Powered by Deep Web Technologies
Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

2

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

3

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct...

4

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Office of Environmental Management (EM)

165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May...

5

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs...

6

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and...  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain...

7

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

8

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

9

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

10

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

11

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

12

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222:...

13

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

14

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can cause the target application to execute arbitrary code on the target user's system.

15

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

16

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

17

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

18

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

19

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

20

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

22

U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

23

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

24

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

25

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code| Department

26

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

27

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service...

28

T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code  

Broader source: Energy.gov [DOE]

Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

29

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

30

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

31

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

32

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

33

Nested Lattice Codes for Arbitrary Continuous Sources and Channels  

E-Print Network [OSTI]

Nested Lattice Codes for Arbitrary Continuous Sources and Channels Aria G. Sahebi and S. Sandeep 48109, USA. Email: ariaghs@umich.edu, pradhanv@umich.edu Abstract--In this paper, we show that nested information at the transmitter. We also show that nested lattice codes are optimal for source coding

Pradhan, Sandeep

34

Quantum Coding Theorems for Arbitrary Sources, Channels and Entanglement Resources  

E-Print Network [OSTI]

The information spectrum approach gives general formulae for optimal rates of various information theoretic protocols, under minimal assumptions on the nature of the sources, channels and entanglement resources involved. This paper culminates in the derivation of the dense coding capacity for a noiseless quantum channel, assisted by arbitrary shared entanglement, using this approach. We also review the currently known coding theorems, and their converses, for protocols such as data compression for arbitrary quantum sources and transmission of classical information through arbitrary quantum channels. In addition, we derive the optimal rate of data compression for a mixed source

Garry Bowen; Nilanjana Datta

2006-09-30T23:59:59.000Z

35

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

36

ETFOD: a point model physics code with arbitrary input  

SciTech Connect (OSTI)

ETFOD is a zero-dimensional code which solves a set of physics equations by minimization. The technique used is different than normally used, in that the input is arbitrary. The user is supplied with a set of variables from which he specifies which variables are input (unchanging). The remaining variables become the output. Presently the code is being used for ETF reactor design studies. The code was written in a manner to allow easy modificaton of equations, variables, and physics calculations. The solution technique is presented along with hints for using the code.

Rothe, K.E.; Attenberger, S.E.

1980-06-01T23:59:59.000Z

37

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

38

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

39

U-071:HP Database Archiving Software Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

40

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

42

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

43

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

44

EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES  

E-Print Network [OSTI]

fulfillment of the requirements for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES Approved by... for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK iii ABSTRACT Exploring Efficient Coding Schemes for Storing Arbitrary Tree Data Structures in Flash Memories. (April 2009) Justin Allen Falck...

Falck, Justin

2009-06-09T23:59:59.000Z

45

System for loading executable code into volatile memory in a downhole tool  

DOE Patents [OSTI]

A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

2007-09-25T23:59:59.000Z

46

Reduced Space-Time and Time Costs Using Dislocation Codes and Arbitrary Ancillas  

E-Print Network [OSTI]

We propose two distinct methods of improving quantum computing protocols based on surface codes. First, we analyze the use of dislocations instead of holes to produce logical qubits, potentially reducing spacetime volume required. Dislocations induce defects which, in many respects, behave like Majorana quasi-particles. We construct circuits to implement these codes and present fault-tolerant measurement methods for these and other defects which may reduce spatial overhead. One advantage of these codes is that Hadamard gates take exactly $0$ time to implement. We numerically study the performance of these codes using a minimum weight and a greedy decoder using finite-size scaling. Second, we consider state injection of arbitrary ancillas to produce arbitrary rotations. This avoids the logarithmic (in precision) overhead in online cost required if $T$ gates are used to synthesize arbitrary rotations. While this has been considered before, we consider also the parallel performance of this protocol. Arbitrary ancilla injection leads to a probabilistic protocol in which there is a constant chance of success on each round; we use an amortized analysis to show that even in a parallel setting this leads to only a constant factor slowdown as opposed to the logarithmic slowdown that might be expected naively.

M. B. Hastings; A. Geller

2014-08-14T23:59:59.000Z

47

Detecting arbitrary quantum errors via stabilizer measurements on a sublattice of the surface code  

E-Print Network [OSTI]

To build a fault-tolerant quantum computer, it is necessary to implement a quantum error correcting code. Such codes rely on the ability to extract information about the quantum error syndrome while not destroying the quantum information encoded in the system. Stabilizer codes are attractive solutions to this problem, as they are analogous to classical linear codes, have simple and easily computed encoding networks, and allow efficient syndrome extraction. In these codes, syndrome extraction is performed via multi-qubit stabilizer measurements, which are bit and phase parity checks up to local operations. Previously, stabilizer codes have been realized in nuclei, trapped-ions, and superconducting qubits. However these implementations lack the ability to perform fault-tolerant syndrome extraction which continues to be a challenge for all physical quantum computing systems. Here we experimentally demonstrate a key step towards this problem by using a two-by-two lattice of superconducting qubits to perform syndrome extraction and arbitrary error detection via simultaneous quantum non-demolition stabilizer measurements. This lattice represents a primitive tile for the surface code, which is a promising stabilizer code for scalable quantum computing. Furthermore, we successfully show the preservation of an entangled state in the presence of an arbitrary applied error through high-fidelity syndrome measurement. Our results bolster the promise of employing lattices of superconducting qubits for larger-scale fault-tolerant quantum computing.

A. D. Córcoles; Easwar Magesan; Srikanth J. Srinivasan; Andrew W. Cross; M. Steffen; Jay M. Gambetta; Jerry M. Chow

2014-10-23T23:59:59.000Z

48

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

49

MSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real  

E-Print Network [OSTI]

: information-centric networking over mobile ad hoc network using the PARC CCNx code, and a seamless handoffMSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real of Tokyo, Japan INRIA, France Abstract We propose to demonstrate Direct Code Execution (DCE)1 , a ns-3

Turletti, Thierry

50

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

51

BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations  

E-Print Network [OSTI]

In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusion of additional physics packages, the ability to use a general equation of state, and most importantly, the ability to solve self-gravitating hydrodynamic flows on time-dependent, arbitrary grids. In what follows, we describe in detail the numerical techniques employed and, with a large suite of tests, demonstrate that BETHE-hydro finds accurate solutions with 2$^{nd}$-order convergence.

Jeremiah W. Murphy; Adam Burrows

2008-07-09T23:59:59.000Z

52

2-D Stellar Evolution Code Including Arbitrary Magnetic Fields. I. Mathematical Techniques and Test Cases  

E-Print Network [OSTI]

A high-precision two-dimensional stellar evolution code has been developed for studying solar variability due to structural changes produced by varying internal magnetic fields of arbitrary configurations. Specifically, we are interested in modeling the effects of a dynamo-type field on the detailed internal structure and on the global parameters of the Sun. The high precision is required both to model very small solar changes (of order of $10^{-4}$) and short time scales (or order of one year). It is accomplished by using the mass coordinate to replace the radial coordinate, by using fixed and adjustable time steps, a realistic stellar atmosphere, elements diffusion, and by adjusting the grid points. We have also built into the code the potential to subsequently include rotation and turbulence. The current code has been tested for several cases, including its ability to reproduce the 1-D results.

