steam to run process P, boiler B can supply 40%, boiler C can supply 40%, and boiler D can supply 50%. Devise a truth table that shows when there is enough steam to run the process. Assume A is "1" when boiler A is ready

Kozick, Richard J.

337

Upgrading ESP efficiency is a problem  

SciTech Connect

The twin problems of efficiency loss, coupled with capricious EPA regulatory changes, can create many difficulties for utilities that already have, or plan to install, electrostatic precipitators in their coal-fired stations. To cut the costs of retrofit and efficiency degradation, there are several off-the-shelf, computer-based, electronic-monitoring and -control systems that can either be individually operated or multiplexed remotely by means of today's state-of-the-art hardware and software. These are discussed.

Hurst, R.

1980-04-15T23:59:59.000Z

338

Age problem in holographic dark energy  

E-Print Network (OSTI)

We study the age problem of the universe with the holographic DE model introduced in [21], and test the model with some known old high redshift objects (OHRO). The parameters of the model have been constrained using the SNIa, CMB and BAO data set. We found that the age of the old quasar APM 08 279+5255 at z = 3.91 can be described by the model.

L. N. Granda; A. Oliveros; W. Cardona

2009-05-12T23:59:59.000Z

339

Problem and Preferred Management Practices Identification Workshop  

SciTech Connect

The goals for this workshop were: to introduce key players in the Appalachian basin oil industry to DOE's new Preferred Upstream Management Practices (PUMP) program; to explain the various elements of our two-year project in detail; to transfer technology through a series of short, invited talks; to identify technical problems and best management practices; and to recruit members for our Preferred Management Practices (PMP) Council.

Patchen, Douglas G.

2003-03-10T23:59:59.000Z

340

Slimhole frac pack tools overcome erosion problems  

SciTech Connect

The application of frac pack technology for stimulation and sand control in the Gulf of Mexico`s unconsolidated formations has steadily increased during the past several years. In addition, re-entry drilling has been one of the fastest growing development techniques used by operators for optimizing reservoir productivity. As such, smaller casing sizes are becoming more common in oil and gas producing wells. Gravel pack tools were being used for frac packing in 7-in. casing sizes and larger, but no tools were available to frac pack in the smaller 5-in. and 5{1/2}-in. casing. The erosion problems operators were experiencing in 7-in. gravel pack tools heightened concerns about fracturing through 5-in. tools with even smaller flow areas. Flow cutting in the 7-in. tools was so severe that it caused fluid communication between the gravel pack ports and the return flow holes in the crossover tool. This allowed fluid and proppant to return to the annulus above the packer, which could cause possible early screen-out and sticking of the crossover tool. The flow cutting could also reduce the tool`s pressure and tensile ratings. Any one of these problems could jeopardize the success of the frac pack operation. Therefore, an erosion resistant crossover tool for slimhole casing was developed to address these problems and optimize frac pack success.

Stout, G. [BJ Services, Tomball, TX (United States). Research and Development Center; Matte, T. [BJ Services, Lafayette, LA (United States); Rogers, B. [Marathon Oil Co., Lafayette, LA (United States)

1997-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Projective metrizability problem and formal integrability  

E-Print Network (OSTI)

The projective metrizability problem can be formulated as follows: under what conditions the geodesics of a given spray coincide with the geodesics of some Finsler space, as oriented curves. In Theorem 3.8 we reformulate the projective metrizability problem for a spray in terms of a first order partial differential operator $P_1$ and a set of algebraic conditions on semi-basic 1-forms. We discuss the formal integrability of $P_1$ using two sufficient conditions provided by Cartan-K\\"ahler Theorem. We prove in Theorem 4.2 that the symbol of $P_1$ is involutive and hence one of the two conditions is always satisfied. In Theorem 4.3 we prove that there is only one obstruction to the second condition for the formal integrability of $P_1$, and this obstruction is due to the curvature tensor of the induced nonlinear connection. When the curvature obstruction is satisfied, the projective metrizability problem reduces to the discussion of the algebraic conditions, which as we show are always satisfied. Based on these...

Bucataru, Ioan

2011-01-01T23:59:59.000Z

342

Initial Value Problem in General Relativity  

E-Print Network (OSTI)

This article, written to appear as a chapter in "The Springer Handbook of Spacetime", is a review of the initial value problem for Einstein's gravitational field theory in general relativity. Designed to be accessible to graduate students who have taken a first course in general relativity, the article first discusses how to reformulate the spacetime fields and spacetime covariant field equations of Einstein's theory in terms of fields and field equations compatible with a 3+1 foliation of spacetime with spacelike hypersurfaces. It proceeds to discuss the arguments which show that the initial value problem for Einstein's theory is well-posed, in the sense that for any given set of initial data satisfying the Einstein constraint equations, there is a (maximal) spacetime solution of the full set of Einstein equations, compatible with the given set of data. The article then describes how to generate initial data sets which satisfy the Einstein constraints, using the conformal (and conformal thin sandwich) method, and using gluing techniques. The article concludes with comments regarding stability and long term behavior of solutions of Einstein's equations generated via the initial value problem.

James Isenberg

2013-04-07T23:59:59.000Z

343

The status of the solar neutrino problem  

Science Conference Proceedings (OSTI)

Perhaps the most outstanding discrepancy between prediction and measurements in current particle physics comes from the solar neutrino problem, in which a large deficit of high-energy solar neutrinos is observed. Many Nonstandard Solar Models have been invoked to try to reduce the predicted flux, but all have run into problems in trying to reproduce other measured parameters (e.g., the luminosity) of the Sun. Other explanations involving new physics such as neutrino decay and neutrino oscillations, etc. have also been proffered. Again, most of these explanations have been ruled out by either laboratory or astrophysical measurements. It appears that perhaps the most likely particle physics solution is that of matter enhanced neutrino oscillation, the Mikheyev-Smirnov-Wolfenstein (MSW) oscillations. Two new radiochemical gallium experiments, which have a low enough threshold to be sensitive to the dominant flux of low-energy p-p neutrinos, now also report a deficit and also favor a particle physics solution. The next generation of solar experiments promise to finally resolve the source of the ``solar neutrino problem`` by the end of this decade.

Bowles, T.J.

1993-12-01T23:59:59.000Z

344

Hans Bethe and the Global Energy Problems.  

E-Print Network (OSTI)

Bethe’s view-point on the global energy problems is presented. Bethe claimed that the nuclear power is a necessity in future. Nuclear energetic must be based on breeder reactors. Bethe considered the non-proliferation of nuclear weapons as the main problem of long-range future of nuclear energetics. The solution of this problem he saw in heavy water moderated thermal breeders, using uranium-233, uranium-238 and thorium as a fuel. 1 My contacts with Bethe. I heard Bethe’s name first time in 1947. I was the student of the 3rd course of the physical faculty of Moscow University. I was not satisfyed by the level of education there, especially by the teaching of theoretical physics – all the best russian theoreticians – Landau, Tamm, Leontovich and others were expelled from the University, because they did not share the official points of view of Marxist philosophy. After some doubts – if I am able to be a theoretical physicist or not – I decided to try to give up to Landau his theoretical minimum. I passed successfully the first entering exam on mathematics and Landau gave me the program of the whole minimum. That time among now well

Boris Ioffe

2005-01-01T23:59:59.000Z

345

Computationally efficient Bayesian inference for inverse problems.  

SciTech Connect

Bayesian statistics provides a foundation for inference from noisy and incomplete data, a natural mechanism for regularization in the form of prior information, and a quantitative assessment of uncertainty in the inferred results. Inverse problems - representing indirect estimation of model parameters, inputs, or structural components - can be fruitfully cast in this framework. Complex and computationally intensive forward models arising in physical applications, however, can render a Bayesian approach prohibitive. This difficulty is compounded by high-dimensional model spaces, as when the unknown is a spatiotemporal field. We present new algorithmic developments for Bayesian inference in this context, showing strong connections with the forward propagation of uncertainty. In particular, we introduce a stochastic spectral formulation that dramatically accelerates the Bayesian solution of inverse problems via rapid evaluation of a surrogate posterior. We also explore dimensionality reduction for the inference of spatiotemporal fields, using truncated spectral representations of Gaussian process priors. These new approaches are demonstrated on scalar transport problems arising in contaminant source inversion and in the inference of inhomogeneous material or transport properties. We also present a Bayesian framework for parameter estimation in stochastic models, where intrinsic stochasticity may be intermingled with observational noise. Evaluation of a likelihood function may not be analytically tractable in these cases, and thus several alternative Markov chain Monte Carlo (MCMC) schemes, operating on the product space of the observations and the parameters, are introduced.

Marzouk, Youssef M.; Najm, Habib N.; Rahn, Larry A.

2007-10-01T23:59:59.000Z

346

IBM Blue Gene Parallel Supercomputer, Brookhaven National Laboratory, (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Login How to Login Please note, New York Blue/L has been decommissioned and these web pages have not yet been updated to reflect its removal from service. The New York Blue/P is now one rack and remains in service. The BNL Blue Gene/Q also remains in service. Introduction Accessing the Blue Gene SSH Gateways Accessing the Blue Gene Front-End Nodes Accessing the Visualization Cluster Accessing the CSC GPU Cluster SSH Tunneling Introduction The only way to access Blue Gene computing resources remotely (outside the Blue Gene network enclave) is through the Blue Gene ssh gateways. Even users connecting from inside the BNL campus network need to go through the gateways. Outside the BNL campus the gateways are known as: ssh.bluegene.bnl.gov Inside the BNL campus they are known as: ssh.bluegene.bnl.local

347

IBM Global Services A Strategic Approach to Protecting  

E-Print Network (OSTI)

operating systems and network infrastructure upon which they rely, and to SCADA protocol-specific weaknesses any network closures in the event of a hardware failure · It's equipped with full SCADA protocol

348

STATEMENT OF CONSIDERATIONS REQUEST BY IBM WATSON RESEARCH CENTER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Measurements of the important High End Computing (HEC) applications, and benchmarks sufficient to compare these with other operating systems to motivate customization...

349

IBM Blue Gene Parallel Supercomputer, Brookhaven National Laboratory...  

NLE Websites -- All DOE Office Websites (Extended Search)

SSH Tunneling One-hop logins and file transfers using ssh tunneling Please note, New York BlueL has been decommissioned and these web pages have not yet been updated to reflect...

350

U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Skip to main content Energy.gov Office of the Chief Information Officer Search form Search Office of the Chief Information Officer Services Assistive Technology Forms Guidance...

351

Field deployment process transformation in IBM PC services  

E-Print Network (OSTI)

Field service, as an important focus area of service operations, has increasingly become a critical component of the overall service offering by high-tech enterprises. Enhancing productivity by optimizing field services ...

