Powered by Deep Web Technologies
Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apple Mac OS X MacDefender Fake Antivirus Malicious Software 34: Apple Mac OS X MacDefender Fake Antivirus Malicious Software T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software June 1, 2011 - 3:35pm Addthis PROBLEM: Apple Mac OS X versions 10.4, 10.5, and 10.6 are the targets of a new campaign of phishing attacks that aim to infect systems with a fake antivirus application called MacDefender. PLATFORM: Mac OS X 10.4, Mac OS X 10.6, Mac OS X 10.5 ABSTRACT: Apple Mac OS X users could infect their systems after visiting a malicious web page. Reports suggest that the Apple Safari web browser could allow automatic download and execution of the JavaScript-based malware because of an incorrectly set security option in Safari. reference LINKS: Security Article: HT4650 IntelliShield ID: 23239 Apple Insider Article

2

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple...

3

V-137: Apple Mac OS X update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apple Mac OS X update for Java V-137: Apple Mac OS X update for Java April 18, 2013 - 6:00am Addthis PROBLEM: Apple Mac OS X update for Java PLATFORM: Mac OS X 10.6, OS X Lion...

4

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

5

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

6

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

7

Inside Mac OS X Lion Troubleshooting: Real Solutions for Mac OS X Users, 1st edition  

Science Conference Proceedings (OSTI)

Despite Mac OS X's ease-of-use, Mac users frequently encounter frustrating problems with their systems. And, when they do, they frequently have to resort to online forums (if they can get online), or trek to the Apple Store and wait for a "Genius" to ...

Matt Washchuk

2012-04-01T23:59:59.000Z

8

T-603: Mac OS X Includes Some Invalid Comodo Certificates | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: Mac OS X Includes Some Invalid Comodo Certificates 03: Mac OS X Includes Some Invalid Comodo Certificates T-603: Mac OS X Includes Some Invalid Comodo Certificates April 15, 2011 - 1:46am Addthis PROBLEM: Mac OS X Includes Some Invalid Comodo Certificates PLATFORM: For Mac OS X Server v10.5.8, Mac OS X v10.5.8, Mac OS X v10.6.7 and Mac OS X Server v10.6.7 ABSTRACT: The operating system includes some invalid certificates. The vulnerability is due to the invalid certificates and not the operating system itself. Other browsers, applications, and operating systems are affected. reference LINKS: SecurityTracker Alert ID: 1025362 APPLE-SA-2011-04-14-4 Security Update 2011-002 Apple Support Downloads IMPACT ASSESSMENT: High Discussion: A partner of Comodo with Registration Authority capabilities suffered an internal security breach and the attacker caused seven certificates to be

9

T-721:Mac OS X Directory Services Lets Local Users View User Password  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21:Mac OS X Directory Services Lets Local Users View User 21:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am Addthis PROBLEM: Mac OS X Directory Services Lets Local Users View User Password Hashes. PLATFORM: Mac OS X Lion (10.7) ABSTRACT: A local user can view user password hashes. reference LINKS: SecurityTracker Alert ID: 1026067 Apple Support Downloads Apple Security Updates Apple OS X Lion v10.7.1 Update IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Mac OS X. A local user can view user password hashes. A local user can invoke the following Directory Services command line command to view the password hash for the target user: dscl localhost -read /Search/Users/[target user] A local user can change their

10

Mac OS X Installation Notes for EXPGUI  

Science Conference Proceedings (OSTI)

... of the following steps: On the finder window for the ... Proceed through the windows by pressing Continue (note ... Mac OS X books that cover this subject ...

11

T-585: Mac OS X v10.6.7 Security Update 2011-001 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

85: Mac OS X v10.6.7 Security Update 2011-001 85: Mac OS X v10.6.7 Security Update 2011-001 T-585: Mac OS X v10.6.7 Security Update 2011-001 March 22, 2011 - 2:02pm Addthis PROBLEM: Mac OS X v10.6.7 Security Update 2011-001 PLATFORM: Mac OS X 10.3, Mac OS X 10.4, Mac OS X 10.6, Mac OS X 10.5.(Affected Software and Download Locations) ABSTRACT: Mac OS Update: Mac OS 10.6.7 fixes multiple vulnerabilities in the following release. This update can be installed on non-startup volumes, but you should only do this if the current startup volume has already been updated to Mac OS X Server v10.6.7. The simplest way to avoid issues from an improper installation is to start up from the volume that you wish to update. reference LINKS: APPLE-SA-2011-03-21-1 Mac OS X v10.6.7 About the Mac OS X Server v10.6.7 Update Apple security updates

12

Mac OS X Installation Notes for EXPGUI  

Science Conference Proceedings (OSTI)

... The Tcl/Tk Starkit. ... Thanks to Paul Kienzle of the NCNR DAVE project for providing the "all in one file" (starkit) version of Tcl/Tk for OS X. ...

13

T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 June 30, 2011 - 3:22pm Addthis PROBLEM: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 PLATFORM: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.6 and later, Mac OS X Server v10.6.6 and later ABSTRACT: Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26. Further information is available via the Java

14

Impostazioni Google Apps con client Mail di Apple Mac per l'account di fantasia pinco.panco@uniroma1.it  

E-Print Network (OSTI)

Impostazioni Google Apps con client Mail di Apple Mac per l'account di fantasia pinco è ospitato sui server google.com) #12;Impostazioni Google Apps con client Mail di Apple Mac per l Google Apps con client Mail di Apple Mac per l'account di fantasia pinco.panco@uniroma1.it Pag. 3

Di Pillo, Gianni

15

Collaborative Sharing of Windows between MacOS X, the X Window System and Windows  

E-Print Network (OSTI)

Collaborative Sharing of Windows between MacOS X, the X Window System and Windows Daniel Stødle This paper investigates how one best can share windows between many different computers in a collaborative application. We present an architecture of a system allowing windows on MacOS X to be shared with computers

Bjørndalen, John Markus

16

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

17

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

18

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple iOS Multiple Vulnerabilities 0: Apple iOS Multiple Vulnerabilities V-080: Apple iOS Multiple Vulnerabilities January 30, 2013 - 12:56am Addthis PROBLEM: Apple iOS Multiple Vulnerabilities PLATFORM: Apple iOS 6.x for iPhone 3GS and later Apple iOS for iPad 6.x Apple iOS for iPod touch 6.x ABSTRACT: Two security issues and multiple vulnerabilities have been reported in Apple iOS REFERENCE LINKS: Article: HT5642 APPLE-SA-2013-01-28-1 iOS 6.1 Software Update Secunia Advisory SA52002 CVE-2011-3058 CVE-2012-2619 CVE-2012-2824 CVE-2012-2857 CVE-2012-2889 CVE-2012-3606 CVE-2012-3607 CVE-2012-3621 CVE-2012-3632 CVE-2012-3687 CVE-2012-3701 CVE-2013-0948 CVE-2013-0949 CVE-2013-0950 CVE-2013-0951 CVE-2013-0952 CVE-2013-0953 CVE-2013-0954 CVE-2013-0955 CVE-2013-0956 CVE-2013-0958 CVE-2013-0959 CVE-2013-0962 CVE-2013-0963 CVE-2013-0964

19

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

20

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

22

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

23

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

24

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

25

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

26

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

27

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HT4825 Apple Product Security CVE-2011-0228 IMPACT ASSESSMENT: Medium Discussion: A remote user in a privileged network position can exploit a certificate chain validation...

28

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

29

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

30

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:03am 7:03am Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

31

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:15pm 3:15pm Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

32

Work with Apple's Rhapsody Operating System which Allows Simultaneous UNIX Program Development, UNIX Program Execution, and PC Application Execution  

E-Print Network (OSTI)

Over the past decade, UNIX workstations have provided a very powerful program development environment. However, workstations are more expensive than PCs and Macintoshes and require a system manager for day-to-day tasks such as disk backup, adding users, and setting up print queues. Native commercial software for system maintenance and "PC applications" has been lacking under UNIX. Apple's new Rhapsody operating system puts the current MacOS on a NeXT UNIX foundation and adds an enhanced NeXTSTEP object oriented development environment called Yellow Box. Rhapsody simultaneously runs UNIX and commercial Macintosh applications such as word processing or spreadsheets. Thus a UNIX detector Monte Carlo can run for days in the background at the same time as a commercial word processing program. And commercial programs such as Dantz Retrospect are being made available to make disk backup easy under Rhapsody. Apple has announced that in 1999 they intend to be running Rhapsody, or MacOS X as it will be called in the commercial release, on all their newer computers. MacOS X may be of interest to those who have trouble hiring expert UNIX system managers; and to those who would prefer to have a single computer and operating system on their desktop that serves both the needs of UNIX program development and running commercial applications, simultaneously. We present our experiences running UNIX programs and Macintosh applications under the Rhapsody DR2 Developer Release.

Don Summers; Chris Riley; Lucien Cremaldi; David Sanders

2001-05-27T23:59:59.000Z

33

Jason MacDonald  

NLE Websites -- All DOE Office Websites (Extended Search)

Jason MacDonald Jason MacDonald Grid Integration Group Demand Response Research Center (DRRC) Lawrence Berkeley National Laboratory 1 Cyclotron Road MS 90R1121 Berkeley CA 94720...

34

TMS PDF INSTRUCTIONS: MAC OS X  

Science Conference Proceedings (OSTI)

Macintosh HD: Applications: Utilities: Print Center. Step 3. The first thing you should see after launching this application is the list of printers currently installed ...

35

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks  

Science Conference Proceedings (OSTI)

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks. Yiyang Li Jianxia Ning Zhengyuan Xu . Srikanth V. Krishnamurthy Gang Chen. Springer...

36

Jason MacDonald  

NLE Websites -- All DOE Office Websites (Extended Search)

Jason MacDonald Jason MacDonald Jason MacDonald Grid Integration Group Demand Response Research Center (DRRC) Lawrence Berkeley National Laboratory 1 Cyclotron Road MS 90R1121 Berkeley CA 94720 Office Location: 90-1139 (510) 486-7085 JSMacDonald@lbl.gov Jason MacDonald, a Senior Scientific Engineering Associate at Lawrence Berkeley National Laboratory, has focused his career in distributed energy resources. As a member of the Grid Integration Group in the Environmental Energy Technologies Division at LBNL, Jason researches fast, automated demand response for bidding into bulk power system ancillary service markets. This work includes analyses of market and policy barriers to DR's market entry into ISO/RTO markets, the development of mathematical models for demand response availability and pilots to test control

37

Roderick MacKinnon - Patents  

Office of Scientific and Technical Information (OSTI)

Patents - Roderick MacKinnon (2003-2011) MacKinnon Page Resources with Additional Information US 6,641,997 ASSAYS FOR SCREENING COMPOUNDS WHICH INTERACT WITH CATION CHANNEL...

38

ADV-MAC: Advertisement-Based MAC Protocol for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Several Medium Access Control (MAC) protocols have been proposed for wireless sensor networks with the objective of minimizing energy consumption. For example, Sensor-MAC (S-MAC) was proposed to reduce energy consumption by introducing a duty cycle. ...

Surjya Sarathi Ray; Ilker Demirkol; Wendi Heinzelman

2009-12-01T23:59:59.000Z

39

TMS PostScript Instructions: "Classic" Mac OS  

Science Conference Proceedings (OSTI)

After installation is complete, launch the Desktop Printer Utility application ... Under the Printer Description list, highligh the Acrobat Distiller option and click on.

40

Symantec Enterprise Vault Guide for Mac OS X Users  

E-Print Network (OSTI)

_name\\user_name. 3 Enter the search criteria, and then start the search. Customizing Enterprise Vault You can a license agreement and may be used only in accordance with the terms of the agreement. Last updated with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http

Wood, James B.

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Mac configuration management at the Los Alamos National Laboratory  

SciTech Connect

The Los Alamos National Laboratory (LANL) had a need for central configuration management of non-Windows computers. LANL has three to five thousand Macs and an equal number of Linux based systems. The primary goal was to be able to inventory all non-windows systems and patch Mc OS X systems. LANL examined a number of commercial and open source solutions and ultimately selected Puppet. This paper will discuss why we chose Puppet, how we implemented it, and some lessons we learned along the way.

Marcus, Allan B [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

42

H-MAC: A Hybrid MAC Protocol for Wireless Sensor Networks  

E-Print Network (OSTI)

In this paper, we propose a hybrid medium access control protocol (H-MAC) for wireless sensor networks. It is based on the IEEE 802.11's power saving mechanism (PSM) and slotted aloha, and utilizes multiple slots dynamically to improve performance. Existing MAC protocols for sensor networks reduce energy consumptions by introducing variation in an active/sleep mechanism. But they may not provide energy efficiency in varying traffic conditions as well as they did not address Quality of Service (QoS) issues. H-MAC, the propose MAC protocol maintains energy efficiency as well as QoS issues like latency, throughput, and channel utilization. Our numerical results show that H-MAC has significant improvements in QoS parameters than the existing MAC protocols for sensor networks while consuming comparable amount of energy.

Mehta, S; 10.5121/ijcnc.2010.2208

2010-01-01T23:59:59.000Z

43

Making sensornet MAC protocols robust against interference  

Science Conference Proceedings (OSTI)

Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external interference on state-of-the-art sensornet MAC protocols. Our experiments ...

Carlo Alberto Boano; Thiemo Voigt; Nicolas Tsiftes; Luca Mottola; Kay Rmer; Marco Antonio Ziga

2010-02-01T23:59:59.000Z

44

MACS as a tool for international inspections  

SciTech Connect

The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites.

Curtiss, J.A.; Indusi, J.P.

1995-08-01T23:59:59.000Z

45

MacPherson wins top Communicator award | Princeton Plasma Physics...  

NLE Websites -- All DOE Office Websites (Extended Search)

MacPherson wins top Communicator award May 3, 2012 Tweet Widget Facebook Like Google Plus One Kitta MacPherson. (Photo by Elle Starkman, PPPL Office of Communications) Kitta...

46

ADV-MAC: Analysis and optimization of energy efficiency through data advertisements for wireless sensor networks  

Science Conference Proceedings (OSTI)

Several Medium Access Control (MAC) protocols have been proposed for wireless sensor networks with the objective of minimizing energy consumption. For example, Sensor-MAC (S-MAC) was proposed to reduce energy consumption by introducing a duty cycle. ... Keywords: Advertisement-based MAC, Energy efficiency, MAC layer performance optimization, MAC protocol

Surjya Ray; Ilker Demirkol; Wendi Heinzelman

2011-07-01T23:59:59.000Z

47

MACS as a tool for international inspections  

SciTech Connect

General acceptance of the challenge provision in the Chemical Weapons Convention has the potential for influence in other arms control areas. While most applications of the challenge inspection may be straightforward, there may be instances where access to the site by inspectors may be problematic. The MACS system described in this paper was developed to respond to these situations. Inspection and verification may be difficult when a host is unwilling,for valid reasons, to permit physical access to a site. We proposed a system of remote sensors which may be used to demonstrate compliance with Chemical Weapons Convention (CWC) challenge inspections even ff the inspector is physically excluded from a sensitive site. The system is based upon alternative-means-of-access provisions of the CWC. The Defense Nuclear Agency (DNA) funded design and construction of a system prototype, designated as MACS for Managed Access by Controlled Sensing. Features of the MACS design allow growth of the prototype into a versatile device for international monitoring of production facilities and other sites. MACS consists of instrumentation and communication equipment allowing site personnel to conduct a facility tour and perform acceptable measurements, while physically excluding the inspector from the facility. MACS consists of a base station used by the inspector, and a mobile unit used within the facility and manipulated by the facility staff. The base station and the mobile unit are @ed by a communication system, currently realized as a fiber optic cable. The mobile unit is equipped with television cameras and remote-reading distance-measuring equipment (DME) for use in verifying locations and dimensions. Global Positioning System receivers on the mobile unit provide both precise location and dead reckoning, suitable for tracking the mobile unit`s position while within a building when satellite signals are not available.

Curtiss, J.A.; Indusi, J.P.

1995-06-01T23:59:59.000Z

48

DEC Asset Rating | CUBIC APPLE LTD  

U.S. Energy Information Administration (EIA)

NON-DOMESTIC ENERGY ... if you are worried about the DEC asset rating for your public building why not get in contact with Cubic Apple on 01529 300 ...

49

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

50

EVALUATION OF ALTERNATIVE FUNGICIDES FOR ORGANIC APPLE PRODUCTION IN VERMONT.  

E-Print Network (OSTI)

??A major challenge in organic apple production in Vermont is the available fungicide options for apple scab management. The standard lime sulfur/sulfur fungicide program used (more)

Cromwell, Morgan

2008-01-01T23:59:59.000Z

51

Multihop performance of cooperative preamble sampling MAC(CPS-MAC) in wireless sensor networks  

Science Conference Proceedings (OSTI)

Cooperative communication(CC) is a promising technique to combat fading in a wireless environment. In our previous work, we proposed Cooperative Preamble Sampling(CPS)-Medium Access Control(MAC) protocol which highlighted the benefits of using CC in ... Keywords: cooperative communication, medium access control, preamble sampling, reliability, wireless sensor networks

Rana Azeem M. Khan; Holger Karl

2011-07-01T23:59:59.000Z

52

Advanced MAC protocol with energy-efficiency for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper proposes E2-MAC, a contention-based energy-efficient Medium Access Control (MAC) Protocol for wireless sensor networks. Energy efficiency is primary goal in wireless sensor networks. Existing MAC protocols for sensor networks attempt ...

Jae-Hyun Kim; Ho-Nyeon Kim; Seog-Gyu Kim; Seung-Jun Choi; Jai-Yong Lee

2005-01-01T23:59:59.000Z

53

DISTRIBUTED COGNITIVE MAC FOR ENERGY-CONSTRAINED OPPORTUNISTIC SPECTRUM ACCESS  

E-Print Network (OSTI)

DISTRIBUTED COGNITIVE MAC FOR ENERGY-CONSTRAINED OPPORTUNISTIC SPECTRUM ACCESS Yunxia Chen, Qing@arl.army.mil ABSTRACT We address the design of distributed cognitive medium ac- cess control (MAC) protocols for opportunistic spectrum access (OSA) under an energy constraint on the secondary users. The objective

Islam, M. Saif

54

Towards automated design of MAC protocols for underwater wireless networks  

Science Conference Proceedings (OSTI)

We present a framework for the automated design of MAC protocols for underwater acoustic wireless networks. We formulate a protocol optimization problem in which the exchange of control packets is explicitly modeled. A protocol optimization program generates ... Keywords: automation, mac, network, wireless underwater protocol

Volkan Rodoplu; Amir Aminzadeh Gohari; Wei Tang

2008-09-01T23:59:59.000Z

55

John J. MacWilliams | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » John J. MacWilliams About Us John J. MacWilliams - Senior Advisor John J. MacWilliams John J. MacWilliams was appointed in June 2013 as Senior Advisor to the Secretary of Energy at the U.S. Department of Energy. In this role he serves as the Secretary's senior finance advisor and is a member of his national security team. Prior to DOE, he was a partner of Tremont Energy Partners, LLC, a private investment firm based in Cambridge, Massachusetts, that was formed in 2003. Prior to Tremont, he was Vice Chairman, Investment Banking, at JP Morgan Chase and a Partner of JP Morgan Partners. Mr. MacWilliams was a founding partner in 1993 of The Beacon Group, LLC, a private investment firm located in New York, which was acquired by JP Morgan Chase in 2000. He was also

56

ZeptoOS // Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation Visit the ZeptoOS Documentation Wiki for a complete ZeptoOS documentation, including a list of features, requirements, limitations, and changes from previous...

57

The Codling Moth or Apple Worm  

NLE Websites -- All DOE Office Websites (Extended Search)

and expense before he harvests the first apple. Ever after his trees are grown and a crop can be expected, bad weather, diseases and pests, or marketing troubles, often throw...

58

Nobel Prize | 2003 Chemistry Prize, Roderick MacKinnon  

NLE Websites -- All DOE Office Websites (Extended Search)

Roderick MacKinnon Roderick MacKinnon Roderick MacKinnon (photo: University of Washington) potassium channels Overhead view of a voltage-dependent potassium ion channel shows four red-tipped "paddles" that open and close in response to positive and negative charges. This structure showed for the first time the mechanism by which potassium ions are allowed in and out of living cells during a muscle or nerve impulse. The Chemistry of the Cell Roderick MacKinnon, M.D., a visiting researcher at Brookhaven National Laboratory, won one half of the 2003 Nobel Prize in Chemistry for work explaining how a class of proteins helps to generate nerve impulses -- the electrical activity that underlies all movement, sensation, and perhaps even thought. The work leading to the prize was done primarily at the

59

TDM MAC protocol design and implementation for wireless mesh networks  

Science Conference Proceedings (OSTI)

We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multi-hop wireless mesh networks using a programmable wireless platform. Extensive research has been devoted to optimal scheduling algorithms for ...

Dimitrios Koutsonikolas; Theodoros Salonidis; Henrik Lundgren; Pascal LeGuyadec; Y. Charlie Hu; Irfan Sheriff

2008-12-01T23:59:59.000Z

60

MacDonald-042612 - Argonne National Laboratories, Materials Sicence...  

NLE Websites -- All DOE Office Websites (Extended Search)

H. MacDonald University of Texas at Austin TITLE: "Momentum-Spaced Berry Curvature in Graphene and in Topological Insulators" DATE: Thursday, April 26, 2012 TIME: 11:00 a.m. PLACE:...

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Dynamic priority scheduling-based MAC for wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, one of the most important issues supporting real-time QoS in wireless sensor networks is discussed, which is fundamentally a challenging problem. A novel MAC protocol based on dynamic priority scheduling is proposed for wireless sensor ... Keywords: MAC, Motes MICA 2, QoS, WSNs, dynamic priority scheduling, medium access control, quality of service, wireless networks, wireless sensor networks

Jiming Chen; Youxian Sun

2007-04-01T23:59:59.000Z

62

ZeptoOS  

NLE Websites -- All DOE Office Websites (Extended Search)

Overview ZeptoOS logo ZeptoOS is a research project studying operating systems for petascale architectures with 10,000 to 1 million CPUs. Operating systems and run-time software...

63

ZeptoOS // Downloads  

NLE Websites -- All DOE Office Websites (Extended Search)

Downloads ZeptoOS Version 2.0 Release Name Size ZeptoOS-2.0-V1R3M0.tar.bz2 155M ZeptoOS-2.0-V1R3M0.tar.bz2.md5sum.txt 61 ZeptoOS-2.0-V1R3M0.tar.bz2.sha1sum.txt 69 Selfish Detour...

64

Appling County Pellets | Open Energy Information  

Open Energy Info (EERE)

Appling County Pellets Appling County Pellets Jump to: navigation, search Name Appling County Pellets Place Graham, Georgia Zip 31513 Sector Biomass Product Producer of wood pellets and other biomass products located in Georgia. Coordinates 47.055765°, -122.294774° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.055765,"lon":-122.294774,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

65

ZeptoOS // Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links ZeptoOS-specific resources: Subversion repository Kernel GIT repository Bug tracking system Blue Gene resources: ALCF: Argonne Leadership Computing Facility Blue Gene...

66

MacDonald Systems Inc | Open Energy Information  

Open Energy Info (EERE)

MacDonald Systems Inc MacDonald Systems Inc Jump to: navigation, search Name MacDonald Systems Inc Address 12804 Willow Centre Place Houston, Texas Zip 77066 Sector Buildings Product Assist building owners, architects, and engineers in designing energy efficient LEED projects Website http://www.macdonaldsystems.co Coordinates 29.9627073°, -95.5352348° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":29.9627073,"lon":-95.5352348,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

67

ITP Classrooms Login on Windows and Macs Last Updated: 10/13/2011 Page 1 of 5  

E-Print Network (OSTI)

ITP Classrooms Login on Windows and Macs Last Updated: 10/13/2011 Page 1 of 5 !"#$%& & & Viterbi IT User Document ITP Classrooms Login on Windows and Macs ITP CLASSROOMS LOGIN ON WINDOWS AND MACS PURPOSE The purpose

Wang, Hai

68

Alan MacDiarmid, Conductive Polymers, and Plastic Batteries  

NLE Websites -- All DOE Office Websites (Extended Search)

Alan MacDiarmid, Conductive Polymers, and Plastic Batteries Alan MacDiarmid, Conductive Polymers, and Plastic Batteries Resources with Additional Information · Patents Alan MacDiarmid ©Alan MacDiarmid/ University of Pennsylvania Photo by Felice Macera Until 1987, the billions of batteries that had been marketed in myriad sizes and shapes all had one thing in common. To make electricity, they depended exclusively upon chemical reactions involving metal components of the battery. But today a revolutionary new type of battery is available commercially. It stores electricity in plastic. Plastic batteries are the most radical innovation in commercial batteries since the dry cell was introduced in 1890. Plastic batteries offer higher capacity, higher voltage, and longer shelf-life than many competitive designs. Companies are testing new shapes and configurations, including flat batteries, that can be bent like cardboard. Researchers expect that the new technology will free electronic designers from many of the constraints imposed by metal batteries such as limited recharging cycles, high weight, and high cost.

69

MAC protocols over wireless mesh networks: problems and perspective  

Science Conference Proceedings (OSTI)

The wireless mesh network (WMN) has been an emerging technology in recent years. Because the transmission medium used in networking backhaul access points (APs) is radio, the wireless mesh network is not only easy and cost effective in deployment, but ... Keywords: Coordinated distributed scheduling, IEEE 802.11, IEEE 802.16, MAC, TDMA, Wireless mesh networks (WMNs)

V. Loscr?

2008-03-01T23:59:59.000Z

70

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will...

71

Light brown apple moths arrival in California worries commodity groups  

E-Print Network (OSTI)

DG. 1991. Integrated control of light brown apple moth, Epi-and Ag- riculture. 2007a. Light brown apple moth host list.6 p. CDFA. 2007b. Light brown apple moth project:

Varela, Lucia G.; Johnson, Marshall W; Strand, Larry; Wilen, Cheryl A; Pickel, Carolyn

2008-01-01T23:59:59.000Z

72

Building Energy Software Tools Directory: Tools by Platform - Mac  

NLE Websites -- All DOE Office Websites (Extended Search)

Mac Mac A B C D E G H I L O P Q R S T W ¡ Tool Applications Free Recently Updated ABACODE Residential code compliance, IECC Free software. Acuity Energy Platform energy efficiency software; customized business recommendation; commercial and industrial energy use comparisons Software has been updated. AEPS System Planning electrical system, renewable energy system, planning and design software, modeling, simulation, energy usage, system performance, financial analysis, solar, wind, hydro, behavior characteristics, usage profiles, generation load storage calculations, on-grid, off-grid, residential, commercial, system sizing, utility rate plans, rate comparison, utility costs, energy savings Software has been updated. ArchiWIZARD energy performance; 3-D graphics interface; solar and lighting simulation; real time updated results and changes; thermal calculation; building performance; heat balance; thermal regulation

73

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: Mac RealPlayer Multiple Vulnerabilities 42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

74

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mac RealPlayer Multiple Vulnerabilities 2: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

75

Rosenzweig of DND-CAT & Northwestern University Receives MacArthur...  