L. H. Li; P. Ventura; S. Basu; S. Sofia; P. Demarque

2006-01-27T23:59:59.000Z

53

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

54

T-593: Microsoft Internet Explorer unspecified code execution  

Broader source: Energy.gov [DOE]

Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

55

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department of EnergyCode |

56

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |

57

Classification of Code Annotations and Discussion of Compiler-Support for Worst-Case Execution Time Analysis  

E-Print Network [OSTI]

of energy consumption, resource-aware code generation, or re- targetable code generators. Program execution providing explicit sup- port for WCET analysis would have on usage of these code annotations is discussed

58

The role of the PIRT process in identifying code improvements and executing code development  

SciTech Connect (OSTI)

In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

Wilson, G.E. [Idaho National Engineering Lab., Idaho Falls, ID (United States); Boyack, B.E. [Los Alamos National Lab., NM (United States)

1997-07-01T23:59:59.000Z

59

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

60

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBM

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment of

62

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment

63

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities |

64

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:

65

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and|

66

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple | Department|Conduct

67

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||

68

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA document

69

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters andCross-Site

70

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address Bar, Conduct

71

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address| DepartmentObtain

72

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of|

73

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

remote user can cause the Firefox installer to load a DLL from the default downloads directory and execute arbitrary code. Only Windows-based systems are affected. A remote user...

74

SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification  

E-Print Network [OSTI]

SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification Olga those using the Internet and exploiting the vul- nerabilities in the software and applications, software ­ for software integrity protection and authentication and presents performance results. Our system architecture

Simha, Rahul

75

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

issue does not affect Mac OS X systems. Viewing an image in a maliciously prepared directory may lead to arbitrary code execution. A path searching issue exists in QuickTime...

76

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Environmental Management (EM)

data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to reload...

77

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

78

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 3, MARCH 2004 417 On the Application of LDPC Codes to Arbitrary  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 3, MARCH 2004 417 On the Application of LDPC, Senior Member, IEEE Abstract--We discuss three structures of modified low-density parity-check (LDPC Gaussian noise (AWGN) channel confirming the effectiveness of the codes. Index Terms-- -ary low-density

Bennatan, Amir

79

TWO-DIMENSIONAL STELLAR EVOLUTION CODE INCLUDING ARBITRARY MAGNETIC FIELDS. II. PRECISION IMPROVEMENT AND INCLUSION OF TURBULENCE AND ROTATION  

SciTech Connect (OSTI)

In the second paper of this series we pursue two objectives. First, in order to make the code more sensitive to small effects, we remove many approximations made in Paper I. Second, we include turbulence and rotation in the two-dimensional framework. The stellar equilibrium is described by means of a set of five differential equations, with the introduction of a new dependent variable, namely the perturbation to the radial gravity, that is found when the nonradial effects are considered in the solution of the Poisson equation. Following the scheme of the first paper, we write the equations in such a way that the two-dimensional effects can be easily disentangled. The key concept introduced in this series is the equipotential surface. We use the underlying cause-effect relation to develop a recurrence relation to calculate the equipotential surface functions for uniform rotation, differential rotation, rotation-like toroidal magnetic fields, and turbulence. We also develop a more precise code to numerically solve the two-dimensional stellar structure and evolution equations based on the equipotential surface calculations. We have shown that with this formulation we can achieve the precision required by observations by appropriately selecting the convergence criterion. Several examples are presented to show that the method works well. Since we are interested in modeling the effects of a dynamo-type field on the detailed envelope structure and global properties of the Sun, the code has been optimized for short timescales phenomena (down to 1 yr). The time dependence of the code has so far been tested exclusively to address such problems.

Li Linghuai; Sofia, Sabatino; Basu, Sarbani; Demarque, Pierre [Department of Astronomy, Yale University, P.O. Box 208101, New Haven, CT 06520-8101 (United States); Ventura, Paolo [INAF, Osservatorio Astronomico di Roma, 00040 Monteporzio Catone (Italy); Penza, Valentina [Universita Di Roma 'Tor Vergata', Via Della Ricerca Scientifica 1, 00133 Roma (Italy); Bi Shaolan [Department of Astronomy, Beijing Normal University, Beijing 100875 (China)], E-mail: li@astro.yale.edu

2009-06-15T23:59:59.000Z

80

Two-Dimensional Stellar Evolution Code Including Arbitrary Magnetic Fields. II. Precision Improvement and Inclusion of Turbulence and Rotation  

E-Print Network [OSTI]

In the second paper of this series we pursue two objectives. First, in order to make the code more sensitive to small effects, we remove many approximations made in Paper I. Second, we include turbulence and rotation in the two-dimensional framework. The stellar equilibrium is described by means of a set of five differential equations, with the introduction of a new dependent variable, namely the perturbation to the radial gravity, that is found when the non-radial effects are considered in the solution of the Poisson equation; following the scheme of the first paper, we write the equations in such a way that the two-dimensional effects can be easily disentangled. The key concept introduced in this series is the equipotential surface. We use the underlying cause-effect relation to develop a recurrence relation to calculate the equipotential surface functions for uniform rotation, differential rotation, rotation-like toroidal magnetic fields and turbulence. We also develop a more precise code to numerically solve the two-dimensional stellar structure and evolution equations based on the equipotential surface calculations. We have shown that with this formulation we can achieve the precision required by observations by appropriately selecting the convergence criterion. Several examples are presented to show that the method works well. Since we are interested in modeling the effects of a dynamo-type field on the detailed envelope structure and global properties of the Sun, the code has been optimized for short timescales phenomena (down to 1 yr). The time dependence of the code has so far been tested exclusively to address such problems.

Linghuai Li; Sabatino Sofia; Paolo Ventura; Valentina Penza; Shaolan Bi; Sarbani Basu; Pierre Demarque

2008-10-27T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command...  

Broader source: Energy.gov (indexed) [DOE]

4: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability...

82

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...  

Broader source: Energy.gov (indexed) [DOE]

script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that...

83

List decoding of subspace codes and rank-metric codes  

E-Print Network [OSTI]

2.2.2 Koetter-Kschischang Codes . . . . . . . . . . . .of Subspace Codes . . . . . . . . . . . . . . 2.3.1 OverviewList-decodable Codes of Arbitrary Dimension . . . . . . .

Mahdavifar, Hessam

2012-01-01T23:59:59.000Z

84

T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

86

E-Print Network 3.0 - arbitrary time dependent Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technical Report CS96466, CSE Dept., UCSD, January 1996 Determining Asynchronous Acyclic Pipeline Execution Times Summary: units. For an arbitrary graph G, G:time 1 can be...

87

Self-assembled software and method of overriding software execution  

DOE Patents [OSTI]

A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

Bouchard, Ann M.; Osbourn, Gordon C.

2013-01-08T23:59:59.000Z

88

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Broader source: Energy.gov (indexed) [DOE]

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

89

Executive Officer  

Broader source: Energy.gov [DOE]

THIS VACANCY ANNOUNCEMENT HAS BEEN MODIFIED TO EXTEND THE CLOSING DATE. A successful candidate in this position will serve as the Executive Officer to the Administrator of the Bonneville Power...

90

Arbitrary Function Generator LSN-  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout theOFFICEAmesApplication2 (CRAC 2 period)Office2Arbitrary Function

91

Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director RichExecutive4

92

Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director RichExecutive45

93

Executive Order 1083 Attachment C  

E-Print Network [OSTI]

Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

Eirinaki, Magdalini

94

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC...

95

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC...

96

U-137: HP Performance Manager Unspecified Bug Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

97

FEI Program Session: Date: CHRIS Code: Session Number:  

Broader source: Energy.gov (indexed) [DOE]

OPM Federal Executive Institute - DOE CHRIS Codes: (Program Tuition Cost - 19,875.00) *Program Calendar for Fiscal Year 2015 FEI Program Session: Date: CHRIS Code: Session Number:...