Fan, Siyu

2007-01-01T23:59:59.000Z

352

Nicole Taheri, Robert Entriken, and IBM, EPRI, and Stanford  

E-Print Network (OSTI)

of Plug-in Electric Vehicles could impact the electricity grid. Standard Charging: as soon as the car Spent Driving Electricity Price Constraint Adjusted Price Total Charge Allowed #12;There are two cars Energy Efficiency Center and Electric Power Research Institute A Dynamic Linear Programming Algorithm

Ye, Yinyu

353

The IBM Government Industry Framework: Accelerating solutions for smarter governments  

E-Print Network (OSTI)

and business intelligence to bill drivers through transponder or license plate recognition. This system also better insight, performance, visibility and control through business intelligence. · Safety and Security Software Group Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America 10-09 All Rights

354

IBM Global Business Services Supply Chain Management Executive Report  

E-Print Network (OSTI)

and services to customers. To meet customers' business intelligence needs, the Teradata Purpose-Built Platform-driven business intelligence. In addition to price and performance, customers can benefit from an operating.teradata.com. Teradata is a trademark or registered trademark of Teradata Corporation in the United States and other

355

Processing PDP-11 files into IBM file structures  

Science Conference Proceedings (OSTI)

This report summarizes the techniques and procedures used to handle automated data collected at the University of Minnesota-Duluth (UMD) campus coal gasification facility. This facility, which is partially funded by the Department of Energy, is being ...

R. H. Strand; M. P. Farrell

1980-01-01T23:59:59.000Z

356

Scheduling functional regression tests for IBM DB2 products  

Science Conference Proceedings (OSTI)

Functional Regression Testing (FRT) is performed to ensure that a new version of a product functions properly as designed. In a corporate environment, the large numbers of test jobs and the complexity of scheduling the jobs on different platforms make ...

Edward Xia; Igor Jurisica; Julie Waterhouse; Valerie Sloan

2005-10-01T23:59:59.000Z

357

SLAC National Accelerator Laboratory - IBM/SLAC Team Controls...  

NLE Websites -- All DOE Office Websites (Extended Search)

IBMSLAC Team Controls Switching Behavior of Promising Electronic Material By Mike Ross October 21, 2013 Working with a metal oxide that shows promise for future generations of...

358

V-061: IBM SPSS Modeler XML Document Parsing Vulnerability |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and cause a DoS (Denial of Service). The vulnerability is caused due to an error when handling certain XML documents and can be exploited via a specially crafted document....

359

Big Data Platforms, Tools, and Research at IBM  

Science Conference Proceedings (OSTI)

... Hadoop System Scheduler • Identifies small and large jobs from ... Deep analytics appliance – Configurable operational analytics appliance ...

2012-06-25T23:59:59.000Z

360

Berkeley Lab Selects IBM Technology to Power Cloud Computing...  

NLE Websites -- All DOE Office Websites (Extended Search)

of Energy (DOE). The Magellan system will be a testbed for National Energy Research Scientific Computing Center (NERSC) scientists to explore the effectiveness of cloud computing...

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Account Request Form | IBM Blue Gene Parallel Supercomputer,...  

NLE Websites -- All DOE Office Websites (Extended Search)

(check all that apply) Please make at least one selection Brookhaven Blue GeneQ Argonne Leadership Computing Facility (based on Blue GeneQ) What is the name of the code? Do you...

362

ibm.com/redbooks ProgrammingtheCellBroadband  

E-Print Network (OSTI)

://www.coverme. com/?MKT=MFC Blue Cross http://www.useblue.com/index. en.html Green Shields Canada http://www.greenshield.ca/ Travel Medical Insurance Plans Manulife Financial http://www.coverme. com/?MKT=MFC Green Shield Canada/Health+insurance+summa ry?vgnLocale=en_CA Travel Guard Insurance http://www.travelguard.ca/quick- quote_2011_333283.html

Burgstaller, Bernd

363

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary...

364

Evolution of small real-time IBM computer systems  

Science Conference Proceedings (OSTI)

In parallel with the development of data processing applications for computers, effort was directed to other areas in which computers might provide benefits for the user. One early effort was the application of computers tot he monitoring and control ...

Thomas J. Harrison; Bruce W. Landeck; Hal K. St. Clair

1981-09-01T23:59:59.000Z

365

U-116: IBM Tivoli Provisioning Manager Express for Software Distributi...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to the SoapServlet servlet is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. A...

366

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

data is viewed. 3) Certain input is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 4)...

367

Intelligent Bioreactor Management Information System (IBM-IS...  

NLE Websites -- All DOE Office Websites (Extended Search)

a network of automated sensors and control points to manage and control bioreactor landfill gas extraction and liquid addition. This system will help control and optimize...

368

Thank you for buying an IBM blade server.  

E-Print Network (OSTI)

. See Chapter 4 for more information. BladeCenter QS22 Type 0793 Install the operating system. See . . . . . . . . . . . . . . . . . . . . 10 Blade server controls and LEDs . . . . . . . . . . . . . . . . . . 10 System board LEDs . . . . . . . . . . . . . . . . . . . . . . . 11 System board internal and expansion card connectors . . . . . . . . . . 12 Chapter 3. Installing

369

Thank you for buying an IBM blade server.  

E-Print Network (OSTI)

. See Chapter 4 for more information. BladeCenter QS21 Type 0792 Install the operating system. See . . . . . . . . . . . . . . . . . . . . 10 Blade server controls and LEDs. . . . . . . . . . . . . . . . . . . 11 System board LEDs . . . . . . . . . . . . . . . . . . . . . . . 12 System board internal and expansion card connectors . . . . . . . . . . 13 Chapter 3. Installing

370

NIST-PEC Meeting, December 2011: IBM Identity Mixer  

Science Conference Proceedings (OSTI)

... Alternative approaches exist ? eg, SAML, WS-Federation, OpenID, Facebook Connect,… ... eg, SAML, WS-Federation, OpenID, Facebook Connect ...

2012-05-16T23:59:59.000Z

371

IBM, Lawrence Livermore researchers form 'Deep Computing Solutions...  

NLE Websites -- All DOE Office Websites (Extended Search)

collaboration to help boost U.S. industrial competitiveness Donald B Johnston, LLNL, (925) 423-4902, johnston19@llnl.gov Printer-friendly Two racks of Vulcan, the new...

372

Measurement and Prediction of Local Structure  

Science Conference Proceedings (OSTI)

... which described the problem of solving structure at the nanoscale, followed by input from scientists from industry (eg, GE, Exxon/Mobil, Ford, IBM ...

2012-10-04T23:59:59.000Z

373

ERAMICS  

Science Conference Proceedings (OSTI)

... which described the problem of solving structure at the nanoscale, followed by input from scientists from industry (eg, GE, Exxon/Mobil, Ford, IBM ...

2012-10-04T23:59:59.000Z

374

Optimization Online - A Branch-and-Price Algorithm and New Test ...  

E-Print Network (OSTI)

Aug 30, 2002 ... A Branch-and-Price Algorithm and New Test Problems for Spectrum Auctions. Oktay Gunluk (oktay ***at*** watson.ibm.com) Laci Ladanyi ...

375

Survey: Covering problems in facility location: A review  

Science Conference Proceedings (OSTI)

In this study, we review the covering problems in facility location. Here, besides a number of reviews on covering problems, a comprehensive review of models, solutions and applications related to the covering problem is presented after Schilling, Jayaraman, ... Keywords: Covering problem, Facility location, Mathematical formulation, Survey

Reza Zanjirani Farahani; Nasrin Asgari; Nooshin Heidari; Mahtab Hosseininia; Mark Goh

2012-02-01T23:59:59.000Z

376

The twin Diffie-Hellman problem and applications  

Science Conference Proceedings (OSTI)

We propose a new computational problem called the twin Diffie-Hellman problem. This problem is closely related to the usual (computational) Diffie-Hellman problem and can be used in many of the same cryptographic constructions that are based on the Diffie-Hellman ...

David Cash; Eike Kiltz; Victor Shoup

2008-04-01T23:59:59.000Z

377

Using domain-independent problems for introducing formal methods  

Science Conference Proceedings (OSTI)

The key to the integration of formal methods into engineering practice is education. In teaching, domain-independent problems —i.e., not requiring prior engineering background— offer many advantages. Such problems are widely available, but ... Keywords: domain-independent problems, formal methods, functional predicate calculus, funmath, generic functionals, specification, teaching, word problems

Raymond Boute

2006-08-01T23:59:59.000Z

378

Advanced algorithms for coupled and inverse problems in electrical engineering  

Science Conference Proceedings (OSTI)

This paper presents some theoretical and numerical problems that arise in the analysis of coupled electromagnetic-thermal problems, and inverse problems in electromagnetic devices. The principal objective of the paper is to describe some computational ... Keywords: coupled fields, finite element method, inverse problems

Ion Cârstea

2008-06-01T23:59:59.000Z

379

Public problems: Still waiting on the marketplace for solutions  

Science Conference Proceedings (OSTI)

This report addresses the need for government sponsored R and D to address real public problems. The motivation is that a public benefit of the money spent must be demonstrated. The areas identified as not having appropriate attention resulting in unmet public needs include healthcare cost, cost and benefits of regulations, infrastructure problems, defense spending misaligned with foreign policy objectives, the crime problem, energy impact on the environment, the education problem, low productivity growth industry sectors, the income distribution problem, the aging problem, the propagation of disease and policy changes needed to address the solution of these problems.

Gover, J. [Sandia National Labs., Albuquerque, NM (United States)] [Sandia National Labs., Albuquerque, NM (United States); Carayannis, E. [George Washington Univ., Washington, DC (United States)] [George Washington Univ., Washington, DC (United States); Huray, P.

1997-10-01T23:59:59.000Z

380

Studies in nonlinear problems of energy  

Science Conference Proceedings (OSTI)

Emphasis has been on combustion and flame propagation. The research program was on modeling, analysis and computation of combustion phenomena, with emphasis on transition from laminar to turbulent combustion. Nonlinear dynamics and pattern formation were investigated in the transition. Stability of combustion waves, and transitions to complex waves are described. Combustion waves possess large activation energies, so that chemical reactions are significant only in thin layers, or reaction zones. In limit of infinite activation energy, the zones shrink to moving surfaces, (fronts) which must be found during the analysis, so that (moving free boundary problems). The studies are carried out for limiting case with fronts, while the numerical studies are carried out for finite, though large, activation energy. Accurate resolution of the solution in the reaction zones is essential, otherwise false predictions of dynamics are possible. Since the the reaction zones move, adaptive pseudo-spectral methods were developed. The approach is based on a synergism of analytical and computational methods. The numerical computations build on and extend the analytical information. Furthermore, analytical solutions serve as benchmarks for testing the accuracy of the computation. Finally, ideas from analysis (singular perturbation theory) have induced new approaches to computations. The computational results suggest new analysis to be considered. Among the recent interesting results, was spatio-temporal chaos in combustion. One goal is extension of the adaptive pseudo-spectral methods to adaptive domain decomposition methods. Efforts have begun to develop such methods for problems with multiple reaction zones, corresponding to problems with more complex, and more realistic chemistry. Other topics included stochastics, oscillators, Rysteretic Josephson junctions, DC SQUID, Markov jumps, laser with saturable absorber, chemical physics, Brownian movement, combustion synthesis, etc.