NLE Websites -- All DOE Office Websites (Extended Search)

Industry Argonne Home Advanced Photon Source October 6th, 2003 Rosenzweig of DND-CAT & Northwestern University Receives MacArthur Grant Photo of Amy Rosenzweig Amy...

76

File:MacGyver windmills.pdf | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search File Edit History Facebook icon Twitter icon » File:MacGyver windmills.pdf Jump to: navigation, search File File history File usage Metadata File:MacGyver windmills.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 2.67 MB, MIME type: application/pdf, 14 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:12, 27 September 2013 Thumbnail for version as of 13:12, 27 September 2013 1,275 × 1,650, 14 pages (2.67 MB) Rmckeel (Talk | contribs) Category:Wind for Schools Portal Curricula

77

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks  

E-Print Network (OSTI)

A medium access control (MAC) protocol is developed for wireless multimedia networks based on frequency division duplex (FDD) wideband code division multiple access (CDMA). In this protocol, the received power levels of simultaneously transmitting users are controlled by a minimum-power allocation algorithm such that the heterogeneous bit error rates (BERs) of multimedia traffic are guaranteed. With minimumpower allocation, a multimedia wideband CDMA generalized processor sharing (GPS) scheduling scheme is proposed. It provides fair queueing to multimedia traffic with different QoS constraints. It also takes into account the limited number of code channels for each user and the variable system capacity due to interference experienced by users in a CDMA network. The admission of real-time connections is determined by a new effective bandwidth connection admission control (CAC) algorithm in which the minimum-power allocation is also considered. Simulation results show that the new MAC protocol guarantees QoS requirements of both real-time and non-real-time traffic in an FDD wideband CDMA network.

Xudong Wang

2003-01-01T23:59:59.000Z

78

An Efficient Multi-Channel MAC Protocol for Mobile Ad Hoc Networks  

Science Conference Proceedings (OSTI)

This paper proposes a novel multi-channel MAC protocol for mobile ad hoc networks that enables the nodes to transmit packets in distributed channels. In our protocol, the ATIM window is divided into two windows. The first window is called deciding channel ... Keywords: Ad hoc network, media access control (MAC), multi-channel

Wen-Hwa Liao; Wen-Chin Chung

2009-01-01T23:59:59.000Z

79

A mobility-adaptive TDMA MAC for real-time data in wireless networks  

Science Conference Proceedings (OSTI)

In this paper, we present a TDMA MAC protocol for scenarios with real-time traffic like voice streams. While many previous works assume stationary networks, DynaMAC can quickly adapt to changing topologies while not violating delay guarantees for even ...

Johannes Lessmann; Dirk Held

2008-05-01T23:59:59.000Z

80

Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data  

E-Print Network (OSTI)

collisions are expensive in terms of latency and wasted bandwidth, (b) the load profiles which are triggeredAnalysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive for MAC performance analysis [1], [2], [3], (c) the maximum propagation delay could be potentially very

Roy, Sumit

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Mathematical Modelling of a Metal Hydride Hydrogen Storage System Brendan David MacDonald  

E-Print Network (OSTI)

Member Abstract In order for metal hydride hydrogen storage systems to compete with existing energyMathematical Modelling of a Metal Hydride Hydrogen Storage System by Brendan David MacDonald B Hydrogen Storage System by Brendan David MacDonald B.A.Sc., University of Waterloo, 2004 Supervisory

Victoria, University of

82

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256  

Science Conference Proceedings (OSTI)

In this paper, we present the first distinguishing attack on the LPMAC based on step-reduced SHA-256. The LPMAC is the abbreviation of the secret-prefix MAC with the length prepended to the message before hashing and it's a more secure version of the ... Keywords: MAC, SHA-256, distinguishing attack

Hongbo Yu; Xiaoyun Wang

2009-06-01T23:59:59.000Z

83

PIP: A multichannel, TDMA-based MAC for efficient and scalable bulk transfer in sensor networks  

Science Conference Proceedings (OSTI)

In this article, we consider the goal of achieving high throughput in a wireless sensor network. Our work is set in the context of those wireless sensor network applications which collect and transfer bulk data. We present PIP (Packets in Pipe), a MAC ... Keywords: Bulk data transfer, MAC, TDMA, pipelining, throughput optimization, wireless sensor network applications

Vijay Gabale; Kameswari Chebrolu; Bhaskaran Raman; Sagar Bijwe

2012-09-01T23:59:59.000Z

84

Handling Triple Hidden Terminal Problems for Multi-Channel MAC in Long-Delay Underwater  

E-Print Network (OSTI)

1 Handling Triple Hidden Terminal Problems for Multi-Channel MAC in Long-Delay Underwater Sensor-channel MAC problem in underwater acoustic sensor networks. To reduce hardware cost, only one acoustic transceiver is often preferred on every node. In a single-transceiver multi- channel long-delay underwater

Cui, Jun-Hong

85

A survey of MAC based QoS implementations for WiMAX networks  

Science Conference Proceedings (OSTI)

We present a comprehensive survey of proposed Quality of Service (QoS) mechanisms in the Media Access Control (MAC) sublayer of WiMAX based wireless networks. QoS support in WiMAX is a fundamental design requirement, and is considerably more difficult ... Keywords: MAC, Media Access Control, QoS, Quality of Service, WiMAX, Wireless networks

Y. Ahmet ?ekercio?lu; Milosh Ivanovich; Alper Ye?in

2009-09-01T23:59:59.000Z

86

Property:Incentive/ApplDsc | Open Energy Information  

Open Energy Info (EERE)

ApplDsc ApplDsc Jump to: navigation, search Property Name Incentive/ApplDsc Property Type String Description Applicable Sector. Pages using the property "Incentive/ApplDsc" Showing 25 pages using this property. (previous 25) (next 25) 2 2003 Climate Change Fuel Cell Buy-Down Program (Federal) + Commercial +, Nonprofit +, Schools +, ... 3 30% Business Tax Credit for Solar (Vermont) + Commercial +, Industrial + 4 401 Certification (Vermont) + Utility +, Industrial + A AEP (Central and North) - CitySmart Program (Texas) + Commercial +, Industrial +, Institutional +, ... AEP (Central and North) - Residential Energy Efficiency Programs (Texas) + Construction +, Installer/Contractor +, Multi-Family Residential + AEP (Central and SWEPCO) - Coolsaver A/C Tune Up (Texas) + Commercial +, Installer/Contractor +, Residential +

87

Communicating the Difference of Correlated Gaussian Sources Over a MAC  

E-Print Network (OSTI)

This paper considers the problem of transmitting the difference of two jointly Gaussian sources over a two-user additive Gaussian noise multiple access channel (MAC). The goal is to recover this difference within an average mean squared error distortion criterion. Each transmitter has access to only one of the two Gaussian sources and is limited by an average power constraint. In this work, a lattice coding scheme that achieves a distortion within a constant of a distortion lower bound is presented if the signal to noise ratio (SNR) is greater than a threshold. Further, uncoded transmission is shown to be worse in performance to lattice coding methods. An alternative lattice coding scheme is presented that can potentially improve on the performance of uncoded transmission.

Soundararajan, Rajiv

2008-01-01T23:59:59.000Z

88

Apples and Other Fruits of the Rose Family  

NLE Websites -- All DOE Office Websites (Extended Search)

Apples and Other Fruits of the Rose Family Apples and Other Fruits of the Rose Family Nature Bulletin No. 277-A October 7, 1967 Forest Preserve District of Cook County Richard B. Ogilvie, President Roland F. Eisenbeis, Supt. of Conservation APPLES AND OTHER FRUITS OF THE ROSE FAMILY Bread, meat and potatoes, with vegetables and green salads, may satisfy the inner man and keep us healthy but much of the fun of eating is provided by the rose family. The rose, itself, is the flower of chivalry and love but its relative, the apple, king of the fruits, has been cultivated since prehistoric times. The members of the Rose Family give us more pleasure than we get from any other group of plants. Apples, quinces, pears, peaches, plums, apricots, cherries, blackberries, raspberries and strawberries -- whether wild or cultivated -- are all relatives of the roses. Their fruits, raw or cooked, give us desserts, pleasant drinks, and many a between-meal delicacy. Typically, they have showy flowers with five equal petals arranged around a central cup bearing one or more fruit-forming pistils and a large number of pollen-bearing stamens. Their leaves are placed alternately on the twigs or stalks -- some of them simple leaves; some of them compound leaves divided into three, five or more leaflets like the rose itself. Some are trees, some are shrubs, and some are vining herbs.

89

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

90

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

91

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

92

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users 0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information August 21, 2012 - 7:00am Addthis PROBLEM: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Apple Remote Desktop after 3.5.1 and prior to 3.6.1 ABSTRACT: A remote user can monitor potentially sensitive information. reference LINKS: Apple.com Apple Article: HT5433 SecurityTracker Alert ID: 1027420 CVE-2012-0681 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apple Remote Desktop. When a user connects to a third-party VNC server with the 'Encrypt all network data' setting enabled, network data is not encrypted. A remote user monitoring the

93

Town of MacClesfield, North Carolina (Utility Company) | Open Energy  

Open Energy Info (EERE)

MacClesfield, North Carolina (Utility Company) MacClesfield, North Carolina (Utility Company) Jump to: navigation, search Name Town of MacClesfield Place North Carolina Utility Id 11360 Utility Location Yes Ownership M NERC Location SERC NERC SERC Yes ISO Other Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png No rate schedules available. Average Rates Residential: $0.1280/kWh Commercial: $0.1360/kWh References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a" Retrieved from "http://en.openei.org/w/index.php?title=Town_of_MacClesfield,_North_Carolina_(Utility_Company)&oldid=41177

94

MacArthur Waste to Energy Facility Biomass Facility | Open Energy  

Open Energy Info (EERE)

MacArthur Waste to Energy Facility Biomass Facility MacArthur Waste to Energy Facility Biomass Facility Jump to: navigation, search Name MacArthur Waste to Energy Facility Biomass Facility Facility MacArthur Waste to Energy Facility Sector Biomass Facility Type Municipal Solid Waste Location Suffolk County, New York Coordinates 40.9848784°, -72.6151169° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.9848784,"lon":-72.6151169,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

95

Application of the MacCormack Scheme to Atmospheric Nonhydrostatic Models  

Science Conference Proceedings (OSTI)

In a previous paper, the authors discussed the numerical properties of the MacCormack scheme, a finite-difference technique widely used in aerospace simulations. Here the authors report results of its application to the simulation, in two ...

Luis R. Mendez-Nunez; John J. Carroll

1994-05-01T23:59:59.000Z

96

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study  

E-Print Network (OSTI)

We construct a simple network model to provide insight into network design strategies. We show that the model can be used to address various approaches to network coding, MAC, and multi-packet reception so that their effects ...

Cloud, Jason M.

97

Preliminary Notice of Violation, MAC Isotopes, LLC - EA- 1998-05 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MAC Isotopes, LLC - EA- 1998-05 MAC Isotopes, LLC - EA- 1998-05 Preliminary Notice of Violation, MAC Isotopes, LLC - EA- 1998-05 June 4, 1998 Preliminary Notice of Violation issued to MAC Isotopes, LLC, related to a Radioactive Material Release at the Idaho National Engineering and Environmental Laboratory, (1998-05) This letter refers to the Department of Energy's (DOE) investigation of the facts and circumstances concerning the release of radioactive material at the Idaho National Engineering and Environmental Laboratory (INEEL). Specifically, on September 17, 1997, radioactive [material] was uncontrollably released to Test Reactor Area [building] from [material] processing activities taking place in [a Hot Cell]. The result of this release was contamination of the entire interior of [the building] and the

98

AMR Power Private Ltd APPL | Open Energy Information  

Open Energy Info (EERE)

AMR Power Private Ltd APPL AMR Power Private Ltd APPL Jump to: navigation, search Name AMR Power Private Ltd. (APPL) Place Hyderabad, Andhra Pradesh, India Zip 560 034 Sector Hydro Product Hyderabad-based small hydro project developer. Coordinates 17.6726°, 77.5971° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":17.6726,"lon":77.5971,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

99

ZeptoOS // Contact Us  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Us Project Management The ZeptoOS project makes use of the Trac system. Contact Information Thank you for your interest in this project. We are always looking forward to...

100

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

102

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

103

Survey Paper: A survey of MAC layer solutions to the hidden node problem in ad-hoc networks  

Science Conference Proceedings (OSTI)

Ad-hoc networks suffer from the problem of hidden nodes (terminals), which leads to severe degradation of network throughput. This survey gives a comprehensive overview of Medium Access Control (MAC) protocols which directly or indirectly address this ... Keywords: Hidden node problem, MAC layer, Protocol classification, Protocol comparison

Katarzyna Kosek-Szott

2012-05-01T23:59:59.000Z

104

A new busy signal-based MAC protocol supporting QoS for ad-hoc networks with hidden nodes  

Science Conference Proceedings (OSTI)

This article presents three versions of a novel MAC protocol for IEEE 802.11 ad-hoc networks called Busy Signal-based Mechanism turned On (BusySiMOn) (This is an extended version of our conference paper: [15]). The key idea of the proposed solution is ... Keywords: EDCA, Hidden nodes, MAC protocol, QoS, Wireless communications

Katarzyna Kosek-Szott; Marek Natkaniec; Andrzej R. Pach

2013-08-01T23:59:59.000Z

105

PIP: a connection-oriented, multi-hop, multi-channel TDMA-based MAC for high throughput bulk transfer  

Science Conference Proceedings (OSTI)

In this paper, we consider the goal of achieving high throughput in a wireless sensor network. Our work is set in the context of those wireless sensor network applications which collect and transfer bulk data. We present PIP (Packets in Pipe), a MAC ... Keywords: MAC, TDMA, bulk data transfer, pipelining, throughput optimization, wireless sensor network applications

Bhaskaran Raman; Kameswari Chebrolu; Sagar Bijwe; Vijay Gabale

2010-11-01T23:59:59.000Z

106

From: Nicholas Ammann [mailto:nammann@apple.com]  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wednesday, June 20, 2012 8:12 AM Wednesday, June 20, 2012 8:12 AM To: Exparte Communications Subject: Energy Conservation Standards for Battery Chargers and External Power Supplies; Proposed Rule Making - Ex Parte Communication Apple Inc. met with DOE to discuss the notice of proposed rule making the Department sent out regarding battery chargers and external power supplies. Below is a list of topics that Apple discussed with DOE. - Discussion regarding Battery Charger product Class 8 and that it does not scale with battery capacity. Class 8 is for DC-DC battery chargers. - Timeline for the effective date of the DOE battery charger efficiency regulation and the external power supply regulation. - Flexibility of DOE Battery Charger efficiency mark to be placed on the retail

107

Apple Valley, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Apple Valley, California: Energy Resources Apple Valley, California: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 34.5008311°, -117.1858759° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":34.5008311,"lon":-117.1858759,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

108

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

109

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

110

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

111

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

112

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

113

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

114

Appl Phys A DOI 10.1007/s00339-012-6920-8  

E-Print Network (OSTI)

, 1882 (2005) 26. S. Sapp, S. Nuebben, Y.B. Losovyj, P. Jeppson, D.L. Schulz, A.N. Caruso, Appl. Phys

Yoon, Jun-Bo

115

Activity and Diet of Bats in Apple Orchards of Southern Michigan.  

E-Print Network (OSTI)

??I studied activity and diet of bats in apple orchards in southern Michigan. There was no difference between organic and conventional orchards in number and (more)

Smith, Brenna Lynn

2012-01-01T23:59:59.000Z

116

Roderick MacKinnon and Ion Channels - Potassium Channels and Sodium  

NLE Websites -- All DOE Office Websites (Extended Search)

Roderick MacKinnon and Ion Channels Roderick MacKinnon and Ion Channels Resources with Additional Information · Patents Roderick MacKinnon Courtesy of The Rockefeller University Roderick MacKinnon, M.D., a visiting researcher at the U.S. Department of Energy's Brookhaven National Laboratory, is a recipient of the 2003 Nobel Prize in Chemistry 'for structural and mechanistic studies of ion channels.' His research explains "how a class of proteins helps to generate nerve impulses - the electrical activity that underlies all movement, sensation, and perhaps even thought. The work leading to the prize was done primarily at the Cornell High Energy Synchrotron Source [CHESS] and the National Synchrotron Light Source [NSLS] at Brookhaven. The proteins, called ion channels, are tiny pores that stud the surface of all of our cells. These channels allow the passage of potassium, calcium, sodium, and chloride molecules called ions. Rapid-fire opening and closing of these channels releases ions, moving electrical impulses from the brain in a wave to their destination in the body."1

117

Comparison of Leapfrog, Smolarkiewicz, and MacCormack Schemes Applied to Nonlinear Equations  

Science Conference Proceedings (OSTI)

The MacCormack scheme is a finite-difference scheme widely used in the aerospace simulations. It is a two-step algorithm, and contains a small amount of implicit numerical diffusion that makes it numerically stable without having to use any ...

Luis R. Mendez-Nunez; John J. Carroll

1993-02-01T23:59:59.000Z

118

Design and Performance Evaluation of an Hybrid Reservation-Polling MAC Protocol for Power-Line  

E-Print Network (OSTI)

Units) in a low-voltage power grid, share the transmission capacity of the power-line network. To make of data. Since wires exist to every household connected to the low-voltage grid, PLC systems can provideDesign and Performance Evaluation of an Hybrid Reservation-Polling MAC Protocol for Power-Line

Tinnirello, Ilenia

119

Emulation of multipath effects on a wireless testbed and its impact on MAC layer performance  

Science Conference Proceedings (OSTI)

Field experiments are an important part of research in wireless networks. Since the wireless channel varies with location and time, the results vary for the same field experiment at a different place and time. Assumptions about the wireless environment ... Keywords: MAC and transport layer performance, Mutipath effects, Networking testbed

Vikas B. Shivamurthy; Ravi Prakash

2012-05-01T23:59:59.000Z

120

An energy-efficient, transport-controlled MAC protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks (WSNs), one major cause of wasted energy is that the wireless network interface is always on to accept possible traffic. Many medium access control (MAC) protocols therefore adopted a periodic listen-and-sleep scheme to save ... Keywords: Congestion control, Medium access control, Transport control, Wireless sensor network

Jaesub Kim; Kyu Ho Park

2009-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

An incrementally deployable energy efficient 802.15.4 MAC protocol (DEEP)  

Science Conference Proceedings (OSTI)

The IEEE 802.15.4 is a standard that specifies the physical layer and media access control for low data rate wireless personal area networks (WPANs). The standard is intended to provide connectivity to mobile devices with storage, energy, and communication ... Keywords: Backward compatible, Energy efficiency, IEEE 802.15.4, MAC protocols, Sensor networks

Marco Valero; Sang Shin Jung; Anu G. Bourgeois; Raheem Beyah

2012-09-01T23:59:59.000Z

122

MAC layer support for delay tolerant video transport in disruptive MANETs  

Science Conference Proceedings (OSTI)

The overall goal of this work is to improve video delivery in emergency and rescue scenarios using sparse MANETs that might be prone to frequent link breaks and network partitions. The core idea of our approach is to reduce the number of MAC layer retransmissions ... Keywords: MANET, cross-layer optimization, delay tolerant transport, video transmission

Morten Lindeberg; Stein Kristiansen; Vera Goebel; Thomas Plagemann

2011-05-01T23:59:59.000Z

123

Design and Implementation of MAC Protocol for SmartGrid HAN Environment  

Science Conference Proceedings (OSTI)

Recent environmental changes have shown the world the importance of sustainable development and these changes demand concrete solutions. The Smart Grid solution is recognized as a key technology to cope with these challenges, not just concerning the ... Keywords: HAN, MAC, SmartGrid, wireless sensor network

Min Seok Kim; Sung Ryul Kim; Jeonghyun Kim; Younghwan Yoo

2011-08-01T23:59:59.000Z

124

From a generic framework for expressing integrity properties to a dynamic MAC enforcement for operating systems  

Science Conference Proceedings (OSTI)

Protection deals with the enforcement of integrity and confidentiality. Integrity violations often lead to confidentiality vulnerabilities. This paper proposes a novel approach of Mandatory Access Control enforcement for guaranteeing a large range of ... Keywords: MAC enforcement, information flows, integrity models, security properties

Patrice Clemente; Jonathan Rouzaud-Cornabas; Christian Toinard

2010-01-01T23:59:59.000Z

125

The study of pedestrian level wind at MacGregor dormitory building  

E-Print Network (OSTI)

This study uses the Wright Brothers Wind Tunnel at MIT to study a 100:1 scaled model of the MacGregor dormitory building. The purposes are to quantify and analyze the effect of the presence of the building on pedestrian-level ...

Wannaphahoon, Teerawut (Teerawut Lim)

2011-01-01T23:59:59.000Z

126

Utilization of Wind Energy in the Galapagos Kurt Kornbluth, Ryohei Hinokuma, and Zach MacCaffrey  

E-Print Network (OSTI)

Utilization of Wind Energy in the Galapagos Kurt Kornbluth, Ryohei Hinokuma, and Zach Mac to utilize the excess wind energy ·Cover at least 50 % (currently 41%) of load with newly installed wind turbines Problems · Mismatch between demand and wind generation · No Storage - All of the excess energy

California at Davis, University of

127

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

128

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

129

Simulation of Water Sources and Precipitation Recycling for the MacKenzie, Mississippi, and Amazon River Basins  

Science Conference Proceedings (OSTI)

An atmospheric general circulation model simulation for 194897 of the water budgets for the MacKenzie, Mississippi, and Amazon River basins is presented. In addition to the water budget, passive tracers are included to identify the geographic ...

Michael G. Bosilovich; Jiun-Dar Chern

2006-06-01T23:59:59.000Z

130

Lx02hMac.seaAPPLaust!**?' *mu?q*?qStuffIt (c) ...  

Science Conference Proceedings (OSTI)

Lx02hMac.seaAPPLaust!**?'?*mu?q*?qStuffIt (c)1997-1998 Aladdin Systems, Inc., http://www.aladdinsys.com/StuffIt/. ...

2000-06-17T23:59:59.000Z

131

Verifying security invariants in ExpressOS  

Science Conference Proceedings (OSTI)

Security for applications running on mobile devices is important. In this paper we present ExpressOS, a new OS for enabling high-assurance applications to run on commodity mobile devices securely. Our main contributions are a new OS architecture and ... Keywords: automatic theorem proving, microkernel, mobile security, programming by con- tracts

Haohui Mai; Edgar Pek; Hui Xue; Samuel Talmadge King; Parthasarathy Madhusudan

2013-04-01T23:59:59.000Z

132

A 16-Bit by 16-Bit MAC Design Using Fast 5: 3 Compressor Cells  

Science Conference Proceedings (OSTI)

3:2 counters and 4:2 compressors have been widely used for multiplier implementations. In this paper, a fast 5:3 compressor is derived for high-speed multiplier implementations. The fast 5:3 compression is obtained by applying two rows of fast 2-bit ... Keywords: 3:2 counter, 4:2 compressor, 5:2 compressor, 5:3 compressor, MAC, multiplier

Ohsang Kwon; Kevin Nowka; Earl E. Swartzlander, Jr.

2002-06-01T23:59:59.000Z

133

Design and evaluation of a new MAC protocol for long-distance 802.11 mesh networks  

Science Conference Proceedings (OSTI)

802.11 has been used well beyond its original intended use of WLANs. Of particular interest to us in this paper is its use in long-distance mesh networks being designed/used for low-cost rural connectivity. We describe in detail a new MAC protocol, called ... Keywords: 802.11 mesh networks, MAC design, network topology design, signal-to-interference ratio

Bhaskaran Raman; Kameswari Chebrolu

2005-08-01T23:59:59.000Z

134

File:The MacGyver Wind Math Competition.pdf | Open Energy Information  

Open Energy Info (EERE)

MacGyver Wind Math Competition.pdf MacGyver Wind Math Competition.pdf Jump to: navigation, search File File history File usage Metadata File:The MacGyver Wind Math Competition.pdf Size of this preview: 800 × 600 pixels. Go to page 1 2 3 4 5 6 7 Go! next page → next page → Full resolution ‎(1,500 × 1,125 pixels, file size: 414 KB, MIME type: application/pdf, 7 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:12, 27 September 2013 Thumbnail for version as of 14:12, 27 September 2013 1,500 × 1,125, 7 pages (414 KB) Rmckeel (Talk | contribs) Category:Wind for Schools Portal Curricula You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information)

135

Magnetically assisted chemical separation (MACS) process: Preparation and optimization of particles for removal of transuranic elements  

SciTech Connect

The Magnetically Assisted Chemical Separation (MACS) process combines the selectivity afforded by solvent extractants with magnetic separation by using specially coated magnetic particles to provide a more efficient chemical separation of transuranic (TRU) elements, other radionuclides, and heavy metals from waste streams. Development of the MACS process uses chemical and physical techniques to elucidate the properties of particle coatings and the extent of radiolytic and chemical damage to the particles, and to optimize the stages of loading, extraction, and particle regeneration. This report describes the development of a separation process for TRU elements from various high-level waste streams. Polymer-coated ferromagnetic particles with an adsorbed layer of octyl(phenyl)-N,N-diisobutylcarbamoylmethylphosphine oxide (CMPO) diluted with tributyl phosphate (TBP) were evaluated for use in the separation and recovery of americium and plutonium from nuclear waste solutions. Due to their chemical nature, these extractants selectively complex americium and plutonium contaminants onto the particles, which can then be recovered from the solution by using a magnet. The partition coefficients were larger than those expected based on liquid[liquid extractions, and the extraction proceeded with rapid kinetics. Extractants were stripped from the particles with alcohols and 400-fold volume reductions were achieved. Particles were more sensitive to acid hydrolysis than to radiolysis. Overall, the optimization of a suitable NMCS particle for TRU separation was achieved under simulant conditions, and a MACS unit is currently being designed for an in-lab demonstration.

