Powered by Deep Web Technologies
Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

2

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

3

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

4

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

5

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

6

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

7

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

8

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

9

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

10

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

11

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

12

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities T-543: Wireshark 0.8.20 through...

13

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"qtactivex" parameters within an HTML object. 4) A boundary error when handling the transform attribute of "text3GTrack" elements can be exploited to cause a buffer overflow via...

14

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

system. 1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be...

15

Apple Education iTunes U User's Guide  

E-Print Network (OSTI)

Apple Education iTunes U User's Guide September 4, 2007 #12; Apple Inc. © 2007 Apple Inc. All rights reserved. Apple, the Apple logo, iPod, iTunes, Mac, and QuickTime are trademarks of Apple Inc., registered in the U.S. and other countries. Apple TV, iPhone, and Safari are trademarks of Apple Inc. i

Bieber, Michael

16

Multiple locus genealogies and phenotypic characters reappraise the causal agents of apple ring rot in China  

E-Print Network (OSTI)

Multiple locus genealogies and phenotypic characters reappraise the causal agents of apple ring rot & Guangyu Sun Received: 6 March 2014 /Accepted: 2 September 2014 # School of Science 2014 Abstract Apple ring rot inflicts severe economic losses in the main apple producing areas of East Asia. The causal

Biggs, Alan R.

17

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

18

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple iOS Multiple Vulnerabilities 0: Apple iOS Multiple Vulnerabilities V-080: Apple iOS Multiple Vulnerabilities January 30, 2013 - 12:56am Addthis PROBLEM: Apple iOS Multiple Vulnerabilities PLATFORM: Apple iOS 6.x for iPhone 3GS and later Apple iOS for iPad 6.x Apple iOS for iPod touch 6.x ABSTRACT: Two security issues and multiple vulnerabilities have been reported in Apple iOS REFERENCE LINKS: Article: HT5642 APPLE-SA-2013-01-28-1 iOS 6.1 Software Update Secunia Advisory SA52002 CVE-2011-3058 CVE-2012-2619 CVE-2012-2824 CVE-2012-2857 CVE-2012-2889 CVE-2012-3606 CVE-2012-3607 CVE-2012-3621 CVE-2012-3632 CVE-2012-3687 CVE-2012-3701 CVE-2013-0948 CVE-2013-0949 CVE-2013-0950 CVE-2013-0951 CVE-2013-0952 CVE-2013-0953 CVE-2013-0954 CVE-2013-0955 CVE-2013-0956 CVE-2013-0958 CVE-2013-0959 CVE-2013-0962 CVE-2013-0963 CVE-2013-0964

19

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

20

Protected Loss of Flow Transient Simulation (Quicktime format, High  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering Analysis > Videos Engineering Analysis > Videos Engineering Analysis: Protected Loss of Flow Transient Simulation Quicktime format Quicktime Format - High Bandwidth | Size: 25.94 MB | Bit Rate: 1148 kbps Keywords: flow transient, plot, EBR-II, SAS4A, SASSYS-1, passive safety, protected loss of flow, PLOF, shutdown heat removal test, SHRT-17, SHRT17 Elevation plot showing detailed top of core temperatures in experimental assembly XX09 during a protected loss of flow transient in EBR-II. Surrounding assemblies are depicted using fuel average temperatures. Results show excellent decay heat removal capability of sodium through natural circulation and exceptionally low transient temperatures with metallic fuel. :: Please wait until video loads completely :: Closed Captioning Transcript

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Sketch Retrieval via Dense Stroke Features bottle apple apple apple apple apple swan giraffe mug giraffe giraffe giraffe  

E-Print Network (OSTI)

Sketch Retrieval via Dense Stroke Features bottle apple apple apple apple apple swan giraffe mug giraffe giraffe giraffe bottle swan giraffe swan swan swan swan apple apple apple apple bottle bottle swan

Yang, Ming-Hsuan

22

Preventing the Worst - MMW Group featured in CNN video (Quicktime format-  

NLE Websites -- All DOE Office Websites (Extended Search)

Quicktime) Quicktime) Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Compressive Passive Millimeter-Wave Imager VIDEO TRANSCRIPT Remote Vital Sign Monitoring System Preventing the Worst (by CNN) Engineering Development & Applications Argonne's Nuclear Science & Technology Legacy Other Multimedia Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Detection & Diagnostic Systems Multimedia Bookmark and Share Preventing the Worst "Preventing the Worst" is a segment of the CNN program "Situation Room", focused on Argonne technologies with anti-terrorism applications. Passive millimeter-wave spectroscopy is one of the technologies featured in the

23

U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pidgin Multiple Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities...

24

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

25

Carrot Apple Salad Ingredients  

E-Print Network (OSTI)

Carrot Apple Salad Ingredients: 4 carrots 2 apples, finely chopped 1/2 cup crushed pineapple in water, drained 2 tablespoons apple juice, frozen concentrate Directions 1. Wash carrots and use a grater to shred into small pieces. Add to medium bowl. 2. Leave the skin on the apple and cut in half through

Liskiewicz, Maciej

26

Buenos Apple Nachos Ingredients  

E-Print Network (OSTI)

Buenos Apple Nachos Ingredients: 1 apple 3 strawberries 1 tablespoon peanut butter 1 tablespoon vanilla low-fat yogurt Directions 1. Leave the skin on the apple and cut in half through the core of strawberries. Slice into thin slic- es, and spread on top of apples. 3. Put peanut butter in a small micro

Liskiewicz, Maciej

27

Apple Fruit Salad Ingredients  

E-Print Network (OSTI)

Apple Fruit Salad Ingredients: 2 Golden Delicious apples 2 Red Delicious apples 2 banana 1 1/2 cups Directions 1. Leave the skin on the apple and cut in half through the core. Then cut each piece in half again

Liskiewicz, Maciej

28

RECAPITI AZIENDALI Apple m EducationtalentIT@apple.com  

E-Print Network (OSTI)

RECAPITI AZIENDALI Apple m EducationtalentIT@apple.com 1 www.apple.com/jobs/it/retail CHI SIAMO Gli Apple Store non sono soltanto negozi tra i più innovativi al mondo, ma anche tra i più dinamici e, coinvolgenti, collaborative e dinamiche, con una spiccata passione per Apple e i suoi prodotti. OPPORTUNIT?

De Cindio, Fiorella

29

Cynthia Sandberg: Love Apple Farm  

E-Print Network (OSTI)

me about the name, Love Apple Farm. Where does that comegrowbetterveggies/about-love-apple-farm.html See http://Photo by Tana Butler Love Apple Farm Cynthia Sandberg is

Rabkin, Sarah

2010-01-01T23:59:59.000Z

30

Apple Trees for Every Garden  

E-Print Network (OSTI)

Grower Press. Organic Apple Production Manual. Publication #of dwarf and semi-dwarf apple varieties can be seen in theGardener Apple Trees for Every Garden Orin Martin manages

Martin, Orin

2008-01-01T23:59:59.000Z

31

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

32

U-120: RSA SecurID Software Token Converter Unspecified Buffer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

33

Cinnamon Muffin 100% Apple Juice  

E-Print Network (OSTI)

31 ½ Apple Cinnamon Muffin 100% Apple Juice 5oz Milk Chef Michele Pastorello Milk Choices: Whole White 4oz Juice Choices: 100% Apple 100% Orange NO SCHOOL May 17th SCHOOL CLOSED May 28th Updated 4 100% Orange Juice 5oz Milk Cream of Wheat Sliced Pears 5oz Milk Turkey Sausage Biscuit 100% Apple

Delgado, Mauricio

34

AIDP -Apple Interface Design Project  

E-Print Network (OSTI)

AIDP - Apple Interface Design Project AIDP - Apple Interface Design Project m 92-95 m Joy Mountford m Design Centre, Advanced Technology Group m Apple's Industrial Design Group "Encourage ProjectThe Project m Bridge the gulf between the physical and virtual worlds - Apple m Design a new way

Tollmar, Konrad

35

Tuna Apple Salad Sandwiches Ingredients  

E-Print Network (OSTI)

Tuna Apple Salad Sandwiches Ingredients: 6 1/2 ounces tuna in water, canned 1 stalk celery 1 apple and chop in small pieces. Wash and cut apple in half and in half again. Cut out core and chop into small pieces. 3. Add celery and apple to tuna. Stir well. 4. Add mayonnaise and lemon juice. Stir well. 5

Liskiewicz, Maciej

36

Apple Scab of Flowering Crabapples  

E-Print Network (OSTI)

Apple Scab of Flowering Crabapples Flowering crabapples add color and beauty to many home leaves and defoliation by early summer. The cause of this problem is a fungus disease known as apple scab. The same disease is also a common problem on eating apples, refer to BP-1 (Apple Scab in the Home Fruit

37

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

38

Reflectivematerials enhance `Fuji'apple  

E-Print Network (OSTI)

Reflectivematerials enhance `Fuji'apple color Harry Andris o Carlos H. Crisosto Red color developmentis an important factor for consumer acceptance of California 'Fuji' apples. Several attempts to im not affect fla- vor, it is an important factor for con- sumer acceptance of apples. Cyanidin is the immediate

Crisosto, Carlos H.

39

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

40

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Century Learning through Apple Technology  

E-Print Network (OSTI)

21st Century Learning through Apple Technology July 4 ­ 5, 2013 This exciting institute will appeal to educators who wish to enhance their teaching in support of 21st century learning using Apple technology. This institute begins with a keynote address that looks at how new technologies can enhance 21st century learning

42

Apple Education iTunes U User's Guide  

E-Print Network (OSTI)

Apple Education iTunes U User's Guide December 11, 2006 #12; Apple Computer, Inc. © 2006 Apple Computer, Inc. All rights reserved. Apple, the Apple logo, iPod, iTunes, and Mac are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Safari is a trademark of Apple Computer, Inc. i

Li, Teng

43

Ordering from Apple Royal Holloway University have a special agreement with Apple Distribution International.  

E-Print Network (OSTI)

Ordering from Apple Royal Holloway University have a special agreement with Apple Distribution International. The overall management of the Agreement is via the Universities' Apple Computer Group (UACG at the National Apple Higher Education Agreement price. This pricing can be found at: https://ecommerce.apple

Royal Holloway, University of London

44

Apple Price List unh computer store  

E-Print Network (OSTI)

Apple Price List 5/27/14 unh computer store university of new hampshire phone: (603) 862-1328 · faxBook Air AppleCare for MacBook Air AppleCare Protection Plan for Mac extends your coverage to three years Battery life varies by use and configuration. See www.apple.com/batteries for more information. 2 Compared

45

EU Verbraucherrechte Apple One-Year Limited  

E-Print Network (OSTI)

EU Verbraucherrechte Apple One-Year Limited Warranty AppleCare Protection Plan CC Service Pack, Kabel. Zusätzlich bei allen Macs: 1x Time Capsule oder 1x Airport Gerät sowie 1x Apple Display Macs u sowie 1x Apple Display Material- u. Herstellungsfehler. Keine Leistung für Verschlei?teile wie Akku

Fiebig, Peter

46

Fungicide control of apple scab: 2010 field trial  

E-Print Network (OSTI)

communications. 2010 Apple scab field trial, Department ofduring leaf fall to control apple scab (Venturia inaequalis)mixtures on scab control in apple orchards. Plant Pathology

Eynard, James; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

47

Potential of Mineral Uptake Efficiency by Some Apple Rootstocks  

E-Print Network (OSTI)

1999. Drought tolerance of apple rootstocks: Production andwater relations of five apple rootstocks. Acta Horticultureon Mineral Composition of Apple Leaves. J. Am. Soc. Hort.

Amiri, Mohammad E; Fallahi, Esmail

2009-01-01T23:59:59.000Z

48

Did Apples refusal to license proprietary information enabling interoperability with its iPod music player constitute an abuse under Article 82 of the EC Treaty?  

E-Print Network (OSTI)

Did Apples refusal to license proprietary informationtechnology that allowed Apple, as the creator of amises en uvre par la socit Apple Computer, Inc. dans les

Mazziotti, Giuseppe

2005-01-01T23:59:59.000Z

49

Green Bean Apple Salad 1. 3 small apples, cored and thinly sliced  

E-Print Network (OSTI)

Green Bean Apple Salad 1. 3 small apples, cored and thinly sliced 2. 1 lb green beans 3. ½ red keep apples from browning). Remove stems from fresh green beans, place in pot with 1 inch of water into rings. Mix apples, onions, cucumbers, green beans together. Add a splash of lemon juice, olive oil

Jawitz, James W.

50

Fire blight of apple blossoms Fireblight of apples and pears, caused by the  

E-Print Network (OSTI)

Fire blight of apple blossoms Fireblight of apples and pears, caused by the bacterium Erwinia. W. Lightner. 1990. Predicting apple blossom infections by Erwinia amylovora using the Maryblyt model for forecasting fire blight disease in apples and pears. University of Maryland, College Park, MD. #12;

51

Apple Price List unh computer store  

E-Print Network (OSTI)

Apple Price List 6/16/14 unh computer store university of new hampshire phone: (603) 862-1328 · fax for home) Upgrade: 4GB memory to 8GB memory & 128GB storage to 256GB storage $200.00 Apple USB Super http://computerstore.unh.edu/support.shtml for more details on warranty coverage. com #12;Apple Price

52

Malcolm Guite The Magic Apple Tree  

E-Print Network (OSTI)

Malcolm Guite The Magic Apple Tree Someday make a journey through the rain Through sodden streets in darkening December A journey to the magic apple tree. And journey also, darkling, through your past Journey records. You glimpsed it once within the garden wall, The image of an ancient apple tree, The fall

Robertson, Stephen

53

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime...

54

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2009 Michigan Apple Research Committee Michigan Apple Shippers MSU Extension MSU AgBioResearch NW MICHIGAN APPLE MATURITY REPORT #1 September 16, 2009 General Comments - This year the NWMHRS will be testing apples

55

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2007 Nikki Horticulture Society Michigan Apple Research Committee Michigan apple Shippers MSU Extension MSU Ag Pome Fruit Code-a-phone/Apple Maturity Line (231) 947-3063 NW MICHIGAN APPLE MATURITY REPORT #1 August

56

Apple Computer: The iCEO Seizes the Internet  

E-Print Network (OSTI)

sales. Table 3: Milestones in Apple direct online retailingDate Event mid-1994 Apple launches first web site Nov. 19971998 Sept. 1998 Jan. 1999 Apple Store (U.S. ) opens; first

West, Joel

2002-01-01T23:59:59.000Z

57

Fungicide control of apple scab: 2007 trial results  

E-Print Network (OSTI)

from Adaskaveg et al. (2007). Apple trial, 2007. W.D. Gublerpp. MacHardy, W.E. 1996. Apple Scab. Biology, Epidemiology,Pest Management for Apples & Pears. 2 nd ed. University of

Janousek, Christopher N; Lorber, Jacob D; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

58

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain...

59

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

60

Baked Apple and Sweet Potato Casserole Ingredients  

E-Print Network (OSTI)

Baked Apple and Sweet Potato Casserole Ingredients: Non-stick cooking spray 5 sweet potatoes 4 aside. 2. Wash sweet potatoes with a vegetable brush, and use a knife and cutting board to cut into potato into small pieces. Add to large baking dish. 3. Cut apples down the center and in half again, down

Liskiewicz, Maciej

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Michigan Apple Committee 2013/14 Request for Proposals  

E-Print Network (OSTI)

1 Michigan Apple Committee 2013/14 Request for Proposals The Michigan Apple Committee (MAC the profitability of apple growing through improving production information and techniques; developing new markets that helps achieve this mission. In keeping with the spirit of the MAC's mission, the Michigan Apple Research

62

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2006 Jim Project GREEEN Michigan State Horticulture Society Michigan Apple Research Committee Michigan apple sites: www.ams.usda.gov/marketnews.htm www.bhfm.com NW Michigan Pome Fruit Code-a-phone/Apple Maturity

63

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2008 Michigan Apple Research Committee Michigan apple Shippers MSU Extension MSU AgBioResearch Current pricing information can be obtained at the following web sites: http://www.bhfm.com/ NW Michigan Pome Fruit Code-a-phone/Apple

64

Michigan Apple Committee 2014/15 Request for Proposals  

E-Print Network (OSTI)

1 Michigan Apple Committee 2014/15 Request for Proposals The Michigan Apple Committee (MAC the profitability of apple growing through improving production information and techniques; developing new markets subcommittee established the following as its charter in early 2009: To help the Michigan Apple Committee

Douches, David S.

65

ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO  

E-Print Network (OSTI)

ADIOS ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO NATIONAL RADIO ASTRONOMY OBSERVATORY TABLES ADIOS - ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE COMPUTER TABLE FOR CONTENTS Page I Module and Apple Card (Photograph) Figure 3 Complete Apple/ADIOS System (Photograph) Figure 4 Analog

Groppi, Christopher

66

Michigan Apple Committee 2012/13 Request for Proposals  

E-Print Network (OSTI)

Michigan Apple Committee 2012/13 Request for Proposals The Michigan Apple Committee (MAC) announces of apple growing through improving production information and techniques; developing new markets and new achieve this mission. In keeping with the spirit of the MAC's mission, the Michigan Apple Research

67

SW MICHIGAN APPLE MATURITY REPORT ISSUE 1 August 25, 2010  

E-Print Network (OSTI)

SW MICHIGAN APPLE MATURITY REPORT ISSUE 1 ­ August 25, 2010 Bill Shane, Diane Brown-Rytlewski, and Mark Longstroth Michigan State University This is the first of weekly apple maturity report for SW. See the Michigan State University apple web site (apples.msu.edu) for more information, including

68

Apple Defect Segmentation by Artificial Neural Networks Devrim Unay a  

E-Print Network (OSTI)

Apple Defect Segmentation by Artificial Neural Networks Devrim Unay a Bernard Gosselin a a TCTS Lab-colored apple fruits performed by several artificial neural networks. Pixel-wise classification approach apple defects. 1 Introduction Quality of apple fruits depends on size, color, shape and presence

Dupont, Stéphane

69

Introduction to Apple Mail with IMAP Version 4 October 2008  

E-Print Network (OSTI)

Introduction to Apple Mail with IMAP Version 4 ­ October 2008 Massachusetts Institute of Technology #12;Apple Mail Quick Start Guide Page 2 Getting Started This Quick Start class assumes that: 1. Apple Mail is configured for use at MIT. If you need help with configuration please see Apple Mail at MIT

Gabrieli, John

70

Michigan Apple Committee Research Priorities for 2014/15  

E-Print Network (OSTI)

Michigan Apple Committee Research Priorities for 2014/15 Following are the 2014/15 priorities of the Michigan Apple Committee. (In priority order.) 1. Increase demand To conduct consumer related research that will help sell Michigan Apples more profitably. a. Market research b. Value ­ convenience, apples versus

Douches, David S.