Matkowsky, B.J.

1992-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Used motor oil passes environmental problem  

SciTech Connect

Purposes of this study were to determine the amount of oil used, oil change practices, disposal methods involved, perceived harmfulness of various disposal methods, and attitudes toward recycling used motor oil. Survey was taken to verify claims made that the do-it-yourselfer (DIY), who changes his own automotive oil, has caused significant environmental problems by dumping the oil down sewers, on the ground, or into landfills as part of their trash. Results show that more than two-thirds of DIYs would save their oil for recycling if it were picked up at their house or if they had a suitable container for bringing it to a recycling center.

Brinkman, D.W.; Gottlieb, M.; Koelbel, K.

1982-08-09T23:59:59.000Z

382

Optimal regularity for the Signorini problem  

E-Print Network (OSTI)

We prove under general assumptions that solutions of the thin obstacle or Signorini problem in any space dimension achieve the optimal regularity $C^{1,1/2}$. This improves the known optimal regularity results by allowing the thin obstacle to be defined in an arbitrary $C^{1,\\beta}$ hypersurface, $\\beta>1/2$, additionally, our proof covers any linear elliptic operator in divergence form with smooth coefficients. The main ingredients of the proof are a version of Almgren's monotonicity formula and the optimal regularity of global solutions.

Guillen, Nestor

2009-01-01T23:59:59.000Z

383

Oscillation Solutions to Solar Neutrino Problem  

E-Print Network (OSTI)

The current status of oscillation solutions to the Solar Neutrino Problem is reviewed. Four oscillation solutions are discussed in the light of 708d Superkamiokande data: MSW, Just-So VO, VO with Energy-Independent Suppression (EIS) and Resonant-Spin-Flavor-Precession (RSFP). Only EIS VO is strongly disfavoured by the global rates, mostly due to the Homestake data. Vacuum oscillations give an interesting solution which explains high-energy excess of events observed by Superkamiokande and predicts {\\em semi-annual} seasonal variation of $Be$-neutrino flux. There are indications to these variations in the GALLEX and Homestake data. No direct evidence for oscillation is found yet.

V. Berezinsky

1999-04-07T23:59:59.000Z

384

Oscillation solutions to solar neutrino problem  

E-Print Network (OSTI)

The current status of oscillation solutions to the Solar Neutrino Problem is reviewed. Four oscillation solutions are discussed in the light of 708d Superkamiokande data: MSW, Just-So VO, VO with Energy-Independent Suppression (EIS) and Resonant-Spin-Flavor-Precession (RSFP). Only EIS VO is strongly disfavoured by the global rates, mostly due to the Homestake data. Vacuum oscillations give an interesting solution which explains high-energy excess of events observed by Superkamiokande and predicts {\\em semi-annual} seasonal variation of $Be$-neutrino flux. There are indications to these variations in the GALLEX and Homestake data. No direct evidence for oscillation is found yet.

Berezinsky, Veniamin Sergeevich

2000-01-01T23:59:59.000Z

385

Some problems THE Galois connection Clones and algebras The lattice of clones Completeness CSP Open problems Clones and Galois connections  

E-Print Network (OSTI)

Some problems THE Galois connection Clones and algebras The lattice of clones Completeness CSP Open aa #12;Some problems THE Galois connection Clones and algebras The lattice of clones Completeness CSP Completeness CSP Open problems Final remarks aa #12;Some problems THE Galois connection Clones and algebras

Pöschel, Reinhard

386

Hamiltonian Graphs and the Traveling Salesman Problem  

E-Print Network (OSTI)

A new characterization of Hamiltonian graphs using f-cutset matrix is proposed. A new exact polynomial time algorithm for the traveling salesman problem (TSP) based on this new characterization is developed. We then define so called ordered weighted adjacency list for given weighted complete graph and proceed to the main result of the paper, namely, the exact algorithm based on utilization of ordered weighted adjacency list and the simple properties that any path or circuit must satisfy. This algorithm performs checking of sub-lists, containing (p-1) entries (edge pairs) for paths and p entries (edge pairs) for circuits, chosen from ordered adjacency list in a well defined sequence to determine exactly the shortest Hamiltonian path and shortest Hamiltonian circuit in a weighted complete graph of p vertices. The procedure has intrinsic advantage of landing on the desired solution in quickest possible time and even in worst case in polynomial time. A new characterization of shortest Hamiltonian tour for a weighted complete graph satisfying triangle inequality (i.e. for tours passing through every city on a realistic map of cities where cities can be taken as points on a Euclidean plane) is also proposed. Finally, we discuss a novel classical algorithm for unstructured search and its effect on any of the NP-Complete problems.

Dhananjay P. Mehendale

2007-04-27T23:59:59.000Z

387

A Resolution of the Vacuum Energy Problem  

E-Print Network (OSTI)

A new vision of the beginning and expansion of our universe has produced a solution to the vacuum energy problem (also known as "cosmological constant problem"). A new dynamic of cellular spaces and a discrete time has space being produced by a process called spatial condensation (SC). With generic energy defined as Planck's constant times the rate of cellular space production, both the vacuum energy and mass energy contents contribute to the expansion in the ratio 10^123/1, the same ratio of predicted densities by quantum theory and our astronomers. However, unlike mass energy, vacuum energy, like Casimir vacuum energy, does not carry the attribute of mass and so does not gravitate. A geometric derivation of the vacuum energy expansion rate was followed by a second derivation in terms of the evolution of the contents, from radiation to matter to dark mass (not matter). With a new definition of cosmic time, the second derivation was shown to produce exactly the same expansion rate. Free of singularities and inflation, both derivations also produced reasonable values of the cosmological parameters and the second derivation produced a good fit to the supernova Ia data with no acceleration of the expansion rate.

Charles B. Leffert

2003-08-01T23:59:59.000Z

388

Quantum query complexity of some graph problems  

E-Print Network (OSTI)

Quantum algorithms for graph problems are considered, both in the adjacency matrix model and in an adjacency list-like array model. We give almost tight lower and upper bounds for the bounded error quantum query complexity of Connectivity, Strong Connectivity, Minimum Spanning Tree, and Single Source Shortest Paths. For example we show that the query complexity of Minimum Spanning Tree is in Theta(n^{3/2}) in the matrix model and in Theta(sqrt{nm}) in the array model, while the complexity of Connectivity is also in Theta(n^{3/2}) in the matrix model, but in Theta(n) in the array model. The upper bounds utilize search procedures for finding minima of functions under various conditions.

Christoph Durr; Mark Heiligman; Peter Hoyer; Mehdi Mhalla

2004-01-15T23:59:59.000Z

389

Longevity Problem of Sterile Neutrino Dark Matter  

E-Print Network (OSTI)

Sterile neutrino dark matter of mass O(1-10) keV decays into an active neutrino and an X-ray photon, and the non-observation of the corresponding X-ray line requires the sterile neutrino to be more long-lived than estimated based on the seesaw formula : the longevity problem. We show that, if one or more of the B-L Higgs fields are charged under a flavor symmetry (or discrete R symmetry), the split mass spectrum for the right-handed neutrinos as well as the required longevity is naturally realized. We provide several examples in which the predicted the X-ray flux is just below the current bound.

Hiroyuki Ishida; Kwang Sik Jeong; Fuminobu Takahashi

2013-09-12T23:59:59.000Z

390

Nuclear aspects of the solar neutrino problem  

E-Print Network (OSTI)

The present status of the nuclear reaction rates determining the solar neutrino flux is discussed. This includes the reaction rates for the two branching ratios of the three pp-chains involving the reactions 3He(3He,2p)4He and 3He(4He,gamma)7Be for the first branching, and 7Be(e-,nu_e)7Li and 7Be(p,gamma)7B for the second branching. Mainly we will concentrate on the basic nuclear reaction p + p -> D + e+ + nu_e of the pp-chains. We use a relativistic field theory model of the deuteron to calculate the low-energy cross section for this reaction. The theoretical prediction of the cross section obtained is about 2.9 times largerthan given in the conventional potential approach. The consequences of this new reaction rate for the solar neutrino problem will be presented and discussed.

H. Oberhummer; A. N. Ivanov; N. I. Troitskaya; M. Faber

1997-05-26T23:59:59.000Z

391

Inverse problems in remote sensing. Progress report  

DOE Green Energy (OSTI)

Research was conducted to improve on presently used techniques for mapping soundspeed variations in the earth by monitoring the return from seismic probes. For small variations in the propagation speed, a linear integral equation was derived for that soundspeed variation. The integral equation is sufficiently general to characterize the placement of sources and receivers. The integral equation was solved in closed form for most of the source-receiver configurations of practical interest. The problem of dealing with the imperfect and incomplete data obtained in the real world was also confronted. The realistically constrained solution was implemented on the computer for a source-receiver configuration commonly used in seismic profiling. This latter project has dominated much of the research effort over the recent contract period.

Bleistein, N.

1977-05-16T23:59:59.000Z

392

Strategies in Symmetric Kolkata Restaurant Problem  

E-Print Network (OSTI)

The Quantum Kolkata restaurant problem is a multiple-choice version of the quantum minority game, where a set of n non-communicating players have to chose between one of m choices. A payoff is granted to the players that make a unique choice. It has previously been shown that shared entanglement and quantum operations can aid the players to coordinate their actions and acquire higher payoffs than is possible with classical randomization. In this paper the initial quantum state is expanded to a family of GHZ-type states and strategies are discussed in terms of possible final outcomes. It is shown that the players individually seek outcomes that maximize the collective good.

Puya Sharif; Hoshang Heydari

2012-12-30T23:59:59.000Z

393

R Symmetry and the Mu Problem  

E-Print Network (OSTI)

A natural origin for the mu and B parameters of weak scale supersymmetric theories is proposed, applicable to any supersymmetry breaking messenger scale between the weak and Planck scales. Although quite general, it requires supersymmetric interactions to respect an R symmetry with definite quantum numbers, and it requires some new scale of symmetry breaking. The required R symmetry distinguishes the Higgs boson from the sneutrino, preserves baryon number in operators of dimension four and five, and contains R parity so that the lightest superpartner is stable. This origin for mu works for a variety of mediation mechanisms, including gauge mediation, gaugino mediation, and boundary condition breaking of supersymmetry. In any of these mediation schemes, our mechanism leads to a real B parameter, and the supersymmetric CP problem is solved. This R symmetry may naturally arise from supersymmetric theories in higher dimensions.