Nunez, L.; Kaminski, M.; Bradley, C.; Buchholz, B.A.; Aase, S.B.; Tuazon, H.E.; Vandegrift, G.F. [Argonne National Lab., IL (United States); Landsberger, S. [Univ. of Illinois, Urbana, IL (United States)

1995-05-01T23:59:59.000Z

136

From: Nicholas Ammann [mailto:nammann@apple.com]  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tuesday, July 16, 2013 4:35 PM Tuesday, July 16, 2013 4:35 PM To: Exparte Communications Subject: Request for Information on Evaluating New Products for the Battery Chargers and External Power Supply Rulemaking - Ex Parte Communication Below are a list of topics that Apple Inc. discussed with DOE. - Timeline for the effective date of the DOE battery charger efficiency regulation and the external power supply regulation. - Flexibility of DOE Battery Charger efficiency mark, including using software or package as an alternate to marking the product surface. - Discussion of replacement parts and refurbished products produced prior to the DOE effective date. - Discussion of DOE proposed EPS Level VI efficiency criteria as compared to that of Level V and how the implementation date

137

ENERGY COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE  

Office of Legacy Management (LM)

COMMISSION COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE Pursuant to the rcgu!ations in Title 10, Code of Federal Regulations, Chapter 1, Part 40, application is hereby made for a license to receive, possess, use, transfer, deliver or import into the United Stat-, source material for the activity or activities described. 1. (check ooa) 2. NAME OF APPLICANT W. R. GRACE 6 Co. 0 (a) New Iicense 0 (b) Amendment to License No.- Davison Chemical Division STA-422 3. Q (c) Renewal of Licensr No. 0 (d) Previous License No. Pompton Plains, N. J. 4. ST,.TE THE AOORESS(ES) AT WHICH SOURCE MATERIAL WILL BE POSSESSED OR USED 868 Black Oak Ridge Road, Wayne, fi. J. a*ocY s up/'l File IF 5. BUSINESS OR OCCUPATION I 6. (a) IF APPLICANT IS AN INDIVIDUAL. STATE CITIZENSHIP

138

Neutrino mass sensitivity by MAC-E-Filter based time-of-flight spectroscopy with the example of KATRIN  

E-Print Network (OSTI)

The KATRIN experiment aims at a measurement of the neutrino mass with a 90 % C.L. sensitivity of 0.2 eV/c$^2$ by measuring the endpoint region of the tritium $\\beta$ decay spectrum from a windowless gaseous molecular tritium source using an integrating spectrometer of the MAC-E-Filter type. We discuss the idea of using the MAC-E-Filter in a time-of-flight mode (MAC-E-TOF) in which the neutrino mass is determined by a measurement of the electron time-of-flight (TOF) spectrum that depends on the neutrino mass. MAC-E-TOF spectroscopy here is a very sensitive method since the $\\beta$-electrons are slowed down to distinguishable velocities by the MAC-E-Filter. Their velocity depends strongly on their surplus energy above the electric retarding potential. Using MAC-E-TOF, a statistical sensitivity gain is expected. Because a small number of retarding-potential settings is sufficient for a complete measurement, in contrast to about 40 different retarding potentials used in the standard MAC-E-Filter mode, there is a gain in measurement time and hence statistical power. The improvement of the statistical uncertainty of the squared neutrino mass has been determined by Monte Carlo simulation to be a factor 5 for an ideal case neglecting background and timing uncertainty. Additionally, two scenarios to determine the time-of-flight of the $\\beta$-electrons are discussed, which use the KATRIN detector for creating the stop signal and different methods for obtaining a start signal. These comprise the hypothetical case of an `electron tagger' which detects passing electrons with minimal interference and the more realistic case of `gated filtering', where the electron flux is periodically cut off by pulsing the pre-spectrometer potential.

Nicholas Steinbrink; Volker Hannen; Eric L. Martin; R. G. Hamish Robertson; Michael Zacher; Christian Weinheimer

2013-08-02T23:59:59.000Z

139

Neutrino mass sensitivity by MAC-E-Filter based time-of-flight spectroscopy with the example of KATRIN  

E-Print Network (OSTI)

The KArlsruhe TRItium Neutrino (KATRIN) experiment aims at a measurement of the neutrino mass with a 90 % confidence limit (C.L.) sensitivity of 0.2 eV/c$^2$ by measuring the endpoint region of the tritium $\\beta$ decay spectrum from a windowless gaseous molecular tritium source using an integrating spectrometer of the MAC-E-Filter type. We discuss the idea of using the MAC-E-Filter in a time-of-flight mode (MAC-E-TOF) in which the neutrino mass is determined by a measurement of the electron time-of-flight (TOF) spectrum that depends on the neutrino mass. MAC-E-TOF spectroscopy here is a very sensitive method since the $\\beta$-electrons are slowed down to distinguishable velocities by the MAC-E-Filter. Their velocity depends strongly on their surplus energy above the electric retarding potential. Using MAC-E-TOF, a statistical sensitivity gain is expected. Because a small number of retarding-potential settings is sufficient for a complete measurement, in contrast to about 40 different retarding potentials used in the standard MAC-E-Filter mode, there is a gain in measurement time and hence statistical power. The improvement of the statistical uncertainty of the squared neutrino mass has been determined by Monte Carlo simulation to be a factor 5 for an ideal case neglecting background and timing uncertainty. Additionally, two scenarios to determine the time-of-flight of the $\\beta$-electrons are discussed, which use the KATRIN detector for creating the stop signal and different methods for obtaining a start signal. These comprise the hypothetical case of an `electron tagger' which detects passing electrons with minimal interference and the more realistic case of `gated filtering', where the electron flux is periodically cut off by pulsing the pre-spectrometer potential.

Nicholas Steinbrink; Volker Hannen; Eric L. Martin; R. G. Hamish Robertson; Michael Zacher; Christian Weinheimer

2013-08-02T23:59:59.000Z

140

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

AEO2011: Oil and Gas Supply Apple-style-span  

Open Energy Info (EERE)

Oil and Gas Supply Apple-style-span" style"line-height: 16px; -webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; ">This dataset comes from...

142

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

143

Optimized code restructuring of OS/2 executables  

Science Conference Proceedings (OSTI)

This paper describes the design and algorithms of FDPR/2 (Feedback Directed Program Restructuring of OS/2 executables), a general-purpose tool that can be used to instrument, profile, and restructure/optimize OS/2 executables for the tel x86 architecture. ...

Jyh-Herng Chow; Yong-fong Lee; Kalyan Muthukumar; Vivek Sarkar; Mauricio Serrano; Iris Garcia; John Hsu; Shauchi Ong; Honesty Young

1995-11-01T23:59:59.000Z

144

Coal-Mac, Inc. Phoenix No. 1 mine provides wildlife haven. 2007 Wildlife West Virginia Award  

Science Conference Proceedings (OSTI)

Coal Mac, Inc.'s Harless Wood Industrial Park off Holden 22 Mines Road in Logan Country, West Virginia is an award-winning reclamation site in the mountains frequented by geese, wild turkey, deer and black bears. Orchard grass and rye is a temporary cover for the timothy, clover and other seedlings. The area was mined several years ago. Some 40,000-50,000 tons of coal per month are surfaced mined with the current permit that takes in 1,500-2,000 acres. After removing the coal, valleys are backfilled as part of the mining and reclamation plan. 10 photos.

Skinner, A.

2007-07-15T23:59:59.000Z

145

MACS II  

Science Conference Proceedings (OSTI)

... "Magnetic field splitting of the spin-resonace in CeCoIn 5 " by C. Stock, C. Broholm, Y. Zhao, F. Demmel, HJ Kang, KC Rule and C. Petrovic. ...

146

MACS II  

Science Conference Proceedings (OSTI)

... WBC, WBC reference component shields (WorkManager), 8/7 ... E 038-0001, WBC, Shield Change Request, 3 ... 0002, WBC, Choke Box Shielding Options ...

147

OsComp Systems | Open Energy Information  

Open Energy Info (EERE)

OsComp Systems OsComp Systems Jump to: navigation, search Logo: OsComp Systems Name OsComp Systems Address 337 Summer St. Place Boston, Massachusetts Zip 02210 Sector Efficiency Product Compression technology Year founded 2010 Number of employees 1-10 Coordinates 42.3491263°, -71.0481592° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.3491263,"lon":-71.0481592,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

148

Remembering Ewan MacColl: The Agency of Writing and the Creation of a Participatory Popular Culture  

E-Print Network (OSTI)

. Rather, the songs specificity of content, which is testament to the success of MacColls agency as a writer, does not preclude universal identification in the naive sense which has contributed to its popularity.50 The Shoals of Herring Mac... Colls creative method implicitly recog - nized the popular songs polysemic hybrid - ity, which can both attest and facilitate successful recontextualization, as demon - strated in his composition of The Shoals of Herring for the radio ballad Singing...

Holland, Owen

149

Mobile Device Management iOS Device Enrollment  

E-Print Network (OSTI)

Setup Instructions 2. Get the App from the Apple App Store a. Launch the App Store. b. Search Enroll app. b. Click Enroll. #12;c. Enter your LSUHSC email address. d. Tap Next. e. Enter your LSUHSC password. f. Tap Next. g. Accept the Terms and Conditions. 4. Tap 1 - Install Company Profile. #12;a. Tap

150

MRMAC: medium reservation MAC protocol for reducing end-to-end delay and energy consumption in wireless sensor networks  

Science Conference Proceedings (OSTI)

This letter proposes a novel medium reservation MAC protocol that reduces both end-to-end delay and energy consumption for wireless sensor networks. MRMAC reduces endto-end delay by informing the intended receiver of NPAT (next packet arrival time) and ... Keywords: asynchronous, end-to-end delay, energy consumption, medium access control, wireless sensor networks

Jaeyoung Hong; Ingook Jang; Hanjin Lee; Suho Yang; Hyunsoo Yoon

2010-07-01T23:59:59.000Z

151

Using the equivalent source technique to estimate noise in 4D TEM data Kristopher MacLennan* and Yaoguo Li  

E-Print Network (OSTI)

of groundwater aquifers and petroleum reservoirs, require dense data distribution over a grid, acquired using is related wholly to the distribution of electrical current in the subsurface at that particular instantUsing the equivalent source technique to estimate noise in 4D TEM data Kristopher Mac

152

Adapting WLAN MAC Parameters to Enhance VoIP Call Grainne Hanley, Sean Murphy and Liam Murphy  

E-Print Network (OSTI)

Adapting WLAN MAC Parameters to Enhance VoIP Call Capacity Gr´ainne Hanley, Se´an Murphy and Liam packet. 4.1.2 CW Adaptation The CW was adapted as follows. After every 250 pack- ets, the AP compared

153

A new framework for QoS provisioning in WLANS using p-persistent 802.11 MAC  

Science Conference Proceedings (OSTI)

In this paper, we propose a new framework which consists of three components viz., a p-persistent 802.11-based core MAC layer which provides optimum channel utilization, a scheduler that provides service differentiation between different classes of traffic ... Keywords: 802.11, Admission control, QoS, Scheduler, Service differentiation, p-persistent

Kiran Anna; Mostafa Bassiouni

2008-11-01T23:59:59.000Z

154

Soil Carbon Modeling (Mac Post) A. Rothamsted model carbon pools and processes. Their approximate equivalents for the EBIS sample processing  

E-Print Network (OSTI)

Soil Carbon Modeling (Mac Post) A. Rothamsted model carbon pools and processes. Their approximate' soil horizon show that model improvements need to be made to capture observed soil carbon cycling and transport processes. Testing and improvement of soil carbon cycling models is a key anticipated output

155

Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA  

E-Print Network (OSTI)

The IEEE 802.15.4 is a wireless standard introduced for low power, low cost wireless communication with moderate data rates. In the next few years, it is expected that Low Rate Wireless Personal Area Networks (LR-WPAN) will be used in a wide variety of embedded applications, including home automation, industrial sensing and control, environmental monitoring and sensing. In these applications, numerous embedded devices running on batteries are distributed in an area communicating via wireless radios. This work presents a method which can be used for comparing current consumption of wireless data transfer embedded systems. This paper implements a small subset of the IEEE 802.15.4 protocol to achieve a point to point communication. The implemented protocol uses 802.15.4 MAC compliant data and acknowledgment packets. Current consumption is measured while doing one data packet transmission. Measurements are compared with existing work. IEEE 802.15.4 protocol implementation is done using Verilog language. Code impl...

Bhat, Naagesh S

2012-01-01T23:59:59.000Z

156

A formally verified OS kernel. now what?  

Science Conference Proceedings (OSTI)

Last year, the L4.verified project produced a formal, machine-checked Isabelle/HOL proof that the C code of the seL4 OS microkernel correctly implements its abstract implementation. In my presentation I will summarise the proof together with its main ...

Gerwin Klein

2010-07-01T23:59:59.000Z

157

Prickett and Lonnquist aquifer simulation program for the Apple II minicomputer  

DOE Green Energy (OSTI)

The Prickett and Lonnquist two-dimensional groundwater model has been programmed for the Apple II minicomputer. Both leaky and nonleaky confined aquifers can be simulated. The model was adapted from the FORTRAN version of Prickett and Lonnquist. In the configuration presented here, the program requires 64 K bits of memory. Because of the large number of arrays used in the program, and memory limitations of the Apple II, the maximum grid size that can be used is 20 rows by 20 columns. Input to the program is interactive, with prompting by the computer. Output consists of predicted lead values at the row-column intersections (nodes).

Hull, L.C.

1983-02-01T23:59:59.000Z

158

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. (in press)  

E-Print Network (OSTI)

of the controlled experiments, and the chemical equilibria and chemical kinetics of the separation processesPROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. (in press 1Á0 to 4Á0 M. Kinetic studies of leaching were conducted in constant solid-to-liquid ratios

159

Determination of freeze-drying behaviors of apples by artificial neural network  

Science Conference Proceedings (OSTI)

Freeze drying is the best drying technology regarding quality of the end product but it is an expensive method and the high costs of process limit its application to industrial scale. At the same time, the freeze-drying process is based on different ... Keywords: ANN, Apple, Drying, Freeze drying, Modeling

Tayfun Menlik; Mustafa Bahad?r zdemir; Volkan Kirmaci

2010-12-01T23:59:59.000Z

160

Cooperative application/OS DRAM fault recovery.  

Science Conference Proceedings (OSTI)

Exascale systems will present considerable fault-tolerance challenges to applications and system software. These systems are expected to suffer several hard and soft errors per day. Unfortunately, many fault-tolerance methods in use, such as rollback recovery, are unsuitable for many expected errors, for example DRAM failures. As a result, applications will need to address these resilience challenges to more effectively utilize future systems. In this paper, we describe work on a cross-layer application/OS framework to handle uncorrected memory errors. We illustrate the use of this framework through its integration with a new fault-tolerant iterative solver within the Trilinos library, and present initial convergence results.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico, Albuquerque, NM); Heroux, Michael Allen; Hoemmen, Mark; Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Welcome Doug MacIntyre, Director, Office of Petroleum and Biofuels Statistics, U.S. Energy Information  

U.S. Energy Information Administration (EIA) Indexed Site

2012 State Heating Oil and Propane (SHOPP) Webinar 2012 State Heating Oil and Propane (SHOPP) Webinar August 14, 2012 (9:30 am - 12:00 pm, Eastern Time) 9:30 am - 9:45 am Welcome Doug MacIntyre, Director, Office of Petroleum and Biofuels Statistics, U.S. Energy Information Administration Mr. MacIntyre is the Director of the Office of Petroleum and Biofuels Statistics and has a long and varied history with the organization. His purview now includes SHOPP which he is familiar with, having been a presenter at previous SHOPP Conferences. 9:45-10:15 am Heating Fuels Outlook Crude Oil, Heating Fuel, and Propane Tancred Lidderdale, Office of Integrated and International Energy Analysis, U.S. Energy Information Administration Dr. Lidderdale will present highlights from the August Short-Term Energy Outlook, a monthly

162

Advanced Development of Certified OS Kernels  

E-Print Network (OSTI)

Operating System (OS) kernels form the bedrock of all system softwarethey can have the greatest impact on the resilience, extensibility, and security of todays computing hosts. A single kernel bug can easily wreck the entire systems integrity and protection. We propose to apply new advances in certified software [86] to the development of a novel OS kernel. Our certified kernel will offer safe and application-specific extensibility [8], provable security properties with information flow control, and accountability and recovery from hardware or application failures. Our certified kernel builds on proof-carrying code concepts [74], where a binary executable includes a rigorous machine-checkable proof that the software is free of bugs with respect to specific requirements. Unlike traditional verification systems, our certified software approach uses an expressive general-purpose meta-logic and machine-checkable proofs to support modular reasoning about sophisticated invariants. The rich meta-logic enables us to verify all kinds of low-level

Zhong Shao (pi; Bryan Ford (co-pi

2010-01-01T23:59:59.000Z

163

Centralized Wireless MAC Protocols Using Slotted ALOHA and Dynamic TDD Transmission  

E-Print Network (OSTI)

ALOHA scheme with dynamic Time Division Duplexed (TDD) transmission is designed and analyzed. A centralized (i.e., star) network is adopted as the topology of a cell which consists of a base station and a number of mobile clients. In dynamic TDD transmission mode, a channel is time-shared for downlink and uplink transmissions under the dynamic access control of the base station. We first propose two MAC protocols (called TDD1 and TDD2 ) depending on how downlink and uplink transmissions are multiplexed. We then analyze throughput and average delay of TDD1 and an alternative ALOHA scheme using Frequency Division Duplexed (FDD) transmission. Finally, we evaluate the performance of these schemes, and compare TDD1 (calculations), TDD2 (simulations), and FDD (calculations). TDD schemes are found to always work as good as, or better than, FDD. TDD2 is observed to outperform TDD1 with respect to the downlink delay in the presence of light uplink and heavy downlink traffic loads while they wor...

Sunghyun Choi; Kang G. Shin

1996-01-01T23:59:59.000Z

164

Downward continuation of temperature gradients at MacFarlane's Hot Spring, Northern Nevada  

SciTech Connect

MacFarlane's Hot Spring is located on the eastern margin of the Black Rock Desert of northwest Nevada. Detailed temperature logs from thirty-eight shallow boreholes (500 feet) and six intermediate depth boreholes (1500-2000 feet) have been used to construct a temperature gradient contour map covering approximately 144 square miles, both within and adjacent to the geothermal area. These temperature gradients were then continued downward through a detailed conductivity model to complete the threedimensional thermal picture. The principal results are as follows: The maximum measured temperature is 178/sup 0/F at 2,000 feet, and the maximum projected temperatures at greater depths are not likely to exceed the 250-350/sup 0/F range. The area of hydrothermal activity is confined to the western front of a structural platform bounded by two roughly parallel normal faults. The anomaly is best explained in terms of a simple groundwater flow model. The groundwater flows west through the structural platform and ascends when it intersects the conduit provided by the fault. The faults on the eastern side of the platform permit recharge to the system.

Swanberg, C.A.; Bowers, R.L.

1982-10-01T23:59:59.000Z

165

PHY and MAC Layer Design of Hybrid Spread Spectrum Based Smart Meter Network  

Science Conference Proceedings (OSTI)

The smart grid is a combined process of revitalizing the traditional power grid applications and introducing new applications to improve the efficiency of power generation, transmission and distribution. This can be achieved by leveraging advanced communication and networking technologies. Therefore the selection of the appropriate communication technology for different smart grid applications has been debated a lot in the recent past. After comparing different possible technologies, a recent research study has arrived at a conclusion that the 3G cellular technology is the right choice for distribution side smart grid applications like smart metering, advanced distribution automation and demand response management system. In this paper, we argue that the current 3G/4G cellular technologies are not an appropriate choice for smart grid distribution applications and propose a Hybrid Spread Spectrum (HSS) based Advanced Metering Infrastructure (AMI) as one of the alternatives to 3G/4G technologies. We present a preliminary PHY and MAC layer design of a HSS based AMI network and evaluate their performance using matlab and NS2 simulations. Also, we propose a time hierarchical scheme that can significantly reduce the volume of random access traffic generated during blackouts and the delay in power outage reporting.

Kuruganti, Phani Teja [ORNL

2012-01-01T23:59:59.000Z

166

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 11860 of 29,416 results. 51 - 11860 of 29,416 results. Download CX-007914: Categorical Exclusion Determination State Geological Survey Contributions to the National Geothermal Data System CX(s) Applied: B3.1, B3.6 Date: 02/10/2012 Location(s): Vermont Offices(s): Golden Field Office http://energy.gov/nepa/downloads/cx-007914-categorical-exclusion-determination Article Building Codes and Regulations for Solar Water Heating Systems Considering a solar water heater? Look into building codes, zoning ordinances, subdivision covenants, and site regulations before installing. http://energy.gov/energysaver/articles/building-codes-and-regulations-solar-water-heating-systems Article T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could infect their systems after visiting a malicious

167

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 17, 2011 June 17, 2011 T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. June 16, 2011 T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. June 1, 2011 T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software Apple Mac OS X users could infect their systems after visiting a malicious

168

Application of an Apple-II Computer in Real-Time Data Processing of Microwave Radiation Attenuation by Rain  

Science Conference Proceedings (OSTI)

Using an Apple-II microcomputer, real-time data acquisition, processing, staring and display of 12 GHz microwave radiation attenuation by rain have been implemented. The computer-radiometer interface consists of an address decoder, two three-...

Song Qian

1989-02-01T23:59:59.000Z

169

Study of Row Phase Dependent Skew Quadrupole Fields in Apple-II Type EPUs at the ALS  

E-Print Network (OSTI)

APPLE-II TYPE EPUs AT THE ALS ? C. Steier , S. Marks, S.very successfully at the ALS to generate high brightnessswitching, the EPUs at the ALS pro- vide the capability to

Steier, C.; Marks, S.; Prestemon, Soren; Robin, David; Schlueter, Ross; Wolski, Andrzej

2004-01-01T23:59:59.000Z

170

First search for double-beta decay of 184Os and 192Os  

E-Print Network (OSTI)

A search for double-beta decay of osmium has been realized for the first time with the help of an ultra-low background HPGe gamma detector at the underground Gran Sasso National Laboratories of the INFN (Italy). After 2741 h of data taking with a 173 g ultra-pure osmium sample limits on double-beta processes in 184Os have been established at the level of T_{1/2} about 10^{14}-10^{17} yr. Possible resonant double-electron captures in 184Os were searched for with a sensitivity T_{1/2} about 10^{16} yr. A half-life limit T_{1/2} > 5.3 10^{19} yr was set for the double-beta decay of 192Os to the first excited level of 192Pt. The radiopurity of the osmium sample has been investigated and radionuclides 137Cs, 185Os and 207Bi were detected in the sample, while activities of 40K, 60Co, 226Ra and 232Th were limited at the mBq/kg level.

P. Belli; R. Bernabei; F. Cappella; R. Cerulli; F. A. Danevich; S. d'Angelo; A. Di Marco; A. Incicchitti; G. P. Kovtun; N. G. Kovtun; M. Laubenstein; D. V. Poda; O. G. Polischuk; A. P. Shcherban; V. I. Tretyak

2013-01-15T23:59:59.000Z

171

Scaling Effects in the CSP Phase Transition \\Lambda Ian P. Gent y , Ewan MacIntyre, y Patrick Prosser y , and Toby Walsh z  

E-Print Network (OSTI)

Scaling Effects in the CSP Phase Transition \\Lambda Ian P. Gent y , Ewan MacIntyre, y Patrick of Strathclyde April 18, 1995 Abstract Phase transitions in constraint satisfaction problems (CSP's) are the subject of intense study. We identify an order parameter for random binary CSP's. There is a rapid

St Andrews, University of

172

Erratum: ``Nitrogen diffusion mechanism in the R2Fe17 lattice'' [Appl. Phys. Lett. 67, 208 (1995)  

E-Print Network (OSTI)

Erratum: ``Nitrogen diffusion mechanism in the R2Fe17 lattice'' [Appl. Phys. Lett. 67, 208 (1995 Center for Precision Manufacturing and Institute of Materials Science, University of Connecticut, Storrs concentration distribution in the hollow can be obtained by solving Eq. 8 whose solution is1 cf r,t cf0R r­R0 cf

Yang, De-Ping

173

SEARCHING FOR VIDEOS ON APPLE IPAD AND IPHONE Colum Foley, Jinlin Guo, David Scott, Paul Ferguson, Cathal Gurrin  

E-Print Network (OSTI)

the performance of novice versus expert users. Index Terms-- Video search, iPad, iPhone 1. INTRODUCTION Content system with the iPad app. On the iPad, using simple touch commands users can enter search queriesSEARCHING FOR VIDEOS ON APPLE IPAD AND IPHONE Colum Foley, Jinlin Guo, David Scott, Paul Ferguson

Lee, Hyowon

174

Effects of applied sewage sludge compost and fluidized bed material on apple seedling growth  

Science Conference Proceedings (OSTI)

Two waste products, composted sewage sludge and fluidized bed material (FBM, a coal/limestone combustion byproduct) were used as soil amendments for apple seedlings (Malus domestica) grown in the greenhouse. Compost was applied at rates equivalent to 0, 25 and 50 dry metric tons/ha and FBM was applied at levels of 1 and 2 times the soil lime requirement on a weight basis (12.5 and 25.0 metric tons/ha). Plant growth was significantly increased by compost or FBM additions. Tissue Ca was increased by both waste, reflecting the high Ca inputs to the low fertility Arendtsville soil. Potentially high soil Mn levels were reduced by both wastes due to their neutralizing effect on soil pH. Root Cd levels were increased by compost additions even though soil pH was maintained above 6.3. Tissue Zn, Cu and Ni were not consistently affected by waste additions.

Korcak, R.F.

1980-01-01T23:59:59.000Z

175

Technical and economic feasibility of utilizing apple pomace as a boiler feedstock  

DOE Green Energy (OSTI)

Apple pomace or presscake, was evaluated for suitability as a boiler feedstock for Michigan firms processing apple juice. Based upon the physical and chemical characteristics of pomace, handling/direct combustion systems were selected to conform with operating parameters typical of the industry. Fresh pomace flow rates of 29,030 and 88,998 kg/day (64,000 and 194,000 lb/day) were considered as representative of small and large processors, respectively, and the material was assumed to be dried to 15% moisture content (wet basis) prior to storage and combustion. Boilers utilizing pile-burning, fluidized-bed-combustion, and suspension-firing technologies were sized for each flow rate, resulting in energy production of 2930 and 8790 kW (10 and 30 million Btu/h), respectively. A life-cycle cost analysis was performed giving Average Annual Costs for the three handling/combustion system combinations (based on the Uniform Capital Recovery factor). An investment loan at 16% interest with a 5-year payback period was assumed. The break-even period for annual costs was calculated by anticipated savings incurred through reduction of fossil-fuel costs during a 5-month processing season. Large processors, producing more than 88,998 kg pomace/day, could economically convert to a suspension-fired system substituting for fuel oil, with break-even occurring after 4 months of operation of pomace per year. Small processors, producing less than 29,030 kg/day, could not currently convert to pomace combustion systems given these economic circumstances. A doubling of electrical-utility costs and changes in interest rates from 10 to 20% per year had only slight effects on the recovery of Average Annual Costs. Increases in fossil-fuel prices and the necessity to pay for pomace disposal reduced the cost-recovery period for all systems, making some systems feasible for small processors. 39 references, 13 figures, 10 tables.

Sargent, S.A.

1983-01-01T23:59:59.000Z

176

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18, 2013 18, 2013 V-137: Apple Mac OS X update for Java Apple has issued an update for Java for Mac OS X April 17, 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 Several vulnerabilities addressed in this Critical Patch Update affect multiple products April 16, 2013 V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. April 15, 2013 V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. April 14, 2013 V-133: Microsoft pulls Patch Tuesday security fix Microsoft has recommended that an update released in the latest Patch Tuesday be removed, after users reported incidents of the "blue screen of

177

First Report of Nectria galligena Causing European Canker of Apple Trees in Ontario. A. R. Biggs, Agriculture Canada Research Station, Vineland Station, Ontario LOR 2EO. Plant  

E-Print Network (OSTI)

First Report of Nectria galligena Causing European Canker of Apple Trees in Ontario. A. R. Biggs, Agriculture Canada Research Station, Vineland Station, Ontario LOR 2EO. Plant Disease 69:1007, 1985. Accepted

Biggs, Alan R.