98

Virtual Private Environments for Multiphysics Code Validation on Computing Grids  

E-Print Network [OSTI]

Virtual Private Environments for Multiphysics Code Validation on Computing Grids Toan Nguyen-based computing environments and deploys, tests and analyzes multiphysics codes. A second approach executes model coupling, error correlations, alert definitions, best usage practices, code verification and code

Paris-Sud XI, Université de

99

Executive Director  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director Rich Marquez,

100

Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

102

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

103

Perturbative Gadgets at Arbitrary Orders  

E-Print Network [OSTI]

Adiabatic quantum algorithms are often most easily formulated using many-body interactions. However, experimentally available interactions are generally two-body. In 2004, Kempe, Kitaev, and Regev introduced perturbative gadgets, by which arbitrary three-body effective interactions can be obtained using Hamiltonians consisting only of two-body interactions. These three-body effective interactions arise from the third order in perturbation theory. Since their introduction, perturbative gadgets have become a standard tool in the theory of quantum computation. Here we construct generalized gadgets so that one can directly obtain arbitrary k-body effective interactions from two-body Hamiltonians. These effective interactions arise from the kth order in perturbation theory.

Stephen P. Jordan; Edward Farhi

2012-01-31T23:59:59.000Z

104

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

105

Chip Laingen Executive Director  

E-Print Network [OSTI]

Link 3) MilTech · Defense Alliance / APC Staff 1) Executive Director 2) Business / Finance Director

Levinson, David M.

106

Quantum stabilizer codes and beyond  

E-Print Network [OSTI]

The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. This dissertation makes a threefold contribution to the mathematical theory of quantum error-correcting codes. Firstly, it extends the framework of an important class of quantum codes -- nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work establishes a close link between subsystem codes and classical codes showing that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels.

Pradeep Kiran Sarvepalli

2008-10-14T23:59:59.000Z

107

MacWilliams identities for codes on graphs  

E-Print Network [OSTI]

The MacWilliams identity for linear time-invariant convolutional codes that has recently been found by Gluesing-Luerssen and Schneider is proved concisely, and generalized to arbitrary group codes on graphs. A similar ...

Forney, G. David, Jr.

108

Experience with Remote Job Execution  

SciTech Connect (OSTI)

The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Green, Mark L [ORNL; Kohl, James Arthur [ORNL; Miller, Stephen D [ORNL; Ren, Shelly [ORNL; Smith, Bradford C [ORNL; Vazhkudai, Sudharshan S [ORNL

2008-01-01T23:59:59.000Z

109

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

110

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

111

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

is caused due to an error within the cache update policy. February 7, 2012 U-097: PHP "phpregistervariableex()" Code Execution Vulnerability Execution of arbitrary code...

112

U-236: Microsoft JScript and VBScript Engine Integer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code...

113

ISO 14001: An Executive Report  

E-Print Network [OSTI]

Review: ISO 14001: An Executive Report By Gordon A. West andA. and Manta, Joseph G. ISO 14001: An Executive Report.management standards, ISO 14001: An Executive Report stands

Simon, Richard

1998-01-01T23:59:59.000Z

114

Shared prefetching to reduce execution skew in multi-threaded systems  

DOE Patents [OSTI]

Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

Eichenberger, Alexandre E; Gunnels, John A

2013-07-16T23:59:59.000Z

115

Data processing with microcode designed with source coding  

DOE Patents [OSTI]

Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

McCoy, James A; Morrison, Steven E

2013-05-07T23:59:59.000Z

116

Code Description Code Description  

E-Print Network [OSTI]

Leave* 5127 Officials 5217 Faculty Sick Leave Payment 5124 Personal Service Contracts 5211 Research Services Contracts Scholarships & Fellowships Faculty Fringe Contract Services #12;Banner Account Code

117

Carrie Takeyasu Executive Director  

E-Print Network [OSTI]

Carrie Takeyasu Executive Director Daryl Schacher Manager, Materials Management Lyn Jose Besplug Materials Handling Worker Chris Charles Materials Handling Worker Gerry Ste Marie Materials Handling Worker Mark Sabo Materials Handling Worker Michele Roberts General Clerk Laurie Martin Purchasing

Burg, Theresa

118

STEP Participant Survey Executive Summary  

Broader source: Energy.gov [DOE]

STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

119

Detection of malicious computer executables  

DOE Patents [OSTI]

A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

2009-04-14T23:59:59.000Z

120

Homological Error Correction: Classical and Quantum Codes  

E-Print Network [OSTI]

We prove several theorems characterizing the existence of homological error correction codes both classically and quantumly. Not every classical code is homological, but we find a family of classical homological codes saturating the Hamming bound. In the quantum case, we show that for non-orientable surfaces it is impossible to construct homological codes based on qudits of dimension $D>2$, while for orientable surfaces with boundaries it is possible to construct them for arbitrary dimension $D$. We give a method to obtain planar homological codes based on the construction of quantum codes on compact surfaces without boundaries. We show how the original Shor's 9-qubit code can be visualized as a homological quantum code. We study the problem of constructing quantum codes with optimal encoding rate. In the particular case of toric codes we construct an optimal family and give an explicit proof of its optimality. For homological quantum codes on surfaces of arbitrary genus we also construct a family of codes asymptotically attaining the maximum possible encoding rate. We provide the tools of homology group theory for graphs embedded on surfaces in a self-contained manner.

H. Bombin; M. A. Martin-Delgado

2006-05-10T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

122

U-120: RSA SecurID Software Token Converter Unspecified Buffer...  

Broader source: Energy.gov (indexed) [DOE]

Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

123

E-Print Network 3.0 - alpha coding sequence Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

will generate conservative Alpha code sequences for unaligned memory access. If the profile does not indicate... Pentium or a 200-MHz Pentium Pro when executing translated...

124

Conservation Focus and Executive  

E-Print Network [OSTI]

Northwest Power and Conservation Council Focus and Executive Summary Background Power Committee Walla Walla May 12, 2009 #12;Northwest Power and Conservation Council Conditions Facing the Region and Conservation Council Resource Alternatives · Increased cost-effective efficiency potential ­ Technological

125

Sustainability Initiative Executive Summary  

E-Print Network [OSTI]

UW­Madison Sustainability Initiative Executive Summary October 2010 #12;2 We are pleased to present the final report of the campus Sustainability Task Force. This report fulfills the charge we gave to sustainability for consideration by UW­Madison's leadership and campus community. There are many reasons why

Sheridan, Jennifer

126

Business Model Guide Executive Summary  

Broader source: Energy.gov [DOE]

The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

127

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

128

Spinal codes  

E-Print Network [OSTI]

Spinal codes are a new class of rateless codes that enable wireless networks to cope with time-varying channel conditions in a natural way, without requiring any explicit bit rate selection. The key idea in the code is the ...

Perry, Jonathan, S.M. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

129

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

An SVG text handling font processing flaw exists CVE-2011-2877. A cross-origin access control flaw exists CVE-2011-2878. Lifetime and threading issues exist in...

130

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

be confirmed via a browser dialog CVE-2011-2783. A file path may be disclosed in the GL program log CVE-2011-2784. The homepage URL is not sanitized in extensions...

131

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to...

132

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

133

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar Power in the|

134

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS XCode |

135

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment of Energy

136

National Ignition Facility project execution plan  

SciTech Connect (OSTI)

This project execution plan covers: Justification of Mission Need; Project Description; Management Roles and Responsibilities; Project Execution; Method of Accomplishment.

Paisner, J., LLNL

1997-08-01T23:59:59.000Z

137

Foundational Certified Code in a Metalogical KARL CRARY and SUSMIT SARKAR  

E-Print Network [OSTI]

Foundational Certified Code in a Metalogical Framework KARL CRARY and SUSMIT SARKAR Carnegie Mellon not reflect the views of this agency. #12;2 · K. Crary and S. Sarkar the executable code is accompanied

Goldstein, Seth Copen

138

Corrected Analytical Solution of the Generalized Woods-Saxon Potential for Arbitrary $\\ell$ States  

E-Print Network [OSTI]

The bound state solution of the radial Schr\\"{o}dinger equation with the generalized Woods-Saxon potential is carefully examined by using the Pekeris approximation for arbitrary $\\ell$ states. The energy eigenvalues and the corresponding eigenfunctions are analytically obtained for different $n$ and $\\ell$ quantum numbers. The obtained closed forms are applied to calculate the single particle energy levels of neutron orbiting around $^{56}$Fe nucleus in order to check consistency between the analytical and Gamow code results. The analytical results are in good agreement with the results obtained by Gamow code for $\\ell=0$.