Lawrence J. Hall; Yasunori Nomura; Aaron Pierce

2002-04-04T23:59:59.000Z

394

Current problems in plasma spray processing  

SciTech Connect

This detailed report summarizes 8 contributions from a thermal spray conference that was held in late 1991 at Brookhaven National Laboratory (Upton, Long Island, NY, USA). The subject of ``Plasma Spray Processing`` is presented under subject headings of Plasma-particle interactions, Deposit formation dynamics, Thermal properties of thermal barrier coatings, Mechanical properties of coatings, Feed stock materials, Porosity: An integrated approach, Manufacture of intermetallic coatings, and Synchrotron x-ray microtomographic methods for thermal spray materials. Each section is intended to present a concise statement of a specific practical and/or scientific problem, then describe current work that is being performed to investigate this area, and finally to suggest areas of research that may be fertile for future activity.

Berndt, C.C.; Brindley, W.; Goland, A.N.; Herman, H.; Houck, D.L.; Jones, K.; Miller, R.A.; Neiser, R.; Riggs, W.; Sampath, S.; Smith, M.; Spanne, P. [State Univ. of New York, Stony Brook, NY (United States). Thermal Spray Lab.

1991-12-31T23:59:59.000Z

395

Current problems in plasma spray processing  

SciTech Connect

This detailed report summarizes 8 contributions from a thermal spray conference that was held in late 1991 at Brookhaven National Laboratory (Upton, Long Island, NY, USA). The subject of Plasma Spray Processing'' is presented under subject headings of Plasma-particle interactions, Deposit formation dynamics, Thermal properties of thermal barrier coatings, Mechanical properties of coatings, Feed stock materials, Porosity: An integrated approach, Manufacture of intermetallic coatings, and Synchrotron x-ray microtomographic methods for thermal spray materials. Each section is intended to present a concise statement of a specific practical and/or scientific problem, then describe current work that is being performed to investigate this area, and finally to suggest areas of research that may be fertile for future activity.

Berndt, C.C.; Brindley, W.; Goland, A.N.; Herman, H.; Houck, D.L.; Jones, K.; Miller, R.A.; Neiser, R.; Riggs, W.; Sampath, S.; Smith, M.; Spanne, P. (State Univ. of New York, Stony Brook, NY (United States). Thermal Spray Lab.)

1991-01-01T23:59:59.000Z

396

Solar neutrinos and the solar composition problem  

E-Print Network (OSTI)

Standard solar models (SSM) are facing nowadays a new puzzle: the solar composition problem. New determinations of solar metal abundances lead SSM calculations to conflict with helioseismological measurements, showing discrepancies that extend from the convection zone to the solar core and can not be easily assigned to deficiencies in the modelling of the solar convection zone. We present updated solar neutrino fluxes and uncertainties for two SSM with high (old) and low (new) solar metallicity determinations. The uncertainties in iron and carbon abundances are the largest contribution to the uncertainties of the solar neutrino fluxes. The uncertainty on the ^14N+p -> ^15O+g rate is the largest of the non-composition uncertainties to the CNO neutrino fluxes. We propose an independent method to help identify which SSM is the correct one. Present neutrino data can not distinguish the solar neutrino predictions of both models but ongoing measurements can help to solve the puzzle.

Carlos Pena-Garay; Aldo Serenelli

2008-11-16T23:59:59.000Z

397

Solving the problems facing the electric utilities  

SciTech Connect

The dimensions of the current problems of attracting capital for utilities investment, of achieving more efficient utilization of capacity, of siting and construction of new power plants, and of utilities receiving a return on their investment large enough to enable them to continue their service to American consumers are examined. Federal actions that are being taken to help get the utilities out of their current state of malaise are described. The author concludes that positive electric power load management, through a system of cost-based pricing incentives and load controls, can achieve a balanced future both for total electricity usage and for peak demand. This would minimize the consumption of scarce fossil fuels in electricity generation, moderate the future need for construction of new capacity, improve utility revenues, and eventually reduce the need for rate increases to maintain utility viability. The FEA feels that is a reasonable, attainable objective for substantial electrification of the economy beyond 1985. (MCW)

Hill, J.A.

1975-01-01T23:59:59.000Z

398

Algae control problems and practices workshop  

SciTech Connect

Western water resources are continuously facing increased demand from industry and the public. Consequently, many of these resources are required to perform multiple tasks as they cycle through the ecosystem. Many plants and animals depend upon these resources for growth. Algae are one group of plants associated with nutrient and energy cycles in many aquatic ecosystems. Although most freshwater algae are microscopic in size, they are capable of dominating and proliferating to the extent that the value of the water resource for both industrial and domestic needs is compromised. There is a great diversity of aquatic environments and systems in which algae may be found, and there are many varieties of treatment and control techniques available to reduce the impacts of excessive growth. This workshop was organized to exchange information about these control problems and practices.

Pryfogle, P.A. [Idaho National Engineering Lab., Idaho Falls, ID (United States); Ghio, G. [Pacific Gas and Electric Co., San Francisco, CA (United States)

1996-09-01T23:59:59.000Z

399

Liquid hydrogen flow problems in Kiwi reactors  

DOE Green Energy (OSTI)

The Kiwi series of reactors were the first ones tested in the US Rover Program in the development of nuclear rocket engines for space propulsion. The early experiments with liquid hydrogen showed that parallel flow systems were prone to uneven flow distributions and violent fluctuations in pressure and flow that were capable of destroying a reactor core. Kiwi flow distribution problems were solved by using multiple feed lines into the nozzle cooling system and carefully balancing impedance among them. The violent pressure and flow fluctuations were eliminated after their cause was identified as resonance phenomena driven by the response to flow disturbances of heat transfer through a superheated hydrogen layer. Smooth flow operations were assured by rapidly bringing operating pressures beyond several times the critical pressure of hydrogen. After this initial rough start, solid core nuclear rocket engines successfully passed milestones of achievements during the remainder of the Rover program.

Thurston, R.S.

1992-09-01T23:59:59.000Z

400

Solar neutrinos and the solar composition problem  

E-Print Network (OSTI)

Standard solar models (SSM) are facing nowadays a new puzzle: the solar composition problem. New determinations of solar metal abundances lead SSM calculations to conflict with helioseismological measurements, showing discrepancies that extend from the convection zone to the solar core and can not be easily assigned to deficiencies in the modelling of the solar convection zone. We present updated solar neutrino fluxes and uncertainties for two SSM with high (old) and low (new) solar metallicity determinations. The uncertainties in iron and carbon abundances are the largest contribution to the uncertainties of the solar neutrino fluxes. The uncertainty on the ^14N+p -> ^15O+g rate is the largest of the non-composition uncertainties to the CNO neutrino fluxes. We propose an independent method to help identify which SSM is the correct one. Present neutrino data can not distinguish the solar neutrino predictions of both models but ongoing measurements can help to solve the puzzle.

Pena-Garay, Carlos

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

The Solar Neutrino Problem - An Update  

E-Print Network (OSTI)

The $^8$B solar neutrino flux as measured by Super-Kamiokande is consistent with the $^{37}$Ar production rate in $^{37}$Cl at Homestake. GALLEX and SAGE, continue to observe $^{71}$Ge production rates in $^{71}$Ga that are consistent with the minimal signal expected from the solar luminosity. The observed $^8$B solar neutrino flux is in good agreement with that predicted by the standard solar model of Dar and Shaviv with nuclear reaction rates that are supported by recent measurements of nuclear fusion cross sections at low energies. The measurements of Super-Kamiokande, SAGE and GALLEX suggest that the expected the pep, $^7$Be and NO solar neutrino fluxes are strongly suppressed. This can be explained by neutrino oscillations and the Mikheyev-Smirnov-Wolfenstein effect. Since neither a flavor change, nor a terrestrial variation, nor a spectral distortion of the $^8$B solar neutrino flux has been observed yet, the solar neutrino problem does not provide conclusive evidence for neutrino properties beyond the standard electroweak model. The deviations of the experimental results from those predicted by the standard solar models may reflect the approximate nature of of solar models and of our knowledge of nuclear reaction rates, radiation transport and particle diffusion in dense stellar plasmas. Only future observations of spectral distortions, or terrestrial modulation or flavor change of solar neutrinos in solar neutrino experiments, such as Super-Kamiokande, SNO, Borexino and HELLAZ will be able to establish that neutrino properties beyond the minimal standard electroweak model are responsible for the solar neutrino problem.

Arnon Dar; Giora Shaviv

1998-08-11T23:59:59.000Z

402

Heated muds solve squeezing-salt problems  

Science Conference Proceedings (OSTI)

Squeezing salts have been responsible for major drilling problems in many areas of the world for over half a century. In NAM's area of operations, they occur primarily in the Zechstein group of evaporites. They are responsible for problems such as stuck pipe during drilling and casing failure during both drilling and casing failure during both drilling and production, sometimes as much as 12 years after drilling. Since 1960, some US $170 million (at 1992 drilling costs) have been spent redrilling wells with failed casing strings. In 1991, NAM was associated with a Billiton project to drill 2 wells for the solution mining of magnesium and potassium salts. Gauge holes were a prerequisite to identify the objective salts by electric logging. Excellent results were achieved by drilling with a heated salt mud that had been saturated on surface to downhole conditions. The heating requirements for the Billiton project were modest, as the top of the squeezing salt occurred at approximately 1,500 m (4,920 ft), requiring a circulating temperature of 45 C (113 F) to achieve the necessary saturation level. However, in NAM's operations, the top of the squeezing salt generally occurs between 2.500 m and 3,000 m (8,200 ft and 9,850 ft), requiring temperatures on the order of 70 C (158 F). Despite the need for higher temperatures, the success of the Billiton project prompted NAM to introduce the heating system on a trial basis. To date eight wells have been drilled using the system, resulting in the drilling of a virtual gauge hole with successful cementations being achieved in each case.

Muecke, N.B. (Nederlandse Aardolie, Maatschappij (Netherlands))

1993-11-01T23:59:59.000Z

403

Int. Conf. on Computational Methods for Coupled Problems in Science and Engineering COUPLED PROBLEMS 2009  

E-Print Network (OSTI)

PROBLEM OF DIFFERENT THERMAL-HYDRAULIC MODELS ARISING IN TWO-PHASE FLOW CODES FOR NUCLEAR REACTORS A the components of a nuclear reactor. 1 INTRODUCTION We have been considering in a series of papers the coupling industrial motivation, such a coupling arises for the simulation of nuclear reactors when different two

Chalons, Christophe

404

Using Constraint Satisfaction Problem approach to solve human resource allocation problems in cooperative health services  

Science Conference Proceedings (OSTI)

In developing countries, the increasing utilization of health services, due to a great life expectancy, is followed by a reduction in incomes from the public health system and from private insurance companies, to the payment of medical procedures. Beyond ... Keywords: Backtracking search algorithm, Constraint Satisfaction Problem, Cooperative services, Heuristics, Human resource allocation

Cicero Ferreira Fernandes Costa Filho; Dayse Aparecida Rivera Rocha; Marly Guimarães Fernandes Costa; Wagner Coelho de Albuquerque Pereira

2012-01-01T23:59:59.000Z

405

On the inverse problem of entropy maximizations (Corresp.)  