71

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2005 Jim Project GREEEN Michigan State Horticulture Society Michigan Apple Research Committee Michigan apple sites: www.ams.usda.gov/marketnews.htm www.bhfm.com NW Michigan Pome Fruit Code-a-phone/Apple Maturity

72

Synthetic and organic fungicide control of apple scab: 2009 field trial  

E-Print Network (OSTI)

during leaf fall to control apple scab (Venturia inaequalis)mixtures on scab control in apple orchards. Plant Pathologyscab development in an organic apple orchard. Agriculture,

Janousek, Christopher N; Bay, Ian S; Gubler, W. Douglas

2009-01-01T23:59:59.000Z

73

EFFECT OF TWO ROOTSTOCK SELECTIONS ON THE SEASONAL NUTRITIONAL VARIABILITY OF BRAEBURN APPLE  

E-Print Network (OSTI)

potasium and magnesium into apple fruit in high densityof Golden delicious apple trees. Acta Horticulturae 448:107-in leaves of different apple rootstocks and Elise Scion

Hirzel, Juan Fernando; Best, Stanley

2009-01-01T23:59:59.000Z

74

Abiotic and biotic factors affecting light brown apple moth, Epiphyas postvittana, in California  

E-Print Network (OSTI)

mortality of lightbrown apple moth. In: OCallaghan, M. (tryoni and the light brown apple moth Epiphyas postvittanaof the light brown apple moth, Epiphyas postvittana (

Buergi, Linda Patricia

2012-01-01T23:59:59.000Z

75

Apple Maturity Protocol Tests for apple flesh firmness and starch conversion are important tools for monitoring crop  

E-Print Network (OSTI)

Apple Maturity Protocol Tests for apple flesh firmness and starch conversion are important tools for monitoring crop maturity. Flesh firmness, as measured with a pressure gauge, determines how long apples can adequate firmness for fresh market or processing uses. A second common assay for apple maturity

76

An Apple a Day -- A Futuristic Parable  

Science Journals Connector (OSTI)

...thousands of sidewalk apple vendors. Second, studies of competition and regulation showed that the costs of apple production actually went up more rapidly in regulated industries than in competitive ones (see J. Zwanziger and G. Melnick, "Competition and Regulation in the Wholesale Fruit Industry," Free... It all began about 20 years ago, in early 1994, when somebody joked with Hillary Rodham Clinton that an apple a day keeps the doctor away, noting that this would provide the best cost control imaginable. The idea took root as if both Johnny and Joanie ...

Phelps C.E.

1994-03-17T23:59:59.000Z

77

END USER LICENCE AGREEMENT iTUNES STORE, APPLE APP STORE AND iBOOKSTORE ("APPLE iSTORE") DOWNLOADS OF THE JAMES COOK UNIVERSITY MOBILE APP  

E-Print Network (OSTI)

1 END USER LICENCE AGREEMENT ­ iTUNES STORE, APPLE APP STORE AND iBOOKSTORE ("APPLE i and JCU only. Apple Inc. is not a party to this Agreement. JCU, and not Apple Inc., is solely responsible or control that runs the iOS operating system software provided by Apple Inc. ("Device"); (b) for Your own

78

The power of lightness. Apple iPad Price List  

E-Print Network (OSTI)

iPad Air The power of lightness. Apple iPad Price List 6/11/14 unh computer store university of new with iPad (4th generation). 2 Battery life varies by use and configuration. See www.apple with Wi-Fi + Cellular 16GB 32GB 64GB 128GB $629 $729 $829 $929 AppleCare+ for iPad AppleCare+ provides 2

79

Mobile Device Guide Apple iPhone Devices  

E-Print Network (OSTI)

Mobile Device Guide ­ Apple iPhone Devices CSUF Date Last Revised: 1/20/11 Page 1 of 3 ConnectingPhone desktop. 1a. Expand `Mail, Contacts, Calendars' as shown. #12;Mobile Device Guide ­ Apple iPhone Devices (case sensitive). 4. Tap `next'. #12;Mobile Device Guide ­ Apple iPhone Devices CSUF Date Last Revised

de Lijser, Peter

80

Curried Pumpkin Soup with Roasted Apple and Crme Frache  

E-Print Network (OSTI)

Curried Pumpkin Soup with Roasted Apple and Crème Fraîche Recipe courtesy of Gordon Hamersley teaspoon chili powder (optional) 3 medium apples, peeled, cored, and chopped 2 1/2 quarts chicken stock 1 apple, roasted and sliced for garnish crème fraîche DIRECTIONS 1. Preheat the oven to 350 degrees. 2

Spence, Harlan Ernest

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

MSU Fruit Team 2011 Apple Maturity Report Northwest Region Reports  

E-Print Network (OSTI)

1 MSU Fruit Team 2011 Apple Maturity Report Northwest Region Reports During the harvest season, apples from different regions are collected for maturity testing. The data is then compiled by MSU Extension educators into recommendations for harvest and storage of the most commonly grown apple varieties

82

Publish by Abstract RNA Extraction From Different Apple Tissues  

E-Print Network (OSTI)

Publish by Abstract RNA Extraction From Different Apple Tissues Rich in Polyphenols. An efficient procedure for isolating RNA from bud, internodal shoot, flower, and fruit tissues of apple has in apple fruit and flower tissues. Isolated RNA is of high qual- ity and is undegraded as assessed

Korban, Schuyler S.

83

MSU Fruit Team 2010 Apple Maturity Report Northwest Region Reports  

E-Print Network (OSTI)

1 MSU Fruit Team 2010 Apple Maturity Report Northwest Region Reports During the harvest season, apples from different regions are collected for maturity testing. The data is then compiled by MSU Extension educators into recommendations for harvest and storage of the most commonly grown apple varieties

84

Original article Characterisation of apple orchard management systems  

E-Print Network (OSTI)

Original article Characterisation of apple orchard management systems in a French Mediterranean) Abstract ­ The objective of our study was to characterise cropping systems in apple arboriculture in the less sensitive areas. apple orchard / on-farm survey / cultivation operation / management indicator

Paris-Sud XI, Université de

85

Original article Nutrient leaching from soil amended with apple waste  

E-Print Network (OSTI)

Original article Nutrient leaching from soil amended with apple waste Anne-Marie de COCKBORNE December 2000) Abstract ­ Among the possibilities for disposing of overproduction of apple, land application is flexible and inexpensive. Six soil columns receiving 0, 200 or 500 Mg of apple wasteha­1 were

Paris-Sud XI, Université de

86

Micropropagation Rooting and weaning of apple rootstock YP  

E-Print Network (OSTI)

Micropropagation Rooting and weaning of apple rootstock YP M Uosukainen Agricultural Research-23 May 1992, Dijon, France) Summary Rooting and weaning of the Finnish apple rootstock YP were arbusculaires INTRODUCTION Research on micropropagation of apple trees started > 20 yr ago (Elliot, 1972; Walkey

Paris-Sud XI, Université de

87

Appling County Pellets | Open Energy Information  

Open Energy Info (EERE)

Appling County Pellets Appling County Pellets Jump to: navigation, search Name Appling County Pellets Place Graham, Georgia Zip 31513 Sector Biomass Product Producer of wood pellets and other biomass products located in Georgia. Coordinates 47.055765°, -122.294774° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.055765,"lon":-122.294774,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

88

The standard computer models for 2014 are the Dell 9020 desktop, Dell e6440 laptop, Apple 21.5" iMac desktop and Apple 13" Mac Book Pro laptop or Apple 13" Mac Book Pro with Retina  

E-Print Network (OSTI)

The standard computer models for 2014 are the Dell 9020 desktop, Dell e6440 laptop, Apple 21.5" iMac desktop and Apple 13" Mac Book Pro laptop or Apple 13" Mac Book Pro with Retina Display (see important distinctions below). Keep in mind that Dell and Apple are continuously modifying their lines, so although

Aalberts, Daniel P.

89

Light brown apple moths arrival in California worries commodity groups  

E-Print Network (OSTI)

control of light brown apple moth, Epi- phyas postvittana (2007a. Light brown apple moth host list. www.cdfa.ca.gov/p. CDFA. 2007b. Light brown apple moth project: Advisories.

Varela, Lucia G.; Johnson, Marshall W; Strand, Larry; Wilen, Cheryl A; Pickel, Carolyn

2008-01-01T23:59:59.000Z

90

Why the Apple Doesnt Fall Far: Understanding Intergenerational Transmission of Human Capital  

E-Print Network (OSTI)

Kjell G. Salvanes. 2003. Why the Apple Doesnt Fall Far:Why the Apple Doesn't Fall Far: UnderstandingPaper Series Why the Apple Doesnt Fall Far: Understanding

Black, Sandra; Devereux, Paul; Salvanes, Kjell

2004-01-01T23:59:59.000Z

91

New Zealand lessons may aid efforts to control light brown apple moth in California  

E-Print Network (OSTI)

1975. Integrated control of apple pests in New Zealand. 1.of the light brown apple moth Epiphyas postvittana (Walker),68592. Dumbleton L J. 1932. The apple leaf-roller (Tortrix

Varela, Lucia G.; Walker, James T.S.; Lo, Peter L; Rogers, David J

2010-01-01T23:59:59.000Z

92

Impact of Foliar Fertilizer Containing Iodine on Golden Delicious Apple Trees  

E-Print Network (OSTI)

on marketable Golden Delicious/M.9 apple production. At thecontaining fertilizer on apple fruits firmness and theirold Golden Delicious/M.9 apple trees Trees were spaced at

Szwonek, Eugeniusz

2009-01-01T23:59:59.000Z

93

The Atom and the Apple, Princeton University Press, "The Atom and the Apple is a delightful ramble through many areas of science as well as  

E-Print Network (OSTI)

The Atom and the Apple, Princeton University Press, Reviews: "The Atom and the Apple and stimulating, and it frequently challenges political correctness. . . . The Atom and the Apple provides." --Publishers Weekly (Starred Review) #12;Science Teacher Association recommends : The Atom and the Apple

Balibar, Sébastien

94

Apple Burrknot Borers in New York Revisited Pest status and chemical control of borers infesting apple burrknots in New York State  

E-Print Network (OSTI)

Apple Burrknot Borers in New York ­ Revisited Pest status and chemical control of borers infesting apple burrknots in New York State DAVID P. KAIN, RICHARD W. STRAUB AND ARTHUR M. AGNELLO Department damage to dwarf apple trees caused by American plum borer, a survey was conducted in the major apple

Agnello, Arthur M.

95

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - 17930 of 29,416 results. 21 - 17930 of 29,416 results. Article U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. http://energy.gov/cio/articles/u-202-apple-quicktime-multiple-stack-overflow-vulnerabilities Article U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases A vulnerability was reported in OpenLDAP. The system may use a weaker cipher suite than specified. http://energy.gov/cio/articles/u-185-openldap-may-ignore-tlsciphersuite-setting-some-cases Article U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

96

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

97

Revised: MASTERS_APPL_ENROLL_TO_PHD-06/04/2014-KCNee FOR ENROLLED STUDENTS ONLY  

E-Print Network (OSTI)

Revised: MASTERS_APPL_ENROLL_TO_PHD-06/04/2014-KCNee FOR ENROLLED STUDENTS ONLY APPLICATION STAFF _____POST MASTERS PLAN APPL #_____________________ _______________ _____RESIDENCY UPDATED

Maryland, Baltimore County, University of

98

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30, 2013 30, 2013 V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service) May 29, 2013 V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users Two vulnerabilities were reported in HP-UX Directory Server. May 28, 2013 V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server A vulnerability was reported in Cisco WebEx for iOS. May 27, 2013 V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The system does not properly validate all Inter-Satellite Sync operations

99

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 20160 of 28,905 results. 51 - 20160 of 28,905 results. Article DOE Issues Notice of Proposed Rulemaking to Improve Energy Efficiency Enforcement Process Today, the Department of Energy announced a Notice of Proposed Rulemaking seeking comment on proposed reforms designed to improve its energy efficiency certification and enforcement regulations. http://energy.gov/gc/articles/doe-issues-notice-proposed-rulemaking-improve-energy-efficiency-enforcement-process Article U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. http://energy.gov/cio/articles/u-202-apple-quicktime-multiple-stack-overflow-vulnerabilities Article U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases

100

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 8, 2011 T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. August 5, 2011 T-685: Cisco Warranty CD May Load Malware From a Remote Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. August 3, 2011 T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. August 2, 2011 T-682:Double free vulnerability in MapServer MapServer developers have discovered flaws in the OGC filter support in

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Autonomous Fruit Picking Machine: A Robotic Apple Harvester  

E-Print Network (OSTI)

Autonomous Fruit Picking Machine: A Robotic Apple Harvester Johan Baeten1 , Kevin Donn´e2 , Sven the construction and functionality of an Au- tonomous Fruit Picking Machine (AFPM) for robotic apple harvesting with a camera mounted inside. The proposed concepts guarantee adequate control of the autonomous fruit

Paris-Sud XI, Université de

102

Handleiding eduroam op Apple iOS6  

E-Print Network (OSTI)

Handleiding eduroam op Apple iOS6 Version: 1.0 eduroam Date: 24-04-2013 #12;2 Inleiding Deze handleiding beschrijft hoe u met uw Apple iPad of iPhone met iOS6 een verbinding met eduroam kan opzetten

Galis, Frietson

103

Who Captures Value in a Global Innovation System? The case of Apple's iPod  

E-Print Network (OSTI)

Portelligent Inc. (2006). Apple iPod Video, 30GB MultimediaSystem? The case of Apple's iPod Greg Linden, Kenneth L.to look at one member of Apples iPod family, part of a

Linden, Greg; Kraemer, Kenneth L; Dedrick, Jason

2007-01-01T23:59:59.000Z

104

Evaluation of Pest Management Tactics for Organic Apple Production A. Agnello, H. Reissig, and D. Combs  

E-Print Network (OSTI)

Evaluation of Pest Management Tactics for Organic Apple Production A. Agnello, H. Reissig, and D number of both native and introduced insect and mite species attack apples grown in commercial apple orchards. Control of this pest complex is particularly challenging, because unlike the more arid apple

Agnello, Arthur M.

105

7.5 Declaration in Apple vs. Microsoft/HewlettPackard  

E-Print Network (OSTI)

327 7.5 Declaration in Apple vs. Microsoft/Hewlett­Packard Ben Shneiderman I, Ben Shneiderman declarations and to further identify the arrangement that is unique to Apple and that makes the overall Petrie, Attorneys for Plaintiff, Apple Computer, Inc.; APPLE COMPUTER, INC., Plaintiff, vs. MCROSOFT CORP

Golbeck, Jennifer

106

Apple Defect Detection and Quality Classification with MLP-Neural Networks  

E-Print Network (OSTI)

Apple Defect Detection and Quality Classification with MLP-Neural Networks Devrim UNAY, Bernard' apples is shown. Color, texture and wavelet features are extracted from the apple images. Principal-classifications. The European Union defines three quality classes ("extra", "I", and "II") for the fresh apples

Dupont, Stéphane

107

7.5 Declaration in Apple vs. Microsoft/Hewlett-Packard  

E-Print Network (OSTI)

327 7.5 Declaration in Apple vs. Microsoft/Hewlett-Packard Ben Shneiderman I, Ben Shneiderman declarations and to further identify the arrangement that is unique to Apple and that makes the overall Petrie, Attorneys for Plaintiff, Apple Computer, Inc.; APPLE COMPUTER, INC., Plaintiff, vs. MCROSOFT CORP

Shneiderman, Ben

108

Predicted 2014 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

Predicted 2014 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator Amy Irish. This moderate to heavy crop will mature close predicted dates. Blocks with light croploads will mature 3 or 4

109

Property:Incentive/ApplDsc | Open Energy Information  

Open Energy Info (EERE)

ApplDsc ApplDsc Jump to: navigation, search Property Name Incentive/ApplDsc Property Type String Description Applicable Sector. Pages using the property "Incentive/ApplDsc" Showing 25 pages using this property. (previous 25) (next 25) 2 2003 Climate Change Fuel Cell Buy-Down Program (Federal) + Commercial +, Nonprofit +, Schools +, ... 3 30% Business Tax Credit for Solar (Vermont) + Commercial +, Industrial + 4 401 Certification (Vermont) + Utility +, Industrial + A AEP (Central and North) - CitySmart Program (Texas) + Commercial +, Industrial +, Institutional +, ... AEP (Central and North) - Residential Energy Efficiency Programs (Texas) + Construction +, Installer/Contractor +, Multi-Family Residential + AEP (Central and SWEPCO) - Coolsaver A/C Tune Up (Texas) + Commercial +, Installer/Contractor +, Residential +

110

Specific heat of apple at different moisture contents and temperatures  

E-Print Network (OSTI)

This work discusses results of experimental investigations of the specific heat, $C$, of apple in a wide interval of moisture contents ($W=0-0.9$) and temperatures ($T = 283-363$ K). The obtained data reveal the important role of the bound water in determination of $C(W,T)$ behaviour. The additive model for description of $C(W)$ dependence in the moisture range of $0.1apple was considered as a mixture of water and hydrated apple material (water plasticised apple) with specific heat $C_h$. The difference between $C_h$ and specific heat of dry apple, $\\Delta Cb=C_h-C_d$, was proposed as a measure of the excess contribution of bound water to the specific heat. The estimated amounts of bound water $W_b$ were comparable with the monolayer moisture content in apple. The analytical equation was proposed for approximation of $C(W,T)$ dependencies in the studied intervals of moisture content and temperature.

Viacheslav Mykhailyk; Nikolai Lebovka

2013-05-11T23:59:59.000Z

111

Dietary supplementation with apple juice concentrate alleviates the compensatory increase in glutathione synthase transcription and activity that  

E-Print Network (OSTI)

Dietary supplementation with apple juice concentrate alleviates the compensatory increase that apple juice concentrate (AJC) prevents the increase in oxidative damage to brain tissue and decline

Graves, Michael V.

112

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users 0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information August 21, 2012 - 7:00am Addthis PROBLEM: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Apple Remote Desktop after 3.5.1 and prior to 3.6.1 ABSTRACT: A remote user can monitor potentially sensitive information. reference LINKS: Apple.com Apple Article: HT5433 SecurityTracker Alert ID: 1027420 CVE-2012-0681 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apple Remote Desktop. When a user connects to a third-party VNC server with the 'Encrypt all network data' setting enabled, network data is not encrypted. A remote user monitoring the

113

E-Print Network 3.0 - apple juice turbidity Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

70 1 Slice Cornbread 165 12 oz Apple Juice 167 THURSDAY: Total Calorie Count 1446... Ranch Dressing 70 1 Apple 81 1 Chocolate Chip Cookie 200 12 oz Diet Soda 0 MONDAY: Total...

114

E-Print Network 3.0 - apple juice clarification Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

70 1 Slice Cornbread 165 12 oz Apple Juice 167 THURSDAY: Total Calorie Count 1446... Ranch Dressing 70 1 Apple 81 1 Chocolate Chip Cookie 200 12 oz Diet Soda 0 MONDAY: Total...

115

Pure appl. geophys. 157 (2000) 11351143 00334553/00/08113519 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 1135­1143 0033­4553/00/081135­19 $ 1.50+0.20/0 Tsunamis Generated, Petropavlovsk-Kamchatsky 683006, Russia. #12;Alexander Belousov et al.1136 Pure appl. geophys., expand

Belousov, Alexander

116

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

117

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

118

Pure appl. geophys. 157 (2000) 21492164 00334553/00/12214916 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 2149­2164 0033­4553/00/122149­16 $ 1.50+0.20/0 The Edges of Large. Shaw2150 Pure appl. geophys., died out produce large stress concentrations, which then tend

Shaw, Bruce E.