Bayrak, O

2015-01-01T23:59:59.000Z

139

Architecture-Dependent Execution Time of Shor's Algorithm  

E-Print Network [OSTI]

We show how the execution time of algorithms on quantum computers depends on the architecture of the quantum computer, the choice of algorithms (including subroutines such as arithmetic), and the ``clock speed'' of the quantum computer. The primary architectural features of interest are the ability to execute multiple gates concurrently, the number of application-level qubits available, and the interconnection network of qubits. We analyze Shor's algorithm for factoring large numbers in this context. Our results show that, if arbitrary interconnection of qubits is possible, a machine with an application-level clock speed of as low as one-third of a (possibly encoded) gate per second could factor a 576-bit number in under one month, potentially outperforming a large network of classical computers. For nearest-neighbor-only architectures, a clock speed of around twenty-seven gates per second is required.

Rodney Van Meter; Kohei M. Itoh; Thaddeus D. Ladd

2006-05-25T23:59:59.000Z

140

Chaotic Turbo Codes  

E-Print Network [OSTI]

This paper describes a new class of codes, chaotic turbo codes. They were born from a symbiosis between a chaotical digital encoder and a turbo code. This paper investigates the most important properties of both chaotic digital encoders and turbo encoders in order to understand how the two complement each other. A Chaotic Turbo Encoder is then described and initial results will be presented. I. INTRODUCTION A chaotic digital encoder was defined for the first time in [1] as a non--linear digital filter with finite precision (8 bits) which behaves in a quasi--chaotic fashion, both with zero and nonzero input sequences. A simple chaotic encoder is shown in Figure 1 [1]. D Y k X k LCIRC D Figure 1: Chaotic Digital Encoder Mapper L L L L L L 1 The main features of chaotic digital encoders that are used in this paper are: # The system is digital which makes possible its integration with a turbo code. # The output of a chaotic digital encoder with arbitrary inputs has a broad...

S. Adrian Barbulescu; Andrew Guidi; Steven S. Pietrobon

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide PrintUsers' Executive Committee

142

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide PrintUsers' Executive

143

Executives & Structure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director

144

CEES Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium: Celebrating the Past -Executive Committee photo

145

Coding theorems for hybrid channels. II  

E-Print Network [OSTI]

The present work continues investigation of the capacities of measurement (quantum-classical) channels in the most general setting, initiated in~\\cite{HCT}. The proof of coding theorems is given for the classical capacity and entanglement-assisted classical capacity of the measurement channel with arbitrary output alphabet, without assuming that the channel is given by a bounded operator-valued density.

A. A. Kuznetsova; A. S. Holevo

2014-08-14T23:59:59.000Z

146

NCAI Executive Council Winter Session  

Broader source: Energy.gov [DOE]

National Congress of American Indians (NCAI) is hosting the 2015 Executive Council Winter Session in Washington, DC, Feb. 23-25, 2015.

147

Code design based on metric-spectrum and applications  

E-Print Network [OSTI]

We introduced nested search methods to design (n, k) block codes for arbitrary channels by optimizing an appropriate metric spectrum in each iteration. For a given k, the methods start with a good high rate code, say k/(k + 1), and successively...

Papadimitriou, Panayiotis D.

2005-02-17T23:59:59.000Z

148

Efficient quantum circuits for arbitrary sparse unitaries  

SciTech Connect (OSTI)

Arbitrary exponentially large unitaries cannot be implemented efficiently by quantum circuits. However, we show that quantum circuits can efficiently implement any unitary provided it has at most polynomially many nonzero entries in any row or column, and these entries are efficiently computable. One can formulate a model of computation based on the composition of sparse unitaries which includes the quantum Turing machine model, the quantum circuit model, anyonic models, permutational quantum computation, and discrete time quantum walks as special cases. Thus, we obtain a simple unified proof that these models are all contained in BQP. Furthermore, our general method for implementing sparse unitaries simplifies several existing quantum algorithms.

Jordan, Stephen P. [Institute for Quantum Information, Caltech, Pasadena, California 91125 (United States); Wocjan, Pawel [School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida 32816 (United States)

2009-12-15T23:59:59.000Z

149

Building Relationships with Executive Search Firms Building Relationships with Executive Search Firms  

E-Print Network [OSTI]

Relationships Similar Searches Alumni Organizations Education Company Team - Sports Job Hunting / NetworkingBuilding Relationships with Executive Search Firms for Building Relationships with Executive Search Firms for Weiner & Associates, Inc. Executive Search Partners Weiner & Associates, Inc. Executive Search

Ferrari, Silvia

150

Introduction to Algebraic Codes  

E-Print Network [OSTI]

codes. Since the elementary coding theory is assumed to be of interest only to ... the algebraic codes, mainly BCH codes, Reed-Solomon codes and classical ...

151

Executive Order 13423: Strengthening Federal Environmental, Energy...  

Broader source: Energy.gov (indexed) [DOE]

text of Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management. eo13423.pdf More Documents & Publications Executive Order 13423-...

152

SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...  

Office of Environmental Management (EM)

SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal Training SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal...

153

JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP  

E-Print Network [OSTI]

JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP MENTOR HANDBOOK September2014................................................................................................................................................... 3 C. Benefits of JSGS Internships .................................................................................................................................... 4 Both partner organizations and interns benefit from JSGS Executive Internships

Peak, Derek

154

Holographic codes  

E-Print Network [OSTI]

There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

Latorre, Jose I

2015-01-01T23:59:59.000Z

155

Holographic codes  

E-Print Network [OSTI]

There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

Jose I. Latorre; German Sierra

2015-02-23T23:59:59.000Z

156

Arbitrary manipulation of nonlinear optical processes  

E-Print Network [OSTI]

Nonlinear optical processes are governed by the relative-phase relationships among the relevant electromagnetic fields in these processes. In this Letter, we describe the physics of arbitrary manipulation of nonlinear optical processes (AMNOP) by artificial control of relative phases. As a typical example, we show freely designable optical-frequency conversions to extreme spectral regions, mid-infrared and vacuum-ultraviolet, with near-unity quantum efficiencies. Furthermore, we show that such optical-frequency conversions can be realized by using a surprisingly simple technology where transparent plates are placed in a nonlinear optical medium and their positions and thicknesses are adjusted precisely. In a numerical experiment assuming practically applicable parameters in detail, we demonstrate a single-frequency tunable laser that covers the whole vacuum-ultraviolet spectral range of 120 to 200 nm.

Jian Zheng; Masayuki Katsuragawa

2014-06-16T23:59:59.000Z

157

Progress on Problem about Quantum Hamming Bound for Impure Quantum Codes  

E-Print Network [OSTI]

A famous open problem in the theory of quantum error-correcting codes is whether or not the parameters of an impure quantum code can violate the quantum Hamming bound for pure quantum codes. We partially solve this problem. We demonstrate that there exists a threshold such that an arbitrary quantum code must obey the quantum Hamming bound whenever . We list some values of for small d and binary quantum codes.

Zhuo Li; Lijuan Xing

2009-07-22T23:59:59.000Z

158

Is It Possible To Clone Using An Arbitrary Blank State?  

E-Print Network [OSTI]

We show that in a cloning process, whether deterministic inexact or probabilistic exact, one can take an arbitrary blank state while still using a fixed cloning machine.