178

A dynamic aspect-oriented system for OS kernels  

Science Conference Proceedings (OSTI)

We propose a dynamic aspect-oriented system for operating system (OS) kernels written in the C language. Unlike other similar systems, our system named KLASY allows the users to pointcut not only function calls but also member accesses to structures. ... Keywords: Linux, aspect-oriented programming, dynamic AOP, operating system, profiling and debugging

Yoshisato Yanagisawa; Kenichi Kourai; Shigeru Chiba

2006-10-01T23:59:59.000Z

179

MAC-GWHAT  

Office of Legacy Management (LM)

GWHAT GWHAT 1.1 Rev. 1 Final Site Observational Work Plan for the UMTRA Project Site at Mexican Hat, Utah July 1998 Prepared for U.S. Department of Energy Albuquerque Operations Office Grand Junction Office Prepared by MACTEC Environmental Restoration Services, LLC Grand Junction, Colorado Project Number UGW-511-0014-03-000 Document Number U0026800 Work Performed under DOE Contract No. DE-AC13-96GJ87335 Document Number U0026800 Contents DOE/Grand Junction Office Site Observational Work Plan for Mexican Hat, Utah July 1998 Final Page iii Contents Page Acronyms and Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ES-1 1.0 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 1.1 Ground Water Compliance Strategy . . . . . . . . . . . . . .

180

MAC-GWMON  

Office of Legacy Management (LM)

GWMON GWMON 1.1 Final Site Observational Work Plan for the UMTRA Project Site at Monument Valley, Arizona April 1999 Prepared by U.S. Department of Energy Grand Junction Office Grand Junction, Colorado Project Number UGW-511-0015-07-000 Document Number U0018101 Work Performed under DOE Contract No. DE-AC13-96GJ87335 Note: Some of the section page numbers in the Table of Contents may not correspond to the page on which the section appears when viewing them in Adobe Acrobat. Document Number U0018101 Contents DOE/Grand Junction Office Site Observational Work Plan for Monument Valley, Arizona April 1999 Page iii Contents Page Acronyms and Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii 1.0 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . .

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Robert MacCuspie  

Science Conference Proceedings (OSTI)

... nanoparticles in biologically and environmentally relevant conditions that affect ... Division, NIST 2006-2008: Research Associate, Air Force Research ...

2013-01-24T23:59:59.000Z

182

Bill MacCrehan  

Science Conference Proceedings (OSTI)

... The determination of nitroaromatic compounds in air samples and phenolic compounds in crude and shale oil followed. ...

2012-11-15T23:59:59.000Z

183

Evaporative Testing Requirements for Dual-Fuel Compressed Natural Gas (CNG)/Gasoline and Liquefied Petroleum Gas (LPG)/Gasoline Vehicles Revision of MAC #99-01 To Allow Subtraction of Methane Emissions from  

E-Print Network (OSTI)

The attached MAC clarifies the Air Resources Board's procedures regarding evaporative emission testing of dual-fuel CNG/gasoline vehicles. This MAC revises and supersedes MAC #99-01 by allowing manufacturers to determine, report, and subtract methane emissions when a dual-fuel CNG/gasoline vehicle is tested for evaporative emissions. A related revision clarifies that for dual-fuel CNG/gasoline medium-duty vehicles, the applicable LEV I evaporative emission standards, which are dependent on the fuel tank capacity of the medium-duty vehicles, are determined solely on the fuel tank capacity of the gasoline fuel system. If you have any questions or comments, please contact Mr. Steven Hada, Air

Alan C. Lloyd, Ph.D.; Arnold Schwarzenegger; All Heavy-duty Vehicle Manufacturers

2004-01-01T23:59:59.000Z

184

Report. Results of a Piezocone Investigation - Shiprock, New Mexico - February 2002. GJO-2001-276-TAR. MAC-GWSHP 13.3-1.  

Office of Legacy Management (LM)

GJO-2001-276-TAR GJO-2001-276-TAR MAC-GWSHP13.3-1 UMTRA Ground Water Project Results of A Piezocone Investigation Shiprock, New Mexico February 2002 Prepared by U.S. Department of Energy Grand Junction Office Grand Junction, Colorado Project Number UGW-511-0020-28-003 Document Number U0145400 Work Performed Under DOE Contract Number DE-AC13-96GJ87335 Document Number U0145400 DOE/Grand Junction Office Results of A Piezocone InvestigationShiprock, New Mexico February 2002 Page 2 Executive Summary A piezocone study was performed at the Shiprock, New Mexico, UMTRA disposal cell as a screening- level investigation of in situ moisture conditions within the disposal cell. The purpose of the investigation was to determine if moisture conditions within the cell are saturated,

185

Long-Term Surveillance Plan for the Burrell Vicinity Property, Blairsville, Pennsylvania, GJO-2002-331-TAR, MAC-LBUR 1.1, Revised April 2000  

NLE Websites -- All DOE Office Websites (Extended Search)

Long-Term Surveillance and Maintenance Program Long-Term Surveillance and Maintenance Program Long-Term Surveillance Plan for the U.S. Department of Energy Burrell Vicinity Property Blairsville, Pennsylvania April 2000 Revised This document supersedes document number UMTRA-DOE/AL/62350-3F Ver.2, Rev.2 Prepared by U.S. Department of Energy Grand Junction Office Grand Junction, Colorado Work Performed Under DOE Contract Number DE-AC13-96GJ87335 Task Order Number MAC 00-06 Document Number S00350 DOE/Grand Junction Office LTSP for Burrell April 2000 Revision Page iii Contents 1.0 Introduction ........................................................................................................................ 1-1 1.1 Purpose ..................................................................................................................... 1-1

186

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for z/OS Arbitrary Command 4: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability December 25, 2012 - 12:08am Addthis PROBLEM: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability PLATFORM: IBM HTTP Server for z/OS Version 5.3 ABSTRACT: A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS REFERENCE LINKS: Security vulnerability Reference #:1620945 Xforce: 80684 Secunia Advisory SA51656 CVE-2012-5955 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to compromise a vulnerable

187

O NMR study of PryY1yBa2Cu3O6x W. A. MacFarlane,* J. Bobroff, P. Mendels, L. Cyrot, H. Alloul, and N. Blanchard  

E-Print Network (OSTI)

Planar 17 O NMR study of PryY1?yBa2Cu3O6¿x W. A. MacFarlane,* J. Bobroff, P. Mendels, L. Cyrot, H 2002 We report the planar 17 O NMR shift in Pr-substituted YBa2Cu3O6 x , which at x 1 exhibits reduction of Tc . From the temperature-dependent magnetic broadening of the 17 O NMR we conclude that the Pr

Paris-Sud 11, Université de

188

Validated 140-1 and 140-2 Cryptographic Modules  

Science Conference Proceedings (OSTI)

... Supports Windows Mobile, MAC iOS, MAC OSX and Google Android, in version 1.0.2, though not operationally tested. ...

2013-08-14T23:59:59.000Z

189

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

190

User Interfaces in iOS and Windows Phone: a comparison.  

E-Print Network (OSTI)

??This term paper contains a comparison between iOS and Windows Phone, regarding especially the user interface. Chapter 1 deals with a brief description of the (more)

Gandin, Silvia

2013-01-01T23:59:59.000Z

191

Inactivation of OsIRX10 leads to decreased xylan content in ...  

Inactivation of OsIRX10 leads to decreased xylan content in rice culm cell walls and improved ... We subjected destarched AIR samples to hot water ...

192

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

193

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities August 6, 2012 - 7:00am Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions 2.0.1.358 and earlier. ABSTRACT: Vulnerabilities in Adobe Flash Player version included with the BlackBerry PlayBook tablet software reference LINKS: BlackBerry Article ID: KB31675 Secunia Advisory SA50164 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 CVE-2012-0768 CVE-2012-0769 CVE-2012-0773 CVE-2012-0779 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

194

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

195

The MacEngineer 1 MacEngineer  

E-Print Network (OSTI)

are Pressurized Heavy Water Reactors (PHWR) otherwise known as CANDU2 , a similar Russian design called Reaktor reactors are commonly called CANDU reactors. #12;28 A BWR is a simpler design than a PWR, but it exposes, Japan, Sweden 94 86.4 enriched UO2 water water Pressurised Heavy Water Reactor 'CANDU' (PHWR) Canada 43

Haykin, Simon

196

Re^Os evidence for replacement of ancient mantle lithosphere beneath the North China craton  

E-Print Network (OSTI)

^Os data for peridotite xenoliths carried in Paleozoic kimberlites and Tertiary alkali basalts confirm, coupled with the presence of cold, refractory mantle xenoliths carried in kimberlite pipes that erupt

Mcdonough, William F.

197

V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities May 17, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in BlackBerry Tablet OS PLATFORM: BlackBerry Tablet OS 2.x ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53453 Blackberry Security Advisory KB34161 CVE-2012-5248 CVE-2012-5249 CVE-2012-5250 CVE-2012-5251 CVE-2012-5252 CVE-2012-5253 CVE-2012-5254 CVE-2012-5255 CVE-2012-5256 CVE-2012-5257 CVE-2012-5258 CVE-2012-5259 CVE-2012-5260 CVE-2012-5261 CVE-2012-5262 CVE-2012-5263 CVE-2012-5264 CVE-2012-5265

198

Mark M. MacCracken  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering, has three U.S. Patents and is a licensed Professional Engineer and a LEED Accredited Professional. He served on the USGBC Board of Directors for 7 years and was...

199

MAC aggregation with message multiplicity  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSN) collect and report measurements, such as temperature, to a central node. Because sensors are usually low-powered devices, data is transmitted hop-by-hop, through neighboring nodes, before it reaches the destination. Each ...

Vladimir Kolesnikov

2012-09-01T23:59:59.000Z

200

OS X Exploits and Defense: Own it...Just Like Windows or Linux!  

Science Conference Proceedings (OSTI)

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the ... Keywords: Security

Paul Baccas; Kevin Finisterre; Larry H.; David Harley; Gary Porteus; Chris Hurley; Johnny Long

2008-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Hobbes: composition and virtualization as the foundations of an extreme-scale OS/R  

Science Conference Proceedings (OSTI)

This paper describes our vision for Hobbes, an operating system and runtime (OS/R) framework for extreme-scale systems. The Hobbes design explicitly supports application composition, which is emerging as a key approach for applications to address scalability ... Keywords: application composition, operating system, supercomputing, virtualization

Ron Brightwell, Ron Oldfield, Arthur B. Maccabe, David E. Bernholdt

2013-06-01T23:59:59.000Z

202

An agent-based workflow system for enterprise based on FIPA-OS framework  

Science Conference Proceedings (OSTI)

The paper describes what we have learned from implementing a multi-agent architecture used to support enterprise notions and principles for intelligent systems design. In the last couple of years, agent-based management systems have been widely used ... Keywords: FIPA-OS, Multi-agent system, Workflow management

Yao Jung Yang; Tien-Wen Sung; Chuni Wu; Hsiang-Yang Chen

2010-01-01T23:59:59.000Z

203

Microstructure and ordering parameter studies in multilayer [FePt(x)/Os]{sub n} films  

SciTech Connect

The microstructure, ordering parameter, and magnetic properties of multilayer [FePt(x)/Os]{sub n} films on glass substrate by dc-magnetron sputtering (with x being thickness in nm; Os with a fixed thickness 5 nm; n being the number of layers) have been studied as a function of the annealing temperatures between 300 and 900 deg. C. The grain size of multilayer films can be controlled by annealing temperature and thickness of the FePt layer with Os space layer. The coercivity as a function of the annealing temperature for samples with n = 1 and pure FePt behaves roughly saturated after annealing above 700 deg. C. However, for samples with n > 4 the value of H{sub c} seems still increasing with increasing annealing temperature between 600 and 900 deg. C, and the ordering parameter decreases with increasing the number of Os layers. Our experimental results are reasonably well to describe the effect of strain-assisted transformation.

Chiang, D. P. [Division of Natural Science, Ming Hsin University of Sci. and Techn., Hsinchu 304, Taiwan (China); Department of Materials Engineering, Tatung University, Taipei 104, Taiwan (China); Chen, S. Y.; Chen, Y. Y. [Institute of Physics, Academia Sinica, Taipei 115, Taiwan (China); Yao, Y. D. [Institute of Applied Science and Engineering, Fu Jen University, Taipei 242, Taiwan (China); Ouyang, H. [Department of Materials Sci. and Engn., Tsing Hua University, Hsinchu 300, Taiwan (China); Yu, C. C. [Department of Applied Physics, National University of Kaohsiung, Kaohsiung 811, Taiwan (China); Lin, H. M. [Department of Materials Engineering, Tatung University, Taipei 104, Taiwan (China)

2011-04-01T23:59:59.000Z

204

ThermOS: system support for dynamic thermal management of chip multi-processors  

Science Conference Proceedings (OSTI)

Constraining the temperature of computing systems has become a dominant aspect in the design of integrated circuits. The supply voltage decrease has lost its pace even though the feature size is shrinking constantly. This results in an increased number ... Keywords: CMP, DTM, OS, chip multi-processor, chip-multiprocessor, dynamic thermal management, multi-core, multicore, operating system

Filippo Sironi, Martina Maggio, Riccardo Cattaneo, Giovanni Francesco Del Nero, Donatella Sciuto, Marco Domenico Santambrogio

2013-10-01T23:59:59.000Z

205

Android and iOS users' differences concerning security and privacy  

Science Conference Proceedings (OSTI)

We compare Android and iOS users according to their demographic differences, security and privacy awareness, and reported behavior when installing apps. We present an exploratory study based on an online survey with more than 700 German students and ... Keywords: android, ios, iphone, personal data, privacy awareness, security awareness, smartphone

Zinaida Benenson; Freya Gassmann; Lena Reinfelder

2013-04-01T23:59:59.000Z

206

T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Citrix XenServer Lets Local Administrative Users on the 21: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 - 3:00pm Addthis PROBLEM: A vulnerability was reported in Citrix XenServer. A local administrative user on the guest operating system can cause denial of service conditions. PLATFORM: Citrix XenServer 5.6 Feature Pack 1 and prior ABSTRACT: A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor. reference LINKS: Document ID: CTX129208 SecurityTracker Alert ID: 1025524 Document ID: CTX129103 Document ID: CTX129102 Document ID: CTX128844 Document ID: CTX129101 Document ID: CTX129100 Citrix Support IMPACT ASSESSMENT Medium Discussion:

207

P e d r o R os a s DYNAMIC INFLUENCES OF WIND  

E-Print Network (OSTI)

P e d r o R os a s DYNAMIC INFLUENCES OF WIND POWER ON THE POWER SYSTEM P h D t h e s is S e c t i-91184-16-9 #12;DYNAMIC INFLUENCES OF WIND POWER ON THE POWER SYSTEM By Pedro Rosas Thesis submitted to ?rsted Institute, Risø National Laboratory & Brazilian Wind Energy Centre Denmark, March 2003 iii #12;iv #12

208

PNNL OS3700 Tritium Monitoring System Software and Hardware Operations Manual, Revision 0  

SciTech Connect

The PNNL OS3700 Tritium Monitoring System Software and Hardware Operations Manual describes herein how to install and operate the software and hardware on a personal computer in conjunction with the Berthold LB110 flow-through proportional counter detector system. Included are operational details for the software functions, how to read and use the drop-down menus, how to understand readings and calculations, and how to access the database tables.

Barnett, J M.; Duchsherer, Cheryl J.; Sisk, Daniel R.; Carrell, Dorothy M.; Douglas, David D.; Carter, Gregory L.

2005-11-09T23:59:59.000Z

209

PNNL OS3300 Alpha/Beta Monitoring System Software and Hardware Operations Manual, Revision 0  

SciTech Connect

This Pacific Northwest National Laboratory (PNNL) OS3300 Alpha/Beta Monitoring System Software and Hardware Operations Manual describes how to install and operate the software and hardware on a personal computer in conjunction with the EG&G Berthold LB150D continuous air monitor. Included are operational details for the software functions, how to read and use the drop-down menus, how to understand readings and calculations, and how to access the database tables.

Barnett, J. M.; Duchsherer, Cheryl J.; Sisk, Daniel R.; Carter, Gregory L.; Douglas, David D.; Carrell, Dorothy M.

2006-01-25T23:59:59.000Z

210

ANR @ MSUANR @ MSU AgBioResearchAgBioResearch Expert Search  

E-Print Network (OSTI)

, 10:30 a.m.) Apple: Red Delicious ­ 66 mm fruit Gala ­ 58 mm fruit Yellow Delicious ­ 60 mm fruit Mac. Paula Red harvest is anticipated to start next week, and some Spur Mac orchards will also begin harvest spotted wing drosophila (SWD) in cherry orchards. We are moving adult traps into wine grapes as this crop

211

T-632: Google Chrome OS before R12 0.12.433.38 Beta Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Google Chrome OS before R12 0.12.433.38 Beta Update 32: Google Chrome OS before R12 0.12.433.38 Beta Update T-632: Google Chrome OS before R12 0.12.433.38 Beta Update May 31, 2011 - 2:00pm Addthis PROBLEM: Unspecified vulnerability in the dbugs package in Google Chrome OS before R12 0.12.433.38 Beta has unknown impact and attack vectors. The Chrome OS Beta channel has announced an updated to R12 release 0.12.433.38 features of Chrome 12 Beta include, new trackpad, new flash player and several stability and functional improvements over the previous releases. PLATFORM: Products Affected By CVE-2011-2171: Google Chrome OS (Previous Releases) ABSTRACT: CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of Google Chrome OS. Prior versions of Google Chrome can be fixed by updating to the current release. Information and content related to this CVE was

212

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

213

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

214

EBL Information  

NLE Websites -- All DOE Office Websites (Extended Search)

with Windows, Mac OS (may need pdf plugin), and Palm OS devices Not available for Linux operating systems If you have installation problems, see Adobe's troubleshooting page...

215

Please cite this article in press as: J. Shaw-Stewart, et al., The optimisation of the laser-induced forward transfer process for fabrication of polyfluorene-based organic light-emitting diode pixels, Appl. Surf. Sci. (2012), http://dx.doi.org/10.1016/j.a  

E-Print Network (OSTI)

-induced forward transfer process for fabrication of polyfluorene-based organic light-emitting diode pixels, Appl-induced forward transfer process for fabrication of polyfluorene-based organic light-emitting diode pixels James been used to fabricate various types of organic light- emitting diodes (OLEDs), and the process itself

216

OMAC: One-Key CBC MAC  

Science Conference Proceedings (OSTI)

... That is, a E {0 1}* b E {0 1}* E {0 1}* hold. We say "{a b }are distin t" if there exists no element o urs twi e or more. ...

2012-12-05T23:59:59.000Z

217

Understanding MACs: Moral Hazard in Acquisitions  

E-Print Network (OSTI)

of the targets financial statements; the absence ofrecently audited financial statements, including contingent

Gilson, Ronald J.

2004-01-01T23:59:59.000Z

218

Reregulating Fannie Mae and Freddie Mac  

E-Print Network (OSTI)

March Policy Statements on Financial Market Developments,2008. Policy Statement on Financial Market Developments.

Jaffee, Dwight M.

2008-01-01T23:59:59.000Z

219

The Instrument Development Group MACS Detector System ...  

Science Conference Proceedings (OSTI)

Page 1. The Instrument Development Group Bloomberg Center for Physics & Astronomy Johns Hopkins University Baltimore Maryland ...

2002-02-25T23:59:59.000Z

220

Interview of David MacDougall  

E-Print Network (OSTI)

an older brother but because of seven year's difference upbringing more like an only child; moved to New York from Vermont during the War; mother teaching at the Dalton School, Manhattan, where I went from grade 1 to 8; remember one geography teacher, John...

MacDougall, David

2007-08-03T23:59:59.000Z

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

SWIFT MAC Protocol: HOL Specification Adam Biltcliffe  

E-Print Network (OSTI)

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 ­ USEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 ­ MSEC

Sewell, Peter

222

TF_Template_Word_Mac_2008  

NLE Websites -- All DOE Office Websites (Extended Search)

606E 606E ! A validation of the Radiance three- phase simulation method for modeling annual daylight performance of optically- complex fenestration systems Andrew McNeil, Eleanor Lee Lawrence Berkeley National Laboratory Environmental Energy Technologies Division Building Technology and Urban Systems Department 2012 To be published in: Journal of Building Performance Simulation 2012: 1-14 DOI:10.1080/19401493.2012.671852 DISCLAIMER This document was prepared as an account of work sponsored by the United States Government. While this document is believed to contain correct information, neither the United States Government nor any agency thereof, nor The Regents of the University of California, nor any of their employees, makes any warranty, express or implied, or assumes

223

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

a. Appliances by Climate Zone, a. Appliances by Climate Zone, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Climate Zone 1 RSE Row Factors Fewer than 2,000 CDD and -- 2,000 CDD or More and Fewer than 4,000 HDD More than 7,000 HDD 5,500 to 7,000 HDD 4,000 to 5,499 HDD Fewer than 4,000 HDD 0.4 1.9 1.1 1.1 1.2 1.1 Total .................................................. 107.0 9.2 28.6 24.0 21.0 24.1 7.8 Kitchen Appliances Cooking Appliances Oven .............................................. 101.7 9.1 27.9 23.1 19.4 22.2 7.8 1 ................................................... 95.2 8.7 26.0 21.6 17.7 21.2 7.9 2 or More ..................................... 6.5 0.4 1.9 1.5 1.7 1.0 14.7 Most Used Oven ........................... 101.7 9.1 27.9 23.1 19.4 22.2

224

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

9a. Appliances by Northeast Census Region, 9a. Appliances by Northeast Census Region, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total U.S. Northeast Census Region RSE Row Factors Total Census Division Middle Atlantic New England 0.5 1.0 1.3 1.6 Total .............................................................. 107.0 20.3 14.8 5.4 NE Kitchen Appliances Cooking Appliances Oven ......................................................... 101.7 19.6 14.5 5.2 1.1 1 .............................................................. 95.2 18.2 13.3 4.9 1.1 2 or More ................................................. 6.5 1.4 1.1 0.3 11.7 Most Used Oven ...................................... 101.7 19.6 14.5 5.2 1.1 Electric .....................................................

225

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

4a. Appliances by Type of Housing Unit, 4a. Appliances by Type of Housing Unit, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Type of Housing Unit RSE Row Factors Single-Family Apartments in Buildings With Mobile Home Two to Four Units Five or More Units 0.4 0.5 1.7 1.6 1.9 Total ............................................... 107.0 73.7 9.5 17.0 6.8 4.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 69.1 9.4 16.7 6.6 4.3 1 ................................................ 95.2 63.7 8.9 16.2 6.3 4.3 2 or More .................................. 6.5 5.4 0.4 0.4 0.2 15.9 Most Used Oven ........................ 101.7 69.1 9.4 16.7 6.6 4.3 Electric ...................................... 63.0 43.3 5.2 10.9 3.6

226

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

5a. Appliances by Type of Owner-Occupied Housing Unit, 5a. Appliances by Type of Owner-Occupied Housing Unit, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Owner- Occupied Units Type of Owner-Occupied Housing Unit RSE Row Factors Single-Family Apartments in Buildings With Mobile Home Two to Four Units Five or More Units 0.3 0.4 2.1 3.1 1.3 Total ............................................... 72.7 63.2 2.1 1.8 5.7 6.7 Kitchen Appliances Cooking Appliances Oven ........................................... 68.3 59.1 2.0 1.7 5.4 7.0 1 ................................................ 62.9 54.1 2.0 1.6 5.2 7.1 2 or More .................................. 5.4 5.0 Q Q 0.2 22.1 Most Used Oven ........................ 68.3 59.1 2.0 1.7 5.4 7.0 Electric ......................................

227

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

2a. Appliances by West Census Region, 2a. Appliances by West Census Region, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total U.S. West Census Region RSE Row Factors Total Census Division Mountain Pacific 0.5 1.0 1.7 1.2 Total .............................................................. 107.0 23.3 6.7 16.6 NE Kitchen Appliances Cooking Appliances Oven ......................................................... 101.7 22.1 6.6 15.5 1.1 1 .............................................................. 95.2 20.9 6.4 14.5 1.1 2 or More ................................................. 6.5 1.2 0.2 1.0 14.6 Most Used Oven ...................................... 101.7 22.1 6.6 15.5 1.1 Electric .....................................................

228

Cynthia Sandberg: Love Apple Farm  

E-Print Network (OSTI)

a tomato that somebody loves in Iran, Ill acquire that seeda fabulous tomato seed from Iran. I got it from a friend ofthe kind of tomato we have in Iran. We only have one kind of

Rabkin, Sarah

2010-01-01T23:59:59.000Z

229

Cynthia Sandberg: Love Apple Farm  

E-Print Network (OSTI)

So I had dinner at the restaurant. It was fabulous. It was ado even more stuff for the restaurant. So thats been great.harvest we do for the restaurant, every bed that we remove

Rabkin, Sarah

2010-01-01T23:59:59.000Z

230

Cynthia Sandberg: Love Apple Farm  

E-Print Network (OSTI)

That manure goes into the compost piles. That decomposes,classes and beekeeping and compost and vermiculture. So weor can I produce enough compost and worm castings here so

Rabkin, Sarah

2010-01-01T23:59:59.000Z

231

Cynthia Sandberg: Love Apple Farm  

E-Print Network (OSTI)

volunteers, interns and apprentices. People love to come inInterns, Volunteers, and Apprentices And going to a systeminterns and volunteers and apprentices keeps my labor costs

Rabkin, Sarah

2010-01-01T23:59:59.000Z

232

appl_household2001.pdf  

Annual Energy Outlook 2012 (EIA)

... Q Q Q Q Q NF Other Appliances Automobile BlockEngine Battery Heater ... 0.5 0.3 Q 0.1 Q 37.2 Ceiling Fans...

233

appl_household2001.pdf  

Gasoline and Diesel Fuel Update (EIA)

Very Large (23 or More cf) ... 5.3 0.3 1.1 1.1 1.1 1.6 18.3 Through-the-Door IceWater Service Yes ... 22.1 1.2 5.1 4.4 5.4 5.9 9.6...

234

appl_household2001.pdf  

Annual Energy Outlook 2012 (EIA)

Units ... 11.9 8.7 1.5 1.5 0.2 14.9 Heaters (other) Hot Tub or Spa (heaters) ... 4.4 1.6 0.6 1.2 1.0 14.8 Electric...

235

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

or More Units ... 11.9 2.3 2.0 0.4 19.8 Heaters (other) Hot Tub or Spa (heaters) ... 4.4 0.6 0.4 0.2 19.5 Electric...

236

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

More Units ... 11.9 1.9 0.9 Q 0.8 24.6 Heaters (other) Hot Tub or Spa (heaters) ... 4.4 1.5 0.6 0.2 0.8 12.2 Electric...