119

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

120

Pure appl. geophys. 154 (1999) 405407 00334553/99/04040503 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 154 (1999) 405­407 0033­4553/99/040405­03 $ 1.50+0.20/0 Introduction of the asthenosphere? #12;Introduction406 Pure appl. geophys., What can we learn from current GPS measurements

Dmowska, Renata

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Pure appl. geophys. 151 (1998) 443462 00334553/98/04044320 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 151 (1998) 443­462 0033­4553/98/040443­20 $ 1.50+0.20/0 Anisotropy appl. geophys., degassing primitive mantle (HEARN et al., 1990); and 5) a parabolic-shaped region

Humphreys, Eugene

122

Connecting to Poly-WiFi (on Apple Mac) February 2010 Page 1 of 5  

E-Print Network (OSTI)

Connecting to Poly-WiFi (on Apple Mac) February 2010 Page 1 of 5 Connecting to Poly-WiFi (on Apple to Poly-WiFi (on Apple Mac) February 2010 Page 2 of 5 2) Before you can access the Network setting screen-WiFi (on Apple Mac) February 2010 Page 3 of 5 4) From the network name dropdown, select "Poly-WiFi". 5

Aronov, Boris

123

Apples and Other Fruits of the Rose Family  

NLE Websites -- All DOE Office Websites (Extended Search)

Apples and Other Fruits of the Rose Family Apples and Other Fruits of the Rose Family Nature Bulletin No. 277-A October 7, 1967 Forest Preserve District of Cook County Richard B. Ogilvie, President Roland F. Eisenbeis, Supt. of Conservation APPLES AND OTHER FRUITS OF THE ROSE FAMILY Bread, meat and potatoes, with vegetables and green salads, may satisfy the inner man and keep us healthy but much of the fun of eating is provided by the rose family. The rose, itself, is the flower of chivalry and love but its relative, the apple, king of the fruits, has been cultivated since prehistoric times. The members of the Rose Family give us more pleasure than we get from any other group of plants. Apples, quinces, pears, peaches, plums, apricots, cherries, blackberries, raspberries and strawberries -- whether wild or cultivated -- are all relatives of the roses. Their fruits, raw or cooked, give us desserts, pleasant drinks, and many a between-meal delicacy. Typically, they have showy flowers with five equal petals arranged around a central cup bearing one or more fruit-forming pistils and a large number of pollen-bearing stamens. Their leaves are placed alternately on the twigs or stalks -- some of them simple leaves; some of them compound leaves divided into three, five or more leaflets like the rose itself. Some are trees, some are shrubs, and some are vining herbs.

124

Optimization of a Fixed Spraying System for Commercial High-Density Apple Plantings Final Report 2007  

E-Print Network (OSTI)

Optimization of a Fixed Spraying System for Commercial High-Density Apple Plantings Final Report and fruit coverage issues are a research priority in tree fruits and apples in particular. Preliminary Work. Preliminary trials were conducted in two blocks each of Red Delicious and Empire apples on M.9 dwarfing stock

Agnello, Arthur M.

125

http://agbioresearch.msu.edu/centers/nwmihort/ MSU Fruit Team Apple Maturity Report 2014  

E-Print Network (OSTI)

http://agbioresearch.msu.edu/centers/nwmihort/ MSU Fruit Team Apple Maturity Report 2014 Northwest Gingergold harvest continues, and many growers are waiting on McIntosh harvest to begin. Apples are coloring nicely with the cool temperatures. Cool temperatures have hit the northwest region, and apple maturity

126

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 3  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 3 September 18, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the third week of 2013 apple maturity testing at NWMHRC. General Comments - The NWMHRC will be testing apples for maturity for 2013

127

THRESHOLDING-BASED SEGMENTATION AND APPLE GRADING BY MACHINE Devrim Unay, and Bernard Gosselin  

E-Print Network (OSTI)

THRESHOLDING-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION Devrim Unay, and Bernard.tcts.fpms.ac.be ABSTRACT In this paper, a computer vision based system is introduced to automatically grade apple fruits outperformed others with 89 % recognition. 1. INTRODUCTION Computer vision based quality sorting of apple

Dupont, Stéphane

128

APPL: A Probability Programming Language Maj. Andrew G. GLEN, Diane L. EVANS, and Lawrence M. LEEMIS  

E-Print Network (OSTI)

APPL: A Probability Programming Language Maj. Andrew G. GLEN, Diane L. EVANS, and Lawrence M having arbitrary distributions. This arti- cle presents a prototype probability package named APPL (A probability software package, referred to as "A Prob- ability Programming Language" (APPL), that fills

Leemis, Larry

129

MSU Fruit Team Apple Maturity Report 2014 Northwest Region, Report Number 4: October 1, 2014  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2014 Northwest Region, Report Number 4: October 1, 2014 Emily Pochubay and Nikki Rothwell, Extension Fruit Educators Apples are maturing slowly, growers are spot picking-pruned orchards has excellent color. Size in most varieties is also very good; some Honeycrisp apples that had

130

Apple detection in natural tree canopies from multimodal images J. P. Wachs1,2  

E-Print Network (OSTI)

1 Apple detection in natural tree canopies from multimodal images J. P. Wachs1,2 , H. I. Stern2 , T apples within a tree canopy using infra-red and color images in order to achieve automated harvesting. Infra-red provides clues regarding the physical structure and location of the apples based

Wachs, Juan

131

Apple Tree, NH Big Tree for May By Anne Krantz, NH Big Tree Team,  

E-Print Network (OSTI)

Apple Tree, NH Big Tree for May By Anne Krantz, NH Big Tree Team, UNH Cooperative Extension The explosion of apple blossoms in May transforms the most gnarled old tree into a delicate cloud of beauty (1817-1862) in his essay "The Wild Apple Tree," described the blossoms perfectly: `The flowers

New Hampshire, University of

132

Comparing Apples and Oranges Through Partial Orders: An Empirical Peter Kingston and Magnus Egerstedt  

E-Print Network (OSTI)

Comparing Apples and Oranges Through Partial Orders: An Empirical Approach Peter Kingston the comparison of apples and oranges is presented to highlight the operation of the proposed approach. I. INTRODUCTION As the saying goes, one can not compare apples and oranges. But why not? It is clear that some

Egerstedt, Magnus

133

ARTIFICIAL NEURAL NETWORK-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION  

E-Print Network (OSTI)

ARTIFICIAL NEURAL NETWORK-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION Devrim Unay In this paper, a computer vision based system is introduced to automatically sort apple fruits. An artificial. INTRODUCTION Computer vision based quality sorting of apple fruits is nec- essary for increasing the speed

Dupont, Stéphane

134

Simulation of Apple Tree Development Using Mixed Statistical and Biomechanical Models  

E-Print Network (OSTI)

Simulation of Apple Tree Development Using Mixed Statistical and Biomechanical Models Colin Smith1 that characterises the architecture of an apple tree over time. As indicated previously [9, 3, 4], the simulation dynamics in a developmental context, we have created an L-system simulation of a developing apple tree

Paris-Sud XI, Université de

135

Li2O Particulate Flow Concept, APPLE APEX Interim Report November, 1999  

E-Print Network (OSTI)

Li2O Particulate Flow Concept, APPLE APEX Interim Report November, 1999 9-1 CHAPTER 9: Li2O PARTICULATE FLOW CONCEPT ­ APPLE DESIGN Contributors Lead Author: Dai Kai Sze Dai Kai Sze, Zhanhe Wang (ANL Particulate Flow Concept, APPLE APEX Interim Report November, 1999 9-2 9. LI2O PARTICULATE FLOW CONCEPT

California at Los Angeles, University of

136

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 6: October 9, 2013  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 6: October 9, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the sixth week of 2013 apple maturity testing at NWMHRC. Results will be sent via fax and email to past apple maturity list subscribers. Results

137

WHOLE-FARM APPLE ARTHROPOD MANAGEMENT USING REDUCED-RISK TACTICS AND IPM SAMPLING AND MONITORING  

E-Print Network (OSTI)

WHOLE-FARM APPLE ARTHROPOD MANAGEMENT USING REDUCED-RISK TACTICS AND IPM SAMPLING AND MONITORING management programs in apples, using provisional action thresholds for specific major pests based on previous-farm approaches for managing the arthropod pests of apple orchards that rely on RR and OP-replacement insecticides

Agnello, Arthur M.

138

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 1  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 1 September 4, 2013 General Comments - The NWMHRC will be testing apples for maturity for 2013, and results will be sent via fax and email to past apple maturity list subscribers. Results will also be available at: http

139

Steve Jobs' creations simplified life, Apple enthusiasts say in mourning his death  

E-Print Network (OSTI)

Steve Jobs' creations simplified life, Apple enthusiasts say in mourning his death By ADAM PLAYFORD as soon as they got confirmation." Word of the Apple co-founder's death of pancreatic cancer hit hard live without a computer," said Joerg von Veltar, the founder of the Palm Beach Phoenix Apple User Group

Belogay, Eugene A.

140

Title: Use of Physical Barriers to Prevent Borer Infestation of Apple Burrknots Project Leaders  

E-Print Network (OSTI)

Title: Use of Physical Barriers to Prevent Borer Infestation of Apple Burrknots Project Leaders of burrknot tissue on apple dwarfing rootstocks is an increasing problem throughout the northeast. One into the winter. We also discuss economic considerations. Background and Justification: Apple growers

Agnello, Arthur M.

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Syracuse University Apple Festival The Department of Recreation Services will conduct the Syracuse  

E-Print Network (OSTI)

Syracuse University Apple Festival The Department of Recreation Services will conduct the Syracuse University Apple Festival on Friday, September 6 from 11:00am- 2:00pm on the Quad. The event will include can reserve a table by completing the Apple Festival Table Registration below. This is a great

Raina, Ramesh

142

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 7: October 16, 2013  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 7: October 16, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the seventh week of 2013 apple maturity testing at NWMHRC. Results will be sent via fax and email to past apple maturity list subscribers. Results

143

THE APPLE GAME AND THE PRESSING-DOWN LEMMA Brian White  

E-Print Network (OSTI)

THE APPLE GAME AND THE PRESSING-DOWN LEMMA Brian White Math 161 Lecture Notes (Winter 2005) Recall, but for every apple game is played in a series of stages, one for each element of 1. At stage 0, you are given a countable collection of apples. At each stage n 1 with n > 0: (1) If you have

White, Brian

144

Integrating Markov Chain Models and L-systems to Simulate the Architectural Development of Apple Trees  

E-Print Network (OSTI)

Integrating Markov Chain Models and L-systems to Simulate the Architectural Development of Apple the architectural development of apple trees is presented. The approach is based on using an L-systems framework. Results show that these models are able to represent the branching zones observed in apple trees at node

Paris-Sud XI, Université de

145

Low and High-Level Visual Feature Based Apple Detection from Multi-modal Images  

E-Print Network (OSTI)

1 Low and High-Level Visual Feature Based Apple Detection from Multi-modal Images J. P. Wachs1 , H discusses the development of a machine vision system, capable of recognizing occluded green apples within a tree canopy. This involves the detection of "green" apples within scenes of "green leaves", shadow

Wachs, Juan

146

Borer problems and their control in dwarf apple trees David Kain, Entomology, NYSAES, Geneva, NY  

E-Print Network (OSTI)

Borer problems and their control in dwarf apple trees David Kain, Entomology, NYSAES, Geneva, NY in western New York, were invading burrknots on dwarf apple trees. About the same time, Dick Straub seemed to be becoming more common in dwarf apple plantings, as well. Based on Deb's alert, we decided

Agnello, Arthur M.

147

V-137: Apple Mac OS X update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apple Mac OS X update for Java V-137: Apple Mac OS X update for Java April 18, 2013 - 6:00am Addthis PROBLEM: Apple Mac OS X update for Java PLATFORM: Mac OS X 10.6, OS X Lion...

148

AMR Power Private Ltd APPL | Open Energy Information  

Open Energy Info (EERE)

AMR Power Private Ltd APPL AMR Power Private Ltd APPL Jump to: navigation, search Name AMR Power Private Ltd. (APPL) Place Hyderabad, Andhra Pradesh, India Zip 560 034 Sector Hydro Product Hyderabad-based small hydro project developer. Coordinates 17.6726°, 77.5971° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":17.6726,"lon":77.5971,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

149

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

150

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

151

The inheritance of fruit colour in apple (Malus pumila Mill.)  

E-Print Network (OSTI)

The inheritance of fruit colour in apple (Malus pumila Mill.) Allan G. WHITE Yves LESPINASSE that red fruit colour was determined by two dominant complementary genes. Blush and red colour did key words : Skin colour, hybridization. R?SUM? Hérédité de la couleur du fruit chez le pommier (Malus

Paris-Sud XI, Université de

152

APPLIED COGNITIVE PSYCHOLOGY Appl. Cognit. Psychol. 20: 487503 (2006)  

E-Print Network (OSTI)

APPLIED COGNITIVE PSYCHOLOGY Appl. Cognit. Psychol. 20: 487­503 (2006) Published online 12 April # 2006 John Wiley & Sons, Ltd. The question of how cognitive abilities predict task performance a cluster of cognitive functions underlying a factor that they labelled complex visuo-spatial organization

Montello, Daniel R.

153

Appl. Math. Lett., (2012) DSM for general nonlinear equations  

E-Print Network (OSTI)

Appl. Math. Lett., (2012) 1 #12;DSM for general nonlinear equations A.G. Ramm Mathematics(y) = 0, F (y) = 0, then equation F(u) = 0 can be solved by a DSM (Dynamical Systems Method) and the rate of convergence of the DSM is given provided that a source-type assumption holds. A discrete version of the DSM

154

Predicted 2010 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

Predicted 2010 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator Amy Irish-Brown, District ICM Educator Clarksville Horticultural Experimentation Station This season started out early the state has a light crop. The post- bloom cold temperatures will delay maturity and light croploads

155

2012 PREDICTED APPLE HARVEST DATES Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

2012 PREDICTED APPLE HARVEST DATES Phillip Schwallier, District Horticulture Educator Amy Irish-Brown, District ICM Educator Clarksville Horticultural Experimentation Station We have the least confidence in our are above normal. Light crops will mature a few days earlier. Other varieties are less prone to hot

156

Limits to the potential distribution of light brown apple moth in ArizonaCalifornia based on climate suitability and host plant availability  

E-Print Network (OSTI)

503531 Dumbleton LJ (1932) The apple leaf roller (TortrixJW (1937) The light-brown apple moth (Tortrix post- vittana,distribution of light brown apple moth in ArizonaCalifornia

Gutierrez, Andrew Paul; Mills, Nicholas J.; Ponti, Luigi

2010-01-01T23:59:59.000Z

157

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

158

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

159

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

160

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

From: Nicholas Ammann [mailto:nammann@apple.com]  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wednesday, June 20, 2012 8:12 AM Wednesday, June 20, 2012 8:12 AM To: Exparte Communications Subject: Energy Conservation Standards for Battery Chargers and External Power Supplies; Proposed Rule Making - Ex Parte Communication Apple Inc. met with DOE to discuss the notice of proposed rule making the Department sent out regarding battery chargers and external power supplies. Below is a list of topics that Apple discussed with DOE. - Discussion regarding Battery Charger product Class 8 and that it does not scale with battery capacity. Class 8 is for DC-DC battery chargers. - Timeline for the effective date of the DOE battery charger efficiency regulation and the external power supply regulation. - Flexibility of DOE Battery Charger efficiency mark to be placed on the retail

162

Apple Valley, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Apple Valley, California: Energy Resources Apple Valley, California: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 34.5008311°, -117.1858759° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":34.5008311,"lon":-117.1858759,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

163

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Energy Savers (EERE)

Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or...

164

E-Print Network 3.0 - apple orchard systems Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy 52 Abstract Amendment of orchard soil with low-glucosinolate Brassica napus (rape) seed meal Summary: established in mature apple orchards and infect trees...

165

E-Print Network 3.0 - apple blossom amaryllidaceae Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Toppings Assorted Dressings Entre Grilled Apple Barbequed Chicken Swiss... Blossom Dressing Starch Oven Roasted Quartered Red Skin Potatoes Desserts Cookies, Brownies, Bars...

166

E-Print Network 3.0 - apple leafroller bonagota Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary: , such as: Apple Aphid Cotton Aphid Green Peach Aphid Melon Aphid Pea Aphid Potato Aphid Rose Aphid... Leafminers, such as: Citrus Leafminer Serpentine Leafminer...

167

E-Print Network 3.0 - apple filter cake Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Cake Apple Turnovers Strawberry Rhubarb Pie Chocolate Cream... Vegetarian Crab Cakes Potato Wedges Linguine Brown Rice Pilaf Steamed Italian Green Beans Steamed Fresh... Peach...

168

E-Print Network 3.0 - apple aphid dysaphis Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Sample search results for: apple aphid dysaphis Page: << < 1 2 3 4 5 > >> 1 Community ecology Ants defend aphids against Summary: conditions, ants remove cadavers of the rosy...

169

E-Print Network 3.0 - appl phys lett Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

, left-handed metamaterial. Appl. Phys. Lett. 78, 489 (2001). 102 R. A. Shelby, D. R. Smith, and S... -refractive-index transmission-line media. ... Source: Groningen,...

170

Theor Appl Genet (2004) 108:274279 DOI 10.1007/s00122-003-1435-5  

E-Print Network (OSTI)

Theor Appl Genet (2004) 108:274­279 DOI 10.1007/s00122-003-1435-5 E. Huaracha · M. Xu · S. S. Korban Narrowing down the region of the Vf locus for scab resistance in apple using AFLP-derived SCARs disease apple scab in apple, to a genetic distance of 0.4 cM is presented. Using 11 AFLP-derived SCARs

Korban, Schuyler S.

171

Four species of Zygophiala (Schizothyriaceae, Capnodiales) are associated with the sooty blotch and flyspeck complex on apple  

E-Print Network (OSTI)

and flyspeck complex on apple Jean Carlson Batzer Maria Mercedes Diaz Arias Thomas C. Harrington Mark L: Sooty blotch and flyspeck (SBFS) is a complex of fungi that cause late-season blemishes of apple anamorph Zygophiala jamaicensis), caused flyspeck on apple. In the present study we compared morphology

Harrington, Thomas C.

172

Masting and trophic cascades: interplay between rowan trees, apple fruit moth, and their parasitoid in southern Norway  

E-Print Network (OSTI)

Masting and trophic cascades: interplay between rowan trees, apple fruit moth, and their parasitoid. 2004. Masting and trophic cascades: interplay between rowan trees, apple fruit moth of the dominant seed predator and its parasitoid. The apple fruit moth, Argyresthia conjugella Zeller, is a pre

173

Page 1 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 How to set up  

E-Print Network (OSTI)

Page 1 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 How to set up Apple Mail to check email from the University of Aarhus In the Mail menu, select Indstillinger... #12;Page 2 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 Click the + button

174

A New Canker Disease of Apple, Pear, and Plum Rootstocks Caused by Diaporthe ambigua in South Africa  

E-Print Network (OSTI)

A New Canker Disease of Apple, Pear, and Plum Rootstocks Caused by Diaporthe ambigua in South., Wingfield. B. D.. Wingfield. M. 1., and Calitz. F. J. 1996. A new canker disease of apple. pear, and plum was found to be the c:J.useof a newly recognized disease of apple. pear, and plum rootstocks in South Africa

175

Investigating the Influence of Geometrical Traits on Light Interception Efficiency of Apple Trees: a Modelling Study with MAppleT  

E-Print Network (OSTI)

Investigating the Influence of Geometrical Traits on Light Interception Efficiency of Apple Trees-structural plant model that has been built for simulating architectural development of apple trees. It has depends on geometrical traits. The purpose of this research is to investigate the influence of apple trees

Paris-Sud XI, Université de

176

Technology for Education Need a Computer? Take advantage of University educational discounts on a Dell or Apple computers, printers, and  

E-Print Network (OSTI)

on a Dell or Apple computers, printers, and accessories. Visit: http://uts.sc.edu/computerpurchase/ PC Windows or Apple? Check with your college or major for any specific computer and operating system Distribution Software for Home. And while there, you can also purchase Microsoft Office for your Apple or PC

Almor, Amit

177

Termini e condizioni 1. L'offerta di finanziamento consumer per i clienti Apple Online Store promossa e gestita  

E-Print Network (OSTI)

Termini e condizioni 1. L'offerta di finanziamento consumer per i clienti Apple Online Store è promossa e gestita congiuntamente da Apple Sales International, Hollyhill Industrial Estate, Cork, Irlanda ("Apple") e Agos Ducato Spa, via Bernina 7 20158 Milano ("Agos Ducato"). 2. L'offerta di finanziamento

178

2010 USDA Research Forum on Invasive Species GTR-NRS-P-75 87 ECONOMIC ANALYSIS OF LIGHT BROWN APPLE MOTH  

E-Print Network (OSTI)

2010 USDA Research Forum on Invasive Species GTR-NRS-P-75 87 ECONOMIC ANALYSIS OF LIGHT BROWN APPLE. Our analyses indicated that LBAM could cause substantial economic losses to U.S. apple, grape, orange an economic analysis of the light brown apple moth (LBAM), (Epiphyas postvittana (Walker)), whose presence

179

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

180

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Pure appl. geophys. 155 (1999) 207232 00334553/99/04020726 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 155 (1999) 207­232 0033­4553/99/040207­26 $ 1.50+0.20/0 Rethinking Earthquake@ldeo.columbia.edu #12;Lynn R. Sykes et al.208 Pure appl. geophys., ment and funding of the National Earthquake Hazards

Shaw, Bruce E.