Science Conference Proceedings (OSTI)

The inverse isoperimetric problem of the entropy functional is considered in this Correspondence. This problem can be stated as follows: Given a known probability density function (pdf), what prior constraints are needed in order for this pdf to be the ...

J. Noonan; N. Tzannes; T. Costello

1976-01-01T23:59:59.000Z

406

The Cumulus Parameterization Problem: Past, Present, and Future  

Science Conference Proceedings (OSTI)

A review of the cumulus parameterization problem is presented with an emphasis on its conceptual aspects covering the history of the underlying ideas, major problems existing at present, and possible directions and approaches for future climate ...

Akio Arakawa

2004-07-01T23:59:59.000Z

407

Trading off space for passes in graph streaming problems  

Science Conference Proceedings (OSTI)

Data stream processing has recently received increasing attention as a computational paradigm for dealing with massive data sets. While major progress has been achieved for several fundamental data sketching and statistics problems, there are many problems ...

Camil Demetrescu; Irene Finocchi; Andrea Ribichini

2006-01-01T23:59:59.000Z

408

Solving Radial Topology Constrained Problems with Evolutionary Algorithms  

Science Conference Proceedings (OSTI)

We report key algorithmic specific features involved in the evolutionary radial network problem solution. We focus on the dimensionality problem of large-scale networks and on the singularities of the radial topology search space. We (1) report the difficulties ...

P. M. S. Carvalho; L. A. F. M. Ferreira; L. M. F. Barruncho

1998-11-01T23:59:59.000Z

409

On the analytic solutions of the nonhomogeneous Blasius problem  

Science Conference Proceedings (OSTI)

In this article a totally analytic solution of the nonhomogeneous Blasius problem is obtained using the homotopy analysis method (HAM). This solution converges for 0= Keywords: 65-xx, Analytic solution, Blasius problem, Homotopy analysis method

Fathi M. Allan; Muhammed I. Syam

2005-10-01T23:59:59.000Z

410

A hybrid heuristic algorithm for the rectangular packing problem  

Science Conference Proceedings (OSTI)

A hybrid heuristic algorithm for the two-dimensional rectangular packing problem is presented. This algorithm is mainly based on divide-and-conquer and greedy strategies. The computational results on a class of benchmark problems have shown that the ...

Defu Zhang; Ansheng Deng; Yan Kang

2005-05-01T23:59:59.000Z

411

Applications of machine learning: matching problems to tasks and methods  

Science Conference Proceedings (OSTI)

The terminology of Machine Learning and Data Mining methods does not always allow a simple match between practical problems and methods. While some problems look similar from the user's point of view, but require different methods to be solved, some ...

Maarten Van Someren; Tanja Urban?i?

2005-12-01T23:59:59.000Z

412

Problems and methods for multiproduct inventory control in production conditions  

Science Conference Proceedings (OSTI)

Problems and methods for control of multiproduct inventory of finished product in the conditions of fixed and random demand and problems of in-process storage of components, billets, and accessories for assembling finished products are considered. Special ...

E. N. Khobotov

2011-12-01T23:59:59.000Z

413

Maintenance scheduling problems as benchmarks for constraint algorithms  

Science Conference Proceedings (OSTI)

The paper focuses on evaluating constraint satisfaction search algorithms on application based random problem instances. The application we use is a well‐studied problem in the electric power industry: optimally scheduling preventive ...

Daniel Frost; Rina Dechter

1999-09-01T23:59:59.000Z

414

Initial-Value Problems for Ordinary Differential Equations - CECM  

E-Print Network (OSTI)

... ' &. $. %. Initial-Value Problems for ODE's. Problem. Approximating the solution y(t) to the ODE y (t) = f(t, y), a ? t ? b, subject to an initial condition y(a) = ?.

415

Stability in the Stefan problem with surface tension (I)  

E-Print Network (OSTI)

We develop a high-order energy method to prove asymptotic stability of flat steady surfaces for the Stefan problem with surface tension - also known as the Stefan problem with Gibbs-Thomson correction.

Hadzic, Mahir

2008-01-01T23:59:59.000Z

416

Charney's Problem for Baroclinic Instability Applied to Barotropic Instability  

Science Conference Proceedings (OSTI)

It is suggested that barotropically unstable easterly jets may be approximated by broken line profiles. It is then possible to use solutions to the Charney problem for baroclinic instability in order to solve the barotropic problem. Results are ...

R. S. Lindzen; A. J. Rosenthal; B. Farrell

1983-04-01T23:59:59.000Z

417

Problem Statement: Energy Holes Energy Profiling & Proactive Reconfiguration: Overview  

E-Print Network (OSTI)

Problem Statement: Energy Holes Energy Profiling & Proactive Reconfiguration: Overview Holes the Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks.", MASS 2006 [2 · Inherent nodes redundancy Spatially correlated energy consumption Energy holes are common in WSN Sink

Suri, Neeraj

418

A discrete BGK approximation for strongly degenerate parabolic problems  

E-Print Network (OSTI)

A discrete BGK approximation for strongly degenerate parabolic problems with boundary conditions F strongly degenerate hyperbolic--parabolic equations with initial boundary condition. We prove a priori -- strongly degenerate parabolic equations -- singular perturbation problems -- BGK models 1 Introduction

419

On Massively Parallel Algorithm for Nonlinear Stochastic Network Problems  

E-Print Network (OSTI)

We develop an algorithm for solving nonlinear two-stage stochastic problems with network recourse. The algorithm is based on the framework of row-action methods. The problem is formulated by replicating the first-stage ...

Nielson, Soren S.

420

Inverse Optimization: An Application to the Capacitated Plant Location Problem  

E-Print Network (OSTI)

Inverse optimization refers to the fact that each time a Lagrangean derived from a given mathematical programming problem is solved, it produces an optimal solution to some problem with a different right hand side. This ...

Bitran, Gabriel R.

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

OPEC or a basic problem in source networks  

Science Conference Proceedings (OSTI)

The problem of determining the achievable rate region for an arbitrary source network with one "helper" is still unsolved. Csiszár and the author have shown that it reduces to the one-parameter entropy characterization problem (OPEC), treated in ...

J. Korner

1984-01-01T23:59:59.000Z

422

A multiscale framework for Bayesian inference in elliptic problems  

E-Print Network (OSTI)

The Bayesian approach to inference problems provides a systematic way of updating prior knowledge with data. A likelihood function involving a forward model of the problem is used to incorporate data into a posterior ...

Parno, Matthew David

2011-01-01T23:59:59.000Z

423

The twin bilinear diffie-Hellman inversion problem and applications  

Science Conference Proceedings (OSTI)

We propose a new computational problem and call it the twin bilinear Diffie-Hellman inversion (BDHI) problem. Inspired by the technique proposed by Cash, Kiltz and Shoup, we have developed a new trapdoor test which enables us to prove that the twin BDHI ... Keywords: bilinear diffie-Hellman inversion problem, identity-based encryption, identity-based key encapsulation, trapdoor test, twin bilinear diffie-Hellman inversion problem

Yu Chen; Liqun Chen

2010-12-01T23:59:59.000Z

424

LITTLEWOOD TYPE PROBLEMS ON SUB ARCS Peter ... - CECM  

E-Print Network (OSTI)

LITTLEWOOD TYPE. PROBLEMS ON SUB ARCS. Peter Borwein. Simon Fraser University Centre for. Constructive and Experimental. Mathematics.

425

Banks-Financial-Insurance - Electronic Message Center Problems  

Science Conference Proceedings (OSTI)

This power quality (PQ) case study presents the investigation of electronic message center problems at an investment firm.

2003-12-31T23:59:59.000Z

426

Approximate solution of a Cauchy problem for the Helmholtz equation  

E-Print Network (OSTI)

of radiation (e.g. a light emitting diode) is a problem of frequent occurrence. As a rule, experimental

427

Optimal Control of Free Boundary Problems with Surface ...  

Science Conference Proceedings (OSTI)

... Up, Optimal Control of Free Boundary Problems with Surface Tension Effects. Harbir Antil Department of Mathematical Sciences ...

2013-11-18T23:59:59.000Z

428

Modeling Direct and Inverse Problems in Ferritic Heat-Exchanger ...  

Science Conference Proceedings (OSTI)

Symposium, Data Analytics for Materials Science and Manufacturing. Presentation Title, Modeling Direct and Inverse Problems in Ferritic Heat- Exchanger Tubes.

429

An effective heuristic algorithm for the maximum satisfiability problem  

Science Conference Proceedings (OSTI)

Stochastic local search algorithms (SLS) have been increasingly applied to approximate solutions of the weighted maximum satisfiability problem (MAXSAT), a model for solutions of major problems in AI and combinatorial optimization. While MAXSAT instances ... Keywords: Bose-Einstein distribution, Extremal Optimization, Heuristic search, MAXSAT, Problem solving

Mohamed El Menaï; Mohamed Batouche

2006-06-01T23:59:59.000Z

430

Solving Satisfiability Problems by the Ground-State Quantum Computer  

E-Print Network (OSTI)

A quantum algorithm is proposed to solve the Satisfiability problems by the ground-state quantum computer. The scale of the energy gap of the ground-state quantum computer is analyzed for the 3-bit Exact Cover problem. The time cost of this algorithm on the general SAT problems is discussed.

Wenjin Mao

2005-06-23T23:59:59.000Z

431

SEARCH AND WITNESS PROBLEMS IN GROUP THEORY VLADIMIR SHPILRAIN  

E-Print Network (OSTI)

SEARCH AND WITNESS PROBLEMS IN GROUP THEORY VLADIMIR SHPILRAIN Abstract. Decision problems with the property P, find a proof of the fact that O indeed has the property P. On the third hand(?!), search a conjuga- tor. In this survey our focus is on various search problems in group theory, including the word

Shpilrain, Vladimir

432

A cutting plane algorithm for the capacitated facility location problem  

Science Conference Proceedings (OSTI)

The Capacitated Facility Location Problem (CFLP) is to locate a set of facilities with capacity constraints, to satisfy at the minimum cost the order-demands of a set of clients. A multi-source version of the problem is considered ... Keywords: Capacitated facility location problem, Facet-enumeration, Mixed dicut inequalities

Pasquale Avella; Maurizio Boccia

2009-05-01T23:59:59.000Z

433

A New Duality Approach to Solving Concave Vector Maximization Problems  

Science Conference Proceedings (OSTI)

We introduce a special class of monotonic functions with the help of support functions and polar sets, and use it to construct a scalarized problem and its dual for a vector optimization problem. The dual construction allows us to develop a new method ... Keywords: Duality, Multiobjective problem, Polar set, Weak efficient solution

Luc Dinh The; Phong Thai Quynh; Volle Michel

2006-11-01T23:59:59.000Z

434

CLASSICAL MECHANICS: THE THREE-BODY PROBLEM ZI CHONG KAO  

E-Print Network (OSTI)

CLASSICAL MECHANICS: THE THREE-BODY PROBLEM ZI CHONG KAO Abstract. The Three-Body Problem is one of the oldest unsolved problems of classical mechanics. It arose as a natural extension of the Two-Body Prob of numerous techniques in classical mechan- ics as well as dynamical systems. Understanding the Three

May, J. Peter

435

Plowing with precedence: A variant of the windy postman problem  

Science Conference Proceedings (OSTI)

In winter, a common problem is to determine the route that a snowplow should take in order to minimize the distance traveled. We propose a variant of this arc routing problem that is motivated by the fact that deadhead travel over streets that have already ... Keywords: Arc routing, Precedence, Snow plowing, Windy postman problem

Benjamin Dussault; Bruce Golden; Chris GroëR; Edward Wasil

2013-04-01T23:59:59.000Z

436

Solving satisfiability problems by the ground-state quantum computer  

Science Conference Proceedings (OSTI)

A quantum algorithm is proposed to solve the satisfiability (SAT) problems by the ground-state quantum computer. The scale of the energy gap of the ground-state quantum computer is analyzed for the 3-bit exact cover problem. The time cost of this algorithm on the general SAT problems is discussed.