Anirban Roy; Aditi Sen; Ujjwal Sen

2001-11-29T23:59:59.000Z

159

arbitrary optical trapping: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

passing through Schieber, Jay D. 238 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

160

arbitrary apertures ii: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 385 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

arbitrary quantum system: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

theory. Sergio Giardino 2013-09-10 30 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

162

arbitrary ionic strength: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 327 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

163

arbitrary degree sequence: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 412 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

164

arbitrary hard ellipses: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 342 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

165

arbitrary control loop: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 330 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

166

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations  

E-Print Network [OSTI]

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations Angel Lozano gives the power allocation policy, referred to as mercury/waterfilling, that maximizes the sum mutual

Verdú, Sergio

167

A PVM Executive Program for Use with RELAP5-3D  

SciTech Connect (OSTI)

A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

2002-04-01T23:59:59.000Z

168

Regulatory constraints on executive compensation  

E-Print Network [OSTI]

This paper explores the influence of economic regulation on the level and structure of executive compensation. We find substantial and persistent differences in CEO compensation between firms subject to economic regulation ...

Joskow, Paul L.

1993-01-01T23:59:59.000Z

169

Executive Summary By Blake Johnson  

E-Print Network [OSTI]

Executive Summary By Blake Johnson Creating Business Value with Analytics and Big Data A one and Teradata Corporation, and was led by Blake Johnson, consulting professor in the Department of Management

Straight, Aaron

170

Extension Program Council's Executive Board.  

E-Print Network [OSTI]

~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate...

Marshall, Mary G.; Richardson, Burl B.

1986-01-01T23:59:59.000Z

171

GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries  

SciTech Connect (OSTI)

GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

Shalf, John; Goodale, Tom

2004-02-01T23:59:59.000Z

172

Caltech campus executive LDRD.  

SciTech Connect (OSTI)

The environment most brain systems of humans and other animals are almost constantly confronted with is complex and continuously changing, with each time step updating a potentially bewildering set of opportunities and demands for action. Far from the controlled, discrete trials used in most neuro- and psychological investigations, behavior outside the lab at Caltech is a seamless and continuous process of monitoring (and error correction) of ongoing action, and of evaluating persistence in the current activity with respect to opportunities to switch tasks as alternatives become available. Prior work on frontopolar and prefrontal task switching, use tasks within the same modality (View a stream of symbols on a screen and perform certain response mappings depending on task rules). However, in thesetask switches' the effector is constant: only the mapping of visual symbols to the specific button changes. In this task, the subjects are choosing what kinds of future action decisions they want to perform, where they can control either which body part will act, or which direction they will orient an instructed body action. An effector choice task presents a single target and the subject selects which effector to use to reach the target (eye or hand). While the techniques available for humans can be less spatially resolved compared to non-human primate neural data, they do allow for experimentation on multiple brain areas with relative ease. Thus, we address a broader network of areas involved in motor decisions. We aim to resolve a current dispute regarding the specific functional roles of brain areas that are often co-activated in studies of decision tasks, dorsal premotor cortex(PMd) and posterior parietal cortex(PPC). In one model, the PPC distinctly drives intentions for action selection, whereas PMd stimulation results in complex multi-joint movements without any awareness of, nor subjective feeling of, willing the elicited movement, thus seems to merely help execute the chosen action.

Shepodd, Timothy J.; Knudsen, Tamara

2013-01-01T23:59:59.000Z

173

ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES  

E-Print Network [OSTI]

ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES This article has CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES Dustin Lang1,2,7 , David W. Hogg3,4 , Keir Mierle1,5 , Michael Blanton3 , and Sam Roweis1,5,6 1 Department of Computer Science, University of Toronto, 6 King's College

Masci, Frank

174

High Performance “Reach” Codes  

E-Print Network [OSTI]

Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

Edelson, J.

2011-01-01T23:59:59.000Z

175

Quantum Szilard engines with arbitrary spin  

E-Print Network [OSTI]

The quantum Szilard engine (QSZE) is a conceptual quantum engine for understanding the fundamental physics of quantum thermodynamics and information physics. We generalize the QSZE to an arbitrary spin case, i.e., a spin QSZE (SQSZE), and we systematically study the basic physical properties of both fermion and boson SQSZEs in a low-temperature approximation. We give the analytic formulation of the total work. For the fermion SQSZE, the work might be absorbed from the environment, and the change rate of the work with temperature exhibits periodicity and even-odd oscillation, which is a generalization of a spinless QSZE. It is interesting that the average absorbed work oscillates regularly and periodically in a large-number limit, which implies that the average absorbed work in a fermion SQSZE is neither an intensive quantity nor an extensive quantity. The phase diagrams of both fermion and boson SQSZEs give the SQSZE doing positive or negative work in the parameter space of the temperature and the particle number of the system, but they have different behaviors because the spin degrees of the fermion and the boson play different roles in their configuration states and corresponding statistical properties. The critical temperature of phase transition depends sensitively on the particle number. By using Landauer's erasure principle, we give the erasure work in a thermodynamic cycle, and we define an efficiency (we refer to it as information-work efficiency) to measure the engine's ability of utilizing information to extract work. We also give the conditions under which the maximum extracted work and highest information-work efficiencies for fermion and boson SQSZEs can be achieved.

Zekun Zhuang; Shi-Dong Liang

2015-02-02T23:59:59.000Z

176

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload...  

Office of Environmental Management (EM)

The vulnerability is caused due to the sitesallmodulesdragdropgalleryupload.php script improperly validating uploaded files, which can be exploited to execute...

177

Speech coding  

SciTech Connect (OSTI)

Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.

Ravishankar, C., Hughes Network Systems, Germantown, MD

1998-05-08T23:59:59.000Z

178

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges...

179

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges...

180

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

182

Statistical Mechanical Models and Topological Color Codes  

E-Print Network [OSTI]

We find that the overlapping of a topological quantum color code state, representing a quantum memory, with a factorized state of qubits can be written as the partition function of a 3-body classical Ising model on triangular or Union Jack lattices. This mapping allows us to test that different computational capabilities of color codes correspond to qualitatively different universality classes of their associated classical spin models. By generalizing these statistical mechanical models for arbitrary inhomogeneous and complex couplings, it is possible to study a measurement-based quantum computation with a color code state and we find that their classical simulatability remains an open problem. We complement the meaurement-based computation with the construction of a cluster state that yields the topological color code and this also gives the possibility to represent statistical models with external magnetic fields.

H. Bombin; M. A. Martin-Delgado

2007-11-03T23:59:59.000Z

183

Faculty of Engineering Executive Committee  

E-Print Network [OSTI]

is in progress. #12;2 The Dean met with the ESS executive and informed then that the Faculty is open to a shared or broader use of CBY A04. Once the ESS has revised their preliminary proposal, the Faculty will undertake to be submitted this week. The Dean discussed our pilot evaluation of TAs at the academic planning committee. TA

Petriu, Emil M.

184

Project Description Executive Summary Report  

E-Print Network [OSTI]

$Total Project Cost: 1,000,000Auxillary Enterprises Balances $ 9,400,000Revenue Financing System Bonds $ 1Project Description Executive Summary Report Project Information Project Budget Project Funding 302-680 Parking Structure Phase I This project consists of a 750 space parking garage of approximately 251

O'Toole, Alice J.