182

Pure appl. geophys. 157 (2000) 16011620 00334553/00/10160120 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 1601­1620 0033­4553/00/101601­20 $ 1.50+0.20/0 Seismic Amplitude Pratt1602 Pure appl. geophys., wavenumbers. We will see that the main difficulty in inverting a deep

Pratt, R. Gerhard

183

510 Plant Disease / Vol. 97 No. 4 Etiology of Moldy Core, Core Browning, and Core Rot of Fuji Apple in China  

E-Print Network (OSTI)

510 Plant Disease / Vol. 97 No. 4 Etiology of Moldy Core, Core Browning, and Core Rot of Fuji Apple, and core rot of Fuji apple in China. Plant Dis. 97:510-516. `Fuji' apple fruit were collected in Shaanxi to species. Pathogenicity was determined by cutting apple fruit into halves and daubing spore suspensions

Biggs, Alan R.

184

Miyake-Apple posterior video analysis/photographic technique  

Science Journals Connector (OSTI)

The Miyake-Apple technique for posterior photography and video analysis of postmortem eyes and its variations provide a unique view of the anterior segment structures and surgical manipulations that are not readily seen during surgical procedures or by clinical inspection. It is particularly useful in studying and teaching anterior segment surgery, especially cataract and intraocular lens (IOL) surgery. We summarize the peer-reviewed literature on the use of this technique (1) in experimental studies with fresh human or animal eyes to analyze new \\{IOLs\\} and surgical techniques, (2) in formalin-fixed human pseudophakic autopsy eyes to study IOL-related complications, and (3) for teaching and training purposes.

Frederico A.S. Pereira; Liliana Werner; E. John Milverton; Minas T. Coroneo

2009-01-01T23:59:59.000Z

185

ZCS Network Edition 6.0 January 2010 1 Zimbra Connector for Apple iSync (For Mac OS 10.5 +)  

E-Print Network (OSTI)

ZCS Network Edition 6.0 January 2010 1 Zimbra Connector for Apple iSync (For Mac OS 10.5 +) Use the Zimbra Connector for Apple® iSync with Mac running 10.5 or later to sync your Apple Address Book to your Connector for Apple iSync to sync your Calendar and your Contacts. See the Zimbra Connector for Apple i

186

T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apple Mac OS X MacDefender Fake Antivirus Malicious Software 34: Apple Mac OS X MacDefender Fake Antivirus Malicious Software T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software June 1, 2011 - 3:35pm Addthis PROBLEM: Apple Mac OS X versions 10.4, 10.5, and 10.6 are the targets of a new campaign of phishing attacks that aim to infect systems with a fake antivirus application called MacDefender. PLATFORM: Mac OS X 10.4, Mac OS X 10.6, Mac OS X 10.5 ABSTRACT: Apple Mac OS X users could infect their systems after visiting a malicious web page. Reports suggest that the Apple Safari web browser could allow automatic download and execution of the JavaScript-based malware because of an incorrectly set security option in Safari. reference LINKS: Security Article: HT4650 IntelliShield ID: 23239 Apple Insider Article

187

Appl. Phys. B 34, 167-170(1984) Applied ,..o,,,-PhysicsB ~Chemisby  

E-Print Network (OSTI)

Appl. Phys. B 34, 167-170(1984) Applied ,..o,,,- physics PhysicsB ~Chemisby 9 Springer-Verlag1984. Rychov, and A. B. Feodorov Physics Department, Moscow State University, SU-117234 Moscow, USSR Received8

Zadkov, Victor

188

Detection of streptomycin resistance in Erwinia amylovora strains isolated from apple orchards in Chihuahua, Mexico  

Science Journals Connector (OSTI)

Fire blight, one of the most severe diseases of apple and pear, is caused by the bacterium Erwinia amylovora. One control method is the use of antibiotics like streptomycin; however, streptomycin is the only anti...

Adrian Ponce de Len Door; Alejandro Romo Chacn

2013-10-01T23:59:59.000Z

189

E-Print Network 3.0 - apple integrated pest Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

results for: apple integrated pest Page: << < 1 2 3 4 5 > >> 1 The Foundation for The Gator Nation An Equal Opportunity Institution Summary: the risk of pests and unnecessary...

190

DOI: 10.1007/s00339-006-3706-x Appl. Phys. A 85, 233240 (2006)  

E-Print Network (OSTI)

DOI: 10.1007/s00339-006-3706-x Appl. Phys. A 85, 233­240 (2006) Materials Science & Processing chemical vapor deposition [45], hydrothermal synthesis [46], and solvothermal and subsequent anneal- ing

Reed, Mark

191

E-Print Network 3.0 - apple cv bravo Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced Search Sample search results for: apple cv bravo Page: << < 1 2 3 4 5 > >> 1 POTATO (Solanum tuberosum) cv. Goldrush W. R. Stevenson and R. V. James Early Blight;...

192

Reflections on Cambridge: Reflections on Isaac Newton, discovery and Cambridge - with apple tree  

E-Print Network (OSTI)

Reflections about the life and effects of Isaac Newton in Cambridge, filmed outside Trinity College, with the descendant of his apple tree behind (and the rooms where he lived and worked). Filmed by Xu Bei in 2009....

Macfarlane, Alan

193

Tackling Care Transitions: Mom and Apple Pie vs. the Devil in the Details  

Science Journals Connector (OSTI)

Continuity of care is a fundamental tenet of high quality of care and has been likened to motherhood and apple pie1. Unfortunately, patients feel that continuity and care transitions are major problems with the...

Vineet M. Arora MD; MAPP

2009-08-01T23:59:59.000Z

194

From: Nicholas Ammann [mailto:nammann@apple.com]  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tuesday, July 16, 2013 4:35 PM Tuesday, July 16, 2013 4:35 PM To: Exparte Communications Subject: Request for Information on Evaluating New Products for the Battery Chargers and External Power Supply Rulemaking - Ex Parte Communication Below are a list of topics that Apple Inc. discussed with DOE. - Timeline for the effective date of the DOE battery charger efficiency regulation and the external power supply regulation. - Flexibility of DOE Battery Charger efficiency mark, including using software or package as an alternate to marking the product surface. - Discussion of replacement parts and refurbished products produced prior to the DOE effective date. - Discussion of DOE proposed EPS Level VI efficiency criteria as compared to that of Level V and how the implementation date

195

ENERGY COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE  

Office of Legacy Management (LM)

COMMISSION COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE Pursuant to the rcgu!ations in Title 10, Code of Federal Regulations, Chapter 1, Part 40, application is hereby made for a license to receive, possess, use, transfer, deliver or import into the United Stat-, source material for the activity or activities described. 1. (check ooa) 2. NAME OF APPLICANT W. R. GRACE 6 Co. 0 (a) New Iicense 0 (b) Amendment to License No.- Davison Chemical Division STA-422 3. Q (c) Renewal of Licensr No. 0 (d) Previous License No. Pompton Plains, N. J. 4. ST,.TE THE AOORESS(ES) AT WHICH SOURCE MATERIAL WILL BE POSSESSED OR USED 868 Black Oak Ridge Road, Wayne, fi. J. a*ocY s up/'l File IF 5. BUSINESS OR OCCUPATION I 6. (a) IF APPLICANT IS AN INDIVIDUAL. STATE CITIZENSHIP

196

Fermion Generations from "Apple-Shaped" Extra Dimensions  

E-Print Network (OSTI)

We examine the behavior of fermions in the presence of an internal compact 2-manifold which in one of the spherical angles exhibits a conical character with an obtuse angle. The extra manifold can be pictured as an apple-like surface i.e. a sphere with an extra "wedge" insert. Such a surface has conical singularities at north and south poles. It is shown that for this setup one can obtain, in four dimensions, three trapped massless fermion modes which differ from each other by having different values of angular momentum with respect to the internal 2-manifold. The extra angular momentum acts as the family label and these three massless modes are interpreted as the three generations of fundamental fermions.

Merab Gogberashvili; Pavle Midodashvili; Douglas Singleton

2007-08-13T23:59:59.000Z

197

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

198

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

199

Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 1 of 4  

E-Print Network (OSTI)

Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 1 of 4 Connecting to Poly-WiFi (on Apple iPhone) 1) Open "Settings". 2) Select "Wi-Fi". Information Systems Department #12;Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 2 of 4 3) If your Wi-Fi is currently off, turn On the Wi

Aronov, Boris

200

Macronized Vowels on a Mac (OS X 10.6 & 10.7) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.6 & 10.7) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click on Language

Keegan, Te Taka

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Macronized Vowels on a Mac (OS X 10.3, 4 & 5) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.3, 4 & 5) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click

Keegan, Te Taka

202

Macronized Vowels on a Mac (OS X 10.1 & 10.2) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.1 & 10.2) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click

Keegan, Te Taka

203

Biotechnol. Appl. Biochem. (2005) 42, 119131 (Printed in Great Britain) doi:10.1042/BA20040207 119 Clonal evolution of stem and differentiated cells can be  

E-Print Network (OSTI)

Biotechnol. Appl. Biochem. (2005) 42, 119­131 (Printed in Great Britain) doi:10.1042/BA20040207 119

Zandstra, Peter W.

204

Mac mini: How to Reset the PMU http://docs.info.apple.com/article.html?artnum=300574 1 of 2 7/23/2007 2:06 PM  

E-Print Network (OSTI)

Mac mini: How to Reset the PMU http://docs.info.apple.com/article.html?artnum=300574 1 of 2 7 the PMU on a Mac mini and it still isn't displaying video or turning on, contact Apple technical support (1-800-APL-CARE in the U.S.) or take your computer to your local Apple Retail Store or Apple

California at Santa Barbara, University of

205

ZCS Network Edition 6.0 December 2009 1 Zimbra Connector for Apple iSync (For Mac OS 10.4.x)  

E-Print Network (OSTI)

ZCS Network Edition 6.0 December 2009 1 Zimbra Connector for Apple iSync (For Mac OS 10.4.x) When the Zimbra Connector for Apple® iSync is installed, you can use Apple Address Book, iCal, and Microsoft on OS X 10.5 or later is handled with CalDAV. See Zimbra Connector for Apple iSync (For Max OS 10

206

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

207

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

208

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

209

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

210

New insights for estimating the genetic value of F1 apple progenies for irregular bearing1 during first years of tree production2  

E-Print Network (OSTI)

1 New insights for estimating the genetic value of F1 apple progenies for irregular bearing1 during title: Early quantification of alternation in flowering for F1 apple progenies18 Submitted: 02 agronomic issues in1 fruit-tree species, particularly in apple, the selection of regular cultivars

Paris-Sud XI, Université de

211

First Report of Nectria galligena Causing European Canker of Apple Trees in Ontario. A. R. Biggs, Agriculture Canada Research Station, Vineland Station, Ontario LOR 2EO. Plant  

E-Print Network (OSTI)

First Report of Nectria galligena Causing European Canker of Apple Trees in Ontario. A. R. Biggs for publication 19 July 1985. European canker of apple (Malus domestics Borkh. 'MacIntosh') caused by Nectria includes the apple-growing region of central Ontario. Reference: Booth, C. Commonw. Mycol. Inst. Pap. 73

Biggs, Alan R.

212

Application for CALS-CCE 2013 Summer Internship Title of project: Plum Curculio Management in Organic Apple Production: Develop Management Strategies  

E-Print Network (OSTI)

in Organic Apple Production: Develop Management Strategies using Bio-control Nematodes Worksite location (CCE outcomes (no more than 5-10 sentences): The Hudson River Valley organic apple production has been management of plum curculio would aid organic apple production in this region of NY. The development

Keinan, Alon

213

Johnson-Laird, ). So, for example, to satisfy the concept (`to be an apple. . .'\\), a thing must exhibit roundness, edibility, redness, fruitiness, and so on. Such theories  

E-Print Network (OSTI)

#12;? Johnson-Laird, ). So, for example, to satisfy the concept (`to be an apple. . .'\\), a thing of concepts. For instance, apples resemble re engines by sharing the characteristic of redness, they resemble lost much of its popularity, largely because apples, although most o en red, are not necessarily so

Bucci, David J.

214

APPLE: Malus domestica Borkhauser D. P. Kain and A. Agnello Dogwood borer (DWB); Synanthedon scitula (Harris) N.Y.S. Agric. Expt. Station  

E-Print Network (OSTI)

APPLE: Malus domestica Borkhauser D. P. Kain and A. Agnello Dogwood borer (DWB); Synanthedon@nysaes.cornell .edu APPLE, EVALUATION OF VARIOUS TRUNK SPRAYS TO CONTROL BORERS INFESTING BURRKNOTS, 2006 the untreated check. (Table 1) Table 1. Efficacy of insecticides against dogwood borer infesting apple, 2006

Agnello, Arthur M.

215

Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00036777 F ADITI GUPTA F GEN N  

E-Print Network (OSTI)

Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00036777 F ADITI GUPTA F 00036674 F SRISHTI VIVEK SHARMA F GEN N Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH) Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00032299 F SANDEEP KUMAR

Ribeiro, Vinay

216

Nitrogen recycling in the apple (Malus domestica Borkh.) Department of Horticulture, University of Illinois, Urbana, II 6i801,1, U.,c).A.  

E-Print Network (OSTI)

Nitrogen recycling in the apple (Malus domestica Borkh.) J.S. Titus Department of Horticulture of an apple tree in which we have been engaged for the last several years. In looking into some early literature, the recognition that the roots of the apple (Malus domestica Borkh.) could reduce nitrogen

Paris-Sud XI, Université de

217

Pure appl. geophys. 149 (1997) 1-2 0033 4553/97/010001-0251.50+ 0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 149 (1997) 1-2 0033 4553/97/010001-0251.50+ 0.20/0 9 Birkh~user Verlag, Basel regarding the strategy of prediction and particular proposals for #12;2 Introduction Pure appl. geophys

Dmowska, Renata

218

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:15pm 3:15pm Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

219

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:03am 7:03am Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

220

Appl. Phys. A 68, 379385 (1999) / DOI 10.1007/s003399900012 Applied Physics A  

E-Print Network (OSTI)

cuticle is comparable to polymers exhibiting relatively low thermal conductivities, and, therefore, should.e. with pulse lengths shorter than the thermal conduction in the substrate. Chitin, the main component of insectAppl. Phys. A 68, 379­385 (1999) / DOI 10.1007/s003399900012 Applied Physics A Materials Science

Krahe, Rüdiger

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Eur. Phys. J. Appl. Phys. 56, 24004 (2011) DOI: 10.1051/epjap/2011110194  

E-Print Network (OSTI)

Eur. Phys. J. Appl. Phys. 56, 24004 (2011) DOI: 10.1051/epjap/2011110194 THE EUROPEAN PHYSICAL JOURNAL APPLIED PHYSICS Regular Article Influence of nitrogen impurities on the formation of active´isica, IST, Universidade T´ecnica de Lisboa, Portugal 3 Research Institute for Solid State Physics and Optics

Guerra, Vasco

222

Tank-Mix Options for Control of Tropical Soda Apple and Dogfennel1  

E-Print Network (OSTI)

SS-AGR-300 Tank-Mix Options for Control of Tropical Soda Apple and Dogfennel1 B. A. Sellers and J throughout Florida, GrazonNext HL tank-mixed with another herbicide will be required to effectively control both species. Many combinations were tested to determine what herbi- cides could be tank

Watson, Craig A.

223

DOI: 10.1007/s00339-003-2397-9 Appl. Phys. A 78, 553556 (2004)  

E-Print Network (OSTI)

DOI: 10.1007/s00339-003-2397-9 Appl. Phys. A 78, 553­556 (2004) Rapidcommunication Materials) were developed [1], active research had been performed to improve the device per- formance [2­6]. For fabricating effi- cient devices, it is necessary to en- hance charge injection efficiency at both OLED cathode

Gong, Jian Ru

224

Radon Series Comp. Appl. Math 8, 129 c de Gruyter 2009 Optimal consumption and investment with  

E-Print Network (OSTI)

Radon Series Comp. Appl. Math 8, 1�29 c de Gruyter 2009 Optimal consumption and investment investment/con- sumption problem for continuous time market models. By applying results from sto- chastic, together with margin tradings on certain financial products, the exposure to losses of investments

Paris-Sud XI, Université de

225

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2009; 17:1133  

E-Print Network (OSTI)

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2009; 17 Research History of Accelerated and Qualification Testing of Terrestrial Photovoltaic Modules: A Literature-plate terrestrial photovoltaic (PV) modules. An important facet of this subject is the standard module test

226

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. (in press)  

E-Print Network (OSTI)

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. (in press and Separation of Cd and Te from Cadmium Telluride Photovoltaic Manufacturing Scrap V. M. Fthenakis*,y and W. Wang Brookhaven National Laboratory, Department of Environmental Sciences, Photovoltaic Environmental

227

New data on the effect of solar radiation and ?-farnesene on development of apple superficial scald during storage  

Science Journals Connector (OSTI)

The previously unknown selective effect of solar radiation on the development of apple superficial scald is established. Superficial scald doesnt occur on the sun-exposed side of certain green fruits after st...

S. A. Rodikov

2008-06-01T23:59:59.000Z

228

Appl Microbiol Biotechnol (2003) 62:291296 DOI 10.1007/s00253-003-1297-4  

E-Print Network (OSTI)

Appl Microbiol Biotechnol (2003) 62:291­296 DOI 10.1007/s00253-003-1297-4 O R I G I N A L P A P E R

Daugulis, Andrew J.

229

Appl. Math. Lett., 25, (2012), 2009-2014. DSM for general nonlinear equations  

E-Print Network (OSTI)

Appl. Math. Lett., 25, (2012), 2009-2014. 1 #12;DSM for general nonlinear equations A.G. Ramm-unique, such that F(y) = 0, F (y) = 0, then equation F(u) = 0 can be solved by a DSM (Dynamical Systems Method) and the rate of convergence of the DSM is given provided that a source-type assumption holds. A discrete

230

Shot Apple 2, a test of the TEAPOT series, 5 May 1955. Technical report  

SciTech Connect

This report describes the activities of more than 2,000 DOD personnel, both military and civilian, in Shot APPLE 2, the thirteenth nuclear test in the TEAPOT atmospheric nuclear weapons testing series. The test was conducted on 5 May 1955 and involved participants from Exercise Desert Rock VI, AFSWP, AFSWC, AEC, Test Groups, and the Air Weather Service. The largest activity was the test of an armored task force, Task Force RAZOR, which involved approximately 1,000 troops.

Ponton, J.; Wilkinson, M.; Rohrer, S.