Mao Wenjin [Department of Physics and Astronomy, Stony Brook University, Stony Brook, New York 11794, USA and 20 Hearthstone Drive, Edison, New Jersey 08820 (United States)

2005-11-15T23:59:59.000Z

437

Problem structuring methods in military command and control  

Science Conference Proceedings (OSTI)

In an authorized military hierarchy organization, the procedure of problem solving must be co-ordinated with the tasks of planning, directing, and controlling. In most combat situations, problem solving knowledge is acquired from an expert (commander) ... Keywords: Knowledge management, Knowledge-based system architecture, Military command and control, Problem structuring methods, Soft operational research

Shu-Hsien Liao

2008-10-01T23:59:59.000Z

438

Investigation of Flue Gas Desulfurization Chemical Process Problems  

Science Conference Proceedings (OSTI)

An understanding of flue gas desulfurization process chemistry is crucial in troubleshooting problems in operating FGD systems. This report discusses a variety of problems and solutions associated with process chemistry for 25 different wet FGD systems, including lime/limestone and double alkali processes. Among the problems addressed are SO2 removal, mist eliminator scaling, poor solids dewatering, and water management.

1990-09-10T23:59:59.000Z

439

Linear and nonlinear degenerate boundary value problems in Besov spaces  

Science Conference Proceedings (OSTI)

The boundary value problems for linear and nonlinear degenerate differential-operator equations in Banach-valued Besov spaces are studied. Several conditions for the separability of linear elliptic problems are given. Moreover, the positivity and the ... Keywords: Banach-valued Besov spaces, Boundary value problems, Differential-operator equations, Interpolation of Banach spaces, Operator-valued multipliers

Veli B. Shakhmurov; Ravi P. Agarwal

2009-03-01T23:59:59.000Z

440

Inverse problem of time-dependent heat sources numerical reconstruction  

Science Conference Proceedings (OSTI)

Abstract: This work studies the inverse problem of reconstructing a time-dependent heat source in the heat conduction equation using the temperature measurement specified at an internal point. Problems of this type have important applications in several ... Keywords: 35R30, 49J20, Green function, Heat source, Inverse problem, Landweber iteration, Numerical results

Liu Yang; Mehdi Dehghan; Jian-Ning Yu; Guan-Wei Luo

2011-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Maximal covering location problem (MCLP) with fuzzy travel times  

Science Conference Proceedings (OSTI)

This paper presents a fuzzy maximal covering location problem (FMCLP) in which travel time between any pair of nodes is considered to be a fuzzy variable. A fuzzy expected value maximization model is designed for such a problem. Moreover, a hybrid algorithm ... Keywords: Credibility theory, Facility location, Fuzzy travel times, Maximal covering location problem (MCLP), Simulation

Soheil Davari; Mohammad Hossein Fazel Zarandi; Ahmad Hemmati

2011-11-01T23:59:59.000Z

442

Fuzzy expert system for solving lost circulation problem  

Science Conference Proceedings (OSTI)

Lost circulation is the most common problem encountered while drilling oil wells. This paper describes a distributed fuzzy expert system, called Smart-Drill, aimed in helping petroleum engineers to diagnose and solve lost circulation problems. To represent ... Keywords: Finite ordinal scales, Fuzzy algebra, Fuzzy expert system, Knowledge representation, Lost circulation problem, Multi-sets, Oil well drilling

Leonid Sheremetov; Ildar Batyrshin; Denis Filatov; Jorge Martinez; Hector Rodriguez

2008-01-01T23:59:59.000Z

443

Comparing Metaheuristic Algorithms for Sonet Network Design Problems  

Science Conference Proceedings (OSTI)

This paper considers two problems that arise in the design of optical telecommunication networks when a ring-based topology is adopted, namely the SONET Ring Assignment Problem and the Intraring Synchronous Optical Network Design Problem. We show that ... Keywords: SONET ring, graph partitioning, metaheuristics, optical networks

Roberto Aringhieri; Mauro Dell'Amico

2005-01-01T23:59:59.000Z

444

Neutron Stars and the Cosmological Constant Problem  

E-Print Network (OSTI)

The gravitational aether theory is a modification of general relativity that decouples vacuum energy from gravity, and thus can potentially address the cosmological constant problem. The classical theory is distinguishable from general relativity only in the presence of relativistic pressure (or vorticity). Since the interior of neutron stars has high pressure and as their mass and radius can be measured observationally, they are the perfect laboratory for testing the validity of the aether theory. In this paper, we solve the equations of stellar structure for the gravitational aether theory and find the predicted mass-radius relation of non-rotating neutron stars using two different realistic proposals for the equation of state of nuclear matter. We find that the maximum neutron star mass predicted by the aether theory is 12% - 16% less than the maximum mass predicted by general relativity assuming these two equations of state. We also show that the effect of aether is similar to modifying the equation of state in general relativity. The effective pressure of the neutron star given by the aether theory at a fiducial density differs from the values given by the two nuclear equations of state to an extent that can be constrained using future gravitational wave observations of neutron stars in compact systems. This is a promising way to test the aether theory if further progress is made in constraining the equation of state of nuclear matter in densities above the nuclear saturation density.

Farbod Kamiab; Niayesh Afshordi

2011-04-29T23:59:59.000Z

445

Quantum mechanics problems in observer's mathematics  

Science Conference Proceedings (OSTI)

This work considers the ontology, guiding equation, Schrodinger's equation, relation to the Born Rule, the conditional wave function of a subsystem in a setting of arithmetic, algebra and topology provided by Observer's Mathematics (see www.mathrelativity.com). Observer's Mathematics creates new arithmetic, algebra, geometry, topology, analysis and logic which do not contain the concept of continuum, but locally coincide with the standard fields. Certain results and communications pertaining to solutions of these problems are provided. In particular, we prove the following theorems: Theorem I (Two-slit interference). Let {Psi}{sub 1} be a wave from slit 1, {Psi}{sub 2} - from slit 2, and {Psi} = {Psi}{sub 1}+{Psi}{sub 2}. Then the probability of {Psi} being a wave equals to 0.5. Theorem II (k-bodies solution). For W{sub n} from m-observer point of view with m>log{sub 10}((2 Multiplication-Sign 10{sup 2n}-1){sup 2k}+1), the probability of standard expression of Hamiltonian variation is less than 1 and depends on n,m,k.

Khots, Boris; Khots, Dmitriy [Compressor Controls Corp, Des Moines, Iowa (United States); iMath Consulting LLC, Omaha, Nebraska (United States)

2012-11-06T23:59:59.000Z

446

Coefficient adaptive triangulation for strongly anisotropic problems  

Science Conference Proceedings (OSTI)

Second order elliptic partial differential equations arise in many important applications, including flow through porous media, heat conduction, the distribution of electrical or magnetic potential. The prototype is the Laplace problem, which in discrete form produces a coefficient matrix that is relatively easy to solve in a regular domain. However, the presence of anisotropy produces a matrix whose condition number is increased, making the resulting linear system more difficult to solve. In this work, we take the anisotropy into account in the discretization by mapping each anisotropic region into a ``stretched`` coordinate space in which the anisotropy is removed. The region is then uniformly triangulated, and the resulting triangulation mapped back to the original space. The effect is to generate long slender triangles that are oriented in the direction of ``preferred flow.`` Slender triangles are generally regarded as numerically undesirable since they tend to cause poor conditioning; however, our triangulation has the effect of producing effective isotropy, thus improving the condition number of the resulting coefficient matrix.

D`Azevedo, E.F.; Romine, C.H.; Donato, J.M.

1996-01-01T23:59:59.000Z

447

Statistics of the Kolkata Paise Restaurant Problem  

E-Print Network (OSTI)

We study the dynamics of a few stochastic learning strategies for the 'Kolkata Paise Restaurant' problem, where N agents choose among N equally priced but differently ranked restaurants every evening such that each agent tries get to dinner in the best restaurant (each serving only one customer and the rest arriving there going without dinner that evening). We consider the learning strategies to be similar for all the agents and assume that each follow the same probabilistic or stochastic strategy dependent on the information of the past successes in the game. We show that some 'naive' strategies lead to much better utilization of the services than some relatively 'smarter' strategies. We also show that the service utilization fraction as high as 0.80 can result for a stochastic strategy, where each agent sticks to his past choice (independent of success achieved or not; with probability decreasing inversely in the past crowd size). The numerical results for utilization fraction of the services in some limiti...

Ghosh, Asim; Mitra, Manipushpak; Chakrabarti, Bikas K

2010-01-01T23:59:59.000Z

448

An Obstacle-avoiding Minimum Variation B-spline Problem  

E-Print Network (OSTI)

We study the problem of computing a planar curve, restricted to lie between two given polygonal chains, such that the integral of the square of arc-length derivative of curvature along the curve is minimized. We introduce the Minimum Variation B-spline problem which is a linearly constrained optimization problem over curves defined by Bspline functions only. An empirical investigation indicates that this problem has one unique solution among all uniform quartic B-spline functions. Furthermore, we prove that, for any B-spline function, the convexity properties of the problem are preserved subject to a scaling and translation of the knot sequence defining the B-spline. 1

Tomas Berglund; Inge Söderkvist

2003-01-01T23:59:59.000Z

449

Geometric bipartitioning problem and its applications to VLSI  

Science Conference Proceedings (OSTI)

We identify a new problem called geometric bipartitioning that is useful in VLSI layout design. Given a floorplan with rectilinear modules, the problem is to partition the floor by a staircase (monotone increasing) channel from one corner of the floor ... Keywords: NP-complete, VLSI, absolute value, branch-and-bound, circuit layout CAD, classical graph bisection problem, computational complexity, designated nodes, edge weights, floorplan, geometric bipartitioning problem, geometry, graph theory, heuristic algorithm, hierarchical decomposition, integer edge weights, layout design, monotone increasing, network routing, rectilinear modules, routing, search problems, staircase, weighted permutation graph

P. S. Dasgupta; A. K. Sen; S. C. Nandy; B. B. Bhattacharya

1996-01-01T23:59:59.000Z

450

On a solvability of hydro-mechanical problem based on contact problem with visco-plastic friction in Bingham rheology  

Science Conference Proceedings (OSTI)

This paper deals with the solvability and numerical solution of contact problem with a local visco-plastic friction in the visco-plastic Bingham rheology. The model problem discussed represents a simple hydro-mechanical model of the global project on ... Keywords: Bingham rheology, Contact problems with friction, FEM, Geomechanics, Hydromechanics, Variational inequalities, Visco-plasticity

Ji?í Nedoma; Luboš Tomášek

2008-08-01T23:59:59.000Z

451

Injection, injectivity and injectability in geothermal operations: problems and possible solutions. Phase I. Definition of the problems  

DOE Green Energy (OSTI)

The following topics are covered: thermodynamic instability of brine, injectivity loss during regular production and injection operations, injectivity loss caused by measures other than regular operations, heat mining and associated reservoir problems in reinjection, pressure maintenance through imported make-up water, suggested solutions to injection problems, and suggested solutions to injection problems: remedial and stimulation measures. (MHR)

Vetter, O.J.; Crichlow, H.B.