185

Executive Order 1083 Attachment C  

E-Print Network [OSTI]

Rev 2/2013 Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

de Lijser, Peter

186

DISCOVER YOURS MBA FOR EXECUTIVES  

E-Print Network [OSTI]

you to earn an MBA? Where is the starting point? What is the return on investment for you and your-suite view on building a robust corporate culture, protecting ethical business foundations, and managing the organization in change ¥ Executive Forum IV--an international management off-site intensive caps the global

Richards-Kortum, Rebecca

187

Executive Summary By Blake Johnson  

E-Print Network [OSTI]

Executive Summary By Blake Johnson Creating Business Value with Enterprise Data and Analytics A one Corporation and was led by Blake Johnson, a consulting professor in the Department of Management Science the discussion of each of these topics are summarized below Framing the Day's Discussion Blake Johnson began

Straight, Aaron

188

Schwinger Mechanism for Gluon Pair Production in the Presence of Arbitrary Time Dependent Chromo-Electric Field in Arbitrary Gauge  

E-Print Network [OSTI]

We study non-perturbative gluon pair production from arbitrary time dependent chromo-electric field E^a(t) with arbitrary color index a =1,2,...8 via Schwinger mechanism in arbitrary covariant background gauge \\alpha. We show that the probability of non-perturbative gluon pair production per unit time per unit volume per unit transverse momentum \\frac{dW}{d^4xd^2p_T} is independent of gauge fixing parameter \\alpha. Hence the result obtained in the Fynman-'t Hooft gauge, \\alpha=1, is the correct gauge invariant and gauge parameter \\alpha independent result.

Gouranga C Nayak

2009-10-02T23:59:59.000Z

189

SCALING RANDOM WALKS ON ARBITRARY SETS Simon C. Harris  

E-Print Network [OSTI]

SCALING RANDOM WALKS ON ARBITRARY SETS by Simon C. Harris , Robin Sibson and David Williams School deterministic sets I. In the 1-dimensional case discussed here and in the following paper by Harris, much

Harris, Simon Colin

190

Simplification of Arbitrary Polyhedral Meshes Shaun D. Ramsey  

E-Print Network [OSTI]

email: bertram@informatik.uni-kl.de Charles Hansen University of Utah Salt Lake City, UT, USA emailSimplification of Arbitrary Polyhedral Meshes Shaun D. Ramsey University of Utah Salt Lake City, UT

Hering-Bertram, Martin

191

Northwest Energy Efficiency Taskforce Executive Committee  

E-Print Network [OSTI]

#12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

192

UCSF Sustainability Action Plan: Executive Summary  

E-Print Network [OSTI]

UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

Yamamoto, Keith

193

Skin effect with arbitrary specularity in Maxwellian plasma  

E-Print Network [OSTI]

The problem of skin effect with arbitrary specularity in maxwellian plasma with specular--diffuse boundary conditions is solved. A new analytical method is developed that makes it possible to to obtain a solution up to an arbitrary degree of accuracy. The method is based on the idea of symmetric continuation not only the electric field, but also electron distribution function. The solution is obtained in a form of von Neumann series.

Anatoly V. Latyshev; Alexander A. Yushkanov

2009-12-10T23:59:59.000Z

194

ByteCode 2011 LCT: An Open Source Concolic Testing Tool  

E-Print Network [OSTI]

recently received interest is concolic testing which combines concrete and symbolic execution. Based Concolic testing [5,11,2] is a method where a given program is executed both concretely and symbolicallyByteCode 2011 LCT: An Open Source Concolic Testing Tool for Java Programs1 Kari K¨ahk¨onen, Tuomas

Heljanko, Keijo

195

Executive Order 13423- Strengthening Federal Environmental, Energy...  

Energy Savers [EERE]

423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

196

Executive Director Carleton Sustainable Energy Research Centre  

E-Print Network [OSTI]

Executive Director Carleton Sustainable Energy Research Centre Carleton University is seeking to appoint an Executive Director to its Sustainable Energy Research Centre. This Centre is one of a series of recent Carleton initiatives in the area of sustainable energy. The Executive Director

Dawson, Jeff W.

197

Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA  

E-Print Network [OSTI]

Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA-level concrete execution for generating test cases that satisfy user-specified testing criteria. We have to testing complex safety critical software that combines unit-level symbolic execution and system

Pasareanu, Corina

198

Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations  

DOE Patents [OSTI]

Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

Gschwind, Michael K

2013-07-23T23:59:59.000Z

199

Implementation of Executive Order 13514, Federal Leadership in...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

of Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance Implementation of Executive Order 13514, Federal Leadership in...

200

Nested linear codes achieve Marton's inner bound for general broadcast channels  

E-Print Network [OSTI]

Nested linear codes achieve Marton's inner bound for general broadcast channels Arun Padakandla the point-to-point capacity of an arbitrary discrete memoryless channel. In this paper, we study nested with and without channel state information at the transmitter. Furthermore, we prove nested linear codes achieve

Pradhan, Sandeep

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Executive Secretariat | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehicles »Exchange Visitors Program Exchange Visitors Program TheExecutive

202

Automatic generation of executable communication specifications from parallel applications  

SciTech Connect (OSTI)

Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

2011-01-19T23:59:59.000Z

203

Generalized concatenated quantum codes  

E-Print Network [OSTI]

We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using ...

Grassl, Markus

204

Hypersonic Arbitrary-Body Aerodynamics (HABA) for conceptual design  

SciTech Connect (OSTI)

The Hypersonic Arbitrary-Body Aerodynamics (HABA) computer program predicts static and dynamic aerodynamic derivatives at hypersonic speeds for any vehicle geometry. It is intended to be used during conceptual design studies where fast computational speed is required. It uses the same geometry and hypersonic aerodynamic methods as the Mark IV Supersonic/Hypersonic Arbitrary-Body Program (SHABP) developed under sponsorship of the Air Force Flight Dynamics Laboratory; however, the input and output formats have been improved to make it easier to use. This program is available as part of the Department 9140 CAE software.

Salguero, D.E.

1990-03-15T23:59:59.000Z

205

Generalizing entanglement via informational invariance for arbitrary statistical theories  

E-Print Network [OSTI]

Given an arbitrary statistical theory, di?erent from quantum mechanics, how to decide which are the nonclassical correlations? We present a formal framework which allows for a definition of nonclassical correlations in such theories, alternative to the current one. This enables one to formulate extrapolations of some important quantum mechanical features via adequate extensions of reciprocal maps relating states of a system with states of its subsystems. These extended maps permit one to generalize i) separability measures to any arbitrary statistical model as well as ii) previous entanglement criteria. The standard definition of entanglement becomes just a particular case of the ensuing, more general notion.

F. Holik; C. Massri; A. Plastino

2014-06-04T23:59:59.000Z

206

Concatenated Conjugate Codes  

E-Print Network [OSTI]

A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

Mitsuru Hamada

2006-10-31T23:59:59.000Z

207

Executive Committee | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005DepartmentDecember U.S. Department of9 ExaminationExecutive Committee

208

STEP Participant Survey Executive Summary  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energy fromCommentsRevolving STATEMENT OF MELANIE KENDERDINE7 (07/03)Executive

209

ExecutiveBios2012.indd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director www.sandia.gov

210

2009 Wind Technologies Market Report: Executive Summary  

SciTech Connect (OSTI)

This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

Wiser, R.; Bolinger, M.

2010-08-01T23:59:59.000Z

211

Federal Executive Institute (FEI) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

together managers and executives from 25 to 30 Federal agencies for a unique, residential learning experience. The objective is to help agencies in the development of their career...

212

Budget Execution Funds Distribution and Control  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order describes Department of Energy systems, requirements, and assignment of responsibilities for control of the Department budget execution process. Cancels DOE O 135.1.

2006-01-09T23:59:59.000Z

213

Senior Executive Service Candidate Development Program | Department...  

Broader source: Energy.gov (indexed) [DOE]

Program Senior Executive Service Candidate Development Program The Office of Learning and Workforce Development coordinates applications for all DOE Federal Employees. Overview The...

214

Quantum Mechanics of Successive Measurements with Arbitrary Meter Coupling  

E-Print Network [OSTI]

We study successive measurements of two observables using von Neumann's measurement model. The two-pointer correlation for arbitrary coupling strength allows retrieving the initial system state. We recover Luders rule, the Wigner formula and the Kirkwood-Dirac distribution in the appropriate limits of the coupling strength.