1981-11-25T23:59:59.000Z

231

CONNNECT TO WiFi USING PROXY SETTINGS (MAC) This guide explains how to set up a modern Apple Mac (running OSX 10.3 or higher) to connect to the internet,  

E-Print Network (OSTI)

CONNNECT TO WiFi USING PROXY SETTINGS (MAC) This guide explains how to set up a modern Apple Mac Apple on the left of the menu bar. 2. Click on `System Preferences'. 3. Click on `Network'. 4. A window

Mottram, Nigel

232

Intel-based iMac, Intel-based Mac mini: How to reset the System Mana... http://docs.info.apple.com/article.html?artnum=303446 1 of 1 7/23/2007 2:16 PM  

E-Print Network (OSTI)

Intel-based iMac, Intel-based Mac mini: How to reset the System Mana... http://docs.info.apple.com/article.html?artnum=303446 1 of 1 7/23/2007 2:16 PM Visit the Apple Store online (1-800-MY-APPLE), visit a retail location on an iMac (Early 2006), iMac (Mid 2006), iMac (Late 2006), or Mac mini (Early 2006): From the Apple menu

California at Santa Barbara, University of

233

Multiple density layered insulator  

DOE Patents (OSTI)

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

234

Apple pith moth Blastodacna atra Prepared by T. Noma, M. Colunga-Garcia, M. Brewer, J. Landis, and A. Gooch as a part of Michigan State University IPM Program and  

E-Print Network (OSTI)

Apple pith moth Blastodacna atra Prepared by T. Noma, M. Colunga-Garcia, M. Brewer, J. Landis of Agriculture. Michigan State University's invasive species factsheets The apple pith moth is an occasional pest of apple orchards and fruit tree nurseries in Eurasia. Larvae feed inside the twigs and heavy infestations

235

Pure Appl. Chem., Vol. 82, No. 12, pp. 22472279, 2010. doi:10.1351/PAC-CON-10-09-04  

E-Print Network (OSTI)

2247 Pure Appl. Chem., Vol. 82, No. 12, pp. 2247­2279, 2010. doi:10.1351/PAC-CON-10-09-04 © 2010 to the trans form once the UV source is removed. Although this thermal re-isomerization is slow, *Pure Appl

Martin, Jan M.L.

236

Multiple Controls on the Chemical and Physical Structure of Biochars  

Science Journals Connector (OSTI)

We report here the systematic characterization of biochars produced under a variety of highly controlled pyrolysis conditions from two biomass feedstocks (corn stover and apple wood). ...

Hao Sun; William C Hockaday; Caroline A. Masiello; Kyriacos Zygourakis

2012-02-01T23:59:59.000Z

237

Pyrochemical multiplicity counter development  

SciTech Connect

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

238

Characterization of the Support and Drive System of the PETRA III APPLE Undulator  

SciTech Connect

Helmholtzzentrum Berlin has built an APPLE II undulator for the storage ring PETRA III. The device has a total length of 5m and a minimum gap of 11mm. The high magnetic forces in particular in the inclined mode have been analyzed by means of finite element methods (FEM). Specific mechanic components such as flexible joints have been optimized to cope with the gap- and shift-dependent 3D-forces and a sophisticated control and drive system has been implemented. After completion of the device, detailed laser interferometer measurements for all operation modes have been performed. The data are compared to the FEM simulations.

Bahrdt, J.; Baecker, H.-J.; Frentrup, W.; Gaupp, A.; Gottschlich, S.; Kuhn, C.; Scheer, M.; Schulz, B. [Helmholtzzentrum Berlin fuer Materialien und Energie, Glienicker Strasse 100, D-14109 Berlin (Germany); Gast, M. [Hochschule fuer Wirtschaft und Recht Berlin, Badensche Str. 50-51, D-10825 Berlin (Germany); Englisch, U.; Schoeps, A.; Tischer, M. [Deutsches Elektronen-Synchrotron DESY, Notkestr. 85, D-22607 Hamburg (Germany)

2010-06-23T23:59:59.000Z

239

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. November 2, 2011 U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. November 1, 2011 U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data A remote user can obtain configuration information. October 31, 2011 U-023: Debian update for phpldapadmin All versions of phpldapadmin - all released versions as of today are vulnerable to a remote code execution bug. October 28, 2011 U-022: Apple QuickTime Multiple Vulnerabilities

240

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. June 24, 2011 T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. June 23, 2011 T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases. June 22, 2011 T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 5, 2012 July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). June 29, 2012 U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. June 28, 2012 U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

242

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

243

Multiple Rankine topping cycles  

SciTech Connect

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and rejection. However, no working fluid has been identified which will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids. This paper gives a history of Rankine topping cycles, presents an analysis for the calculation of the overall efficiency of a three-module multiple Rankine cycle, and presents results from a case study for a sodium-mercury-water cycle.

McWhirter, J.D. [Argonne National Lab., Idaho Falls, ID (United States). Engineering Div.]|[Idaho State Univ., Pocatello, ID (United States). Coll. of Engineering

1995-07-01T23:59:59.000Z

244

SEARCHING FOR VIDEOS ON APPLE IPAD AND IPHONE Colum Foley, Jinlin Guo, David Scott, Paul Ferguson, Cathal Gurrin  

E-Print Network (OSTI)

the performance of novice versus expert users. Index Terms-- Video search, iPad, iPhone 1. INTRODUCTION Content system with the iPad app. On the iPad, using simple touch commands users can enter search queriesSEARCHING FOR VIDEOS ON APPLE IPAD AND IPHONE Colum Foley, Jinlin Guo, David Scott, Paul Ferguson

Lee, Hyowon

245

Appl Phys B (2012) 107:921934 DOI 10.1007/s00340-011-4837-0  

E-Print Network (OSTI)

Appl Phys B (2012) 107:921­934 DOI 10.1007/s00340-011-4837-0 On the application of radio frequency in terms of the physi- cal parameters of the resonator and the properties of the ion trap. We also compare · L.R. Simkins · S. Weidt · W.K. Hensinger ( ) Department of Physics and Astronomy, University

Hensinger, Winfried

246

ANL/APS/LS-313 Short-Period APPLE II Undulator for Generating 12-15 keV  

E-Print Network (OSTI)

Radiation Center, Higashi-Hiroshima, 739-0046, Japan Rev. 3, November 25, 2009: Edited by C. Eyberger a zero-emittance electron beam, all radiation on-axis above the first harmonic will be zero). However APPLE II design. In this note, we present magnet design calculations and radiation calculations

Kemner, Ken

247

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2004; 12:93111 (DOI: 10.1002/pip.527)  

E-Print Network (OSTI)

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2004; 12(In,Ga)Se2; thin-films; photovoltaics; solar energy INTRODUCTION P olycrystalline thin-film solar cells the complete solar spectrum for photovoltaic power conversion. There are several chalcopyr

Romeo, Alessandro

248

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

249

Multiple gap photovoltaic device  

DOE Patents (OSTI)

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

250

Isolation and identification of the pollen-expressed polymorphic F-box genes linked to the S-locus in apple (Malusנdomestica)  

Science Journals Connector (OSTI)

Using degenerate primers designed based on the conserved regions of the reported SLF/SFB genes, more than a dozen of different cDNA clones were isolated from pollen of three different apple S-genotypes by reverse...

Jianhong Cheng; Zhenhai Han; Xuefeng Xu; Tianzhong Li

2006-12-01T23:59:59.000Z

251

Multiple System Rate Process  

NLE Websites -- All DOE Office Websites (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

252

Multiple sclerosis and interferon  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

253

Kiss Apple  

E-Print Network (OSTI)

Broadcast Transcript: Spicy kimchee and garlicky fish. Standard fare in Korea. Good for the health, sure, but for the breath? Not so much. So in an attempt to promote healthy eating along with kissably fresh breath, Korean ...

Hacker, Randi; Boyd, David

2011-08-24T23:59:59.000Z

254

Multimed Tools Appl (2009) 41:305331 DOI 10.1007/s11042-008-0230-3  

E-Print Network (OSTI)

Multimed Tools Appl (2009) 41:305­331 DOI 10.1007/s11042-008-0230-3 Hack-proof synchronization-reckoning" are vulnerable to a popular type of cheat called speed-hack. A speed-hack helps a cheater to gain unfair of a dead-reckoning protocol that is invulnerable to speed-hacks. Existing games based on dead-reckoning can

Lui, John C.S.

255

Soil microarthropod community structure and dynamics in organic and conventionally managed apple orchards in Western Colorado, USA  

Science Journals Connector (OSTI)

We studied the influences of organic and conventional management practices on microarthropod diversity, densities, and dynamics in apple orchards on the Western Slope of Colorado. The organic orchards differed from the conventional orchards in that they used natural fertilizers (versus synthetic) and did not use insecticides and/or herbicides. Based on findings from annual agroecosystems, we hypothesized that the conventionally managed (CM) apple orchards would support a lower diversity and density of soil microarthropods than the organically managed (OM) apple orchards. We located nine sites, three OM orchards, three CM orchards, and three native sites. From each site, microarthropods were extracted from soil samples taken from June to September of 1997 and April to September of 1998. The richness and diversity of functional groups and families did not differ among the OM orchards, CM orchards and/or native sites. We did find significantly greater (P?0.05) densities of soil microarthropods early in growing season, June 1997 and April 1998, in the OM orchards in comparison to the CM orchards and native sites. Furthermore, the densities of predatory mites were significantly greater in the OM orchards in comparison to both the CM orchards and native sites on selective dates throughout the period of study. Organic management practices have increased the densities of microarthropods above those found in CM orchards and native sites. These results may be due to the interaction between a greater accumulation of plant litter and organic matter in the OM orchards and the heavy pesticide use in the CM orchards.

Jennifer L Doles; Rick J Zimmerman; John C Moore

2001-01-01T23:59:59.000Z

256

Multiple layer insulation cover  

DOE Patents (OSTI)

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

257

Traits and Multiple Genes  

NLE Websites -- All DOE Office Websites (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

258

AM with Multiple Merlins  

E-Print Network (OSTI)

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

259

Optimal discrimination of multiple regions with an active polarimetric  

E-Print Network (OSTI)

regions (a target and a background). In this paper, we propose a methodology to determine the set. J. E. Solomon, "Polarization imaging," Appl. Opt. 20, 1537­1544 (1981). 2. J. S. Tyo, M. P. Rowe, E

Paris-Sud XI, Université de

260

Quantification of political risk with multiple dependent sources  

Science Journals Connector (OSTI)

In this paper, we develop a model using a conditional Poisson process for measuring the effect of a countable number of mutually dependant political risks on the outcome of foreign direct investment. We also appl...

Ephraim Clark; Radu Tunaru

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

V-035: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the target user. An out-of-bounds read may occur in Skia CVE-2012-5130. A memory corruption error may occur in the Apple OSX driver for Intel GPUs CVE-2012-5131. A...

262

Hadron multiplicities at the LHC  

E-Print Network (OSTI)

We present the predictions for hadron multiplicities in pp, pA and AA collisions at the LHC based on our approach to the Color Glass Condensate.

D. Kharzeev; E. Levin; M. Nardi

2007-07-05T23:59:59.000Z

263

You can use a mobile device to access your Exchange account. On this page you will find the settings ActiveSync/Exchange to set up your Apple mobile devices.  

E-Print Network (OSTI)

Overview: You can use a mobile device to access your Exchange account. On this page you will find the settings ActiveSync/Exchange to set up your Apple mobile devices. If you set up an Exchange and task data! Use these settings to access your Exchange e-mail on an Apple mobile device: Username

Qiu, Weigang

264

Cored Apple Bipolarity : A Global Instability to Convection in Radial Accretion?  

E-Print Network (OSTI)

We propose that the prevalence of bipolarity in Young Stellar Objects is due to the fine tuning that is required for spherical accretion of an ambient medium onto a central node.It is shown that there are two steady modes that are more likely than radial accretion, each of which is associated with a hyperbolic central point in the meridional stream lines, and consequently with either an equatorial inflow and an axial ejection or vice versa. In each case the stream lines pass through a thick accretion torus, which is better thought of as a standing pressure wave rather than as a relatively inert Keplerian structure.We base our arguments on a simple analytic example,which is topologi cally generic,wherein each bipolarmode is created by the rebound of accreting matter under the action of the thermal,magnetic,turbulent and centrifugal pressures created in the flow. In both bipolar modes the presence of non-zero angular momentum implies axial regions wherein the pressure is first reduced below the value at infinity and then becomes negative, where the solution fails because rotating material can not enter this region without suction.The model thus has empty stems where the activity of the central source must dominate.So the basic engine of the bipolar flow discussed here is simply the rebound of freely falling material from a thick pressure disc into an axial low pressure region.The low mass,high velocity outflow must be produced in this region by an additional mechanism. This is reminiscent of the cored apple structure observed recently in the very young bipolar source VLA 1623.

R. N. Henriksen; D. Valls-Gabaud

1993-08-19T23:59:59.000Z

265

Parallel progressive multiple sequence alignment  

Science Journals Connector (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

266

Multiple Motivations Institutional Change Principle  

Energy.gov (U.S. Department of Energy (DOE))

The multiple motivations principle suggests that a portfolio approachrather than a single strategymay be required to achieve change. Research demonstrates that people and institutions adopt new...

267

Multiple hypothesis evaluation in auditing  

E-Print Network (OSTI)

In many audit tasks, auditors evaluate multiple hypotheses to diagnose the situation. Research suggests this is a complex task that individuals have difficulty performing. Further, there is little guidance in professional ...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

268

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized pattern matching [Proc. 25th Annual STOC, 1993, pp. 7180] to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed a...

Ramana M. Idury; Alejandro A. Schffer

1994-01-01T23:59:59.000Z

269

The INEL beryllium multiplication experiment  

SciTech Connect

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

270

Work with Apple's Rhapsody Operating System which Allows Simultaneous UNIX Program Development, UNIX Program Execution, and PC Application Execution  

E-Print Network (OSTI)

Over the past decade, UNIX workstations have provided a very powerful program development environment. However, workstations are more expensive than PCs and Macintoshes and require a system manager for day-to-day tasks such as disk backup, adding users, and setting up print queues. Native commercial software for system maintenance and "PC applications" has been lacking under UNIX. Apple's new Rhapsody operating system puts the current MacOS on a NeXT UNIX foundation and adds an enhanced NeXTSTEP object oriented development environment called Yellow Box. Rhapsody simultaneously runs UNIX and commercial Macintosh applications such as word processing or spreadsheets. Thus a UNIX detector Monte Carlo can run for days in the background at the same time as a commercial word processing program. And commercial programs such as Dantz Retrospect are being made available to make disk backup easy under Rhapsody. Apple has announced that in 1999 they intend to be running Rhapsody, or MacOS X as it will be called in the commercial release, on all their newer computers. MacOS X may be of interest to those who have trouble hiring expert UNIX system managers; and to those who would prefer to have a single computer and operating system on their desktop that serves both the needs of UNIX program development and running commercial applications, simultaneously. We present our experiences running UNIX programs and Macintosh applications under the Rhapsody DR2 Developer Release.

Don Summers; Chris Riley; Lucien Cremaldi; David Sanders

2004-12-06T23:59:59.000Z

271

Fair capacity sharing of multiple aperiodic servers  

E-Print Network (OSTI)

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

272

1. Holloszy, J. O. & Coyle, E. F. J. Appl. Physiol. 56, 831838 (1984). 2. Gaunt, A. S., Hikida, R. S., Jehl, J. & Fembert, L. Auk 107,  

E-Print Network (OSTI)

. S., Jehl, J. & Fembert, L. Auk 107, 649­659 (1990). 3. Marsh, R. L. Physiol. Zool. 57, 105­117 (19841. Holloszy, J. O. & Coyle, E. F. J. Appl. Physiol. 56, 831­838 (1984). 2. Gaunt, A. S., Hikida, R). 4. Austin, J. E. & Fredrickson, L. H. Auk 104, 694­699 (1987). 5. Driedzic, W. R., Crowe, H. L

Zettl, Alex

273

A Simple Algorithm for Closed-Loop Control of Stepping Motors IEE Proc. -Electr. Power Appl., (1995) Vol 142, No 1, pp 5-13.  

E-Print Network (OSTI)

A Simple Algorithm for Closed-Loop Control of Stepping Motors IEE Proc. - Electr. Power Appl of Reading Whiteknights PO Box 225 Reading RG6 2AY ABSTRACT Stepping motors are normally operated without feedback. A simple control algorithm is developed which allows a stepping motor to operate effectively

Grimbleby, James

274

Analyzing the time-course variation of apple and pear tree dates of flowering1 stages in the global warming context2  

E-Print Network (OSTI)

in the global warming context2 3 Yann Guédon (1) and Jean Michel Legave (2)* 4 5 (1) CIRAD, UMR DAP and INRIA the relationship between flowering advances in fruit trees and19 global warming. After an exploratory analysis;2 to consider the flowering advances in apple and pear trees as impacts of global warming. The26 suddenness

Paris-Sud XI, Université de

275

A G Ramm, Implicit Function Theorem via the DSM, Nonlinear Analysis: Theory, Methods and Appl., 72, N3-4, (2010), 1916-1921.  

E-Print Network (OSTI)

A G Ramm, Implicit Function Theorem via the DSM, Nonlinear Analysis: Theory, Methods and Appl., 72, N3-4, (2010), 1916-1921. 1 #12;Implicit Function Theorem via the DSM A G Ramm Department of the Dynamical Systems Method (DSM). It allows one to solve a class of nonlinear operator equa- tions in the case

276

Journ. Appl. Math and Comp. (JAMC), 38, N1-2, (2012), 523-533. On the DSM Newton-type method  

E-Print Network (OSTI)

Journ. Appl. Math and Comp. (JAMC), 38, N1-2, (2012), 523-533. 1 #12;On the DSM Newton-type method of a Dynamical Systems Method (DSM), based on the continuous analog of the Newton method, is proved without any.30.Hq; 02.30.Tb Keywords: Inverse function theorem, Newton's method, DSM (Dynamical sys- tems method

277

J. Appl. Phys. 116, 023107 (2014); http://dx.doi.org/10.1063/1.4887805 Inhibition of light emission in a 2.5D photonic structure  

E-Print Network (OSTI)

for a collection of emitters and (ii) hazardous with a single emitter whose location is not easily controlledJ. Appl. Phys. 116, 023107 (2014); http://dx.doi.org/10.1063/1.4887805 1 Inhibition of light in a broad spectral range, whatever the in-plane orientation and location of the emitting dipole. We analysed

Paris-Sud XI, Université de

278

Federal Energy Management Program: Multiple Motivations Institutional  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

279

Modularization to Support Multiple Brand Platforms  

E-Print Network (OSTI)

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

280

Prognostication of energy consumption and greenhouse gas (GHG) emissions analysis of apple production in West Azarbayjan of Iran using Artificial Neural Network  

Science Journals Connector (OSTI)

Abstract The present study addresses the amount of inputoutput energy utilized in apple production in West Azarbayjan province of Iran. The environmental indices of greenhouse emissions during apple production were determined as another end of this investigation. Finally, the potential of a supervised Artificial Neural Network (ANN) approach was assessed to prognosticate the energy consumption and environmental indices of apple production in the studying location. The associated data for the production of apple were collected randomly from 100 orchardists by using a face to face questionnaire method. Energy inputs included human labor, machinery, diesel fuel, seeds, herbicide, pesticide, chemical fertilizers, manure, irrigation water and electricity. The total input and output energies of 77,064.24MJha?1 and 802,695MJha?1 were obtained for apple production in the study region where the value of total GHG emission was estimated at 1195.79kgCO2eqha?1. The results revealed that the total consumed energy input could be classified as direct energy (65.97%), and indirect energy (33.76%) or renewable energy (45.37%) and nonrenewable energy (46.97%). The modeling implementations indicated that the lowest RMSE and MAPE of 0.11 and 0.68 were obtained at 16 neurons. At this number of neurons, the best predicting model was achieved. The R2 values of 0.9879 and 0.9827 were obtained for energy input and environmental indices prediction, respectively. The promising ability of the developed ANN in this study indicates that ANN is powerful and robust tool to be served as a functional and dynamic field of studying interest in the realm of energy consumption modeling.