237

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

Units ... 11.9 2.6 1.9 0.8 0.2 15.2 Heaters (other) Hot Tub or Spa (heaters) ... 4.4 0.2 0.9 0.6 Q 14.6 Electric...

238

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

3a. Appliances by Household Income, 3a. Appliances by Household Income, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total 2001 Household Income Below Poverty Line Eli- gible for Fed- eral Assist- ance 1 RSE Row Factors Less than $14,999 $15,000 to $29,999 $30,000 to $49,999 $50,000 or More 0.5 1.4 1.1 1.0 0.8 1.6 1.0 Total ............................................... 107.0 18.7 22.9 27.1 38.3 15.0 33.8 3.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 18.0 22.0 26.1 35.6 14.4 32.6 3.2 1 ................................................ 95.2 17.3 21.1 24.8 32.0 13.8 31.1 3.4 2 or More .................................. 6.5 0.8 0.9 1.3 3.6 0.6 1.5 13.1 Most Used Oven ........................ 101.7 18.0 22.0 26.1 35.6 14.4 32.6 3.2

239

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

2a. Appliances by Year of Construction, 2a. Appliances by Year of Construction, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Year of Construction RSE Row Factors 1990 to 2001 1 1980 to 1989 1970 to 1979 1960 to 1969 1950 to 1959 1949 or Before 0.4 1.5 1.2 1.1 1.2 1.1 0.9 Total ............................................... 107.0 15.5 18.2 18.8 13.8 14.2 26.6 4.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 14.3 17.2 17.8 12.9 13.7 25.9 4.2 1 ................................................ 95.2 13.1 16.3 16.6 12.1 12.7 24.3 4.4 2 or More .................................. 6.5 1.2 0.9 1.1 0.7 1.0 1.6 14.8 Most Used Oven ........................ 101.7 14.3 17.2 17.8 12.9 13.7 25.9 4.2 Electric ......................................

240

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 10, 2011 January 10, 2011 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. January 6, 2011 T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

State Laboratary Contacts OS  

Science Conference Proceedings (OSTI)

... South Dakota. Mailing Address South Dakota Div. of Commercial Inspection & Reg 118 W. Capitol Pierre, SD 57501. Shipping Address Div. ...

2013-06-17T23:59:59.000Z

242

ZeptoOS // Publications  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications K. Yoshii, H. Naik, C. Yu, and P. Beckman, Extending and Benchmarking the Big Memory Implementation on Blue GeneP Linux, In "Proceedings of the 1st Int. Workshop on...

243

ZeptoOS // Projects  

NLE Websites -- All DOE Office Websites (Extended Search)

for, e.g., real-time data streaming. The Selfish Benchmark Suite Massively parallel computers use compute node operating systems that are either special purpose light-weight...

244

ZeptoOS // Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Team Core Team Pete Beckman Pete Beckman Kamil Harish Kamil Iskra Kazutomo Yoshii Harish Naik Collaborators Rusty Lusk Susan Coghlan Rusty Lusk Susan Coghlan Aroon Nataraj Al...

245

New extended atomic data in cool star model atmospheres - Using Kurucz's new iron data in MAFAGS-OS models  

E-Print Network (OSTI)

Context. Cool star model atmospheres are a common tool for the investigation of stellar masses, ages and elemental abundance composition. Theoretical atmospheric models strongly depend on the atomic data used when calculating them. Aims. We present the changes in flux and temperature stratification when changing from iron data computed by R.L. Kurucz in the mid 90s to the Kurucz 2009 iron computations. Methods. MAFAGS-OS opacity sampling atmospheres were recomputed with Kurucz 2009 iron atomic data as implemented in the VALD database by Ryabchikova. Temperature stratification and emergent flux distribution of the new version, called MAFAGS-OS9, is compared to the former version and to solar flux measurements. Results. Using the Kurucz line lists converted into the VALD format and new bound-free opacities for Mg i and Al i leads to changes in the solar temperature stratification by not more than 28 K. At the same time, the calculated solar flux distribution shows significantly better agreement between observat...

Grupp, F; Tan, K

2009-01-01T23:59:59.000Z

246

Guidelines for Webcast & Recorded Presentations rev2 10-14 ...  

Guidelines for Web Cast & Recorded Presentations Windows PowerPoint slides are preferred (although Mac OS slides can also be used). Remember to include with ...

247

February 2011 JOCELYN MARGET RICHARD  

E-Print Network (OSTI)

. Poster presented at the 2008 meeting of the Society for Neuroscience, Washington, DC. Dess, N. KPad Prism, Windows XP/7 and Mac OS X core software #12;

Berridge, Kent

248

JOM: The Member Journal of TMS - Mechanical Guide  

Science Conference Proceedings (OSTI)

Electronic submissions must be accompanied by an output report containing information on: operating system used (e.g., Mac OS, Windows); any compression...

249

VISES DO ORIENTE EM EA DE QUEIRS: uma anlise comparatista entre os Relatos de viagem e A relquia.  

E-Print Network (OSTI)

??Esta dissertao tem como objetivo estudar, em perspectiva comparatista, as obras de Ea de Queirs os Relatos de viagem O Egito, A Palestina e (more)

Rosana Carvalho da Silva Ghignath

2008-01-01T23:59:59.000Z

250

Thermoelastic properties of ReB[subscript 2] at high pressures and temperatures and comparison with Pt, Os, and Re  

Science Conference Proceedings (OSTI)

We have measured the phase stability and thermoelastic equation of state of ultrahard rhenium diboride at pressures up to 30 GPa and temperatures up to 2500 K using a laser heated diamond anvil cell in conjunction with synchrotron X-ray diffraction. ReB{sub 2} is shown to be stable throughout this pressure and temperature region. The ratio of the c-axis to the a-axis provides a monitor of the annealing of plastic stresses during compression. We show that ReB{sub 2} has a small thermal anisotropy but a large mechanical anisotropy. Combining this new data set with previously existing results from a large volume press yields a thermoelastic equation of state with a Grueneisen parameter of 2.4 (0.08) and a q of 2.7. A comparison of ReB{sub 2} with other high electron density incompressible metals - Os, Re, and Pt - shows that ReB{sub 2} has the lowest thermal pressure and the highest bulk modulus.

Kavner, Abby; Armentrout, Matthew M.; Rainey, Emma S.G.; Xie, Miao; Weaver, Beth E.; Tolbert, Sarah H.; Kaner, Richard B. (UCLA)

2012-01-20T23:59:59.000Z

251

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Science, announced... http:energy.govarticlesusstatements-international-fusion-reactor-iter-siting-decision Article U-121: Apple iOS Bugs Let Remote Users Execute...

252

General Utility Lattice Program (GULP)  

Science Conference Proceedings (OSTI)

Feb 7, 2007 ... Versions of GULP currently available include Apple OS X, PC Linux, and PC Windows. Commercial users can acquire GULP through Accelrys.

253

ANR @ MSUANR @ MSU AgBioResearchAgBioResearch Expert Search  

E-Print Network (OSTI)

at NWMHRS (6/5/06, 11:30 am) Apple: Mac: 15mm fruit, Red delicious: 18mm fruit Pear: Bartlett: 13mm fruit, Entomology,MSU Luis Teixeira, Entomology,MSU Although there are three potential picture-winged flies

254

HARRY R. BELLER 1 Cyclotron Rd., MS 70A-3317  

E-Print Network (OSTI)

for Excellence in Refereeing, Water Resources Research (AGU). 1997. · American Chemical Society award Union PEER-REVIEWED PUBLICATIONS Müller, J., D. MacEachran, H. Burd, N. Sathitsuksanoh, C. Bi, Y-C. Yeh. Appl. Environ. Microbiol. 79:63-73. Yeh, Y.-C., J. Müller, C. Bi, N. J. Hillson, H. R. Beller, S. R

Ajo-Franklin, Jonathan

255

ART & DESIGN BTEC Level 2 Diploma in  

E-Print Network (OSTI)

is equipped with up to date resources such as Apple Mac computers, photographic darkroom, print area, ceramic, and a range of other disciplines in the creative industry. CORE UNITS: · Visual recording · Materials: · Drawing from observation · Words and images in graphic design · Exploring ceramic techniques

Dahl, Torbjørn Semb

256

DOE VPN Client User Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VPN Client VPN Client User Guide November 2013 U.S. Department of Energy Table of Contents Introduction ................................................................... 3 System Requirements ................................................... 3 Microsoft Windows ........................................................ 3 Mac OS X...................................................................... 4 Windows ......................................................................... 5 Installation for the Cisco AnyConnect Client ................... 5 Disconnecting from the Cisco AnyConnect Client ........... 8 Reconnecting to the Cisco AnyConnect Client ................ 9 Mac OS X ...................................................................... 10

257

Frustration by competing interactions in the highly-distorted double perovskites La2NaB'O6 (B' = Ru, Os)  

Science Conference Proceedings (OSTI)

The usual classical behaviour of S = 3/2, B-site ordered double perovskites generally results in simple, commensurate magnetic ground states. In contrast, heat capacity and neutron powder diffraction measurements for the S = 3/2 systems La2NaB'O6 (B = Ru, Os) reveal an incommensurate magnetic ground state for La2NaRuO6 and a drastically suppressed ordered moment for La2NaOsO6. This behaviour is attributed to the large monoclinic structural distortions of these double perovskites. The distortions have the effect of weakening the nearest neighbour superexchange interactions, presumably to an energy scale that is comparable to the next nearest neighbour superexchange. The exotic ground states in these materials can then arise from a competition between these two types of antiferromagnetic interactions, providing a novel mechanism for achieving frustration in the double perovskite family.

Aczel, Adam A [ORNL; Bugaris, Dan [University of South Carolina; Li, Ling [University of Tennessee, Knoxville (UTK); Yan, Jiaqiang [ORNL; Dela Cruz, Clarina R [ORNL; Zur Loye, Hans-Conrad [University of South Carolina; Nagler, Stephen E [ORNL

2013-01-01T23:59:59.000Z

258

Hypodensity/Hyperdensity ; or, Apple skies  

E-Print Network (OSTI)

Hypodensity/Hyperdensity is a reaction to the paradoxical modern urban condition of emptiness: the 'ring of drek,' left like a smear around Boston by post-industrial deflation. This area is close to both the crowded city ...

Cira, Gabriel (Gabriel Blue)

2008-01-01T23:59:59.000Z

259

Performance Calculations of APPLE II Undulator  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced Photon Source (formerly MD-TN-2008-001) R. Dejus - MD GroupASD S. Sasaki - Hiroshima Synchrotron Radiation Center, Higashi-Hiroshima, 739-0046, Japan Rev. 3, November...

260

how to prepare Apple-Cabbage Slaw  

E-Print Network (OSTI)

, celery, and onions. In a separate bowl, combine ingredients for pineapple yogurt dressing and mix. Gently Extension, 1990) Reivsed By Lillian Occeña-Po, Ph.D., Assistant Professor, Dept. of Food Science & Human

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Dihydroptychantol A, a macrocyclic bisbibenzyl derivative, induces autophagy and following apoptosis associated with p53 pathway in human osteosarcoma U2OS cells  

SciTech Connect

Dihydroptychantol A (DHA), a novel macrocyclic bisbibenzyl compound extracted from liverwort Asterella angusta, has antifungal and multi-drug resistance reversal properties. Here, the chemically synthesized DHA was employed to test its anti-cancer activities in human osteosarcoma U2OS cells. Our results demonstrated that DHA induced autophagy followed by apoptotic cell death accompanied with G{sub 2}/M-phase cell cycle arrest in U2OS cells. DHA-induced autophagy was morphologically characterized by the formation of double membrane-bound autophagic vacuoles recognizable at the ultrastructural level. DHA also increased the levels of LC3-II, a marker of autophagy. Surprisingly, DHA-mediated apoptotic cell death was potentiated by the autophagy inhibitor 3-methyladenine, suggesting that autophagy may play a protective role that impedes the eventual cell death. Furthermore, p53 was shown to be involved in DHA-meditated autophagy and apoptosis. In this connection, DHA increased nuclear expression of p53, induced p53 phosphorylation, and upregulated p53 target gene p21{sup Waf1/Cip1}. In contrast, cytoplasmic p53 was reduced by DHA, which contributed to the stimulation of autophagy. In relation to the cell cycle, DHA decreased the expression of cyclin B{sub 1}, a cyclin required for progression through the G{sub 2}/M phase. Taken together, DHA induces G{sub 2}/M-phase cell cycle arrest and apoptosis in U2OS cells. DHA-induced apoptosis was preceded by the induction of protective autophagy. DHA-mediated autophagy and apoptosis are associated with the cytoplasmic and nuclear functions of p53.

Li Xia [School of Pharmaceutical Sciences, Shandong University, Jinan 250012 (China); School of Ocean, Shandong University, Weihai 264209 (China); Wu, William K.K. [Institute of Digestive Diseases, LKS Institute of Health Sciences and Department of Medicine and Therapeutics, Chinese University of Hong Kong (Hong Kong); Sun Bin [School of Pharmaceutical Sciences, Shandong University, Jinan 250012 (China); Cui Min; Liu Shanshan [School of Ocean, Shandong University, Weihai 264209 (China); Gao Jian [School of Pharmaceutical Sciences, Shandong University, Jinan 250012 (China); Lou Hongxiang, E-mail: louhongxiang@sdu.edu.cn [School of Pharmaceutical Sciences, Shandong University, Jinan 250012 (China)

2011-03-01T23:59:59.000Z

262

Finite Frobenius Rings and the MacWilliams Identities  

E-Print Network (OSTI)

Dublin November 14, 2011 #12;Finite Frobenius Rings (from last week) Finite ring R with 1. The (Jacobson) radical Rad(R) of R is the intersection of all maximal left ideals of R; Rad(R) is a two-sided ideal of R. The (left/right) socle Soc(R) of R is the ideal of R generated by all the simple left/right ideals of R. R

Wood, Jay

263

Achievable Rate Region of Quantized Broadcast and MAC Channels  

E-Print Network (OSTI)

In this paper, we study the achievable rate region of Gaussian multiuser channels with the messages transmitted being from finite input alphabets and the outputs being {\\em quantized at the receiver}. In particular, we focus on the achievable rate region of $i)$ Gaussian broadcast channel (GBC) and $ii)$ Gaussian multiple access channel (GMAC). First, we study the achievable rate region of two-user GBC when the messages to be transmitted to both the users take values from finite signal sets and the received signal is quantized at both the users. We refer to this channel as {\\em quantized broadcast channel (QBC)}. We observe that the capacity region defined for a GBC does not carry over as such to QBC. We show that the optimal decoding scheme for GBC (i.e., high SNR user doing successive decoding and low SNR user decoding its message alone) is not optimal for QBC. We then propose an achievable rate region for QBC based on two different schemes. We present achievable rate region results for the case of uniform ...

Chandrasekaran, Suresh; Chockalingam, A

2011-01-01T23:59:59.000Z

264

Patents - Alan G. MacDiarmid (1994 - 2012)  

Office of Scientific and Technical Information (OSTI)

blend of polymers dissolved in an organic solvent includes generating a high voltage electric field between oppositely charged polymer fluid in a glass syringe (4) with a...

265

Inaugural Address by Jerry MacArthur Hultin  

E-Print Network (OSTI)

aid such as Pell Grants, loans, part-time employment and private scholarships from a variety. Amount: $1,000 Selection: Financial Aid and Awards Committee #12;JERRY ELAINE KLIMETZ SCHOLARSHIP

Aronov, Boris

266

Matthew K. MacDonald 401 Crew Building, Kings Buildings  

E-Print Network (OSTI)

. 2005-2006. · Landfill Gas Engineering Assistant. Comcor Environmental Ltd., Cambridge, ON. 2005.A.Sc. Honours Environmental (Civil) Engineering Co-operative Program, Department of Civil and Environmental

267

Patents - Alan G. MacDiarmid (1980 - 1992)  

Office of Scientific and Technical Information (OSTI)

state of such secondary batteries, the polymer is in undoped form, and charging of the battery is effected by electrochemical doping of the polymer with the dopant ions of the...

268

Technical Sessions M. C. MacCracken Atmospheric amj Geophysical...  

NLE Websites -- All DOE Office Websites (Extended Search)

prolgram in the High Performance Computing and Communications Program, which is a new Presidential Initiative dedic:ated to the "grand challenge" computational problems. Just...

269

MAC and Routing Protocols for Mobile Underwater Acoustic Sensor Swarms  

E-Print Network (OSTI)

Pressure Routing for Underwater Sensor Networks . . . . . .of Aloha Protocols for Underwater Acoustic Sensor Networks.Critical Applications in Underwater Sensor Networks. In

Noh, Young Tae

2012-01-01T23:59:59.000Z

270

MAC and Routing Protocols for Mobile Underwater Acoustic Sensor Swarms.  

E-Print Network (OSTI)

??Underwater Acoustic Sensor Networks (UW-ASNs) have recently been proposed as a way to explore and observe the ocean, which covers two-thirds of the Earth's surface. (more)

Noh, Young Tae

2012-01-01T23:59:59.000Z

271

Former Lawrence Fellow David Lobell receives MacArthur fellowship  

NLE Websites -- All DOE Office Websites (Extended Search)

and connects informative sources of data to investigate the impact of climate change on crop production and food security around the globe. Former Lawrence Fellow David Lobell, who...

272

Preliminary Notice of Violation, MAC Isotopes, LLC - EA- 1998...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Test Reactor Area building from material processing activities taking place in a Hot Cell. The result of this release was contamination of the entire interior of the...

273

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2011 26, 2011 T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. July 25, 2011 T-675: Apple Laptop Battery Interface Lets Local Users Deny Service Apple Laptop Battery Interface Lets Local Users Deny Service July 22, 2011 T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

274

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23, 2011 23, 2011 T-586: Microsoft Advisory about fraudulent SSL Certificates Microsoft Advisory about fraudulent SSL Certificates. March 22, 2011 T-585: Mac OS X v10.6.7 Security Update 2011-001 Mac OS Update: Mac OS 10.6.7 fixes multiple vulnerabilities in the following release. This update can be installed on non-startup volumes, but you should only do this if the current startup volume has already been updated to Mac OS X Server v10.6.7. The simplest way to avoid issues from an improper installation is to start up from the volume that you wish to update. March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin

275

Apple-to-Apple: A Common Framework for Energy-Efficiency in Networks  

E-Print Network (OSTI)

linecard chassis is in use (i.e., Ii>0). The resulting power profiling, for both Cisco CRS-1 and Ju- niper

Paris-Sud XI, Université de

276

Apples-to-apples: a framework analysis for energy-efficiency in networks  

Science Conference Proceedings (OSTI)

Research on energy-efficiency of communication networks has already gained the attention of a broad research community. Specifically, we consider efforts towards improving environmental sustainability by making networks energyaware. An important step ...

Aruna Prem Bianzino; Anand Kishore Raju; Dario Rossi

2011-01-01T23:59:59.000Z

277

Logging in to Edison  

NLE Websites -- All DOE Office Websites (Extended Search)

Logging in Logging in to Edison Interactive Access You can log in to Edison using SSH (Secure Shell) with the following command from any UNIX, Mac OS X, Linux, FreeBSD, etc....

278

http://www.ctcms.nist.gov/~rdm/mumag.htmlComputation of ...  

Science Conference Proceedings (OSTI)

... Requirements* Unix/X, Windo ws 95+, Mac OS X *Tcl/Tk 7.6/4.2+ (8.0+ recommended) Tcl De veloper Xchange: http://www .tcl.tk *TCP/IP ...

279

Building Energy Software Tools Directory: REScheck  

NLE Websites -- All DOE Office Websites (Extended Search)

XP), Mac (OS 89X). Also available as a web-based software. Programming Language C++, Java Strengths Provides great flexibility while requiring a minimum amount of time and...

280

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the actual Cisco AnyConnect Secure Mobility Client. The helper application is a Java applet on the Linux and MacOS X platforms, and either a Java applet on the Windows...

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Emerging trends in mobile OS platforms  

E-Print Network (OSTI)

Smartphones with a market penetration of over 31% in US among mobile users have become a mass-market product within a short 4-year period since the launch of iPhone. Tablets are showing similar trajectory in terms of ...

Mohammed, Irfan, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

282

Appling County, Georgia: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

712238°, -82.2583297° 712238°, -82.2583297° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":31.712238,"lon":-82.2583297,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

283

CB ENCIi TEC APPL SCI Stuctual Dynamic Systems Computational Techniques  

E-Print Network (OSTI)

Airport Terminal, Liquefied Natural Gas (LNG) Facility in Greece, C-1 Computer Center Building in Japan of the layout of 212 isolation bearings of one of two identical LNG storage tanks during construction in Greece in 1995. The isolation system is located about 20 m under the ground surface. It supports the steel LNG

Nagarajaiah, Satish

284

ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO  

E-Print Network (OSTI)

floating point values. However, to use these system calls you will need to use the mfc1 and mtc1 round down. However, for up to 20% extra credit, you can implement rounding (using the guard, round

Groppi, Christopher

285

Commercial Reference Building: Large Hotel Apple...  

Open Energy Info (EERE)

descriptions for whole building energy analysis using

290

Fungicide control of apple scab: 2010 field trial  

E-Print Network (OSTI)

Manzate 4 lb + Vangard 4 oz (2x) then Flint 2 oz (3x) thenManzate 6 lb (1x) Flint 2.5 oz alt Procure 12 fl oz Rally+ Vangard, 4 oz (2x) then Flint, 2 oz (3x) then Manzate, 6

Eynard, James; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

291

Fungicide control of apple scab: 2007 trial results  

E-Print Network (OSTI)

Endorse 11.3DF Evito 480SC Flint 50WG JMS Stylet-oil LEM17Sovran, Evito, Endorse, Flint, the organic Champion ++ Topguard Dithane then Flint Dithane then Dithane + A7402

Janousek, Christopher N; Lorber, Jacob D; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

292

Fungicide control of apple scab: 2007 trial results  

E-Print Network (OSTI)

Lynn Wunderlich 2 and W. Douglas Gubler 1 Department of Plant Pathology, University of California, Davis,

Janousek, Christopher N; Lorber, Jacob D; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

293

AEO2011: Electricity Trade Apple-style-span  

Open Energy Info (EERE)

trade, gross domestic sales, international electricity trade, imports and exports to Canada and Mexico.
2011-08-01T19:29:49Z 2011-08-04T15:35:21Z http:...

294

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

E-Print Network (OSTI)

of gas-fired and renewable generation Mark Bolinger and Ryannatural gas prices, renewable energy resources which bygas-fired generation, renewable generation, such as wind or

Bolinger, Mark; Wiser, Ryan

2003-01-01T23:59:59.000Z

295

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

E-Print Network (OSTI)

fixed-price gas supply contracts and natural gas storage. Asnatural gas prices, rather than on prices that can be locked in through futures, swap, or fixed- price physical supplySupply, Renewable Energy Gas Options, Gas Storage Option Premium or Storage Cost Gas Price Falls Gas Price Rises Natural

Bolinger, Mark; Wiser, Ryan

2003-01-01T23:59:59.000Z

296

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

E-Print Network (OSTI)

operating costs, long-term fixed-price renewable energyRenewable Energy Gas Options, Gas Storage Option Premium or Storage Costrenewable power is more cost- competitive than previously believed, Renewable Energy

Bolinger, Mark; Wiser, Ryan

2003-01-01T23:59:59.000Z

297

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

E-Print Network (OSTI)

gas supply contracts and natural gas storage. As is shown inor Storage Cost Gas Price Falls Gas Price Rises Natural Gas

Bolinger, Mark; Wiser, Ryan

2003-01-01T23:59:59.000Z

298

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

E-Print Network (OSTI)

in the market, allowing natural gas price volatility to flowClearly, the variability of gas prices poses a major risk toincreasingly volatile natural gas prices, renewable energy

Bolinger, Mark; Wiser, Ryan

2003-01-01T23:59:59.000Z

299

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

E-Print Network (OSTI)

considering that natural gas prices (and gas pricein the market, allowing natural gas price volatility to flowincreasingly volatile natural gas prices, renewable energy

Bolinger, Mark; Wiser, Ryan

2003-01-01T23:59:59.000Z

300

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

E-Print Network (OSTI)

common practice of using gas price forecasts in long-rangeit is likely that gas prices in the US will continue to bethat natural gas prices (and gas price volatility) have a

Bolinger, Mark; Wiser, Ryan

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

DOE Green Energy (OSTI)

For better or worse, natural gas has become the fuel of choice for new power plants being built across the United States. According to the US Energy Information Administration (EIA), natural gas combined-cycle and combustion turbine power plants accounted for 96% of the total generating capacity added in the US between 1999 and 2002--138 GW out of a total of 144 GW. Looking ahead, the EIA expects that gas-fired technology will account for 61% of the 355 GW new generating capacity projected to come on-line in the US up to 2025, increasing the nationwide market share of gas-fired generation from 18% in 2002 to 22% in 2025. While the data are specific to the US, natural gas-fired generation is making similar advances in other countries as well. Regardless of the explanation for (or interpretation of) the empirical findings, however, the basic implications remain the same: one should not blindly rely on gas price forecasts when comparing fixed-price renewable with variable-price gas-fired generation contracts. If there is a cost to hedging, gas price forecasts do not capture and account for it. Alternatively, if the forecasts are at risk of being biased or out of tune with the market, then one certainly would not want to use them as the basis for resource comparisons or investment decisions if a more certain source of data (forwards) existed. Accordingly, assuming that long-term price stability is valued, the most appropriate way to compare the levelized cost of these resources in both cases would be to use forward natural gas price data--i.e. prices that can be locked in to create price certainty--as opposed to uncertain natural gas price forecasts. This article suggests that had utilities and analysts in the US done so over the sample period from November 2000 to November 2003, they would have found gas-fired generation to be at least 0.3-0.6 cents/kWh more expensive (on a levelized cost basis) than otherwise thought. With some renewable resources, in particular wind power, now largely competitive with gas-fired generation in the US (including the impact of the federal production tax credit and current high gas prices), a margin of 0.3-0.6 cents/kWh may in some cases be enough to sway resource decisions in favor of renewables.

Bolinger, Mark; Wiser, Ryan

2003-12-18T23:59:59.000Z

302

Apples with apples: accounting for fuel price risk in comparisons of gas-fired and renewable generation  

E-Print Network (OSTI)

natural gas combined-cycle and combustion turbine power plantsnatural gas has become the fuel of choice for new power plants

Bolinger, Mark; Wiser, Ryan

2003-01-01T23:59:59.000Z

303

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 28, 2011 July 28, 2011 T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service. July 27, 2011 T-677: F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability F5 BIG-IP BIND Negative Caching RRSIG RRsets Denial of Service Vulnerability. July 26, 2011 T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. July 25, 2011 T-675: Apple Laptop Battery Interface Lets Local Users Deny Service Apple Laptop Battery Interface Lets Local Users Deny Service

304

An introduction to ios programming: from getting the sdk to submitting your first app, 1 edition  

Science Conference Proceedings (OSTI)

Learn the steps necessary for building your first iOS app. With this introductory video course, experienced iOS developer Alasdair Allan walks you through the entire process, from downloading the developer tools to submitting your finished app to Apple's ...