1979-02-14T23:59:59.000Z

452

SUPERMASSIVE BLACK HOLE BINARY EVOLUTION IN AXISYMMETRIC GALAXIES: THE FINAL PARSEC PROBLEM IS NOT A PROBLEM  

SciTech Connect

During a galaxy merger, the supermassive black hole (SMBH) in each galaxy is thought to sink to the center of the potential and form an SMBH binary; this binary can eject stars via three-body scattering, bringing the SMBHs ever closer. In a static spherical galaxy model, the binary stalls at a separation of about a parsec after ejecting all the stars in its loss cone-this is the well-known final parsec problem. Earlier work has shown that the centrophilic orbits in triaxial galaxy models are key in refilling the loss cone at a high enough rate to prevent the black holes from stalling. However, the evolution of binary SMBHs has never been explored in axisymmetric galaxies, so it is not clear if the final parsec problem persists in these systems. Here we use a suite of direct N-body simulations to follow SMBH binary evolution in galaxy models with a range of ellipticity. For the first time, we show that mere axisymmetry can solve the final parsec problem; we find the SMBH evolution is independent of N for an axis ratio of c/a = 0.8, and that the SMBH binary separation reaches the gravitational radiation regime for c/a = 0.75.

Khan, Fazeel Mahmood [Department of Space Science, Institute of Space Technology, P.O. Box 2750 Islamabad (Pakistan); Holley-Bockelmann, Kelly [Department of Physics and Astronomy, Vanderbilt University, Nashville, TN 37235 (United States); Berczik, Peter; Just, Andreas, E-mail: khan@ari.uni-heidelberg.de, E-mail: just@ari.uni-heidelberg.de, E-mail: berczik@ari.uni-heidelberg.de, E-mail: k.holley@vanderbilt.edu [Astronomisches Rechen-Institut, Zentrum fuer Astronomie, University of Heidelberg, Moenchhof-Strasse 12-14, D-69120 Heidelberg (Germany)

2013-08-20T23:59:59.000Z

453

Geothermal resources in California: potentials and problems  

DOE Green Energy (OSTI)

The technology, cost and potential of geothermal resources in California are examined. The production of power from dry stream fields is expanding in Northern California, at The Geysers, at costs that compare favorably with alternate means of generation. The possibility exists that economic production of power can be started in the Imperial Valley, but numerous issues remain to be resolved; chief among them is the demonstration that commercially valuable aquifers indeed exist. The production of demineralized water from the geothermal fluids of the Imperial Valley depends, among other things, upon the identification of other sources of water for power plant cooling, or for reservoir reinjection, should it be necessary to avoid subsidence. It would appear that water production, without the income-producing capability of associated power generation, is not economically reasonable. The pace of geothermal development at the Geysers could probably be accelerated perhaps offering the opportunity for maintenance of adequate generating reserves should their nuclear construction program be delayed. The unknown factors and risks involved seem to preclude the Imperial Valley resource from being immediately effective in improving the power generation picture in Southern California. However, in the next decade, geothermal power could provide a useful energy increment, perhaps 10 percent of peak load. Associated water production could offer relief for the Imperial Valley in its predicted water quality problem. The pace of public and private development in the Imperial Valley seems incommensurately slow in relation to the potential of the resource. Geothermal power and water production is not intrinsically pollution-free, but appropriate environmental protection is possible.

Goldsmith, M.

1971-12-01T23:59:59.000Z

454

A class of ejecta transport test problems  

Science Conference Proceedings (OSTI)

Hydro code implementations of ejecta dynamics at shocked interfaces presume a source distribution function ofparticulate masses and velocities, f{sub 0}(m, v;t). Some of the properties of this source distribution function have been determined from extensive Taylor and supported wave experiments on shock loaded Sn interfaces of varying surface and subsurface morphology. Such experiments measure the mass moment of f{sub o} under vacuum conditions assuming weak particle-particle interaction and, usually, fully inelastic capture by piezo-electric diagnostic probes. Recently, planar Sn experiments in He, Ar, and Kr gas atmospheres have been carried out to provide transport data both for machined surfaces and for coated surfaces. A hydro code model of ejecta transport usually specifies a criterion for the instantaneous temporal appearance of ejecta with source distribution f{sub 0}(m, v;t{sub 0}). Under the further assumption of separability, f{sub 0}(m,v;t{sub 0}) = f{sub 1}(m)f{sub 2}(v), the motion of particles under the influence of gas dynamic forces is calculated. For the situation of non-interacting particulates, interacting with a gas via drag forces, with the assumption of separability and simplified approximations to the Reynolds number dependence of the drag coefficient, the dynamical equation for the time evolution of the distribution function, f(r,v,m;t), can be resolved as a one-dimensional integral which can be compared to a direct hydro simulation as a test problem. Such solutions can also be used for preliminary analysis of experimental data. We report solutions for several shape dependent drag coefficients and analyze the results of recent planar dsh experiments in Ar and Xe.

Hammerberg, James E [Los Alamos National Laboratory; Buttler, William T [Los Alamos National Laboratory; Oro, David M [Los Alamos National Laboratory; Rousculp, Christopher L [Los Alamos National Laboratory; Morris, Christopher [Los Alamos National Laboratory; Mariam, Fesseha G [Los Alamos National Laboratory

2011-01-31T23:59:59.000Z

455

Problems of Silica Scaling at Cerro Prieto Geothrmal Power Station  

DOE Green Energy (OSTI)

In the Cerro Prieto Geothermal field, where the predominant fluid in the reservoir is water, they have had problems with silica and other deposits in the first exploration wells as well as in production wells. Scaling problems have also been encountered in silencers, cyclone separators, drains, water pipes, etc. Some scale problems have also been encountered in the turbine blades of the geothermal electric plant. Most of these problems have been solved by corrective procedures which, in some cases, have turned into routine. Scale deposition is a problem that certainly diminishes the useful capacity of geothermal fluids with water predominance, but it does not actually endanger the installations, since this problem is under control.

Mercado, S.; Guiza, J.

1976-01-01T23:59:59.000Z

456

Using dual decomposition for solving problems involving data uncertainty |  

NLE Websites -- All DOE Office Websites (Extended Search)

dual decomposition for solving problems involving data uncertainty dual decomposition for solving problems involving data uncertainty August 14, 2013 Tweet EmailPrint Many applications mdash; energy, routing, scheduling, and production planning, for example mdash; involve problems in which some or all of the data may not be known when decisions under uncertainty must be made. In such cases, approximations with stochastic mixed-integer programming models are often used. Two approaches have been suggested to address such problems: dual decomposition (DD) and branch-and-price (BP). Both approaches divide the problem into two or more subproblems, together with linear constraints that enforce agreement between solutions to the different problems through a series of iterations. Unfortunately, both approaches also suffer from lack

457

Solving chemical equilibrium problems using nonlinear optimization. [NEWT  

DOE Green Energy (OSTI)

This report describes a program that will solve general chemical equilibrium problems of the type found in synthetic fossil-fuel plants. The program described here will also solve chemical equilibrium problems that are associated with unit operations that are found in refineries and ammonia plants. The most common problem encountered involves finding the equilibrium composition of a mixture, given feed composition, and the desired equilibrium temperature and pressure. Another less common problem requires the computation of the equilibrium temperature as well as the equilibrium composition for an adiabatic or other nonisothermal reaction. A constrained multidimensional Newton's method is used to solve the common isothermal equilibrium problem. The nonisothermal problem is solved by nesting the same multidimensional Newton's method inside a one-dimensional Newton's method that iterates on temperature. The program allows a gas phase with up to 20 reacting gases and the possibility of one solid phase (graphitic carbon).

Parkinson, W.J.; Sanderson, J.G.

1984-06-01T23:59:59.000Z

458

A Conjecture Related to Sylvester's Problem Author(s ... - CECM  

E-Print Network (OSTI)

http://www.jstor.org. A Conjecture Related to Sylvester's Problem. Author(s): Peter Borwein and Michael Edelstein. Source: The American Mathematical Monthly, ...

459

Complexity of the positive semidefinite matrix completion problem ...  

E-Print Network (OSTI)

This follows directly from Lemma 2.2 combined with Theorem. 3.2: By Lemma 2.2 , ..... The real positive defi- nite completion problem: cycle completability.

460

New Benchmark Instances for the Steiner Problem in Graphs  

E-Print Network (OSTI)

Sep 26, 2001 ... New Benchmark Instances for the Steiner Problem in Graphs. Isabel Rosseti ( rosseti ***at*** inf.puc-rio.br) Marcus Poggi de Aragão (poggi ...

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Revised Benchmark Problem for modeling of metal flow and metal ...  

Science Conference Proceedings (OSTI)

The literature is scarce when it comes to benchmark problems for MHD flow in a cell and those cases which are available often suffer from insufficient level of ...

462

Exact Algorithms for Arc and Node Routing Problems  

E-Print Network (OSTI)

Oct 8, 2013 ... For both problems, there are a set of customers spread over a given graph, ... the total number of labels used during the dynamic programming.

463

Optimization Online - Solving the integrated airline recovery problem ...  

E-Print Network (OSTI)

Column-and-row generation achieves an improvement in solution runtimes by reducing the problem size and thereby achieving ... Entry Submitted: 12/03/2012

464

A class of moving boundary problems arising in drying processes  

Science Conference Proceedings (OSTI)

Keywords: drying processes, heat and mass transfer, moving boundary value problems, multiphase flows in porous media, quasilinear parabolic systems, wellposedness of solutions

M. Ilic

1992-10-01T23:59:59.000Z

465

On DC. optimization algorithms for solving minmax flow problems ?  