Hamid Taghavifar; Aref Mardani

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Multiple smart weapons employment mechanism  

SciTech Connect

A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

McGlynn, M.P.; Meiklejohn, W.D.

1993-07-20T23:59:59.000Z

282

Information transfer at multiple scales  

Science Journals Connector (OSTI)

In the study of complex systems a fundamental issue is the mapping of the networks of interaction between constituent subsystems of a complex system or between multiple complex systems. Such networks define the web of dependencies and patterns of continuous and dynamic coupling between the systems elements characterized by directed flow of information spanning multiple spatial and temporal scales. Here, we propose a wavelet-based extension of transfer entropy to measure directional transfer of information between coupled systems at multiple time scales and demonstrate its effectiveness by studying (a) three artificial maps, (b) physiological recordings, and (c) the time series recorded from a chaos-controlled simulated robot. Limitations and potential extensions of the proposed method are discussed.

Max Lungarella; Alex Pitti; Yasuo Kuniyoshi

2007-11-27T23:59:59.000Z

283

Interactive Multiple Scale Small Multiples Andrew S. Forsberg  

E-Print Network (OSTI)

-dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

Laidlaw, David

284

Multiple resonant railgun power supply  

DOE Patents (OSTI)

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

285

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized string matching (1993) to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed and preprocessed once, and then the case where the pattern set can change by insertions and deletions. Baker's algorithms are based on suffix trees, whereas ours are based on pattern matching automata.

Ramana M. Idury; Alejandro A. Schffer

1996-01-01T23:59:59.000Z

286

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1  

E-Print Network (OSTI)

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1 2012 INTERNAL USER GUIDE A Guide to the Multiple Sclerosis Society Grant Tracker Society web page: http://www.mssociety.org.uk/ #12;Multiple Sclerosis Society (Grant Tracker) Multiple

287

The proliferation of functions: multiple systemsplayingmultiple roles in multiple super systems  

E-Print Network (OSTI)

playedbyanygivensystemarerepresentedbythe functionanalysisdiagram(Aurisicchio,Bracewell,&Armstrong,2013; Devoinoetal.,1997).Here,componentsofasystemareconnectedtoeach otherthroughtheeffectthatonehasontheother.Componentscanaffect multiple...

Crilly, Nathan

2014-07-14T23:59:59.000Z

288

A NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS  

Science Journals Connector (OSTI)

...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS 10.1126...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS. | Journal...maturity, variety and treatment on the iodine value...CHICAGO, ILLINOIS WATER SOLUBLE MAGNESIUM...NEW MULTIPLE-UNIT ELECTRODIALYSIS ous fields of science...

Aasulv Lddesl

1932-07-22T23:59:59.000Z

289

Recirculation in multiple wave conversions  

SciTech Connect

A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

Kaufman, A. N.; Brizard, A.J.; Kaufman, A.N.; Tracy, E.R.

2008-07-30T23:59:59.000Z

290

Multiple protocol fluorometer and method  

DOE Patents (OSTI)

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

291

Inverse scattering series for multiple attenuation: An example with surface and internal multiples  

SciTech Connect

A multiple attenuation method derived from an inverse scattering series is described. The inversion series approach allows a separation of multiple attenuation subseries from the full series. The surface multiple attenuation subseries was described and illustrated in Carvalho et al. (1991, 1992). The internal multiple attenuation method consists of selecting the parts of the odd terms that are associated with removing only multiply reflected energy. The method, for both types of multiples, is multidimensional and does not rely on periodicity or differential moveout, nor does it require a model of the reflectors generating the multiples. An example with internal and surface multiples will be presented.

Araujo, F.V. [PPPG/Federal Univ. of Bahia, Salvador (Brazil); Weglein, A.B. [Schlumberger Cambridge Research (United Kingdom); Carvalho, P.M. [Petrobras SA, Rio de Janeiro (Brazil); Stolt, R.H.

1994-12-31T23:59:59.000Z

292

Hereditary Multiple Exostoses with Pseudoaneurysm  

SciTech Connect

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

293

Inverted and multiple nematic emulsions  

Science Journals Connector (OSTI)

We investigate experimentally the structures that form when small colloidal particles are suspended in a nematic solvent. These structures are anisotropic, and their formation is driven by interactions arising from the orientational elasticity of the nematic solvent. By using inverted and multiple nematic emulsions composed of water droplets dispersed in a thermotropic liquid crystal, we identify the nature of these interactions, and demonstrate that they can be controlled by the anchoring of the liquid crystal molecules at the surfaces of the droplets. When the anchoring is normal, the droplets form linear chains, suggesting a long-range dipole-dipole attraction between the particles. By contrast, the interactions are repulsive at short range, and prevent contact of the droplets, thereby stabilizing them against coalescence. When the anchoring is planar, the droplets generate distortions that have a quadrupolar character. The resultant elastic interactions lead to more compact, but still anisotropic, clusters.

P. Poulin and D. A. Weitz

1998-01-01T23:59:59.000Z

294

Multiple acousto-optic q-switch  

DOE Patents (OSTI)

An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

Deason, Vance A. (Idaho Falls, ID)

1993-01-01T23:59:59.000Z

295

Multiplicity of investment equilibria when pollution permits are not tradable  

E-Print Network (OSTI)

Paper ???? Multiplicity of investment equilibria whenauthor. Multiplicity of investment equilibria when pollutionon aggregate levels of investment in abatement capital.

Karp, Larry

2006-01-01T23:59:59.000Z

296

Systems analysis of multiple regulator perturbations allows discoveryo...  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

297

Multiple Layer Graphene Optical Modulator - Energy Innovation...  

NLE Websites -- All DOE Office Websites (Extended Search)

Materials Advanced Materials Find More Like This Return to Search Multiple Layer Graphene Optical Modulator Lawrence Berkeley National Laboratory Contact LBL About This...

298

Code design for multiple-input multiple-output broadcast channels  

E-Print Network (OSTI)

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

299

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang  

E-Print Network (OSTI)

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

Jiang, Anxiao "Andrew"

300

Analysis of Variance (ANOVA) Multiple Comparisons  

E-Print Network (OSTI)

Analysis of Variance (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA Stat 491 The Kruskal-Wallis Test Two-Way ANOVA Introduction We are interested in testing equality of k population means (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA ANOVA: Simulated Data (k = 4; µ1 = 5

Bardsley, John

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Multiple Point Schemes for Corank 1 Maps  

Science Journals Connector (OSTI)

......Multiple Point Schemes for Corank 1 Maps Washington Luiz Marar David Mond...MULTIPLE POINT SCHEMES FOR CORANK 1 MAPS WASHINGTON LUIZ MARAR AND DAVID...1). Finally, denote the map Cn "1+fc -> C*~m defined...g:(Cn -1+k ,0) *C\\gis G-invariant}. Then

Washington Luiz Marar; David Mond

1989-06-01T23:59:59.000Z

302

Charged track multiplicity in B meson decay  

Science Journals Connector (OSTI)

We have used the CLEO II detector to study the multiplicity of charged particles in the decays of B mesons produced at the ?(4S) resonance. Using a sample of 1.5106 B meson pairs, we find the mean inclusive charged particle multiplicity to be 10.710.02-0.15+0.21 for the decay of the pair. This corresponds to a mean multiplicity of 5.360.01-0.08+0.11 for a single B meson. Using the same data sample, we have also extracted the mean multiplicities in semileptonic and nonleptonic decays. We measure a mean of 7.820.05-0.19+0.21 charged particles per BB decay when both mesons decay semileptonically. When neither B meson decays semileptonically, we measure a mean charged particle multiplicity of 11.620.04-0.18+0.24 per BB pair.

G. Brandenburg et al. (CLEO Collaboration)

2000-03-07T23:59:59.000Z

303

Modeling Multiple Causes of Carcinogenesis  

SciTech Connect

An array of epidemiological results and databases on test animal indicate that risk of cancer and atherosclerosis can be up- or down-regulated by diet through a range of 200%. Other factors contribute incrementally and include the natural terrestrial environment and various human activities that jointly produce complex exposures to endotoxin-producing microorganisms, ionizing radiations, and chemicals. Ordinary personal habits and simple physical irritants have been demonstrated to affect the immune response and risk of disease. There tends to be poor statistical correlation of long-term risk with single agent exposures incurred throughout working careers. However, Agency recommendations for control of hazardous exposures to humans has been substance-specific instead of contextually realistic even though there is consistent evidence for common mechanisms of toxicological and carcinogenic action. That behavior seems to be best explained by molecular stresses from cellular oxygen metabolism and phagocytosis of antigenic invasion as well as breakdown of normal metabolic compounds associated with homeostatic- and injury-related renewal of cells. There is continually mounting evidence that marrow stroma, comprised largely of monocyte-macrophages and fibroblasts, is important to phagocytic and cytokinetic response, but the complex action of the immune process is difficult to infer from first-principle logic or biomarkers of toxic injury. The many diverse database studies all seem to implicate two important processes, i.e., the univalent reduction of molecular oxygen and breakdown of aginuine, an amino acid, by hydrolysis or digestion of protein which is attendant to normal antigen-antibody action. This behavior indicates that protection guidelines and risk coefficients should be context dependent to include reference considerations of the composite action of parameters that mediate oxygen metabolism. A logic of this type permits the realistic common-scale modeling of multiple causes of carcinogenesis and shifts the risk-assessment logic to considerations of ?what dose does?? in contrast to the current process of the substance-specific question of ?what dose is?? Whether reactive oxygen is the proximate or contributing cause of disease or simply a better estimate of biologically effective dose, it has enormous advantages for improved risk- and policy-based decisions. Various estimates of immune system modulation will be given based on radiobiology.

Jones, T.D.

1999-01-24T23:59:59.000Z

304

PJM Interconnection (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

305

A Study of Multiplicities in Hadronic Interactions  

SciTech Connect

Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

Estrada Tristan, Nora Patricia; /San Luis Potosi U.

2006-02-01T23:59:59.000Z

306

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 36 (2003) R151R165 PII: S0022-3727(03)26928-X  

E-Print Network (OSTI)

accelerators and x-ray sources. At the next physical regime that will be encountered at even higher intensitiesINSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS D: APPLIED PHYSICS J. Phys. D: Appl. Phys. 36 (2003) R151­R165 PII: S0022-3727(03)26928-X TOPICAL REVIEW Relativistic laser­plasma interactions Donald

Umstadter, Donald

307

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF OPTICS A: PURE AND APPLIED OPTICS J. Opt. A: Pure Appl. Opt. 7 (2005) S241S243 doi:10.1088/1464-4258/7/2/032  

E-Print Network (OSTI)

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF OPTICS A: PURE AND APPLIED OPTICS J. Opt. A: Pure Appl of an optical nonlinearity in a nanoparticle film V A Fedotov, K F MacDonald and N I Zheludev School of Physics for publication 5 August 2004 Published 20 January 2005 Online at stacks.iop.org/JOptA/7/S241 Abstract Optical

Zheludev, Nikolay

308

The MARVEL assembly for neutron multiplication  

SciTech Connect

A new multiplying test assembly is under development at Idaho National Laboratory to support research, validation, evaluation, and learning. The item is comprised of three stacked, highly-enriched uranium (HEU) cylinders, each 11.4 cm in diameter and having a combined height of up to 11.7 cm. The combined mass of all three cylinders is 20.3 kg of HEU. Calculations for the bare configuration of the assembly indicate a multiplication level of >3.5 (keff=0.72). Reflected configurations of the assembly, using either polyethylene or tungsten, are possible and have the capability of raising the assembly's multiplication level to greater than 10. This paper describes simulations performed to assess the assembly's multiplication level under different conditions and describes the resources available at INL to support the use of these materials. We also describe some preliminary calculations and test activities using the assembly to study neutron multiplication.

David L. Chichester; Mathew T. Kinlaw

2013-10-01T23:59:59.000Z

309

Multiple Vehicle Routing Problem with Fuel Constraints  

E-Print Network (OSTI)

In this paper, a Multiple Vehicle Routing Problem with Fuel Constraints (MVRPFC) is considered. This problem consists of a field of targets to be visited, and a collection of vehicles with fuel tanks that may visit the targets. Consideration...

Levy, David

2013-06-26T23:59:59.000Z

310

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network (OSTI)

Anisotropic gridadaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

311

Nonparametric estimation of multiple structures with outliers  

E-Print Network (OSTI)

Nonparametric estimation of multiple structures with outliers Wei Zhang and Jana Kosecka George outliers (pseudo outliers) to it in addition to the true outliers (gross outliers). The problem of robust

Kosecka, Jana

312

Algorithms for Multiple Vehicle Routing Problems  

E-Print Network (OSTI)

Surveillance and monitoring applications require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental routing problems involving multiple vehicles that arise in these applications. The main...

Bae, Jung Yun

2014-06-02T23:59:59.000Z

313

Friction and the Multiplicity of Equilibria  

E-Print Network (OSTI)

but large, the measure of the ROM is therefore non-monotonicTherefore the measure of the ROM is positive. However, as ?region of multiplicity (ROM) is the intersection of two or

Karp, Larry

2005-01-01T23:59:59.000Z

314

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

315

An analysis of multiple component mooring lines  

E-Print Network (OSTI)

AN ANALYSIS OF MULTIPLE COMPONENT MOORING LINES A Thesis by THOMAS ROBERT NALTERS Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1977 Major...'595 ABSTRACT An Analysis Of Multiple Component Mooring Lines (December 1977) Thomas Robert Walters, B. E. , Vanderbilt University Co-Chai rman of Advisory Committee: Dr. Ts ung- Chow Su Co- Chai rman of Advisory Committee: Dr. Richard Domi nguez...

Walters, Thomas Robert

2012-06-07T23:59:59.000Z

316

T-597: WordPress Multiple Security Vulnerabilities | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

7: WordPress Multiple Security Vulnerabilities T-597: WordPress Multiple Security Vulnerabilities April 7, 2011 - 5:42am Addthis PROBLEM: WordPress is prone to multiple security...

317

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...  

Energy Savers (EERE)

V-041: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple...

318

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 -...

319

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting...  

NLE Websites -- All DOE Office Websites (Extended Search)

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA Aptamers and Graphene Oxide Nanosheets. In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA...

320

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy Savers (EERE)

32: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 -...

322

Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds...  

NLE Websites -- All DOE Office Websites (Extended Search)

Bonded Arrays: The Power of Multiple Hydrogen Bonds. Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds. Abstract: Hydrogen bond interactions in small covalent model...

323

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen...  

NLE Websites -- All DOE Office Websites (Extended Search)

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen K-edge Spectroscopy and Electronic Structure Theory . Covalency in Metal-Oxygen Multiple Bonds Evaluated Using...

324

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network (OSTI)

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

325

Charged-particle multiplicity at LHC energies  

ScienceCinema (OSTI)

The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited.

None

2011-10-06T23:59:59.000Z

326

Erratum: Formation Control of Multiple Mobile Robots Systems  

Science Journals Connector (OSTI)

The paper entitled Formation Control of Multiple Mobile Robots Systems by Zhanfeng Li, Youliang Ma...

Zhanfeng Li; Youliang Ma; Tong Ren

2008-01-01T23:59:59.000Z

327

Multiple Triclosan Targets in Trypanosoma brucei  

Science Journals Connector (OSTI)

...Microbiology ARTICLE ARTICLES Multiple Triclosan Targets in Trypanosoma brucei Kimberly...It was therefore not surprising that triclosan, an inhibitor of type II enoyl-acyl...EC50s) of 10 and 13 muM, respectively. Triclosan also inhibited cell-free fatty acid...

Kimberly S. Paul; Cyrus J. Bacchi; Paul T. Englund

2004-08-01T23:59:59.000Z

328

Wind direction modelling using multiple observation points  

Science Journals Connector (OSTI)

...gains in the produced output power. chaos engineering|wind forecasting|multiple measurements...realized that the modelling of power output in wind turbines needs to be performed...region; in region 3, for high winds, the power output is subject to a threshold...

2008-01-01T23:59:59.000Z

329

Quasi Multiplication and K-groups  

E-Print Network (OSTI)

We give a negative answer to the question raised by Mart Abel about whether his proposed definition of K0 and K1 groups in terms of quasi multiplication is indeed equivalent to the established ones in algebraic K-theory....

Lee, Tsiu-Kwen; Sheu, Albert Jeu-Liang

2013-02-28T23:59:59.000Z

330

A Survey of Multiplicity Fluctuations in PHENIX  

E-Print Network (OSTI)

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the charged particle multiplicity as a function of collision energy, centrality, collision species, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

Jeffery T. Mitchell

2005-10-27T23:59:59.000Z

331

Computer Simulations Reveal Multiple Functions for Aromatic  

E-Print Network (OSTI)

Computer Simulations Reveal Multiple Functions for Aromatic Residues in Cellulase Enzymes NREL researchers use high-performance computing to demonstrate fundamental roles of aromatic residues in cellulase enzyme tunnels. National Renewable Energy Laboratory (NREL) computer simulations of a key indus- trial

332

Gene prediction by multiple spliced alignment  

Science Journals Connector (OSTI)

With recent advances in sequencing technologies, a huge amount of DNA sequences become available year after year. In order to obtain useful information on these sequences, we need to process them in search of biologically meaningful regions. The genes ... Keywords: comparative genomics, gene prediction, multiple spliced alignment

Rodrigo Mitsuo Kishi; Ronaldo Fiorilo dos Santos; Said Sadique Adi

2011-08-01T23:59:59.000Z

333

Medical image classification with multiple kernel learning  

Science Journals Connector (OSTI)

Nowadays, medical images are generated by hospitals and medical centers rapidly. The large volume of medical image data produces a strong need to effective medical image retrieval. The visual characteristic of medical image, such as modality, anatomical ... Keywords: feature fusion, image classification, medical imaging, multiple kernel learning

Hong Wu; Hao Zhang; Chao Li

2010-12-01T23:59:59.000Z

334

Parallel MATLAB: Single Program Multiple Data  

E-Print Network (OSTI)

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;MATLAB Parallel MATLAB sets up one special agent called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

335

Parallel MATLAB: Single Program Multiple Data  

E-Print Network (OSTI)

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;Matlab Parallel ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 67 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

336

Parallel MATLAB: Single Program Multiple Data  

E-Print Network (OSTI)

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff: Advanced Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 69 #12;Matlab ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 69 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

337

Parallel MATLAB: Single Program Multiple Data  

E-Print Network (OSTI)

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 66 #12;MATLAB Parallel MATLAB sets up one special worker called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

338

The multiple vortex nature of tropical cyclogenesis  

E-Print Network (OSTI)

) __________________________ __________________________ John Nielsen-Gammon Craig Epifanio (Chair of Committee) (Member) __________________________ __________________________ Fuqing Zhang Hongxing Liu (Member) (Member) December 2004 Major Subject: Atmospheric Sciences... iii ABSTRACT The Multiple Vortex Nature of Tropical Cyclogenesis. (December 2004) Jason Allen Sippel, B.S., Texas A&M University Chair of Advisory Committee: Dr. John Nielsen-Gammon This thesis contains an observational analysis...