Allan Alasdair

2011-05-01T23:59:59.000Z

305

Sandia National Laboratories: Working with Sandia: Just in Time Contracts  

NLE Websites -- All DOE Office Websites (Extended Search)

Just in Time Contracts Just in Time Contracts Commodity Descriptions of Commodity Items APPLE APPLE COMPUTERS (MAC) AUTO PARTS ELECTRICAL/MECH AUTO/EQUIP PARTS (RESTRICTED) BOOKS INFORMATIONAL MATERIALS-BOOKS BOTTLED WATER BOTTLED WATER/WATER COOLERS CALIBRATE REPAIR / CALIBRATE TEKTRONIX/MF INSTRUMENTATION CARTRIDGES REMANUFACTURED TONER CARTRIDGES CELLULAR PHONES CELLULAR PHONES/AIR TIME CHEMICALS CHEMICALS COFFEE SUPPLIES COFFEE/ TEA / SUGAR / CREAMER / DISPENSER (CONF LRG STAFF ONLY) COMM PRODUCTS COMMUNICATION SUPPORT SERVICES COMPRESSED GAS 500-5000 GAL CONTAINER SYS/HYDROGEN/ HELIUM/LIQUID NITROGEN/DEWARS COMPUTER SOFTWARE PREPACKAGED COMPUTER SOFTWARE/ EXCLUDES ALL MICROSOFT PRODUCTS COMPUTER TRAINING COMPUTER TRAINING DELL COMPUTERS DELL COMPUTERS--PERIPHERALS, ITEMS DESIGNATED FOR DELL PLATFORM

306

Edits performed by Bruce MacDonald to make it conform to ...  

Science Conference Proceedings (OSTI)

... of crude oil. It is used to fire boilers in electric generating plants, particularly in the northeastern US. The sulfur emissions ...

2011-08-04T23:59:59.000Z

307

Achievable throughput and service delay for imperfect cooperative retransmission MAC protocols  

Science Conference Proceedings (OSTI)

Cooperative retransmission medium access control protocols may be used in a cellular uplink setting to achieve a higher throughput than, say, slotted Aloha, while retaining the advantages of random channel access. When multiple nodes contend for channel ... Keywords: aloha, cooperative retransmission, medium access control

Steven Weber; Ananth V. Kini; Athina P. Petropulu

2008-10-01T23:59:59.000Z

308

Distributed MAC protocol for networks with multipacket reception capability and spatially distributed nodes  

E-Print Network (OSTI)

The physical layer of future wireless networks will be based on novel radio technologies such as Ultra-Wideband (UWB) and Multiple-Input Multiple-Output (MIMO). One of the important capabilities of such technologies is the ...

Celik, Guner Dincer

2007-01-01T23:59:59.000Z

309

Historia da Computac~ao MAC 412 -Organizac~ao de Computadores  

E-Print Network (OSTI)

"Computadores"mec^anicos 1642 - 1945 · B. Pascal (1623-1662) M´aquina de calcular mec^anica com engreganagens e

Song, Siang Wun

310

Trellis Coded Modulation for Two-User Unequal-Rate Gaussian MAC  

E-Print Network (OSTI)

In this paper, code pairs based on trellis coded modulation are proposed over PSK signal sets for a two-user Gaussian multiple access channel. In order to provide unique decodability property to the receiver and to maximally enlarge the constellation constrained (CC) capacity region, a relative angle of rotation is introduced between the signal sets. Subsequently, the structure of the \\textit{sum alphabet} of two PSK signal sets is exploited to prove that Ungerboeck labelling on the trellis of each user maximizes the guaranteed minimum squared Euclidean distance, $d^{2}_{g, min}$ in the \\textit{sum trellis}. Hence, such a labelling scheme can be used systematically to construct trellis code pairs for a two-user GMAC to approach \\emph{any rate pair} within the capacity region.

Harshan, J

2009-01-01T23:59:59.000Z

311

VHF & UHF energy harvesting radio system physical and MAC layer considerations.  

E-Print Network (OSTI)

??Wireless Sensor Network industrial and civilian applications have been moved closer to us since they were originally developed for defense applications. They have been or (more)

Zhang, Xiaohu

2009-01-01T23:59:59.000Z

312

MacEngineer McMaster University Faculty of Engineering Spring 2009  

E-Print Network (OSTI)

generator design included leading the Pickering A nuclear station design team, has written memoirs on Candu history. Go to: http://can- teach.candu.org. 5T3 Ike Goodfellow (ECE 5T3; MASc 5T4) is the rep

Haykin, Simon

313

MAC layer power management schemes for efficient energy- delay tradeoffs in wireless local area networks  

E-Print Network (OSTI)

power consumptions which are approximately standard for a specific devicepower consumption and thereby prolong the system lifetime of battery powered wireless devices,

Sarkar, Mahasweta

2006-01-01T23:59:59.000Z

314

Policies for Increasing Throughput and Decreasing Power Consumption in Bluetooth MAC  

E-Print Network (OSTI)

Bluetooth is a fast emerging standard for indoor pico-cellular wireless networks. Power is at a premium in typical Bluetooth devices like palmtops, PDAs, laptops and mobile phones. The Bluetooth standard defines various modes for reducing power consumption of the devices by reducing their transmission and reception activities. System throughput can be increased by keeping Bluetooth devices in low power mode in case of low data rates at those devices, by avoiding unnecessary polling packets. In this paper we propose policies for scheduling and switching of power modes of Bluetooth devices for increasing throughput and decreasing power consumption. All the proposed schemes, along with a policy where all the devices are always in active mode, and a policy with previous information of packet arrival times are implemented on a Bluetooth simulator for comparing their performance. Performance of the policies is compared for different traffic models and actual traffic traces. The policies are found to perform well in terms of power savings and throughput enhancement.

Indraneel Chakraborty; Abhishek Kashyap; Anupam Rastogi; Huzur Saran; Rajeev Shorey; Apurva Kumar

2000-01-01T23:59:59.000Z

315

Demonstration of distributed TDMA MAC protocol implementation with OLSR on linux enriched WARP  

Science Conference Proceedings (OSTI)

In this demo we present software extension for the Wireless open Access Research Platform (WARP), named as Linux Enriched WARP (LE-WARP). The objective of the LE-WARP is twofold. First, to make the WARP more independent from external systems, e.g., need ... Keywords: ad hoc, linux, olsr, synchronization, tdma, warp

Hannu Tuomivaara; Matti Raustia; Markku Jokinen

2009-09-01T23:59:59.000Z

316

Ar geochronology and structural data from the giant Okavango and related mac dyke swarms,  

E-Print Network (OSTI)

; Jung et al., 2003). · Les séries sédimentaires détritiques et carbonatées du Karoo (faisant partie des'horizontal sur les séries plissées du Damara. Les sédiments du Karoo affleurent tout autour des laves du Goboboseb, et sont en dessous. Au-dessus des terrains Karoo, on trouve une couverture cénozoïque et la

Dyment, Jérôme

317

Anthropogenic and Natural Emissions of Mercury (Hg) in the northeastern United Jeffrey MacAdam Sigler  

E-Print Network (OSTI)

. 2.1. Methods [10] Harvard Forest is located in Petersham, Massachu- setts (42.48°N, 72.18 W, 340 m

Lee, Xuhui

318

"Who needs MacArthur?" : analyzing South Korea's counterinvasion capability against North Korea  

E-Print Network (OSTI)

Assuming there is another North Korean invasion; could the South Koreans counterinvade North Korea and prevail even without the United States' assistance? This paper studies the possibility of a South Korean counterinvasion ...

Chung, Jonghyuk

2011-01-01T23:59:59.000Z

319

Receiver initiated MAC design for ad hoc networks based on multiuser detection  

Science Conference Proceedings (OSTI)

Recent technological developments in code division multiple access (CDMA) with multiuser detection (MUD) make multiple packets reception a more appropriate model for the physical layer of future wireless networks. To take advantage of the new features, ...

Jinfang Zhang; Zbigniew Dziong; Francois Gagnon; Michel Kadoch

2008-07-01T23:59:59.000Z

320

A dual-processor solution for the MAC layer of a software defined radio terminal  

Science Conference Proceedings (OSTI)

Considerable work has been devoted to studying flexible computation structures for the physical layer of a software defined radio (SDR) terminal. However there has been almost no research on protocol processors for the upper layer protocols such as the ... Keywords: SDR terminal, protocol processing, wireless platform

Hyunseok Lee; Trevor Mudge

2005-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Implementation of a Cooperative MAC protocol using a Software Defined Radio Platform  

E-Print Network (OSTI)

, Vikas Gelara, Shashi Raj Singh , Thanasis Korakis , Pei Liu , Shivendra Panwar Department of Electrical on the channel quality. Therefore, the poorer the channel is, the lower the transmission rate that should be used. A possible solution to this problem is the use of neighboring stations as relays to reduce channel time usage

Panwar, Shivendra S.

322

Three Political Philosophers Debate Social Science: Leo Strauss, Alasdair MacIntyre, and Charles Taylor  

E-Print Network (OSTI)

eds. , Interpretive Social Science: A Second Look (Berkeley:and David Collier, Political Science Methodology, in TheJohn Gerring, Social Science Methodology, Second Edition (

Blakely, Jason William

2013-01-01T23:59:59.000Z

323

August 2011 Jocelyn Marget Richard  

E-Print Network (OSTI)

at the 2011 meeting of the Society for Neuroscience, Washington, DC. Richard, J. M., & Berridge, K. C. (2011 of the Society for Neuroscience, Washington, DC. Dess, N. K., Chapman, C. D., Garrett, C. C., Gonzales, M., Mc, Adobe Illustrator, Noldus Observer, GraphPad Prism, Windows XP/7 and Mac OS X core software References

Berridge, Kent

324

Fabio Soldo Interests and Specialties  

E-Print Network (OSTI)

to Improve TCP Performance over Wireless Networks," in Proc. of GLOBECOM `07, Washington DC, USA, Nov. 2007 networks," in Proc. of IEEE MILCOM`06, Washington DC, USA, Oct. 2006 [C01] M. Gerla, B. Zhou, Y.-Z. Lee, F · Network Simulators: NS2, Qualnet · Operating Systems: Mac OS X, Unix, MS Windows Honors and Awards · ACM

Markopoulou, Athina

325

WindowsMillenniumEdition (Me) Windows98/98SecondEdition(SE)  

E-Print Network (OSTI)

WindowsMillenniumEdition (Me) Windows98/98SecondEdition(SE) Windows2000Professional WindowsXPHomeEdition WindowsXPProfessional Installation Guide Installing Nikon View 4 and Supporting Software Windows software (such as Cumulus) Mac OS Nikon D1 Nikon D1X Nikon D1H Windows Millennium Edition (Me) Windows 98

Kleinfeld, David

326

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 22, 2013 March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services March 21, 2013 V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple iOS March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 18, 2013 V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code

327

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 - 16340 of 28,905 results. 31 - 16340 of 28,905 results. Article Four Days Left to Buy Energy-Efficient Products for a 2009 Tax Credit! You may want to see if there are any deals out there for energy-efficient purchases-but time is running out if you want to get a tax credit when you file your 2009 taxes in April. http://energy.gov/energysaver/articles/four-days-left-buy-energy-efficient-products-2009-tax-credit Article U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. http://energy.gov/cio/articles/u-165-apple-ios-bugs-let-remote-users-execute-arbitrary-code-and-spoof-address-bar-urls

328

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 13760 of 28,560 results. 51 - 13760 of 28,560 results. Download CX-009030: Categorical Exclusion Determination Study of Intermetallic Nanostructures for Light-water Reactor Materials - Regents of the University of California CX(s) Applied: B3.6 Date: 08/20/2012 Location(s): California Offices(s): Nuclear Energy http://energy.gov/nepa/downloads/cx-009030-categorical-exclusion-determination Article V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities http://energy.gov/cio/articles/v-080-apple-ios-multiple-vulnerabilities Download Audit Report: IG-0613 Disposal of Remote-Handled Transuranic Waste at the Waste Isolation Pilot Plant http://energy.gov/ig/downloads/audit-report-ig-0613 Download Secure ICCP IntegrationConsiderations and Recommendations The goal of this report is to identify the operation and implementation

329

Did Apples refusal to license proprietary information enabling interoperability with its iPod music player constitute an abuse under Article 82 of the EC Treaty?  

E-Print Network (OSTI)

duplicated [..] The essential facilities doctrine has itsrelating to the essential facilities doctrine, it has nevercase law on the essential facilities doctrine leads us to

Mazziotti, Giuseppe

2005-01-01T23:59:59.000Z

330

CryptoPalm: a cryptographic library for PalmOS  

Science Conference Proceedings (OSTI)

PDAs and other handheld devices are commonly used for processing private or otherwise secret information. Their increased usage along with their networking capabilities raises security considerations for the protection of the sensitive information they ...

Georgios C. Alexandridis; Artemios G. Voyiatzis; Dimitrios N. Serpanos

2005-11-01T23:59:59.000Z

331

Acta Crystallographica Section D Optimum solubility (OS) screening ...  

methane]; TCEP, tris(2-carboxyethyl) phos-phine. 2. Introduction Advances in X-ray crystallography have provided three-dimensional structures of

332

A trusted assessment environment in a network-booted OS  

Science Conference Proceedings (OSTI)

This paper describes how a laboratory where students usually access the LAN using personal accounts can be configured during examinations. Test questions are automatically corrected by a learning-management system, which is used to authenticate students ... Keywords: authentication, computer-assisted assessment, innovative web-based teaching and learning technologies, learning management system, platform integration, testing and assessment issues in web-based education

Giorgio Biacchi; Philip Grew; Elena Pagani

2007-03-01T23:59:59.000Z

333

ZeptoOS: Operating Systems for Petascale | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Kamil Iskra Kazutomo Yoshii Other Contributors Ivan Beschastnikh (UW) Susan Coghlan (ALCF) Cameron Cooper (OSU) Aroon Nataraj (UO) Al Malony (UO) Sameer Shende (UO) Suravee...

334

engineering POstGraDuatePrOsPectus2011  

E-Print Network (OSTI)

to Glasgow and live at least 25 miles outside the city are given priority for a place in University of the University. These include a full symphonic wind band and big band, two choirs and a full-scale symphony

Mottram, Nigel

335

Ally: OS-Transparent Packet Inspection Using Sequestered Cores  

Science Conference Proceedings (OSTI)

This paper presents Ally, a server platform architecture that supports compute-intensive management services on multi-core processors. Ally introduces simple hardware mechanisms to sequester cores to run a separate software environment dedicated to management ... Keywords: multicore, packet inspection, isolation, computer architecture, multicore partitioning

Jen-Cheng Huang; Matteo Monchiero; Yoshio Turner; Hsien-Hsin S. Lee

2011-10-01T23:59:59.000Z

336

Enhancing the OS against Security Threats in System Administration  

E-Print Network (OSTI)

,25,37], offer more fine-grained protection [11], harden the TCB using formal verification [21], or use labeling or otherwise impact sensitive user data and processes, e.g., adding and remov- ing software packages-known Linux mechanisms and therefore show that the degree of protection proposed by the broker model

Ford, Bryan

337

Advanced Topics in OS: Multithreading 2 Michael Elhadad  

E-Print Network (OSTI)

() -- struct timeval time; time.tv??sec = 2; time.tv??usec = 0; for (;;) -- printf(''Otherwork...``n''); lwp timeval time; time.tv??sec = timeout; time.tv??usec = 0; lwp??sleep(&time); printf(''%s slept %d secs

Elhadad, Michael

338

Os Efeitos da Seca nas Florestas Chuvosas Amaznicas P. Meir...  

NLE Websites -- All DOE Office Websites (Extended Search)

Chuvosas Amaznicas P. Meir, 1 P. M. Brando, 2,3, 4 D. Nepstad, 5 S. Vasconcelos, 6 A. C. L. Costa, 7 E. Davidson, 4 S. Almeida, 8 R. A. Fisher, 9 E. D. Sotta, 10 D. Zarin,...

339

A memento web browser for iOS  

Science Conference Proceedings (OSTI)

The Memento framework allows web browsers to request and view archived web pages in a transparent fashion. However, Memento is still in the early stages of adoption, and browser-plugins are often required to enable Memento support. We report on a new ... Keywords: memento, mobile web, web archiving, web browser

Heather Tweedy; Frank McCown; Michael L. Nelson

2013-07-01T23:59:59.000Z

340

IN MEMORIAM PAUL ERD OS (1913-1996)  

E-Print Network (OSTI)

'antibiotiques : pleur´eesie s´eev`eere. Il s'approche du lit, et parle (trop) fort : -- Au revoir, Monsieur, j'ai laiss'ombre. Paul Erdos est n´ee `aa Budapest le 26 mars 1913, dans une famille juive. Son p`eere, Lajos, et sa m`eere demandera, bien plus tard, s'il a jamais ´eet´ee tent´ee par le mariage il r´eepondra : Mon caract`eere est

Tenenbaum, Gérald - Institut de Mathématiques ?lie Cartan, Université Henri Poincaré

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-081: Wireshark Multiple Vulnerabilities Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 18, 2013 V-072: Red Hat update for java-1.7.0-openjdk Red Hat has issued an update for java-1.7.0-openjdk. January 15, 2013 V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code

342

TMS Two-Column Proceedings Publications: Formatting Instructions  

Science Conference Proceedings (OSTI)

(Mac & Windows) page-layout program. InDesign. (Mac & Windows) page-layout program. Quark Xpress (Mac & Windows) ... WordPerfect (Windows) advanced...

343

Planejamento regional / territorial : a interface entre os planos diretores de aproveitamentos hidreltricos e os planos diretores municipais.  

E-Print Network (OSTI)

??This research allowed to understand the way the Managing Plan of Hydroelectric Plants affects the organization of the territory. The use and occupation of the (more)

Francine Borges Silva

2007-01-01T23:59:59.000Z

344

Claris FileMaker Pro 3.0 for Windows 95 and MacIntosh: With Disk, 1st edition  

Science Conference Proceedings (OSTI)

From the Publisher:Designed for business people who need to be up to speed on everyday applications for both Windows and Macintosh, the QuickTorials provide the ideal self-study solution. Unique design lies flat for easy use and includes step-by-step ...

Betsy Newberry

1996-09-01T23:59:59.000Z

345

Intitule Date Enseignant Intitule Date Enseignant AKIN Tuna 59 0 4 -0 2 AD 3 04-avr MAC  

E-Print Network (OSTI)

Page 1 Page 1 Intitule Date Enseignant Intitule Date Enseignant AKIN Tuna 59 0 4 - 0 2 AD 3 04-avr Date Enseignant AKIN Tuna 34 12-avr DT 69 02-mai RL EL QOTBI Noemie 51 11-avr AD 41 30-avr DT FATMI

Douai, Antoine

346

C H A P T E R S E V E N MacIntyre and the Emotivists  

E-Print Network (OSTI)

forecast ewf k = wf k ;bf k: (6) Similarly, ewo k = wo k ;bo k (7) would be a set of unbiased observations which properly accounts for bias is then ewa k = ewf k + Kk h ewo k ;Hk ewf k i (8) where ewa k wo k wf k in place of ewo k ewf k the analysis equation is wa k = wf k + Kk h wo k ;Hkwf k i : (11

Marsh, David

347

Feelings of Usefulness to Others, Disability, and Mortality in Older Adults: The MacArthur Study of Successful Aging  

E-Print Network (OSTI)

Study design and methodology. Aging (Milano), 5, 2737. P36B. J. (1995). Successful aging, life satisfaction, andInternational Journal of Aging and Human Development, Fried,

Gruenewald, Tara L.; Karlamangla, Arun S.; Greendale, Gail A.; Singer, Burton H.; Seeman, Teresa E.

2007-01-01T23:59:59.000Z

348

Appl. Phys. 18, 271 274 (1979) 9 bySpringer-Verlag1979  

E-Print Network (OSTI)

in thermally depoled La-doped lead zirconate titanate (PLZT) ceramics of composition 8/65/35 and 9/65/35 has on temperature-dependent optical second-harmonic generation (SHG) in ther- mally depoled samples, mainly performed at room temperature, by incomplete ther- mal depoling of the sample and by internal strain. 1

Osnabrück, Universität

349

Pure Appl. Chem., Vol. 77, No. 11, pp. 19051921, 2005. DOI: 10.1351/pac200577111905  

E-Print Network (OSTI)

applicable to both chemical and biological entities, becomes kinetically less stable to kinetically more of stability, whether biological or chemical, requires definitive physicochemical characterization. Kinetic be- cause it is the high kinetic barrier to reaction that prevents the chemical reaction from taking

Pross, Addy

350

Apples and oranges: don't compare levelized cost of renewables: Joskow  

SciTech Connect

MIT Prof. Paul Joskow points out that the levelized metric is inappropriate for comparing intermittent generating technologies like wind and solar with dispatchable generating technologies like nuclear, gas combined cycle, and coal. The levelized comparison fails to take into account differences in the production profiles of intermittent and dispatchable generating technologies and the associated large variations in the market value of the electricity they supply. When the electricity is produced by an intermittent generating technology, the level of output and the value of the electricity at the times when the output is produced are key variables that should be taken into account.

NONE

2010-12-15T23:59:59.000Z

351

Appl Microbiol Biotechnol (2004) 65: 620626 DOI 10.1007/s00253-004-1684-5  

E-Print Network (OSTI)

-forming industries require the use of greases to lubricate metal surfaces during manufacturing operations as a sole carbon and energy source (=0.05±0.01 h-1 at 0.5 vol% lubricant concentration). The active bacteria product has been shifted to pre- treatment, the cleaning process to remove lubricant greases and oils

Wood, Thomas K.

352

Rotten Apples: An Investigation of the Prevalence and Predictors of Teacher Cheating  

E-Print Network (OSTI)

then clean the answer keys, erasing stray pencil marks,deliver the completed answer keys and exams to the CPSin the middle of the answer key, making it more difficult to

Jacob, Brian A.; Levitt, Steve

2002-01-01T23:59:59.000Z

353

DOI: 10.1007/s00339-006-3758-y Appl. Phys. A 86, 275281 (2007)  

E-Print Network (OSTI)

Computational framework Cluster formation has been investigated by means of tight-binding molecular dynamics-empirical #12;276 Applied Physics A ­ Materials Science & Processing tight-binding (TB) model. Assuming a frozen to study systems involving more than a thou- sand atoms, we have switched from TB to model potential

Powles, Rebecca

354

U.S. State Wind Resource Potential Apple-style-span...  

Open Energy Info (EERE)

from development of the "available" windy land area after exclusions. The "Installed Capacity" shows the potential megawatts (MW) of rated capacity that could be...

355

J. Math. Anal. Appl. 372 (2010) 208223 Contents lists available at ScienceDirect  

E-Print Network (OSTI)

a School of Mathematical Sciences, Fudan University Shanghai, PR China, 200433 b Department of Mathematics the spread of infectious diseases: pharmaceu- tical interventions (drugs, vaccines) and non

Arino, Julien

356

AEO2011: Liquid Fuels Supply and Disposition Apple...  

Open Energy Info (EERE)

dataset uses million barrels per day. The data is broken down into crude oil, other petroleum supply, other non petroleum supply and liquid fuel consumption.
...

357

0301 1-5 KEY VISUAL CUES: man-orange outfit, apple, black ...  

Science Conference Proceedings (OSTI)

... RossInKansasJune2007._-o-_.2007_arrangement_of_districts143_512kb. mp4 0306 QUERY: Find the video of Lions banquet that includes a skit ...

2011-01-06T23:59:59.000Z

358

eGRID2007 Version 1.1 - All Files Apple-style-span  

Open Energy Info (EERE)

attributes of electricity generation. eGRID also provides aggregated data by state, U.S. total, company, and by three different sets of electric grid boundaries.<...

359

Hydrocol. Appl. (2010) Tome 17, pp.1776 http://www.hydroecologie.org c EDF, 2011  

E-Print Network (OSTI)

on fish communities were widely debated at the end of the seventies, as large thermal power plants were warming period and especially the 2003 heat-wave event have placed again the thermal biology at the front

Paris-Sud XI, Université de

360

Mobile Netw Appl DOI 10.1007/s11036-012-0370-6  

E-Print Network (OSTI)

divide these predictors into different power states (e.g., idle state and high clock rate state for CPU control the transition between different power states. When the DCH state starts, the protocol initiates consumption corre- sponding to different power states of the smartphone's components (e.g., CPU, memory, WNIC

Stojmenovic, Ivan

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Peer-to-Peer Netw. Appl. DOI 10.1007/s12083-010-0084-0  

E-Print Network (OSTI)

helped found the Program in Science, Technology and Society, and later joined the STS faculty. He came's programs in health sciences and biomedical engi- neering and developing collaborations with other.Ung Wong '04 (vice chair). The MIT Wind Ensemble wowed its audience with a program of modern music Friday

Ramkumar, Mahalingam

362

research papers 448 doi:10.1107/S0021889813001362 J. Appl. Cryst. (2013). 46, 448460  

E-Print Network (OSTI)

unit-cell volumes as a function of pressure and temperature are parameterized in the form of a Birch curve. Additional data obtained during this work, concerning the elastic properties of deuterated ice IV phase in contact with an equilibrium mixture of Na2SO4 and H2O at room pressure between a eutectic

Vocadlo, Lidunka

363

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

validate remote certificates and may ignore that a system root certificate has been disabled and incorrectly accept certificates signed by that root server CVE-2011-0214. On...

364

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

input elements may be autocompleted even if the site specifies that autocomplete be disabled CVE-2012-0680. A remote user can create specially crafted HTML that, when loaded by...

365

AEO2011: Natural Gas Imports and Exports Apple-style...  

Open Energy Info (EERE)

is Table 135, and contains only the reference case. The data is broken down into Crude oil, dry natural gas.
2011-07-29T20:40:33Z 2011-08-23T20:46:28Z http:...

366

Pure Appl. Chem., Vol. 71, No. 12, pp. 23332348, 1999. Printed in Great Britain.  