E-Print Network (OSTI)

Jun 17, 2011 ... Email: ldmuu@math.ac.vn. Le Quang Thuy ..... programming and DCA revisited with DC models of real world nonconvex optimization problems ...

466

On DC. optimization algorithms for solving minmax flow problems  

E-Print Network (OSTI)

Jun 16, 2011 ... math.ac.vn) ... (Difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems, ...

467

Solving large scale polynomial convex problems on \\ell_1/nuclear ...  

E-Print Network (OSTI)

Oct 24, 2012 ... Solving large scale polynomial convex problems on \\ell_1/nuclear norm balls by randomized first-order algorithms. Aharon Ben-Tal (abental ...

468

Partially affine control problems: second order conditions and a well ...  

E-Print Network (OSTI)

Oct 17, 2011 ... Partially affine control problems: second order conditions and a well-posed shooting algorithm. M. Soledad Aronna(aronna ***at*** ...

469

Optimization problems on the rank and inertia of the Hermitian ...  

E-Print Network (OSTI)

and in the investigation of Hermitian parts of complex matrices. The problem ... H stand for the sets of all m × n complex matrices and all ...... Conf., Albuquerque,.

470

Matrix-free Interior Point Method for Compressed Sensing Problems  

E-Print Network (OSTI)

Aug 27, 2012 ... Matrix-free Interior Point Method for Compressed Sensing Problems. Kimon Fountoulakis (K.Fountoulakis ***at*** sms.ed.ac.uk) Jacek Gondzio ...

471

Fast Local Search for the Maximum Independent Set Problem  

E-Print Network (OSTI)

Jan 29, 2008 ... Fast Local Search for the Maximum Independent Set Problem. Diogo V. Andrade (diogo ***at*** google.com) Mauricio G. C. Resende (mgcr ...

472

The History of the Problem - CECM - Simon Fraser University  

E-Print Network (OSTI)

The History of the Problem. [Annotate] .... [an error occurred while processing this directive] Let us return to the history of projective planes. Now that we have a ...

473

Solving the Prize-collecting Rural Postman Problem  

E-Print Network (OSTI)

recycling bins by a private entity. Additionally, problems of this type might appear as subprob- lems in the pricing stage when addressing capacitated ERPs by ...

474

Control problems with mixed constraints and application to an ...  

E-Print Network (OSTI)

problem where a utility type function is to be minimized. By an adapted penalization ..... the capital with constant rate a. Finally, the evolution of the capital ...

475

Problem-solving in technology education as an approach to ...  

Science Conference Proceedings (OSTI)

Nov 6, 2008 ... which was the statement of the problem; (2) a goal state, which was the .... financial and curriculum outcomes (Department of the Environment ...

476

ANALYSIS OF MILP TECHNIQUES FOR THE POOLING PROBLEM ...  

E-Print Network (OSTI)

Some variants of pooling problem have cost of per unit flow in arcs, profit per ...... and Analytics in the Oil and Gas Industry, International Series in Operations Re-.

477

Optimization Online - Modeling the Mobile Oil Recovery Problem as ...  

E-Print Network (OSTI)

Feb 6, 2009 ... The goal of the MOR optimization Problem (MORP) is to optimize both the oil extraction and the travel costs. We describe several formulations ...

478

Benchmark problems in which equality plays the major role  

SciTech Connect

We have recently heard rumors that researchers are again studying paramodulation [Wos87] in the context of strategy for its control. In part to facilitate such research, and in part to provide test problems for evaluating other approaches to equality-oriented reasoning, we offer in this article a set of benchmark problems in which equality plays the dominant role. The test problems are taken from group theory, Robbins algebra, combinatory logic, and other areas. For each problem, we include appropriate clauses and comment as to its status with regard to provability by an unaided automated reasoning program.

Lusk, E.; Wos, L.

1992-05-01T23:59:59.000Z

479

Benchmark problems in which equality plays the major role  

SciTech Connect

We have recently heard rumors that researchers are again studying paramodulation (Wos87) in the context of strategy for its control. In part to facilitate such research, and in part to provide test problems for evaluating other approaches to equality-oriented reasoning, we offer in this article a set of benchmark problems in which equality plays the dominant role. The test problems are taken from group theory, Robbins algebra, combinatory logic, and other areas. For each problem, we include appropriate clauses and comment as to its status with regard to provability by an unaided automated reasoning program.

Lusk, E.; Wos, L.

1992-01-01T23:59:59.000Z

480

Transmission Problem Between Two Herschel-Bulkley Fluids  

E-Print Network (OSTI)

The paper is devoted to the study of transmission problem between two Herschel-Bulkley fluids with different viscosities, yield limits and power law index.

Farid Messelmi

2011-02-28T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem ibm" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Efficient algorithms for bipartite matching problems with preferences.  

E-Print Network (OSTI)

??Matching problems involve a set of participants, where each participant has a capacity and a subset of the participants rank a subset of the others… (more)

Sng, Colin Thiam Soon

2008-01-01T23:59:59.000Z

482

Flexible Solutions to Maritime Inventory Routing Problems with ...  

E-Print Network (OSTI)

simulation study for a liquefied natural gas (LNG) ship routing problem with uncertainty in sailing time and production rate is presented in Halvorsen-Weare et al.

483

ROCK INSTRUMENTATION PROBLEMS EXPERIENCED DURING IN-SITU HEATER TESTS  

E-Print Network (OSTI)

and R. Haught, Instrumentation evaluation, calibration, and27 - 30,1979. ROCK INSTRUMENTATION PROBLEMS EXPERIENCEDdiscussed here,l INSTRUMENTATION AND DATA ACQUISITION SYSTEM

Binnall, E.

2012-01-01T23:59:59.000Z

484

Traveling Salesman Problem Formulations with $N \\log N$ Number ...  

E-Print Network (OSTI)

Feb 13, 2013 ... Traveling Salesman Problem Formulations with $N \\log N$ Number of Binary Variables. Thomas A. Pogiatzis(tp309 ***at*** cam.ac.uk)

485

A Riemann-Hilbert problem for skew-orthogonal polynomials  

E-Print Network (OSTI)

We find a local $(d+1) \\times (d+1)$ Riemann-Hilbert problem characterizing the skew-orthogonal polynomials associated to the partition function of the Gaussian Orthogonal Ensemble of random matrices with a potential function of degree $d$. Our Riemann-Hilbert problem is similar to a local $d \\times d$ Riemann-Hilbert problem found by Kuijlaars and McLaughlin characterizing the bi-orthogonal polynomials. This gives more motivation for finding methods to compute asymptotics of high order Riemann-Hilbert problems, and brings us closer to finding asymptotics of the skew-orthogonal polynomials.

V. U. Pierce

2006-10-19T23:59:59.000Z

486

A parallel between two classes of pricing problems in transportation ...  

E-Print Network (OSTI)

Jan 5, 2009 ... A parallel between two classes of pricing problems in transportation and economics. Géraldine Heilporn (Geraldine.Heilporn ***at*** hec.ca)

487

1 Relaxations of combinatorial problems via association schemes  

E-Print Network (OSTI)

1.6.1 Relation to a relaxation of the quadratic assignment problem ..... that the matrix W belongs to a coherent configuration with d = 12 relations, ... community.

488

Matrix-free Interior Point Method for Compressed Sensing Problems  

E-Print Network (OSTI)

ages. The FPC AS CG solves problem (5a). The code of FPC AS CG package ...... Uncertainty principles and ideal atomic decomposition. IEEE Trans. Inf. Theory ...

489

Cosmic age problem revisited in the holographic dark energy model  

E-Print Network (OSTI)

Because of an old quasar APM 08279 + 5255 at $z=3.91$, some dark energy models face the challenge of the cosmic age problem. It has been shown by Wei and Zhang [Phys. Rev. D {\\bf 76}, 063003 (2007)] that the holographic dark energy model is also troubled with such a cosmic age problem. In order to accommodate this old quasar and solve the age problem, we propose in this paper to consider the interacting holographic dark energy in a non-flat universe. We show that the cosmic age problem can be eliminated when the interaction and spatial curvature are both involved in the holographic dark energy model.

Cui, Jinglei

2010-01-01T23:59:59.000Z

490

Solvable problems - Titan expands the realm of the possible ...  

NLE Websites -- All DOE Office Websites (Extended Search)

Solvable problems Titan expands the realm of the possible Jim Pearce - May 03, 2013 Supercomputers like Jaguar and Titan allow researchers to simulate complex processes such as the...

491

A Stochastic Vendor Managed Inventory Problem and Its Variations .  

E-Print Network (OSTI)

??We analyze the problem of distributing units of a product, by a capacitated vehicle, from one storage location (depot) to multiple retailers. The demand processes… (more)

Balun, Pairote

2004-01-01T23:59:59.000Z

492

Optimization Online - Coherent Risk Measures in Inventory Problems  

E-Print Network (OSTI)

Dec 19, 2005 ... Abstract: We analyze an extension of the classical multi-period, single-item, linear cost inventory problem where the objective function is a ...

493

Solving the Global Space-Group Optimization Problem by ...  

Science Conference Proceedings (OSTI)

This problem requires a global space-group optimization (GSGO) of the total energy of a solid as a function of the crystal degrees of freedom. Evolutionary ...

494

Solving Security Constrained Optimal Power Flow Problems by a ...  

E-Print Network (OSTI)

The optimal power flow (OPF) problem describes a minimum cost electricity gener- ation model that takes into account ...... Electricity Market, 2008. EEM 2008 .

495

A Polyhedral Approach to the Single Row Facility Layout Problem  

E-Print Network (OSTI)

problem of arranging facilities on a line, while minimizing a weighted sum of the ..... heuristic, are an essential component of branch-and-cut algorithms. We now.

496

Optimization Online - The Delivery Man Problem with Time Windows  

E-Print Network (OSTI)

Sep 1, 2009 ... Abstract: In this paper, a variant of the Traveling Salesman Problem with Time Windows is considered, which consists in minimizing the sum of ...

497

Swamy class of two-stage linear stochastic programming problems  

E-Print Network (OSTI)

Jul 28, 2006 ... 1 ? ? is polynomial in ?, log(??1), dimensions of the problem and a certain ..... Continuous Optimization: Current Trends and Applications, pp.

498

Stochastic binary problems with simple penalties for capacity ...  

E-Print Network (OSTI)

capacity constraints, using simple penalties for capacities violations. In particular, we take a closer look at the knapsack problem with weights and capacity ...

499

An Exact Algorithm for Power Grid Interdiction Problem with Line ...  

E-Print Network (OSTI)

Jan 10, 2012 ... An Exact Algorithm for Power Grid Interdiction Problem with Line Switching. Long Zhao(longzhao ***at*** mail.usf.edu) Bo Zeng(bzeng ***at*** ...

500

The opportunistic replacement problem: analysis and case studies  

E-Print Network (OSTI)

Jan 22, 2009 ... We show that when maintenance occasions are fixed, the remaining problem can ... Category 2: Applications -- OR and Management Sciences ...