Sippel, Jason Allen

2005-02-17T23:59:59.000Z

339

Experimental Verification of Carrier Multiplication in Graphene  

Science Journals Connector (OSTI)

By this method, we obtain occupation probabilities at eight distinct energies, enabling a safe reconstruction of the time-dependent carrier distribution in the relevant range in momentum space, assuming quasi-instantaneous thermalization of the excited carriers. ... Schaller, R. D.; Klimov, V. I.High Efficiency Carrier Multiplication in PbSe Nanocrystals: Implications for Solar Energy Conversion Phys. ...

T. Pltzing; T. Winzer; E. Malic; D. Neumaier; A. Knorr; H. Kurz

2014-08-21T23:59:59.000Z

340

Jet multiplicities as the QGP thermometer  

E-Print Network (OSTI)

It is proposed to use the energy behavior of mean multiplicities of jets propagating in a nuclear medium as the thermometer of this medium during the collision phases. The qualitative effects are demonstrated in the framework of the fixed coupling QCD with account of jet quenching.

I. M. Dremin; O. S. Shadrin

2006-02-10T23:59:59.000Z

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Monitoring voltage collapse margin with synchrophasors across transmission corridors with multiple lines and multiple contingencies  

E-Print Network (OSTI)

We use synchrophasor measurements of the complex voltage and current at both ends of multiple transmission lines that connect areas of a power system to monitor the online voltage collapse margin. A new reduction is used to reduce the multiple transmission lines to a single line equivalent and determine how to combine the synchrophasor measurements. Generator reactive power limits can be accommodated. The results show that this methodology can capture the effect of multiple contingencies inside the transmission corridors, giving awareness to the operators about the severity of contingencies with respect to voltage stability.

Ramirez, Lina

2014-01-01T23:59:59.000Z

342

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF OPTICS A: PURE AND APPLIED OPTICS J. Opt. A: Pure Appl. Opt. 3 (2001) S103S120 PII: S1464-4258(01)27690-9  

E-Print Network (OSTI)

INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF OPTICS A: PURE AND APPLIED OPTICS J. Opt. A: Pure Appl. Opt. 3 (2001) S103­S120 PII: S1464-4258(01)27690-9 Photonic bandgap materials: towards an all-optical September 2001 Published 26 October 2001 Online at stacks.iop.org/JOptA/3/S103 Abstract We describe all-optical

John, Sajeev

343

A material's multiple personalities | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

344

Multiple Scattering Measurements in the MICE Experiment  

SciTech Connect

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

345

Weak multiplicativity for random quantum channels  

E-Print Network (OSTI)

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

346

Method for High Accuracy Multiplicity Correlation Measurements  

E-Print Network (OSTI)

Multiplicity correlation measurements provide insight into the dynamics of high energy collisions. Models describing these collisions need these correlation measurements to tune the strengths of the underlying QCD processes which influence all observables. Detectors, however, often possess limited coverage or reduced efficiency that influence correlation measurements in obscure ways. In this paper, the effects of non-uniform detection acceptance and efficiency on the measurement of multiplicity correlations between two distinct detector regions (termed forward-backward correlations) are derived. This result is transformed into a correction method. Verification of the presented correction method is provided through simulations using different event generators. The result of the method allows one to correct measurements in a simulation independent manner with high accuracy and thereby shed light on the underlying processes.

Gulbrandsen, K

2014-01-01T23:59:59.000Z

347

Experience with pipelined multiple instruction streams  

SciTech Connect

Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

Jordon, H.F.

1984-01-01T23:59:59.000Z

348

Multiple Rankine topping cycles offer high efficiency  

SciTech Connect

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and heat rejection. However, no working fluid has been identified that will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids to span larger temperature ranges.

McWhirter, J.D. [Idaho State Univ., Pocatello, ID (United States)

1997-10-01T23:59:59.000Z

349

Neutron multiplicities for the transplutonium nuclides  

SciTech Connect

This paper continues, with respect to the transplutonium nuclides, earlier efforts to collate and evaluate data from the scientific literature on the prompt neutron multiplicity distribution from fission and its first moment = ..sigma..nuPnu. The isotopes considered here for which P/sub nu/ and or data (or both) were found in the literature are of americium (Am), curium (Cm), berkelium (Bk), californium (Cf), einsteinium (Es), fermium (Fm), and nobelium (No).

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

350

[0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,  

E-Print Network (OSTI)

, multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

Tam, Tin-Yau

351

Alternatives for Helium-3 in Multiplicity Counters  

SciTech Connect

Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

2013-04-01T23:59:59.000Z

352

Exponential smoothing with a damped multiplicative trend  

Science Journals Connector (OSTI)

Multiplicative trend exponential smoothing has received very little attention in the literature. It involves modelling the local slope by smoothing successive ratios of the local level, and this leads to a forecast function that is the product of level and growth rate. By contrast, the popular Holt method uses an additive trend formulation. It has been argued that more real series have multiplicative trends than additive. However, even if this is true, it seems likely that the more conservative forecast function of the Holt method will be more robust when applied in an automated way to a large batch of series with different types of trend. In view of the improvements in accuracy seen in dampening the Holt method, in this paper we investigate a new damped multiplicative trend approach. An empirical study, using the monthly time series from the M3-Competition, gave encouraging results for the new approach at a range of forecast horizons, when compared to the established exponential smoothing methods.

James W. Taylor

2003-01-01T23:59:59.000Z

353

MPACT Fast Neutron Multiplicity System Prototype Development  

SciTech Connect

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

354

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2008-01-03T23:59:59.000Z

355

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2007-02-15T23:59:59.000Z

356

Design of globally optimal multiple description scalar quantizers  

E-Print Network (OSTI)

This thesis investigates the design of globally optimal multiple description scalar quantizers. The design of multiple description scalar quantizers is formulated as a combinatorial optimization problem due to the index assignment issue. The first...

Desilva, Buveneka Kanishka

2012-06-07T23:59:59.000Z

357

Multiple Steady States in Ideal Two-Product Distillation  

E-Print Network (OSTI)

Multiple Steady States in Ideal Two-Product Distillation Elling W. Jacobsen and Sigurd Skogestad Chemical Engineering Dept., University of Trondheim-NTH, N-7034 Trondheim, Norway Simple distillation and compositions in the column. Introduction Multiple steady states (multiplicity) in distillation columns have

Skogestad, Sigurd

358

New multiplicativity results for qubit maps  

E-Print Network (OSTI)

Let $\\Phi$ be a trace-preserving, positivity-preserving (but not necessarily completely positive) linear map on the algebra of complex $2 \\times 2$ matrices, and let $\\Omega$ be any finite-dimensional completely positive map. For $p=2$ and $p \\geq 4$, we prove that the maximal $p$-norm of the product map $\\Phi \\ot \\Omega$ is the product of the maximal $p$-norms of $\\Phi$ and $\\Omega$. Restricting $\\Phi$ to the class of completely positive maps, this settles the multiplicativity question for all qubit channels in the range of values $p \\geq 4$.

Christopher King; Nilufer Koldan

2006-03-09T23:59:59.000Z

359

Multiple volume compressor for hot gas engine  

DOE Patents (OSTI)

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

360

Multiple frequency method for operating electrochemical sensors  

DOE Patents (OSTI)

A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

Martin, Louis P. (San Ramon, CA)

2012-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Experience with pipelined multiple instruction streams  

SciTech Connect

The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

Jordan, H.F.

1984-01-01T23:59:59.000Z

362

Multiplicative cascades and seismicity in natural time  

Science Journals Connector (OSTI)

Natural time ? enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance ?1(???2?????2) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

N. V. Sarlis; E. S. Skordas; P. A. Varotsos

2009-08-11T23:59:59.000Z

363

Multiple gamma lines from semi-annihilation  

SciTech Connect

Hints in the Fermi data for a 130 GeV gamma line from the galactic center have ignited interest in potential gamma line signatures of dark matter. Explanations of this line based on dark matter annihilation face a parametric tension since they often rely on large enhancements of loop-suppressed cross sections. In this paper, we pursue an alternative possibility that dark matter gamma lines could arise from ''semi-annihilation'' among multiple dark sector states. The semi-annihilation reaction ?{sub i}?{sub j} ? ?{sub k}? with a single final state photon is typically enhanced relative to ordinary annihilation ?{sub i}?-bar {sub i} ? ?? into photon pairs. Semi-annihilation allows for a wide range of dark matter masses compared to the fixed mass value required by annihilation, opening the possibility to explain potential dark matter signatures at higher energies. The most striking prediction of semi-annihilation is the presence of multiple gamma lines, with as many as order N{sup 3} lines possible for N dark sector states, allowing for dark sector spectroscopy. A smoking gun signature arises in the simplest case of degenerate dark matter, where a strong semi-annihilation line at 130 GeV would be accompanied by a weaker annihilation line at 173 GeV. As a proof of principle, we construct two explicit models of dark matter semi-annihilation, one based on non-Abelian vector dark matter and the other based on retrofitting Rayleigh dark matter.

D'Eramo, Francesco [Department of Physics, University of California, Berkeley, CA 94720 (United States); McCullough, Matthew; Thaler, Jesse, E-mail: fraderamo@berkeley.edu, E-mail: mccull@mit.edu, E-mail: jthaler@mit.edu [Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

2013-04-01T23:59:59.000Z

364

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

365

Prompt neutron multiplicities for the transplutonium nuclides  

SciTech Connect

The direct determination of the average prompt neutron emission values is reviewed, and a method of comparing different sites of neutron emission multiplicity distribution values is described. Measured and recommended values are tabulated for these nuclides: /sup 241/Am, /sup 242/Am, /sup 242/Cm, /sup 243/Cm, /sup 244/Cm, /sup 246/Cm, /sup 247/Cm, /sup 248/Cm, /sup 250/Cm, /sup 245/Cm, /sup 249/Bk, /sup 246/Cf, /sup 249/Cf, /sup 250/Cf, /sup 252/Cf, /sup 254/Cf, /sup 251/Cf, /sup 253/Es, /sup 254/Es, /sup 244/Fm, /sup 246/Fm, /sup 255/Fm, /sup 252/No, /sup 254/Fm, /sup 256/Fm, /sup 257/Fm. 59 refs., 24 tabs. (LEW)

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

366

Free Energy of Multiple Overlapping Chains  

Science Journals Connector (OSTI)

How accurate is pair additivity in describing interactions between soft polymer-based nanoparticles? Using numerical simulations we compute the free energy cost required to overlap multiple chains in the same region of space, and provide a quantitative measure of the effectiveness of pair additivity as a function of chain number and length. Our data suggest that pair additivity can indeed become quite inadequate as the chain density in the overlapping region increases. We also show that even a scaling theory based on polymer confinement can only partially account for the complexity of the problem. In fact, we unveil and characterize an isotropic to star-polymer crossover taking place for large number of chains, and propose a revised scaling theory that better captures the physics of the problem.

Katherine Klymko and Angelo Cacciuto

2011-12-27T23:59:59.000Z

367

Multiple crossbar network: Integrated supercomputing framework  

SciTech Connect

At Los Alamos National Laboratory, site of one of the world's most powerful scientific supercomputing facilities, a prototype network for an environment that links supercomputers and workstations is being developed. Driven by a need to provide graphics data at movie rates across a network from a Cray supercomputer to a Sun scientific workstation, the network is called the Multiple Crossbar Network (MCN). It is intended to be coarsely grained, loosely coupled, general-purpose interconnection network that will vastly increase the speed at which supercomputers communicate with each other in large networks. The components of the network are described, as well as work done in collaboration with vendors who are interested in providing commercial products. 9 refs.

Hoebelheinrich, R. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

368

Multiple predictor smoothing methods for sensitivity analysis.  

SciTech Connect

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

369

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

370

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

371

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

372

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

373

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

374

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

375

Organic light emitting device having multiple separate emissive layers  

DOE Patents (OSTI)

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

376

Measuring multiple residual-stress components using the contour method and multiple cuts  

SciTech Connect

The conventional contour method determines one component of stress over the cross section of a part. The part is cut into two, the contour of the exposed surface is measured, and Bueckner's superposition principle is analytically applied to calculate stresses. In this paper, the contour method is extended to the measurement of multiple stress components by making multiple cuts with subsequent applications of superposition. The theory and limitations are described. The theory is experimentally tested on a 316L stainless steel disk with residual stresses induced by plastically indenting the central portion of the disk. The stress results are validated against independent measurements using neutron diffraction. The theory has implications beyond just multiple cuts. The contour method measurements and calculations for the first cut reveal how the residual stresses have changed throughout the part. Subsequent measurements of partially relaxed stresses by other techniques, such as laboratory x-rays, hole drilling, or neutron or synchrotron diffraction, can be superimposed back to the original state of the body.

Prime, Michael B [Los Alamos National Laboratory; Swenson, Hunter [Los Alamos National Laboratory; Pagliaro, Pierluigi [U. PALERMO; Zuccarello, Bernardo [U. PALERMO

2009-01-01T23:59:59.000Z

377

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

378

Building multiple adsorption sites in porous polymer networks...  

NLE Websites -- All DOE Office Websites (Extended Search)

Building multiple adsorption sites in porous polymer networks for carbon capture applications Previous Next List Weigang Lu, Wolfgang M. Verdegaal, Jiamei Yu, Perla B Balbuena,...

379

ALS Capabilities Reveal Multiple Functions of Ebola Virus  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its...

380

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network (OSTI)

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Smoothing of the cosmic background radiation by multiple gravitational scattering  

Science Journals Connector (OSTI)

We investigated the smoothing of the cosmic background radiation (CBR) ... rays increases exponentially through multiple scatterings. This exponential growth occurs if the distance is smaller...

Junichiro Making

1994-01-01T23:59:59.000Z

382

Multiplex Chaos Synchronization in Semiconductor Lasers with Multiple Optoelectronic Feedbacks  

E-Print Network (OSTI)

Secure chaos based multiplex communication system scheme is proposed utilizing globally coupled semiconductor lasers with multiple variable time delay optoelectronic feedbacks.

E. M. Shahverdiev; K. A. Shore

2011-11-06T23:59:59.000Z

383

Carrier Multiplication in Nanocrystal Quantum Dots and Solar Energy Conversion  

Science Journals Connector (OSTI)

This paper discusses aspects of carrier multiplication (multiexciton generation by single photons) in semiconductor nanocrystals such as its mechanism, competing relaxation channels,...

Klimov, Victor I

384

Project Profile: CSP Energy Storage Solutions - Multiple Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings, under the Thermal Storage FOA, is aiming to demonstrate commercial,...

385

Multiple frequency electron cyclotron heating for the Levitated Dipole Experiment .  

E-Print Network (OSTI)

??The use of multiple frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX) is an important tool that will tailor the (more)

Mahar, Scott B

2005-01-01T23:59:59.000Z

386

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

NLE Websites -- All DOE Office Websites (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

387

Multiple phase estimation in quantum cloning machines  

E-Print Network (OSTI)

Since the initial discovery of the Wootters-Zurek no-cloning theorem, a wide variety of quantum cloning machines have been proposed aiming at imperfect but optimal cloning of quantum states within its own context. Remarkably, most previous studies have employed the Bures fidelity or the Hilbert-Schmidt norm as the figure of merit to characterize the quality of the corresponding cloning scenarios. However, in many situations, what we truly care about is the relevant information about certain parameters encoded in quantum states. In this work, we investigate the multiple phase estimation problem in the framework of quantum cloning machines, from the perspective of quantum Fisher information matrix (QFIM). Focusing on the generalized d-dimensional equatorial states, we obtain the analytical formulas of QFIM for both universal quantum cloning machine (UQCM) and phase-covariant quantum cloning machine (PQCM), and prove that PQCM indeed performs better than UQCM in terms of QFIM. We highlight that our method can be generalized to arbitrary cloning schemes where the fidelity between the single-copy input and output states is input-state independent. Furthermore, the attainability of the quantum Cramer-Rao bound is also explicitly discussed.

Yao Yao; Li Ge; Xing Xiao; Xiao-guang Wang; Chang-pu Sun

2014-07-22T23:59:59.000Z

388

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network (OSTI)

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

389

Coordinated Output Regulation of Multiple Heterogeneous Linear Systems  

E-Print Network (OSTI)

, the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

Dimarogonas, Dimos

390

A Multiple Criteria Decision Analysis (MCDA) Software Selection Framework  

Science Journals Connector (OSTI)

With the gaining popularity of multiple criteria decision analysis (MCDA) among researchers and practitioners, a variety of software that implements sophisticated MCDA methods and techniques is now available. To address the issue of the missing methodological ... Keywords: Multiple Criteria Decision Analysis, MCDA, Software evaluation, multicriteria aggregation procedures

Yan Li; Manoj A. Thomas

2014-01-01T23:59:59.000Z

391

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network (OSTI)

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

392

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods  

E-Print Network (OSTI)

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods Judith E. Devaney, John G plaster over multiple time periods. We use three dimensional data obtained through X-ray microtomography of the plaster datasets that had been labeled with their autoclass predictions. The rules were found to have both

Fernandez, Thomas

393

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location  

E-Print Network (OSTI)

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

394

Generalized quadratic multiple knapsack problem and two solution approaches  

Science Journals Connector (OSTI)

The Quadratic Knapsack Problem (QKP) is one of the well-known combinatorial optimization problems. If more than one knapsack exists, then the problem is called a Quadratic Multiple Knapsack Problem (QMKP). Recently, knapsack problems with setups have ... Keywords: Combinatorial optimization, F-MSG, Generalized Quadratic Multiple Knapsack Problem (G-QMKP), Genetic Algorithm (GA), Production with plastic injection

Tugba Sara; Aydin Sipahioglu

2014-03-01T23:59:59.000Z

395

Model Reduction for Power Electronics Systems with Multiple Heat Sources  

E-Print Network (OSTI)

Model Reduction for Power Electronics Systems with Multiple Heat Sources A. Augustin, T. Hauck, B demonstrates the model order re- duction procedures applied to semiconductor devices with multiple heat sources. The approach is demonstrated for a device with nine heat sources where some of them are perma- nently active

Paris-Sud XI, Université de

396

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a  

E-Print Network (OSTI)

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a Single Fiber. In this work, we demonstrate the successful fabrication of an eight-device cascaded optoelectronic fiber of integrating multiple optoelectronic components into a single fiber cross-section. This is in fact a common

California at Irvine, University of

397

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment  

E-Print Network (OSTI)

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment by Scott B. Mahar on Graduate Students #12;2 #12;Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX

398

Complex multiplication, rationality and mirror symmetry for abelian varieties  

E-Print Network (OSTI)

We show that complex multiplication on abelian varieties is equivalent to the existence of a constant rational K\\"ahler metric. We give a sufficient condition for a mirror of an abelian variety of CM-type to be of CM-type as well. We also study the relationship between complex multiplication and rationality of a toroidal lattice vertex algebra.

Meng Chen

2005-12-20T23:59:59.000Z

399

Cooperative target convergence using multiple agents  

SciTech Connect

This work considers the problem of causing multiple (100`s) autonomous mobile robots to converge to a target and provides a follow-the-leader approach to the problem. Each robot has only a limited-range sensor for sending the target and also larger but also limited-range robot-to-robot communication capability. Because of the small amount of information available to the robots, a practical approach to improve convergence to the target is to have a robot follow the robot with the best quality of information. Specifically, each robot emits a signal that informs in-range robots what its status is. A robot has a status value of 0 if it is itself in range of the target. A robot has a status of 1 if it is not in range of the target but is in communication range of a robot that is in range of the target. A robot has a status of 2 if it is not in range of the target but is within range of another robot that has status 1, and so on. Of all the mobile robots that any given robot is in range of, it follows the one with the best status. The emergent behavior is the ant-like trails of robots following each other toward the target. If the robot is not in range of another robot that is either in range of the target or following another robot, the robot will assign-1 to its quality-of-information, and will execute an exhaustive search. The exhaustive search will continue until it encounters either the target or another robot with a nonnegative quality-of-information. The quality of information approach was extended to the case where each robot only has two-bit signals informing it of distance to in-range robots.