E-Print Network (OSTI)

R. THE?VENOT1 , KLARA TOTH2 , RICHARD A. DURST3 AND GEORGE S. WILSON4 1 Universite? Paris XII-Val de for the present project during 1993±1999 was as follows: D. R. The?venot, R. P. Buck, K. Cammann, R. A. Durst, K

Recanati, Catherine

367

research papers J. Appl. Cryst. (2007). 40, 489495 doi:10.1107/S0021889807011387 489  

E-Print Network (OSTI)

International Union of Crystallography Printed in Singapore ­ all rights reserved Low-background single-crystal, Chalk River Laboratories, Chalk River, Ontario, Canada K0J 1J0, and b Physics Department and the Centre on inexpensive single-crystal silicon are described. One uses a conventional cylindrical geometry

Ryan, Dominic

368

Pure Appl. Chem., Vol. 77, No. 2, pp. 379389, 2005. DOI: 10.1351/pac200577020379  

E-Print Network (OSTI)

- ecules (like disilane) even in small quantities. There is an optimum pressure, determined by primary

369

Comput Optim Appl DOI 10.1007/s10589-010-9329-3  

E-Print Network (OSTI)

was supported in part by a Research and Creative Activities Grant from UM-Flint. F. Gao Department of Mathematics, University of Michigan-Flint, Flint, MI 48502, USA e-mail: lxhan@umflint.edu #12;F. Gao, L. Han

Gao, Frank

370

Simultaneous synthesis of flexible heat exchanger network. Appl Thermal Eng 2002;22:90718  

E-Print Network (OSTI)

BSTRACT In industry there is still lot of potential to make an energy system more efficient and thereby reduce the waste heat available. On the other hand there is an option to export the waste heat to another industry or to society. When the use of a heat exchanger network is considered for these tasks the optimization framework developed in this work can be implemented to calculate the cost of optimal investments. This thesis presents a framework for generating flexible heat exchanger networks (HEN) over a specified range of variations in the flow rates and temperatures of the streams, so that the total annual costs (TAC) as a result of utility charges, exchanger areas and selection of matches are minimized. The proposed framework includes (i) an initialization stage to reduce the problem size, (ii) a multiperiod simultaneous MINLP model to synthesize a flexible HEN configuration, (iii) a multiperiod LP feasibility test model to check the operability and identify critical conditions which are to be included in the possible resolve stage of the MINLP model, and (iv) an NLP improvement model for further optimization

Juha Aaltola; Juha Aaltola; Otamedia Oy

2003-01-01T23:59:59.000Z

371

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

hidden, auto-filled forms on the target user's browser CVE-2011-0217. With a certain Java configuration, a remote user can create a specially crafted web site that, when loaded...

372

Appl Phys A DOI 10.1007/s00339-010-5735-8  

E-Print Network (OSTI)

and engineering, but many of these systems are complex with little or no symmetry and are difficult to fabri- cate]. Complex 3D microstructures, devices, and optics have been fabricated by 2PP, such as a microgear-wheel [8-expansion model is presented to explain the distortion caused by axial load- ings of the walls. 1 Introduction Two

Pyrak-Nolte, Laura J.

373

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2009; 17:1133  

E-Print Network (OSTI)

on PV magazine PHOTON International.3 The modules in reliability by government laboratories, third-plate terrestrial photovoltaic (PV) modules. An important facet of this subject is the standard module test of photovoltaics (PV) following such as accelerated temperature and humidity stresses the invention of the silicon

374

Eur. J Appl Physiol (1986) 55:457--464 EuropeanJournalof  

E-Print Network (OSTI)

demonstrates that continued preferential usage of a muscle is asso- ciated with altered electrical properties. (1984) arrived at the same conclusion by noting that the electrically induced twitch response time. Upper limb muscles may be more predis- posed to modifications than lower limb muscles (Schantz et

De Luca, Carlo J.

375

Appl Phys A DOI 10.1007/s00339-012-6958-7  

E-Print Network (OSTI)

. Devices such as flat panel displays, solar pho- tovoltaics, and energy efficient building materials all, deposited by spin coating, is exposed to monochromatic UV pulsed laser processing near a plasmonic resonance nanowire network are in competition over the density of the wires in the network [2]. A dense coating

Arnold, Craig B.

376

annual report of giving WINTER 2005 NEWSLETTER LEHIGH UNIVERSITY OFFICE OF ADVANCEMENT  

E-Print Network (OSTI)

..........................................98 Rust Disease of Apple.....................................................98 Sooty Blotch...........................................................102 Apple Maggot...............................................................102 Apple Rust Mite....................................................................116 Pearleaf Blister Mite and Pear Rust Mite .....................116 Periodical Cicada

Napier, Terrence

377

Undergraduate Alumni LEHIGH UNIVERSITY 1 Brooke R. Hartman  

E-Print Network (OSTI)

..........................................98 Rust Disease of Apple.....................................................98 Sooty Blotch...........................................................102 Apple Maggot...............................................................102 Apple Rust Mite....................................................................116 Pearleaf Blister Mite and Pear Rust Mite .....................116 Periodical Cicada

Gilchrist, James F.

378

T-627: Adobe Flash Player Memory Corruption | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Memory Corruption 7: Adobe Flash Player Memory Corruption T-627: Adobe Flash Player Memory Corruption May 20, 2011 - 2:50pm Addthis PROBLEM: Adobe Flash Player Memory Corruption, Denial Of Service, Execute Code PLATFORM: Windows, Mac OS X, Linux, and Solaris ABSTRACT: Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file. reference LINKS: CVE Details - CVE-2011-0627 CVE Details - Adobe Flash Player Vulnerability Statistics CVE Details - Adobe Security Vulnerabilities IMPACT ASSESSMENT: High Discussion:

379

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 9, 2011 September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 7, 2011 T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks. September 6, 2011 T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. September 2, 2011 T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed By Remote Users Mac OS X keychain certificate settings can be bypassed by remote users September 1, 2011 T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code Pidgin bugs let remote users deny service and potentially execute arbitrary

380

Design Notes Last update: 12112008  

E-Print Network (OSTI)

in docsisVersion.h · TCLdefines.tcl servers as the header file for the tcl scripts · C++ convention: don.h hdrdocsis.h macPhyInterface.h reseqFlowListElement.h serviceFlowObject.h The tcl support code : docsis@CentOS_VM ~/nsallinone2.33/ns2.33/tcl/lan $ The testscripts are located in : docsis

Martin, Jim

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Development of computer graphics  

SciTech Connect

The purpose of this project was to screen and evaluate three graphics packages as to their suitability for displaying concentration contour graphs. The information to be displayed is from computer code simulations describing air-born contaminant transport. The three evaluation programs were MONGO (John Tonry, MIT, Cambridge, MA, 02139), Mathematica (Wolfram Research Inc.), and NCSA Image (National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign). After a preliminary investigation of each package, NCSA Image appeared to be significantly superior for generating the desired concentration contour graphs. Hence subsequent work and this report describes the implementation and testing of NCSA Image on both an Apple MacII and Sun 4 computers. NCSA Image includes several utilities (Layout, DataScope, HDF, and PalEdit) which were used in this study and installed on Dr. Ted Yamada`s Mac II computer. Dr. Yamada provided two sets of air pollution plume data which were displayed using NCSA Image. Both sets were animated into a sequential expanding plume series.

Nuttall, H.E. [Univ. of New Mexico, Albuquerque, NM (US). Dept. of Chemical and Nuclear Engineering

1989-07-01T23:59:59.000Z

382

Image upload with broken thumbnail image | OpenEI Community  

Open Energy Info (EERE)

Image upload with broken thumbnail image Image upload with broken thumbnail image Home > Groups > Developer Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Windows: ctrl + F5 Mac/Apple: Apple + R or command + R Linux: F5 Thanks! DIAGNOSTIC INFORMATION: BROKEN THUMBNAIL IMAGE HEADERS (RIGHT IMAGE, BUT CACHED BEFORE THUMBNAIL CREATED): Request URL:http://prod-http-80-800498448.us-east-1.elb.amazonaws.com/w/images/thumb/4/44/Powered_by_OpenEI_196x49_sc.png/120px-Powered_by_OpenEI_196x49_sc.png

383

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30, 2013 30, 2013 V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service) May 29, 2013 V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users Two vulnerabilities were reported in HP-UX Directory Server. May 28, 2013 V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server A vulnerability was reported in Cisco WebEx for iOS. May 27, 2013 V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The system does not properly validate all Inter-Satellite Sync operations

384

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities Two vulnerabilities were reported in Apache Tomcat November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands A vulnerability was reported in Cisco Prime Data Center Network Manager. October 31, 2012

385

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2012 10, 2012 U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. May 9, 2012 U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. May 8, 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may

386

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS November 7, 2012 V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

387

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24, 2012 24, 2012 U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions A vulnerability was reported in Apache CXF September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes. September 19, 2012 U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site

388

Testes rapidos (kits) para avaliao da qualidade de oleos, gorduras e produtos que os contenham e sua correlao com os metodos oficiais da AOCS.  

E-Print Network (OSTI)

??DiaMed Food Analysis Test System (F.A.T.S.) composto por testes rpidos, alternativos aos mtodos convencionais de determinao de cidos graxos livres (%AGL), ndice de perxidos (more)

Cibele Cristina Osawa;

2005-01-01T23:59:59.000Z

389

Logging in to Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Logging in Logging in Logging in to Hopper Interactive Access You can log in to Hopper using SSH (Secure Shell) with the following command from any UNIX, Mac OS X, Linux, FreeBSD, etc. command shell or terminal: ssh -l username hopper.nersc.gov There are several SSH-capable clients available for Windows, Mac, and UNIX/Linux machines. NERSC does not support or recommend any particular client. Hopper has 12 login nodes. You will be randomly connected to one of those 12 when you ssh to hopper.nersc.gov. In all cases it will appear to you as if you are on "hopper.nersc.gov." The login nodes are where you compile codes, submit jobs, and view data. The login nodes on Hopper are "external," meaning they are not directly connected to Hopper's internal high-speed "Gemini" network. Because the

390

 

NLE Websites -- All DOE Office Websites (Extended Search)

Adobedÿí Adobedÿí<TPhotoshop 3.08BIM%8BIMê°<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.PMHorizontalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMHorizontalRes 72 com.apple.print.ticket.client com.apple.printingmanager

391

Copyright David JC MacKay 2009. This electronic copy is provided, free, for personal use only. See www.withouthotair.com. Sustainable Energy --without the hot air  

E-Print Network (OSTI)

of the active faculty include: heat transfer during cooking, microencapsulation, microwave measurement, microwave-assisted extraction of bioactives and microbial de-contamination (E-coli in drinking water), microwave- assisted drying of meats and vegetables and other food products, research on the utilization

392

Copyright David JC MacKay 2009. This electronic copy is provided, free, for personal use only. See www.withouthotair.com. Sustainable Energy --without the hot air  

E-Print Network (OSTI)

............................................................. 7 Gasification Direct Solar Gasification...................................................................... 11 Miscellaneous Gasification Processes.................................................... 11 Biomass

393

A failure to communicate Is God A Scientist? A Dialogue between Science and Religion by Robert Crawford, Palgrave MacMillan, 2004. 45.00 hbk (192 pages)  

E-Print Network (OSTI)

to demonstrate the power of the atomic bomb in 1949, before it was dropped on Hiroshima and Nagasaki (the bomb

Mangel, Marc

394

Departamento de Ci^encia da Computac~ao IME-USP Segundo Semestre de 2010 MAC 115 Introduc~ao `a Computac~ao IF  

E-Print Network (OSTI)

calculadora mec^anica que realizava somas e subtra¸c~oes. A linguagem de programa¸c~ao Pascal (desenvolvida

Kohayakawa, Yoshiharu

395

COMMENCEMENT SPEAKERS 1897: Professor L. H. Bailey, Cornell University, M.A.C. Class of 1882 (June 18), Ithaca, New York  

E-Print Network (OSTI)

J. England, Jr., LLMT `72 Ira S. Epstein Ruth Espey-Romero Orlando L. Evora Spencer G. Feldman recipient, Joke Dekeersschieter, Burton Young Externship award recipient, Bernard P. Perlmutter, JD'83 Foundation Peter andYuriko Lederer Ivor Massey, Jr., JD `79 Paul J. McMahon Hon. Peter R. Palermo, JD `50

Landis, Doug

396

Application of an integrated PHY and MAC layer model for half-duplex IEEE 802.15.4 networks to smart grids  

Science Conference Proceedings (OSTI)

This paper puts the spotlight on the home/building area network of the smart grid. The IEEE 802.15.4 standard provides the core infrastructure for collecting data from customers' premises and forwarding it to the operations as well as service providers. ...

Batool Talha; Piergiuseppe Di Marco; Mostafa Kaveh

2011-10-01T23:59:59.000Z

397

Copyright David JC MacKay 2009. This electronic copy is provided, free, for personal use only. See www.withouthotair.com. Sustainable Energy --without the hot air  

E-Print Network (OSTI)

-exchange system. This document was prepared using recycled paper. #12;ORNL/M-2733 A BRIEF HISTORY OF THE CHEMICAL.3.2 Miles C. Leverett, Director, Technical Division, 1943-1948, ORNL. . . . . . . . . . . . PERSPECI'IVES OF FORMER ORNL DIRECTORS AND ASSOCIATE DIRECTORS

MacKay, David J.C.

398

MAC/PHY Cross-Layer Design and Analysis for Multiple Packet Detector MIMO Sanaz Barghi Hamid Jafarkhani Homayoun Yousefi'zadeh  

E-Print Network (OSTI)

orthogonal resources to different terminals. In heavy load conditions, slotted access methods use resources- This work was partially sponsored by a grant from the Boeing Company. cations. Generally speaking, layered

Yousefi'zadeh, Homayoun

399

Desktop Computing Workbook: A Guide for Using 15 Programs in MacIntosh and Windows Formats with CD (Audio), 1st edition  

Science Conference Proceedings (OSTI)

From the Publisher:This book combines coverage of desktop design aesthetics and computer program basics with practical workbook assignments. It discusses 15 different programs in both Macintosh and Windows formats (including basic instructions for using ...

Paul Martin Lester

1995-08-01T23:59:59.000Z

400

Visualization Tools for Computational Electrocardiology Robert S. MacLeod, Ph.D. Christopher R. Johnson, Ph.D. Mike A. Matheson, M.Sc.  

E-Print Network (OSTI)

system", a set of distributed, batch-mode utilities for generating rendered images. Programs in the CVRTI conductivities: the outer boundary of the torso; the subcutaneous fat/muscle interface; the inner border

Utah, University of

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

SIAM J. APPL. MATH. c 2006 Society for Industrial and Applied Mathematics Vol. 66, No. 6, pp. 20852106  

E-Print Network (OSTI)

the computational cost by several orders of magni- tude with respect to the global energy-norm-based hp.1137/050631732 1. Introduction. A plethora of energy-norm-based algorithms intended to gen- erate optimal grids) to accurately solve a large class of engineering prob- lems. However, the energy-norm is a quantity of limited

Torres-Verdín, Carlos

402

Appl Phys A (2011) 105:713722 DOI 10.1007/s00339-011-6583-x  

E-Print Network (OSTI)

light-emitting diodes (OLEDs) [9], organic thin-film transistors [10], ceramics [11], 3-D interconnects

403

SIAM J. APPL. MATH. c 2007 Society for Industrial and Applied Mathematics Vol. 67, No. 3, pp. 777791  

E-Print Network (OSTI)

of the time reversal operator) is explored numerically. In particular, we show that selective focusing, which is known to occur for small and distant enough scatterers, holds when the wavelength and the size] and confirmed by experiments that for ideally resolved or pointlike and distant enough scatterers with different

Ramdani, Karim - Institut de Mathématiques ?lie Cartan, Université Henri Poincaré

404

Appl. Phys. A 74, 345348 (2002) / Digital Object Identifier (DOI) 10.1007/s003390201275 Applied Physics A  

E-Print Network (OSTI)

on aerogel-supported catalyst B. Zheng, Y. Li, J. Liu Department of Chemistry, Duke University, Durham, NC monoxide on an aerogel-supported Fe/Mo catalyst. A simple acidic treat- ment followed by an oxidation of amorphous-carbon coating. Several fac- tors that affect the yield and the quality of the SWNTs were also

Liu, Jie

405

Oak Ridge National Environmental Research Park -- Research Park...  

NLE Websites -- All DOE Office Websites (Extended Search)

of a proposed long-term study led by Paul Hanson, Phillip Jardine, Mac Post, Chuck Garten, Pat Mulholland, and Mac Callaham of Oak Ridge National Laboratory's Environmental...

406

Attendees List  

Herbst R. Scott Hobbs David Holtzscheiter Bill Jackson Patrick Jantzen Carol Josephenson Gary Lambert Dan Lillard Scott Louthan Mac Lukens Wayne MacDonald Digby

407

H:\PROJEC~1\2004\2004OS~1\2004  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secure Transportation Secure Transportation Emergency Management Program Independent Oversight Evaluation of the Office of Independent Oversight and Performance Assurance February 2004 OVERSIGHT Table of Contents 1.0 INTRODUCTION ....................................................................1 2.0 RESULTS .................................................................................2 3.0 CONCLUSIONS ......................................................................4 4.0 RATINGS .................................................................................5 APPENDIX A - SUPPLEMENTAL INFORMATION ...................6 APPENDIX B - SITE-SPECIFIC FINDINGS ...............................7 APPENDIX C - EMERGENCY PLANNING ................................8 APPENDIX D - EMERGENCY PREPAREDNESS

408

Filet-o-fish: practical and dependable domain-specific languages for OS development  

Science Conference Proceedings (OSTI)

We address a persistent problem with using domain-specific languages to write operating systems: the effort of implementing, checking, and debugging the DSL usually outweighs any of its benefits. Because these DSLs generate C by templated string concatenation, ...

Pierre-Evariste Dagand; Andrew Baumann; Timothy Roscoe

2010-01-01T23:59:59.000Z

409

Filet-o-Fish: practical and dependable domain-specific languages for OS development  

Science Conference Proceedings (OSTI)

We address a persistent problem with using domain-specific languages to write operating systems: the effort of implementing, checking, and debugging the DSL usually outweighs any of its benefits. Because these DSLs generate C by templated string concatenation, ...

Pierre-Evariste Dagand; Andrew Baumann; Timothy Roscoe

2009-10-01T23:59:59.000Z

410

"Os franciscanos da reconciliao e o ecumenismo na arquidiocese de So Paulo (1977-1994)".  

E-Print Network (OSTI)

??The objective of the present work is to analyse the ecumenical task performed by Franciscan Friars and Sisters of Atonement in Sao Paulo City in (more)

Edison Minami

2005-01-01T23:59:59.000Z

411

OS and compiler considerations in the design of the IA-64 architecture  

Science Conference Proceedings (OSTI)

Increasing demands for processor performance have outstripped the pace of process and frequency improvements, pushing designers to find ways of increasing the amount of work that can be processed in parallel. Traditional RISC architectures use hardware ...

Rumi Zahir; Jonathan Ross; Dale Morris; Drew Hess

2000-12-01T23:59:59.000Z

412

Client/Server distributed processing using SunOS remote procedure protocol  

SciTech Connect

Over the last ten years the development of PC's and workstations has changed the way computing is performed. Previously, extensive computations were performed on large high speed mainframe machines with substantial storage capacity. Large capital and operational costs were associated with these machines. The advent of more powerful workstations has brought more computational cycles to the users at lower cost than was achieved with busy timesharing systems. However, many users still can't afford individual special purpose hardware or gigabytes of storage. A successful distributed processing environment must share these resources. Client/Server models have been proposed to address the issues of shared resources. They are not a new idea, but their implementation has been difficult. With the introduction of SUN's public domain Remote Procedure Call (RPC) Protocol and SUN's interface generator, RPCGEN, their implementation has been made easier. SUN has developed a set of C'' callable routines that handle the Client/Server operations. The availability of Network File System (NFS) on the SRL CRAY and the arrival of Wollongong's latest version of NFS has allowed applications and information sharing between computing platforms. This paper reviews the Client/Server model with respect to SUN's RPC implementation. The discussion will focus on the RPC connection between local and remote machines, the RPC Paradigm for making remote procedure calls, and the programming levels of the RPC libraries. The paper will conclude with summaries of two applications developed at SRL using the protocol and their effect on our computing environment. These include the Nuclear Plant Analyzer and an animation of fluids using behavioral simulation of atom-like particles.

Hammer, K.E.; Gilman, T.L.

1990-01-01T23:59:59.000Z

413

The rice OsGAE1 is a novel gibberellin-regulated gene and involved ...  

Science Conference Proceedings (OSTI)

genomic DNA was isolated from 1-week-old seedlings grown on MS ... restriction mapping and sequencing. .... (residues 52190) with a repeated sequence of.

414

Quantifying trade-os between pest sampling time and precision in commercial  

E-Print Network (OSTI)

will increase the cost of the sampling pro- gram, where cost is measured in terms of time, labor, equipment of the resulting pest management decision. Using con- sperse stink bug (Euschistus conspersus Uhler) in processing of samples required for a precise population estimate. An insect pest with uniform ®eld dis- tribution lends

Sheridan, Jennifer

415

OS support for a commodity database on PC clusters: distributed devices vs. distributed file systems  

Science Conference Proceedings (OSTI)

In this paper we attempt to parallelise a commodity database for OLAP on a cluster of commodity PCs by using a distributed high-performance storage subsystem. By parallelising the underlying storage architecture we eliminate the need to make any changes ...

Felix Rauch; Thomas M. Stricker

2005-01-01T23:59:59.000Z

416

Art of Rapid Prototyping: User Interface Design for Windows and OS/2, 1st edition  

Science Conference Proceedings (OSTI)

From the Publisher:Describing a prototyping process which is applicable for all computer platforms from the smallest personal computer to the largest mainframe, The Art of Rapid Prototyping details how prototyping is one of the best ways to improve the ...

Scott Isensee; James R. Rudd; Michael Heck

1995-11-01T23:59:59.000Z

417

From Ptides to PtidyOS, Designing Distributed Real-Time Embedded Systems  

E-Print Network (OSTI)

while Ptides takes an event trigger approach, and 2) Giottofor Ptides models where events are trigger events, meaningonly dealt with trigger events in the system, which are

Zou, Jia

2011-01-01T23:59:59.000Z

418

Energy Is Just Another Resource: Energy Accounting and Energy Pricing in the Nemesis OS  

Science Conference Proceedings (OSTI)

Abstract: In this position paper, we argue that, with an appropriate operating system structure, energy in mobile computers can be treated and managed as just another resource. In particular, we investigate how energy management could be added to the ...

Rolf Neugebauer; Derek McAuley

2001-05-01T23:59:59.000Z

419

Hopper OS upgrade and new SW set to default next Wed, Feb 27  

NLE Websites -- All DOE Office Websites (Extended Search)

parallel-netcdf1.3.1 -- perftools6.0.1 -- papi5.0.1 -- atp1.6.0 -- stat1.2.1.3 -- javajdk1.7.007 -- xt-asyncpe5.16 The availability of the above software versions were...

420

Power containers: an OS facility for fine-grained power and energy management on multicore servers  

Science Conference Proceedings (OSTI)

Energy efficiency and power capping are critical concerns in server and cloud computing systems. They face growing challenges due to dynamic power variations from new client-directed web applications, as well as complex behaviors due to multicore resource ... Keywords: hardware counters, multicore, operating system, power modeling, power virus, server and cloud computing

Kai Shen; Arrvindh Shriraman; Sandhya Dwarkadas; Xiao Zhang; Zhuan Chen

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Architecture of participation : the realization of the Semantic Web, and Internet OS  

E-Print Network (OSTI)

The Internet and World Wide Web (WWW) is becoming an integral part of our daily life and touching every part of the society around the world including both well-developed and developing countries. The simple technology and ...

Lau, Shelley

2008-01-01T23:59:59.000Z

422

How do we find personal files?: the effect of OS, presentation & depth on file navigation  

Science Conference Proceedings (OSTI)

Folder navigation is the main way that computer users retrieve their personal files. However we know surprisingly little about navigation, particularly about how it is affected by the operating system used, the interface presentation and the folder structure. ... Keywords: files, navigation, personal information management

Ofer Bergman; Steve Whittaker; Mark Sanderson; Rafi Nachmias; Anand Ramamoorthy

2012-05-01T23:59:59.000Z

423

A2thOS: availability analysis and optimisation in SLAs  

Science Conference Proceedings (OSTI)

Information technology (IT) service availability is at the core of customer satisfaction and business success for today's organisations. Many medium- to large-size organisations outsource part of their IT services to external providers, with service-level ...

Emmanuele Zambon; Sandro Etalle; Roel J. Wieringa

2012-03-01T23:59:59.000Z

424

Low-power TinyOS tuned processor platform for wireless sensor network motes  

Science Conference Proceedings (OSTI)

In this article we describe a low-power processor platform for use in Wireless Sensor Network (WSN) nodes (motes). WSN motes are small, battery-powered devices comprised of a processor, sensors, and a radio frequency transceiver. It is expected that ... Keywords: Embedded system design, Wireless Sensor Network, hardware-software codesign, low power processor

R. K. Raval; C. H. Fernandez; C. J. Bleakley

2010-05-01T23:59:59.000Z

425

H:\\PROJEC~1\\2004\\2004OS~1\\2004  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secure Transportation Emergency Management Program Independent Oversight Evaluation of the Office of Independent Oversight and Performance Assurance February 2004 OVERSIGHT Table...

426

Tessellation: Refactoring the OS around Explicit Resource Containers with Continuous Adaptation  

E-Print Network (OSTI)

some latency. Event-triggered (ET) cells provide flexible event-handling as well as good responsiveness to QoS domains called cells. Tessellation separates global decisions about the allocation of resources to cells from application-specific scheduling of resources within cells. We examine the implementation

Kubiatowicz, John D.

427

Gus Pabon  

NLE Websites -- All DOE Office Websites (Extended Search)

at Apple, Inc. During a majority of his tenure at Apple he was responsible for all AC-DC power system development in the Apple product line. Under his leadership, Gus group...

428

--No Title--  

NLE Websites -- All DOE Office Websites (Extended Search)

int.PageFormat.PMHorizontalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray ...

429

Dependence of local electronic structure in p-type GaN on crystal polarity and presence of inversion domain boundaries  

E-Print Network (OSTI)

V. Smith, E. T. Yu, J. M. Redwing, and K. S. Boutros, Appl.Miller, E. T. Yu, and J. M. Redwing, Appl. Phys. Lett. 78,

Zhou, X; Yu, E T; Green, D S; Speck, J S

2006-01-01T23:59:59.000Z

430

Process Management Practices and Performance: Competition and the Moderating Effect of Technological Capabilities *  

E-Print Network (OSTI)

, Lenox and Terlaak, 2005; Guler, Guillen, and MacPherson, 2002). Existing research further suggests

Veloso, Francisco

431

Impact of Canada's Voluntary Agreement on Greenhouse Gas Emissions from Light Duty Vehicles  

E-Print Network (OSTI)

variable displacement compressors. Conventional MAC systems have fixed speed compressors with a constant refrigerant flow

Lutsey, Nicholas P.

2006-01-01T23:59:59.000Z

432

Impact of Canadas Voluntary Agreement on Greenhouse Gas Emissions from Light Duty Vehicles  

E-Print Network (OSTI)

variable displacement compressors. Conventional MAC systems have fixed speed compressors with a constant refrigerant flow

Lutsey, Nicholas P.

2006-01-01T23:59:59.000Z

433

Double Crystal Analyzer System  

Science Conference Proceedings (OSTI)

... 2002 Page 2. Bloomberg Center for Physics & Astronomy Johns Hopkins University Baltimore Maryland MACS Double ...

2002-02-25T23:59:59.000Z

434

Issue 225 29 October 2010 SharingstoriesofImperial'scommunity Recognising  

E-Print Network (OSTI)

Luening, Dorothy Hodgskiss Mac Gregor, Susan Ann Makela, Carole June Mezera, Margaret Anne Muehr, June N

435

EFFECT OF MOBILITY ON PERFORMANCE OF WIRELESS AD-HOC NETWORK PROTOCOLS.  