Lars M. Johansen; Pier A. Mello

2009-01-21T23:59:59.000Z

215

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network [OSTI]

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

216

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

217

U-051: Skype Discloses IP Addresses to Remote Users | Department...  

Broader source: Energy.gov (indexed) [DOE]

available at the time of this entry. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

218

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

219

U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

220

V-216: Drupal Monster Menus Module Security Bypass and Script...  

Office of Environmental Management (EM)

Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

222

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

in Adobe Shockwave. December 21, 2012 V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities Drupal Core Multiple vulnerabilities December 20, 2012...

223

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Broader source: Energy.gov (indexed) [DOE]

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

224

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

225

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

in Adobe Shockwave. December 21, 2012 V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities Drupal Core Multiple vulnerabilities December 20, 2012...

226

U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference...  

Broader source: Energy.gov (indexed) [DOE]

system can trigger a buffer overflow or null pointer dereference in the display drivers to execute arbitrary code on the target system with elevated privileges. A null...

227

U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

web page containing an IFRAME with an overly large "height" attribute viewed using the Apple Safari browser. Successful exploitation may allow execution of arbitrary code with...

228

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

229

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

230

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

231

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

232

T-625: Opera Frameset Handling Memory Corruption Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

security and stability enhancements. Opera Download Addthis Related Articles V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-105: Google Chrome...

233

T-589: Citrix XenApp and Citrix Presentation Server Bug  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system.

234

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

An update that fixes 25 vulnerabilities is now available. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

235

U-017: HP MFP Digital Sending Software Lets Local Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

236

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

An update that fixes 25 vulnerabilities is now available. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

237

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

238

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

239

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities  

Broader source: Energy.gov [DOE]

A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

240

A multiple sphere T-matrix Fortran code for use on parallel computer clusters  

E-Print Network [OSTI]

calculate maps of the electric field both interior and exterior to the spheres. The code is written- based algorithm ­ is not in a form readily adaptable to high-performance, parallel-based computational execution of the code for large-scale ensembles on both parallel and serial machines. To meet this end we

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Modeling Correlation Noise Statistics at Decoder for Pixel Based Wyner-Ziv Video Coding *  

E-Print Network [OSTI]

, and is responsible to achieve the best rate-distortion (RD) performance, while the decoder remains a pure executer in Wyner-Ziv (WZ) video coding, a particular case of DVC. In the literature, many practical WZ coding once and decoded many times, i.e. one-to-many topologies, such as broadcasting or video-on-demand

Pereira, Fernando

242

Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for  

E-Print Network [OSTI]

Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors UPC Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya #12;Dept. d'Arquitectura de Computadors Execution Environments

Corbalan, Julita

243

Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for  

E-Print Network [OSTI]

Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya Dept. d'Arquitectura de Computadors Execution Environments for Parallel

Corbalan, Julita

244

Homological stabilizer codes  

SciTech Connect (OSTI)

In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

2013-03-15T23:59:59.000Z

245

Hans M. Amman Executive Board Utrecht University  

E-Print Network [OSTI]

Hans M. Amman Executive Board Utrecht University Current Positions 2006­present Executive Board Member (lid College van Bestuur), Utrecht University, Utrecht, the Netherlands. 2006­present Professor of Economics and Management, Utrecht School of Economics, Utrecht University, Utrecht, the Netherlands

Utrecht, Universiteit

246

IBM Global Business Services Executive Report  

E-Print Network [OSTI]

-based strategic insights for senior executives around critical public and private sector issues. This executive perspectives Creating new business models for a changing world of energy Energy and Utilities #12;IBM Institute to facilitate not only traditional energy generation and delivery, but also emerging products and services

247

Advanced Fuels Campaign Execution Plan  

SciTech Connect (OSTI)

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2011-09-01T23:59:59.000Z

248

Insertion of operation-and-indicate instructions for optimized SIMD code  

SciTech Connect (OSTI)

Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

2013-06-04T23:59:59.000Z

249

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan National Spherical Torus Experiment (NSTX) Upgrade Project Execution Plan Revision 1 October 6, 2011 Submitted by: R. Strykowsky NSTX Upgrade Project Manager _____________________________ M. Williams Associate Director, PPPL

Princeton Plasma Physics Laboratory

250

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan National Spherical Torus Experiment (NSTX) Upgrade Project Execution Plan Revision 3 October 12, 2012 Administrative Change Submitted by: ______________________________ R. Strykowsky NSTX Upgrade Project Manager Anthony Indelicato

Princeton Plasma Physics Laboratory

251

The Minimum Assumed Incentive Effect of Executive Share Options   

E-Print Network [OSTI]

In granting executive share options (ESOs), companies hand over financial assets to the executive at an opportunity cost that generally outweighs the value placed on those assets by the executive on the receiving end. This ...

Main, Brian G M; Skovoroda, Rodion; Buck, Trevor; Bruce, Alistair

2003-01-01T23:59:59.000Z

252

Analytically solvable geometric network growth model with arbitrary degree distribution  

E-Print Network [OSTI]

We construct a class of network growth models capable of producing arbitrary degree distributions. The conditions necessary for generating the desired degree distribution can be derived analytically. In this model, a network is generated as a result of local interactions among agents residing on a metric space. Specifically, we study the case of random-walking agents who form bonds when they meet at designated locations we refer to as "rendezvous points." The spatial distribution of the rendezvous points determines key characteristics of the network such as the degree distribution. For any arbitrary (monotonic) degree distribution, we are able to analytically solve for the required rendezvous point distribution. Certain features of the model including high clustering coefficients suggest that it may be a suitable candidate for modeling biological and urban networks.

Dianati, Navid

2015-01-01T23:59:59.000Z

253

Arbitrary mass Majorana neutrinos in neutrinoless double beta decay  

E-Print Network [OSTI]

We revisit the mechanism of neutrinoless double beta (NLDBD) decay mediated by the exchange with the heavy Majorana neutrino N of arbitrary mass mN, slightly mixed with the electron neutrino. By assuming the dominance of this mechanism, we update the well-known NLDBD-decay exclusion plot in the mass-mixing angle plane taking into account recent progress in the calculation of nuclear matrix elements within quasiparticle random phase approximation and improved experimental bounds on the NLDBD-decay half-life of Ge-76 and Xe-136. We also consider the known formula approximating the mN dependence of the NLDBD-decay nuclear matrix element in a simple explicit form. We analyze its accuracy and specify the corresponding parameters, allowing one to easily calculate the NLDBD-decay half-life for arbitrary mN for all the experimentally interesting isotopes without resorting to real nuclear structure calculations.

Amand Faessler; Marcela Gonzalez; Sergey Kovalenko; Fedor Simkovic

2014-08-26T23:59:59.000Z

254

PREREM: an interactive data preprocessing code for INREM II. Part I: user's manual. Part II: code structure  

SciTech Connect (OSTI)

PREREM is an interactive computer code developed as a data preprocessor for the INREM-II (Killough, Dunning, and Pleasant, 1978a) internal dose program. PREREM is intended to provide easy access to current and self-consistent nuclear decay and radionuclide-specific metabolic data sets. Provision is made for revision of metabolic data, and the code is intended for both production and research applications. Documentation for the code is in two parts. Part I is a user's manual which emphasizes interpretation of program prompts and choice of user input. Part II stresses internal structure and flow of program control and is intended to assist the researcher who wishes to revise or modify the code or add to its capabilities. PREREM is written for execution on a Digital Equipment Corporation PDP-10 System and much of the code will require revision before it can be run on other machines. The source program length is 950 lines (116 blocks) and computer core required for execution is 212 K bytes. The user must also have sufficient file space for metabolic and S-factor data sets. Further, 64 100 K byte blocks of computer storage space are required for the nuclear decay data file. Computer storage space must also be available for any output files produced during the PREREM execution. 9 refs., 8 tabs.

Ryan, M.T.; Fields, D.E.