Kwok, K.S.; Driessen, B.J.

1997-10-01T23:59:59.000Z

400

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

402

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

403

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

404

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

405

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

406

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

407

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

408

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

409

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

410

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

411

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

412

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

413

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

414

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

415

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

416

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

417

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

418

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

419

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

420

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

422

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

423

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

424

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

425

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

426

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

427

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

428

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents (OSTI)

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN) [Knoxville, TN; David, Stan A. (Knoxville, TN) [Knoxville, TN; Frederick, David Alan (Harriman, TN) [Harriman, TN

2010-07-27T23:59:59.000Z

429

Midwest Independent System Operator (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent System Operator (Multiple States) Independent System Operator (Multiple States) Midwest Independent System Operator (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Interconnection Provider Midwest Independent System Operator Midwest Independent Transmission System Operator (MISO) is a Regional Transmission Organization, which administers wholesale electricity markets in all or parts of 11 U.S. states and the Canadian province of Manitoba. MISO administers electricity transmission grids across the Midwest and into Canada, and provides tools, transmission planning strategies, and integration for utilities in those markets.

430

Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Interstate Nuclear Compact State Nuclear Policy (Multiple Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Nonprofit Retail Supplier Rural Electric Cooperative State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Arizona Program Type Siting and Permitting Provider Western Interstate Energy Board Legislation authorizes states' entrance into the Western Interstate Nuclear Compact, which aims to undertake the cooperation of participating states in

431

Southern States Energy Compact (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alabama Program Type Environmental Regulations Industry Recruitment/Support Provider Southern States Energy Board

432

Delaware River Basin Commission (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) < Back Eligibility Utility Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Systems Integrator Savings Category Water Buying & Making Electricity Home Weatherization Program Info Start Date 1961 State Delaware Program Type Environmental Regulations Siting and Permitting Provider Project Review Section The Delaware River Basin Commission (DRBC) is a federal-interstate compact government agency that was formed by concurrent legislation enacted in 1961 by the United States and the four basin states (Pennsylvania, New York, New

433

Exceeding the Limit in Solar Energy Conversion with Multiple Excitons  

Science Journals Connector (OSTI)

The former comes from the transparence of the semiconductor material to solar radiation with photon energies below the bandgap (Eg), while the latter results from the cooling of hot carriers, initially generated by photon energies above Eg, to the band edges before they are extracted to do work. ... Carrier multiplication or singlet fission can be used to decrease the thermalization loss by converting part of the excess photon energy to multiple electronhole pairs, thus increasing photocurrent. ... (9) However, such enhancement has little effect on the power conversion efficiency because significant carrier multiplication only occurs at photon energies as high as 4Eg. ...

Xiaoyang Zhu

2013-06-18T23:59:59.000Z

434

Interstate Commission on the Potomac River Basin (Multiple States) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Systems Integrator Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State District of Columbia Program Type Environmental Regulations Siting and Permitting Provider Interstate Commission on the Potomac River Basin The Interstate Commission on the Potomac River Basin's (ICPRB) mission is to enhance, protect, and conserve the water and associated land resources of the Potomac River and its tributaries through regional and interstate

435

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

436

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

437

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

438

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

439

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

440

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

442

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

443

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

444

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

445

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

446

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

447

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

448

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

449

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

450

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

451

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

452

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

453

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

454

Multiple time scale based reduction scheme for nonlinear chemical dynamics  

Science Journals Connector (OSTI)

A chemical reaction is often characterized by multiple time scales governing the kinetics of reactants, products and intermediates. We eliminate the fast relaxing intermediates in autocatalytic reaction by tra...

D. Das; D. S. Ray

2013-07-01T23:59:59.000Z

455

Probabilistic Multiple-Linear Regression Modeling for Tropical Cyclone Intensity  

Science Journals Connector (OSTI)

The authors describe the development and verification of a statistical model relating tropical cyclone intensity to the local large-scale environment. A multiple linear regression framework is used to estimate the expected intensity of a tropical ...

Chia-Ying Lee; Michael K. Tippett; Suzana J. Camargo; Adam H. Sobel

456

The Effects of Multiple Green Factors on Condominium Prices  

Science Journals Connector (OSTI)

This paper analyzes the transaction prices of green buildings assessed on the basis of multiple green factors. Our theoretical model demonstrates that the initial green premium can be negative but becomes positiv...

Jiro Yoshida; Ayako Sugiura

2014-04-01T23:59:59.000Z

457

Development of neutron multiplicity counters for safeguards assay  

SciTech Connect

This paper reports on the development of a new generation of neutron multiplicity counters for assaying impure plutonium. The new counters will be able to obtain three measured parameters from the neutron multiplicity distribution and will be able to determine sample mass, multiplication, and (..cap alpha..,n) reaction rate, making it possible to obtain a more matrix-independent assay of moist or impure materials. This paper describes the existing prototype multiplicity counters and evaluates their performance using assay variance as a figure of merit. The best performance to date is obtained with a high-efficiency, low die-away-time thermal neutron counter with shift-register electronics. 10 refs., 2 figs., 4 tabs.

Ensslin, N.

1989-01-01T23:59:59.000Z

458

Depression during exacerbations in multiple sclerosis: the importance of uncertainty  

E-Print Network (OSTI)

The following correlates of depression were examined in a sample of 166 patients with clinically definite relapsing-remitting (n=140) or secondary progressive (n=26) multiple sclerosis: (a) the present state of the patients' ...

Kroencke, Dawn C.; Denney, Douglas R.; Lynch, Sharon G.

2001-08-01T23:59:59.000Z

459

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network (OSTI)

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

Lestone, J P

2014-01-01T23:59:59.000Z

460

Identification of critical locations across multiple infrastructures for terrorist actions  

E-Print Network (OSTI)

This paper discusses a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their ...

Patterson, Sean A. (Sean Albert), 1981-

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Robust Optimization with Multiple Ranges: Theory and Application ...  

E-Print Network (OSTI)

While Metan and Thiele [25] introduces multiple ranges for product demand in a simple two-stage robust ..... the market response to the new product. ...... certainty sets. Technical report, Massachusetts Institute of Technology, Cambridge, MA,.

2010-09-23T23:59:59.000Z

462

Competitive behavior of airlines at multiple airport systems  

E-Print Network (OSTI)

The way passenger traffic is distributed at multiple airport systems continues to intrigue air transportation planners, urban planners, and policy-makers as researchers attempt to unravel how airlines, air travelers and ...

Chen, Edmund

1995-01-01T23:59:59.000Z

463

A simulation environment for multiple project resource optimization  

E-Print Network (OSTI)

This thesis develops a numerical simulation environment as a management support tool applicable to the selection and scheduling of multiple, concurrent research and development projects under conditions of constrained ...

Sharkey, John Patrick, 1954-

2004-01-01T23:59:59.000Z

464

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets  

E-Print Network (OSTI)

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets Vadeerat spatial datasets. This capability is important for change analysis and contrast mining. In this paper spatial datasets by maximizing cluster interestingness and correspondence between clusters derived from

Eick, Christoph F.

465

A Bayesian hierarchical method for multiple-event seismic location  

Science Journals Connector (OSTI)

......demonstrate BAYHLoc using the set of Nevada Test Site nuclear explosions, for which...location|multiple-event|Nevada Test Site|seismic|stochastic| INTRODUCTION...The Walter (2004) data set of Nevada Test Site (NTS) explosions (Fig. 2a......

Stephen C. Myers; Gardar Johannesson; William Hanley

2007-12-01T23:59:59.000Z

466

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network (OSTI)

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

J. P. Lestone

2014-09-17T23:59:59.000Z

467

Effects of Single versus Multiple Warnings on Driver Performance  

E-Print Network (OSTI)

Objective: To explore how a single master alarm system affects drivers responses when compared to multiple, distinct warnings. Background: Advanced driver warning systems are intended to improve safety, yet inappropriate ...

Cummings, M. L.

2007-01-01T23:59:59.000Z

468

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

SciTech Connect

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

469

Volume Visualization of Multiple Alignment of Large Genomic DNA  

E-Print Network (OSTI)

. Another approach to understanding genetic code is through comparison of genomes, or parts of genomes/conservation between positions (http://www.cryst.bbk.ac.uk/BCD/bcdgloss.html). Figure 1 shows an example of a multiple

Utah, University of

470

An instruction issue mechanism for superscalar processors supporting multiple threads  

E-Print Network (OSTI)

An instruction issue mechanism for superscalar processors supporting multiple threads is presented. This mechanism offers the advantages of two of the most popular dynamic scheduling mechanisms: Tomasulo's algorithm and the Dispatch Stack scheme...

Kumar, Salil

1994-01-01T23:59:59.000Z

471

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

472

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

473

Multiple Motivations Institutional Change Principle | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

474

Lenalidomide plus Dexamethasone for High-Risk Smoldering Multiple Myeloma  

Science Journals Connector (OSTI)

...with lenalidomide, in patients with high-risk smoldering multiple myeloma significantly delayed the time to progression to symptomatic disease and resulted in an overall survival benefit. The orally administered treatment regimen was associated with an acceptable toxicity profile. Certain clinical features predict progression from smoldering to overt multiple myeloma. Patients with high-risk features who were treated with lenalidomide and dexamethasone were less likely to have disease progression and had a higher rate of survival than untreated patients.

Mateos M.-V.; Hernndez M.-T.; Giraldo P.

2013-08-01T23:59:59.000Z

475

Jaloro': A New Multiple Virus Resistant Hot Yellow Jalapeno Pepper.  

E-Print Network (OSTI)

, with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas..., with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas...

Villalon, Benigno

1992-01-01T23:59:59.000Z

476

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network (OSTI)

Analysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time Scales

Coughlin, Katie

2011-01-01T23:59:59.000Z

477

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network (OSTI)

2007. Analysis of Wind Power and Load Data at Multiple Timesd- Analysis of Wind Power and Load Data at Multiple Time35 v Analysis of Wind Power and Load Data at Multiple Time

Coughlin, Katie

2011-01-01T23:59:59.000Z

478

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

a. Appliances by Climate Zone, a. Appliances by Climate Zone, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Climate Zone 1 RSE Row Factors Fewer than 2,000 CDD and -- 2,000 CDD or More and Fewer than 4,000 HDD More than 7,000 HDD 5,500 to 7,000 HDD 4,000 to 5,499 HDD Fewer than 4,000 HDD 0.4 1.9 1.1 1.1 1.2 1.1 Total .................................................. 107.0 9.2 28.6 24.0 21.0 24.1 7.8 Kitchen Appliances Cooking Appliances Oven .............................................. 101.7 9.1 27.9 23.1 19.4 22.2 7.8 1 ................................................... 95.2 8.7 26.0 21.6 17.7 21.2 7.9 2 or More ..................................... 6.5 0.4 1.9 1.5 1.7 1.0 14.7 Most Used Oven ........................... 101.7 9.1 27.9 23.1 19.4 22.2

479

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

9a. Appliances by Northeast Census Region, 9a. Appliances by Northeast Census Region, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total U.S. Northeast Census Region RSE Row Factors Total Census Division Middle Atlantic New England 0.5 1.0 1.3 1.6 Total .............................................................. 107.0 20.3 14.8 5.4 NE Kitchen Appliances Cooking Appliances Oven ......................................................... 101.7 19.6 14.5 5.2 1.1 1 .............................................................. 95.2 18.2 13.3 4.9 1.1 2 or More ................................................. 6.5 1.4 1.1 0.3 11.7 Most Used Oven ...................................... 101.7 19.6 14.5 5.2 1.1 Electric .....................................................

480

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

4a. Appliances by Type of Housing Unit, 4a. Appliances by Type of Housing Unit, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Type of Housing Unit RSE Row Factors Single-Family Apartments in Buildings With Mobile Home Two to Four Units Five or More Units 0.4 0.5 1.7 1.6 1.9 Total ............................................... 107.0 73.7 9.5 17.0 6.8 4.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 69.1 9.4 16.7 6.6 4.3 1 ................................................ 95.2 63.7 8.9 16.2 6.3 4.3 2 or More .................................. 6.5 5.4 0.4 0.4 0.2 15.9 Most Used Oven ........................ 101.7 69.1 9.4 16.7 6.6 4.3 Electric ...................................... 63.0 43.3 5.2 10.9 3.6

Note: This page contains sample records for the topic "apple quicktime multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

3a. Appliances by Household Income, 3a. Appliances by Household Income, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total 2001 Household Income Below Poverty Line Eli- gible for Fed- eral Assist- ance 1 RSE Row Factors Less than $14,999 $15,000 to $29,999 $30,000 to $49,999 $50,000 or More 0.5 1.4 1.1 1.0 0.8 1.6 1.0 Total ............................................... 107.0 18.7 22.9 27.1 38.3 15.0 33.8 3.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 18.0 22.0 26.1 35.6 14.4 32.6 3.2 1 ................................................ 95.2 17.3 21.1 24.8 32.0 13.8 31.1 3.4 2 or More .................................. 6.5 0.8 0.9 1.3 3.6 0.6 1.5 13.1 Most Used Oven ........................ 101.7 18.0 22.0 26.1 35.6 14.4 32.6 3.2

482

appl_household2001.pdf  

Gasoline and Diesel Fuel Update (EIA)

Q Q 31.0 2 or More ... Q Q Q Q Q NF Other Appliances Automobile BlockEngine Battery Heater ... 0.5 0.3 Q 0.1 Q 37.2...

483

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

5a. Appliances by Type of Owner-Occupied Housing Unit, 5a. Appliances by Type of Owner-Occupied Housing Unit, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Owner- Occupied Units Type of Owner-Occupied Housing Unit RSE Row Factors Single-Family Apartments in Buildings With Mobile Home Two to Four Units Five or More Units 0.3 0.4 2.1 3.1 1.3 Total ............................................... 72.7 63.2 2.1 1.8 5.7 6.7 Kitchen Appliances Cooking Appliances Oven ........................................... 68.3 59.1 2.0 1.7 5.4 7.0 1 ................................................ 62.9 54.1 2.0 1.6 5.2 7.1 2 or More .................................. 5.4 5.0 Q Q 0.2 22.1 Most Used Oven ........................ 68.3 59.1 2.0 1.7 5.4 7.0 Electric ......................................

484

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

2a. Appliances by West Census Region, 2a. Appliances by West Census Region, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total U.S. West Census Region RSE Row Factors Total Census Division Mountain Pacific 0.5 1.0 1.7 1.2 Total .............................................................. 107.0 23.3 6.7 16.6 NE Kitchen Appliances Cooking Appliances Oven ......................................................... 101.7 22.1 6.6 15.5 1.1 1 .............................................................. 95.2 20.9 6.4 14.5 1.1 2 or More ................................................. 6.5 1.2 0.2 1.0 14.6 Most Used Oven ...................................... 101.7 22.1 6.6 15.5 1.1 Electric .....................................................

485

appl_household2001.pdf  

U.S. Energy Information Administration (EIA) Indexed Site

2a. Appliances by Year of Construction, 2a. Appliances by Year of Construction, Million U.S. Households, 2001 Appliance Types and Characteristics RSE Column Factor: Total Year of Construction RSE Row Factors 1990 to 2001 1 1980 to 1989 1970 to 1979 1960 to 1969 1950 to 1959 1949 or Before 0.4 1.5 1.2 1.1 1.2 1.1 0.9 Total ............................................... 107.0 15.5 18.2 18.8 13.8 14.2 26.6 4.2 Kitchen Appliances Cooking Appliances Oven ........................................... 101.7 14.3 17.2 17.8 12.9 13.7 25.9 4.2 1 ................................................ 95.2 13.1 16.3 16.6 12.1 12.7 24.3 4.4 2 or More .................................. 6.5 1.2 0.9 1.1 0.7 1.0 1.6 14.8 Most Used Oven ........................ 101.7 14.3 17.2 17.8 12.9 13.7 25.9 4.2 Electric ......................................

486

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities January 5,...

487

Combining frequency and time domain approaches to systems with multiple spike train input and output  

E-Print Network (OSTI)

between neuronal spike trains. Prog Biophys Mol Biol Vapnikto systems with multiple spike train input and output D. R.Keywords Multiple spike trains Neural coding Maximum

Brillinger, D. R.; Lindsay, K. A.; Rosenberg, J. R.

2009-01-01T23:59:59.000Z

488

V-099: Honeywell Multiple Products ActiveX Control Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February...

489

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

490

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

491

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

492

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

493

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

494

CHOS in Production - Multiple Linux Environments on PDSF at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

CHOS CHOS in Production Multiple Linux Environments on PDSF at NERSC Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory April 2012 A commodity Linux cluster at NERSC serving HEP and NS projects 1GbE and 10GbE interconnect In continuous operation since 1996 ~1500 compute cores on ~200 nodes Over 750 TB shared GPFS storage in 17 filesystems Over 650 TB of XRootD storage Supports SL5 and SL6 environments Projects "buy in" to PDSF and the UGE share tree is adjusted accordingly PDSF at NERSC 2 PDSF has a broad user base (including non-CERN and non-LHC projects) Current projects include ALICE, ATLAS, CUORE, Daya Bay, IceCube, KamLAND, Majorana, and STAR Prior projects include BaBaR, CDF, Planck, SNO, and SNFactory PDSF Workloads 3 PDSF must support multiple applications for multiple projects Many are only tested

495

Chesapeake Bay Preservation Programs (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maryland Program Type Siting and Permitting Provider Chesapeake Bay Program The Chesapeake Bay Program is a unique regional partnership that has led

496

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic  

Open Energy Info (EERE)

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Details Activities (1) Areas (1) Regions (0) Abstract: Despite several episodes of ground deformation and intense seismic activity starting in 1978, the Long Valley, California, volcanic area has not produced clearly recognized volcanic tremor. Instead, a variety of atypical microearthquakes have been recorded during these episodes, including events dominated by low-frequency (long-period) or mixed high and low-frequency (hybrid) signals. During a 1997 episode, a number of unusual microearthquakes occurred within a temporary 40-station

497

New England Power Pool (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

England Power Pool (Multiple States) England Power Pool (Multiple States) New England Power Pool (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maine Program Type Interconnection Independent System Operator (ISO) New England helps protect the health of New England's economy and the well-being of its people by ensuring the constant availability of electricity, today and for future generations. ISO New England meets this obligation in three ways: by ensuring the day-to-day reliable operation of New England's bulk power generation and transmission system, by overseeing and ensuring the fair administration of the region's wholesale electricity markets, and by managing comprehensive, regional

498

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

499

North American Renewables Registry (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

American Renewables Registry (Multiple States) American Renewables Registry (Multiple States) North American Renewables Registry (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State North Carolina Program Type Green Power Purchasing Provider APX The North American Renewables Registry (NAR) provides a Web-based platform trusted to create, track, and manage renewable energy certificate (REC) origination for clean generation facilities and states not covered by one of the existing APX-powered, regional systems. All market participants are able to take advantage of a trusted infrastructure to help manage their role in the market. With the ability to create unique, serialized records

500

Interstate Oil and Gas Conservation Compact (Multiple States) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) < Back Eligibility Commercial Developer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Alabama Program Type Environmental Regulations Provider Interstate Oil and Gas Compact Commission The Interstate Oil and Gas Compact Commission assists member states efficiently maximize oil and natural gas resources through sound regulatory practices while protecting the nation's health, safety and the environment. The Commission serves as the collective voice of member governors on oil and gas issues and advocates states' rights to govern petroleum resources within their borders. The Commission formed the Geological CO2 Sequestration Task Force, which