SciTech Connect

We empirically study the effect of mobility on the performance of protocols designed for wireless adhoc networks. An important ohjective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols was measured in terms of (i) latency, (ii) throughput, (iii) number of packels received, (iv) long term fairness and (v) number of control packets at the MAC layer level. Three different commonly studied routing protocols were used: AODV, DSR and LAR1. Similarly three well known MAC protocols were used: MACA, 802.1 1 and CSMA. The inair1 conclusion of our study include the following: 1. 'I'he performance of the: network varies widely with varying mobility models, packet injection rates and speeds; and can ba in fact characterized as fair to poor depending on the specific situation. Nevertheless, in general, it appears that the combination of AODV and 802.1 I is far better than other combination of routing and MAC protocols. 2. MAC layer protocols interact with routing layer protocols. This concept which is formalized using statistics implies that in general it is not meaningful to speak about a MAC or a routing protocol in isolation. Such an interaction leads to trade-offs between the amount of control packets generated by each layer. More interestingly, the results wise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. 3. Routing prolocols with distributed knowledge about routes are more suitable for networks with mobility. This is seen by comparing the performance of AODV with DSR or LAR scheme 1. In DSli and IAR scheme 1, information about a computed path is being stored in the route query control packct. 4. MAC layer protocols have varying performance with varying mobility models. It is not only speed that influences the performance but also node degree and connectivity of the dynamic network that affects the protocol performance. 'The main implication of OUI' work is that performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the pcrlormance of a communication network, it will be important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the 7 layer OS1 stilck will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as design of experinierits arzd aiialysis qf variance methods to characterize the interaction between the protocols, mobility patterns and speed. This allows us to mako much more informed conclusions about the performance of thc protocols than would have been possible by merely running these experiments and observing the data. These ideas are of independtmt interest and are applicable in other contexts wherein one experimentally analyzes algorithms.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.); Marathe, A. (Achla)

2001-01-01T23:59:59.000Z

436

Xgrid admin guide  

SciTech Connect

Xgrid, with a capital-X is the name for Apple's grid computing system. With a lower case x, xgrid is the name of the command line utility that clients can use, among other ways, to submit jobs to a controller. An Xgrid divides into three logical components: Agent, Controller and Client. Client computers submit jobs (a set of tasks) they want run to a Controller computer. The Controller queues the Client jobs and distributes tasks to Agent computers. Agent computers run the tasks and report their output and status back to the controller where it is stored until deleted by the Client. The Clients can asynchronously query the controller about the status of a job and the results. Any OSX computer can be any of these. A single mac can be more than one: it's possible to be Agent, Controller and Client at the same time. There is one Controller per Grid. Clients can submit jobs to Controllers of different grids. Agents can work for more than one grid. Xgrid's setup has a pleasantly small palette of choices. The first two decisions to make are the kind of authentication & authorization to use and if a shared file system is needed. A shared file system that all the agents can access can be very beneficial for many computing problems, but it is not appropriate for every network.

Strauss, Charlie E M [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

437

 

NLE Websites -- All DOE Office Websites (Extended Search)

ØPhotoshop 3.08BIM%8BIMê!ß ØPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

438

 

NLE Websites -- All DOE Office Websites (Extended Search)

Photoshop 3.08BIM%8BIMê!ß Photoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

439

 

NLE Websites -- All DOE Office Websites (Extended Search)

ÔPhotoshop 3.08BIM%8BIMê!ß ÔPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

440

 

NLE Websites -- All DOE Office Websites (Extended Search)

ðÿíD†Photoshop 3.08BIM%8BIMê!ß ðÿíD†Photoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

 

NLE Websites -- All DOE Office Websites (Extended Search)

˜Photoshop 3.08BIM%8BIMê!ß ˜Photoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

442

 

NLE Websites -- All DOE Office Websites (Extended Search)

lPhotoshop 3.08BIM8BIM%èñ\ó/Á¡¢{g-ÅdÕº8BIMê° lPhotoshop 3.08BIM8BIM%èñ\ó/Á¡¢{g-ÅdÕº8BIMê°<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.PMHorizontalRes com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.PMHorizontalRes 72 com.apple.print.ticket.client com.apple.printingmanager

443

 

NLE Websites -- All DOE Office Websites (Extended Search)

ŠPhotoshop 3.08BIM%8BIMê!ß ŠPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

444

 

NLE Websites -- All DOE Office Websites (Extended Search)

AØPhotoshop 3.08BIM%8BIMê!ß AØPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

445

 

NLE Websites -- All DOE Office Websites (Extended Search)

BPhotoshop 3.08BIM%8BIMê!ß BPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

446

 

NLE Websites -- All DOE Office Websites (Extended Search)

ŽPhotoshop 3.08BIM%8BIMê!ß ŽPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

447

 

NLE Websites -- All DOE Office Websites (Extended Search)

™ÿí>úPhotoshop 3.08BIM%8BIMê!ß ™ÿí>úPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

448

 

NLE Websites -- All DOE Office Websites (Extended Search)

PPhotoshop 3.08BIM%8BIMê!ß PPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

449

 

NLE Websites -- All DOE Office Websites (Extended Search)

DjPhotoshop 3.08BIM%8BIMê!ß DjPhotoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

450

 

NLE Websites -- All DOE Office Websites (Extended Search)

Photoshop 3.08BIM%8BIMê!ß Photoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

451

 

NLE Websites -- All DOE Office Websites (Extended Search)

A2Photoshop 3.08BIM%8BIMê!ß A2Photoshop 3.08BIM%8BIMê!ß<?xml version="1.0" encoding="UTF-8"?> com.apple.print.PageFormat.FormattingPrinter com.apple.print.ticket.creator com.apple.printingmanager com.apple.print.ticket.itemArray com.apple.print.PageFormat.FormattingPrinter _222_A112_HPZ6100PSC com.apple.print.ticket.client com.apple.printingmanager

452

IOP PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 40 (2007) 43764381 doi:10.1088/0022-3727/40/14/037  

E-Print Network (OSTI)

and pulsed operation are used. 1. Introduction Thermoelectric coolers can pump heat using electricity without any moving parts. They are lightweight, small and inexpensive. The steady-state cooling temperature while Joule heating is distributed in the body of the thermoelectric element. The Joule heating takes

453

* This chapter is based on: A. Morelli, Sriram Venkatesan, B. J. Kooi, G. Palasantzas, J. Th. M. De Hosson, J. Appl. Phys. 105, 064106 (2009)  

E-Print Network (OSTI)

10 'i5. E c:t 5 UJ 0 W A 100 Hz Voltagtt-clamp 100 Hz + DepoL illlllWlUllIr . ..., - L lw20mV J L- 20mV c 0.5 nA L Depol. Alone .. 40msec 100 Hz + Voltage- Clamp .. 2.0nAL 40 msec 100 Hz + Voltage- Clamp .. 100 Hz + Depol. .. '-A B Control 20 minutes Posttetanus . . "........ · I V......... · ..· V

Groningen, Rijksuniversiteit

454

Copyright by SIAM. Unauthorized reproduction of this article is prohibited. SIAM J. APPL. MATH. c 2008 Society for Industrial and Applied Mathematics  

E-Print Network (OSTI)

and stability of certain chemical networks and applications to the kinetic proofreading model of T-cell receptor action kinetics. A chemical reaction system is said to have mass action kinetics if (2) Ryy (x) = kyy xy1 reversible, deficiency zero, chemical reaction system with mass action kinetics, each semilocking set

Anderson, David F.

455

Pure Appl. Chem., Vol. 83, No. 2, pp. 359396, 2011. doi:10.1351/PAC-REP-10-09-14  

E-Print Network (OSTI)

, -252, -253, and -254, curium-240, -241, -242, -243, -244, -245, -246 and -247, einsteinium-252, - 253, -254 and -255, fermium-257, gadolinium-148, mendelevium-258, neptunium-235 and - 237, polonium-210

456

Appl Microbiol Biotechnol (1995) 43:850-855 Springer-Verlag 1995 N. Padukone K. W. Evans J. D. McMillan  

E-Print Network (OSTI)

. Springer, New York, Berlin Heidelberg, pp 210-280 Hahn-H~igerdal B, Hallborn J, Jeppson H, Olsson L, Skoog

California at Riverside, University of

457

IOP PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 45 (2012) 175204 (14pp) doi:10.1088/0022-3727/45/17/175204  

E-Print Network (OSTI)

the way to VRF + |Vdc|, the sum of the peak RF voltage and the absolute value of the applied dc bias

Economou, Demetre J.

458

r XXXX American Chemical Society A dx.doi.org/10.1021/am101012c |ACS Appl. Mater. Interfaces XXXX, XXX, 000000 RESEARCH ARTICLE  

E-Print Network (OSTI)

. where they report that the essential work of fracture (EWF) can be used to study ductile fracture under fracture is required.) The load-displacement curves and underlying phe- nomena of EWF-type analyses can be categorized into two components, the essential work of fracture (EWF) and nones- sential work of fracture (non-EWF

Mather, Patrick T.

459

Copyright by SIAM. Unauthorized reproduction of this article is prohibited. SIAM J. APPL. MATH. c 2013 Society for Industrial and Applied Mathematics  

E-Print Network (OSTI)

is required in the applied conservation and renewable resource contexts. Key words. predator-prey model on the dynamics of predator-prey systems and the role of harvesting in the management of renewable resources; see Natural Science Foundation of China (11228104). School of Mathematics and Statistics, Central China Normal

Ruan, Shigui

460

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 36 (2003) 31563167 PII: S0022-3727(03)65940-1  

E-Print Network (OSTI)

Y Choueiri Electric Propulsion and Plasma Dynamics Laboratory (EPPDyL), Mechanical and Aerospace is dedicated to Professor Harvey Lam on the occasion of his recovery. 1. Introduction 1.1. Historical) and derived an equation for the steady-state volume flow rate based on the radial velocity profile for a fully

Choueiri, Edgar

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Department of Civil Engineering, Northwestern University, Evanston, IL 60208.1 GeoTDR, Inc., 297 Pinewood Drive, Apple Valley, MN 55124.2  

E-Print Network (OSTI)

. These examples include, 1) cables in roadways above possible coal mine subsidence, 2) cables through scour in March 1995. Subsidence was initiated in response to dewatering of an underlying abandoned coal mine OKVKICVG FCOCIG TDR monitoring of cables embedded in strata overlying abandoned mines provides a means

462

Limits to the potential distribution of light brown apple moth in ArizonaCalifornia based on climate suitability and host plant availability  

E-Print Network (OSTI)

and host plant availability Andrew Paul Gutierrez Nicholasthrough host plant availability. Outside of irrigated crops,non limiting host plant availability. A regional analysis of

Gutierrez, Andrew Paul; Mills, Nicholas J.; Ponti, Luigi

2010-01-01T23:59:59.000Z

463

IOP PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 41 (2008) 035212 (9pp) doi:10.1088/0022-3727/41/3/035212  

E-Print Network (OSTI)

,2,4,5], this is not the case for BDs in SD arrangement and especially CD configuration. The history of the coplanar discharge, an advanced technology with addressing electrodes was used. The history of the coplanar configuration current and voltage measurement f = 10.2 kHz U = 24 kV oil as an insulator discharge area ...side view

Greifswald, Ernst-Moritz-Arndt-Universität

464

J. Phys. D:Appl. Phys. 20 (1987) 151-161. Printedinthe UK Studsvik Energiteknik AB, S-611 82 Nykoping, Sweden  

E-Print Network (OSTI)

,itobeysboththeforwardandbackward forms (Bell and Glasstone 1970). From that, the mean particle number in a given volume can be obtained- tuations in cosmic showers (JAnossy 1950a, b), neutron noise in amultiplyingmedium (PA1 1958,1962,Bell 1963

Pázsit, Imre

465

Laser Anemometry In Fluid Mechanics Selected Papers from the First Intl. Symp. On Appl. Of Laser-doppler Anemometry to Fluid Mechanics  

E-Print Network (OSTI)

-doppler Anemometry to Fluid Mechanics Editors: R.J. Adrian, D.F.G. Durão, F. Durst, H. Mishina and J.H. Whitelaw.C. Hastings and K.G. Moreton. · Laser-Doppler and numerical studies of backward-facing step flows. By F. Durst range wind velocity measurements using visible laser radiation. By F. Durst and G. Richter. · Fiber

Instituto de Sistemas e Robotica

466

Laser Anemometry In Fluid Mechanics-IV Selected Papers from the Fourth Intl. Symp. On Appl. Of Laser-doppler Anemometry to Fluid Mechanics  

E-Print Network (OSTI)

. Of Laser-doppler Anemometry to Fluid Mechanics Editors: R.J. Adrian, D.F.G. Durão, F. Durst, T. Asanuma. Bopp, F. Durst, R. Muller, A. Naqwi, C. Tropea and H. Weber. · Battery-driven miniature LDA

Instituto de Sistemas e Robotica

467

Laser Anemometry In Fluid Mechanics-III Selected Papers from the Third Intl. Symp. On Appl. Of Laser-doppler Anemometry to Fluid Mechanics  

E-Print Network (OSTI)

. Of Laser-doppler Anemometry to Fluid Mechanics Editors: R.J. Adrian, D.F.G. Durão, F. Durst, H. Mishina. Durst. · Measurement and prediction of air flow in building joints. By A. Aroussi, S.A. Ferris and I

Instituto de Sistemas e Robotica

468

Laser Anemometry In Fluid Mechanics-II Selected Papers from the Second Intl. Symp. On Appl. Of Laser-doppler Anemometry to Fluid Mechanics  

E-Print Network (OSTI)

. Of Laser-doppler Anemometry to Fluid Mechanics Editors: R.J. Adrian, D.F.G. Durão, F. Durst, H. Mishina of separated flow behind a circular cylinder. By A. McKillop and F. Durst. · Separated turbulent flow over

Instituto de Sistemas e Robotica

469

Published: January 24, 2011 r 2011 American Chemical Society 309 dx.doi.org/10.1021/am100943f |ACS Appl. Mater. Interfaces 2011, 3, 309316  

E-Print Network (OSTI)

of Polymer Light-Emitting Diode Pixels with Increased Charge Injection James Shaw-Stewart,, Thomas Lippert light- emitting diode (PLED) pixels with poly[2-methoxy, 5-(2- ethylhexyloxy)-1,4-phenylene vinylene at a brightness of 400 cd/m2 . A similar increase is obtained for the polymer light- emitting diode (PLED) pixels

470

IOP PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 45 (2012) 012001 (5pp) doi:10.1088/0022-3727/45/1/012001  

E-Print Network (OSTI)

) doi:10.1088/0022-3727/45/1/012001 FAST TRACK COMMUNICATION Aerogel and ferroelectric dielectric permittivity as dielectric barrier discharge actuators. Specifically, the use of silica aerogels manifests itself primarily as heat generation with no measurable thrust. The silica aerogel, however, has

Roy, Subrata

471

J. Phys. D: Appl. Phys. 33 (2000) 27312746. Printed in the UK PII: S0022-3727(00)14861-2 Modelling of silicon hydride clustering  

E-Print Network (OSTI)

to deposit layers of thin silicon films using silane or disilane precursor gases. This process suffers from

Swihart, Mark T.

472

Limits to the potential distribution of light brown apple moth in ArizonaCalifornia based on climate suitability and host plant availability  

E-Print Network (OSTI)

Press, Can- berra, pp 326 Fowler G, Garrett L, Neeley A,orange and pear production (Fowler et al. 2009). In responseassessment of risk (e.g. , Fowler et al. 2009; Migeon et al.

Gutierrez, Andrew Paul; Mills, Nicholas J.; Ponti, Luigi

2010-01-01T23:59:59.000Z

473

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)  

E-Print Network (OSTI)

A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, ...

Sarmenta, Luis F. G.

2006-09-11T23:59:59.000Z

474

Er d?os, Jo o and Komo r nik in 1 990 [5] initiate the study of ... - CECM  

E-Print Network (OSTI)

f r om evaluating ce r tain classes of polynomials at values q > 1. Recall: ... A Pisot number is a r eal algeb r aic intege r , all of whose conjugates a r e of modulus...

475

Reproducedwith pennissionfrom Elsevier/Pergamon ~ Biomass and Bioenerg..' Vol: 10, !:!os 2-3, pp..149-l66, 1996  

E-Print Network (OSTI)

reserved 0961-9534(95)00069-0 0961-9534/96SI5.00+ 0.00 BIOMASS GASIFIER GAS TURBINE POWER GENERATING-Integrating gasifiers with gas turbines, aeroderivative gas turbines in particular, makes it possible to achieve high produced with biomass-integrated gasifier/gas turbine (BIG/GT) power systems would be competitive

476

Variability in greenhouse gas emissions from permafrost thaw ponds Isabelle Lauriona,b,* Warwick F. Vincent,b,c Sally MacIntyre,d Leira Retamal,a,b  

E-Print Network (OSTI)

Variability in greenhouse gas emissions from permafrost thaw ponds Isabelle Lauriona,b,* Warwick F period for greenhouse gas emissions from subarctic ponds. These results underscore the increasingly important contribution of permafrost thaw ponds to greenhouse gas emissions and the need to account

California at Santa Barbara, University of

477

Building Energy Software Tools Directory: Tools by Platform  

NLE Websites -- All DOE Office Websites (Extended Search)

PC Mac UNIX Internet Tools by Country Related Links Tools by Platform PC Mac UNIX Internet Contacts | Web Site Policies | U.S. Department of Energy | USA.gov Content Last Updated:...

478

Seaborg and Kennedy After Briefing | U.S. DOE Office of Science...  

Office of Science (SC) Website

is seen behind the President's left shoulder. The microphone is held by Malcolm MacGregor "Mac" Kilduff, Jr., Assistant White House Press Secretary. Source of Photo External link...

479

Cross-layer protocol interactions in heterogeneous data networks  

E-Print Network (OSTI)

(cont.) TCP timeout backoff and MAC layer retransmissions, are studied in detail. The results show that the system performance is a balance of idle slots and collisions at the MAC layer, and a tradeoff between packet loss ...

Liu, Chunmei, 1970-

2005-01-01T23:59:59.000Z

480

What about I3 - INFOSEC Integration Issues: "What worked ...  

Science Conference Proceedings (OSTI)

... He also provided INFOSEC presentations for Congressional staffs, Gartner Group, Conference Board, Price Waterhouse, Exxon, Freddie Mac ...

1999-11-05T23:59:59.000Z

Note: This page contains sample records for the topic "apple mac os" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Resources  

Science Conference Proceedings (OSTI)

... Market Access and Compliance ( MAC ) keeps world markets open to ... Congress with independent, quality analysis, information, and support ...

482

Mixture Interpretation  

Science Conference Proceedings (OSTI)

... JM Butler Houston DNA Training Workshop ... Redman (Access database entry, shipping) Dave Duewer ... FMBIO Mac data) Kermit Channel & Mary ...

2007-04-09T23:59:59.000Z

483

of Human Ecology: Getting the Story Right  

E-Print Network (OSTI)

, Kirsten A. Luening, Dorothy H. Mac Gregor, Susan A. Makela, Carole J. Mezera, Margaret A. Muehr, June N

Sheridan, Jennifer

484

FIPS 140-1, Security Requirements For Cryptographic ...  

Science Conference Proceedings (OSTI)

... IV Initialization Vector LCD Liquid Crystal Display LED Light Emitting Diode MAC Message Authentication Code NBS National Bureau of Standards ...

2012-12-18T23:59:59.000Z

485

NIST SP800-15, Minimum Interoperability Specification for PKI ...  

Science Conference Proceedings (OSTI)

... code (MAC) using the symmetric encryption algorithm ... 2. Infrastructure Component Specifications ... required for the interoperation of PKI components. ...

2012-05-09T23:59:59.000Z

486

Bellavance, Erik Hydro Quebec Energy Markets A  

E-Print Network (OSTI)

Scribe: John MacKenzie, IESO. Please report any corrections, additions or deletions to these notes to the following

Brian Ontario Power Generation A; Pascal Brookfield Power A; Marc-andr Brookfield Power A; Robert Ieso A; Leung Linda; John Ieso A; Paul Powerex A; George Aquilon A; David Ontario Power Generation A; John Silverhill A; Ray Constellation New Energy A

2008-01-01T23:59:59.000Z

487

Drug Use and Drug Policy in a Prohibition Regime  

E-Print Network (OSTI)

Heroin/opiates MacCoun and Martin - 2/4/2008 - 41 Otherstory_268000326.html. MacCoun and Martin - 2/4/2008 - 29Toward a drugs MacCoun and Martin - 2/4/2008 - 32 and crime

MacCoun, Robert; Martin, Karin D.

2008-01-01T23:59:59.000Z

488

IN SEARCH OF ISO: AN INSTITUTIONAL PERSPECTIVE ON THE ADOPTION OF INTERNATIONAL MANAGEMENT STANDARDS  

E-Print Network (OSTI)

275-314. Arias, M.E. and M.F. Guillen 1998 The transfer ofMacMillan. Guler, I. , Guillen, M. F. , and J.M. MacPherson1999; Mendel, 2001; Guler, Guillen and MacPherson, 2002).

Delmas, Magali A.

2003-01-01T23:59:59.000Z

489

Telecommunication Networks Group Technische Universitt Berlin  

E-Print Network (OSTI)

The WiseNET platform uses a codesign approach Reducing Power consumption require optimizationReducing Power Design to minimize power consumptionHardware Design to minimize power consumption MAC layerMAC layer MAC--design to achievedesign to achieve the lowest possible power consumptionthe lowest possible power consumption Need for all

Wichmann, Felix

490

Slicing of Components' Behavior Specification with Respect to their Composition*  

E-Print Network (OSTI)

MacPermanentDb interface and its use be triggered on via the IManagement interface. However, both these interfaces are left on the IManagement provided interface to mode switch between random IP address assignment and persistent MAC to IPCallback.IpAddressInvalidated* | ( ?IManagement.UsePermanentIpDb ; ( !IIpMacPermDb.GetIpAddress* | ( !IManagement.UsePermanentIpDb ; ?IManagement

491

Outer bounds for user cooperation  

Science Conference Proceedings (OSTI)

We obtain a dependence balance based outer bound on the capacity region of the two-user multiple access channel with generalized feedback (MAC-GF). We investigate a Gaussian MAC with user-cooperation (MAC-UC), where each transmitter receives an additive ...

Ravi Tandon; Sennur Ulukus

2009-06-01T23:59:59.000Z

492

Outer bounds for multiple-access channels with feedback using dependence balance  

Science Conference Proceedings (OSTI)

We use the idea of dependence balance to obtain a new outer bound for the capacity region of the discrete memoryless multiple-access channel with noiseless feedback (MAC-FB). We consider a binary additive noisy MAC-FB whose feedback capacity is not known. ... Keywords: cut-set bound, dependence balance, multiple-access channel with feedback (MAC-FB)

Ravi Tandon; Sennur Ulukus

2009-10-01T23:59:59.000Z

493

Using SCP and SFTP at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

SCP/SFTP SCP/SFTP Using SCP/SFTP At NERSC Overview Secure Copy (SCP) and Secure FTP (SFTP) are used to securely transfer files between two hosts using the Secure Shell (SSH) protocol. Suggested for smaller files (<~10GB) Availibility SCP and SFTP are available on all NERSC systems. Requirements To transfer files into/out of NERSC using SCP or SFTP, you need a SSH client: Linux/Unix/Cygwin: command ssh, scp or sftp Windows: Many GUI tools such as WinSCP MacOS: Many GUI tools such as Fugu Usage All example commands below are executed on your local machine, not the NERSC machine: The scp command Get a file from Data Transfer Node scp user_name@dtn01.nersc.gov:/remote/path/myfile.txt /local/path Send a file to Data Transfer Node scp /loca/path/myfile.txt user_name@dtn01.nersc.gov:/remote/path

494

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

495

Microsoft PowerPoint - Guidelines for Webcast & Recorded Presentations rev1.ppt  

NLE Websites -- All DOE Office Websites (Extended Search)

Webcast Webcast & Recorded Presentations * Windows PowerPoint slides are preferred (although Mac OS slides should be usable). * Remember to include with the PowerPoint any media files and other external objects to ensure presentations play correctly. (Windows Media Player and QuickTime are the player applications supported.) * Embed all fonts to avoid unexpected type-rendering, especially where technical notation involves pi or symbol characters. (See page 7) * Optimize graphics for onscreen presentation (i.e., cropped and recompressed) in an image-editing application or in PowerPoint itself (See page 8). This event will be both Webcast for remote audiences and recorded for an electronic proceedings and podcast, necessitating more stringent guidelines for slide preparation.

496

Building Life Cycle Cost Programs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Life Cycle Cost Programs Building Life Cycle Cost Programs Building Life Cycle Cost Programs October 8, 2013 - 2:14pm Addthis The National Institute of Standards and Technology (NIST) developed the Building Life Cycle Cost (BLCC) Program to provide computational support for the analysis of capital investments in buildings. BLCC5 Program Register and download. BLCC 5.3-13 (for Windows, Mac OS X, or Linux). BLCC is programmed in Java with an XML file format. The user's guide is part of the BLCC Help system. BLCC version 5.3-13 contains the following modules: FEMP Analysis; Energy Project Federal Analysis; Financed Project Office of Management and Budget Analysis MILCON Analysis; Energy Project MILCON Analysis; Energy Conservation Investment Program Project MILCON Analysis; Non-Energy Project

497

ParaView on the Data Analytics Cluster on Eureka/Gadzooks | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

on the Data Analytics Cluster on Eureka/Gadzooks on the Data Analytics Cluster on Eureka/Gadzooks Set Up User Environment The recommended way of running ParaView on Eureka is in client/server mode. This consists of running the ParaView client on your local resource, and the ParaView server (pvserver) on the Eureka visualization nodes. The latest version currently installed on Eureka is ParaView 4.0.1. This should first be installed on your local resource. Binary and source packages for Linux, MacOS, and Windows are available from the ParaView Download Page. (Run the 'softenv' command on the Eureka login node to see additional versions of ParaView that are available on Eureka). To put ParaView in your environment on Eureka, add the following line to your ~/.softenvrc file NOTE: This must go before the @default entry. Also note that this macro

498

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

499

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

500

PySpline: A Modern, Cross-Platform Program for the Processing of Raw Averaged XAS Edge and EXAFS Data  

Science Conference Proceedings (OSTI)

PySpline is a modern computer program for processing raw averaged XAS and EXAFS data using an intuitive approach which allows the user to see the immediate effect of various processing parameters on the resulting k- and R-space data. The Python scripting language and Qt and Qwt widget libraries were chosen to meet the design requirement that it be cross-platform (i.e. versions for Windows, Mac OS X, and Linux). PySpline supports polynomial pre- and post-edge background subtraction, splining of the EXAFS region with a multi-segment polynomial spline, and Fast Fourier Transform (FFT) of the resulting k{sup 3}-weighted EXAFS data.

Tenderholt, A.; Hedman, B.; Hodgson, K.O.

2007-01-08T23:59:59.000Z