1981-05-01T23:59:59.000Z

255

Generalized Concatenation for Quantum Codes  

E-Print Network [OSTI]

We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are ...

Grassl, Markus

256

Dynamical density functional theory for colloidal particles with arbitrary shape  

E-Print Network [OSTI]

Starting from the many-particle Smoluchowski equation, we derive dynamical density functional theory for Brownian particles with an arbitrary shape. Both passive and active (self-propelled) particles are considered. The resulting theory constitutes a microscopic framework to explore the collective dynamical behavior of biaxial particles in nonequilibrium. For spherical and uniaxial particles, earlier derived dynamical density functional theories are recovered as special cases. Our study is motivated by recent experimental progress in preparing colloidal particles with many different biaxial shapes.

Raphael Wittkowski; Hartmut Löwen

2011-06-12T23:59:59.000Z

257

Guam- Building Energy Code  

Broader source: Energy.gov [DOE]

NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by...

258

A compact, multichannel, and low noise arbitrary waveform generator  

SciTech Connect (OSTI)

A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

Govorkov, S. [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada)] [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada); Ivanov, B. I. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany) [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany); Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 (Russian Federation); Il'ichev, E.; Meyer, H.-G. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)] [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)

2014-05-15T23:59:59.000Z

259

Codeword Stabilized Quantum Codes  

E-Print Network [OSTI]

We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.

Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng

2007-09-27T23:59:59.000Z

260

Generalized Concatenated Quantum Codes  

E-Print Network [OSTI]

We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.

Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng

2009-01-09T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Encoding Subsystem Codes  

E-Print Network [OSTI]

In this paper we investigate the encoding of operator quantum error correcting codes i.e. subsystem codes. We show that encoding of subsystem codes can be reduced to encoding of a related stabilizer code making it possible to use all the known results on encoding of stabilizer codes. Along the way we also show how Clifford codes can be encoded. We also show that gauge qubits can be exploited to reduce the encoding complexity.

Pradeep Kiran Sarvepalli; Andreas Klappenecker

2008-06-30T23:59:59.000Z

262

Renewable Energy Requirement Guidance for EPAct 2005 and Executive...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies...

263

Richard Lazarus Named as Executive Director of National Commission...  

Office of Environmental Management (EM)

Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National Commission on the BP...

264

New Executive Order Establishes a Federal Flood Risk Management...  

Energy Savers [EERE]

New Executive Order Establishes a Federal Flood Risk Management Standard New Executive Order Establishes a Federal Flood Risk Management Standard February 5, 2015 - 10:55am Addthis...

265

PIA - Savannah River Operations Office Executive Commitment Action...  

Energy Savers [EERE]

Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations...

266

American Indian Policy and Relevant DOE and Executive Orders...  

Energy Savers [EERE]

Services Communication & Engagement Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive...

267

President Issues Executive Order Aimed at Preparing for the Impacts...  

Broader source: Energy.gov (indexed) [DOE]

President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for...

268

Eastern Wind Integration and Transmission Study: Executive Summary...  

Office of Environmental Management (EM)

Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview This...

269

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental...  

Office of Environmental Management (EM)

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy...

270

SPACE UTILIZATION STUDY -EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES  

E-Print Network [OSTI]

SPACE UTILIZATION STUDY - EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES UNIVERSITY School of Medicine & Health Sciences - Space Utilization Study Grand Forks, ND EXECUTIVE SUMMARY SUITAb utilities. · Lackofnaturallight

Delene, David J.

271

FY 2006 Executive Order 13101 Report: Department of Energy Affirmative...  

Broader source: Energy.gov (indexed) [DOE]

6 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 31207 FY 2006 Executive Order 13101 Report: Department of...

272

On optimal constacyclic codes  

E-Print Network [OSTI]

In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.

Giuliano G. La Guardia

2013-11-11T23:59:59.000Z

273

Project Execution Plan, Rev. 3  

SciTech Connect (OSTI)

This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

IT Corporation, Las Vegas

2002-08-01T23:59:59.000Z

274

Arbitrary Nesting of Spatial Computations Antoine Spicher, Olivier Michel, Jean-Louis Giavitto  

E-Print Network [OSTI]

Arbitrary Nesting of Spatial Computations Antoine Spicher, Olivier Michel, Jean-Louis Giavitto LACL-louis.giavitto@ircam.fr Abstract--Modern programming languages allow the definition and the use of arbitrary nested data structures but this is not generally considered in unconventional programming models. In this paper, we present arbitrary nesting

Paris-Sud XI, Université de

275

Stateless and stateful implementations of faithful execution  

DOE Patents [OSTI]

A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

2014-12-16T23:59:59.000Z

276

Account Executive Account Manager of Sales  

E-Print Network [OSTI]

Engineer Naval Surface Ship Warfare Officer Network Administrator Networking/Engineering Level II NetworkAccount Executive Account Manager of Sales Administrative Assistant Advanced Systems Engineer Engineer Assistant Administrator Assistant Analyst Assistant Development Engineer Assistant Director

277

Microsoft Word - CTF Executive Summary 001.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Test Loop Pre-Conceptual Design Executive Summary December 2008 BEA Contract No. 000 75310 Disclaimer This report was prepared as an account of work sponsored by an agency of the...

278

Consistent interaction vertices in arbitrary topological BF theories  

SciTech Connect (OSTI)

Here we extend the previous results from [12] to the computation of all consistent self-interactions for topological BF theories with maximal field spectra in D =5,6,7,8 and present some partial results on possible generalizations on a space-time of arbitrary dimension D. For convenience, the deformation of the solution to the master equation in the context of the BRST-antifield formalism is used as a general method of constructing consistent interacting gauge field theories together with most of the standard hypotheses on quantum field theories on Minkowski space-times.

Bizdadea, C.; Cioroianu, E. M.; Saliu, S. O.; Sararu, S. C.; Stanciu-Oprean, L. [Department of Physics, University of Craiova, 13 Al. I. Cuza Street, Craiova 200585 (Romania)

2013-11-13T23:59:59.000Z

279

Quantum teleportation of an arbitrary superposition of atomic Dicke states  

E-Print Network [OSTI]

, USA 2Departments of Chemistry and Aerospace & Mechanical Engineering, Princeton University, New Jersey 08544, USA sReceived 20 December 2004; revised manuscript received 18 February 2005; published 9 June 2005d We propose a scheme for teleporting... insetd. States uccl and ubbl represent both atoms in the same state, and subcl+ ucbld /?2 is a state with one atom in state ubl and one in state ucl. The coeffi- cients C0 I , C1 I , and C2I are arbitrary and satisfy uC0I u2+ uC1I u2 + uC 2I u2...

Di, TG; Muthukrishnan, A.; Scully, Marlan O.; Zubairy, M. Suhail

2005-01-01T23:59:59.000Z

280

Towards radio astronomical imaging using an arbitrary basis  

E-Print Network [OSTI]

The new generation of radio telescopes, such as the Square Kilometer Array (SKA), requires dramatic advances in computer hardware and software, in order to process the large amounts of produced data efficiently. In this document, we explore a new approach to wide-field imaging. By generalizing the image reconstruction, which is performed by an inverse Fourier transform, to arbitrary transformations, we gain enormous new possibilities. In particular, we outline an approach that might allow to obtain a sky image of size P times Q in (optimal) O(PQ) time. This could be a step in the direction of real-time, wide-field sky imaging for future telescopes.

Petschow, Matthias

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Quantum lithography with classical light: Generation of arbitrary patterns  

E-Print Network [OSTI]

Quantum lithography with classical light: Generation of arbitrary patterns Qingqing Sun,1,2 Philip R. Hemmer,3 and M. Suhail Zubairy1,2 1Department of Physics and Institute of Quantum Studies, Texas A&M University, College Station, Texas 77843..., Phys. Rev. Lett. 85, 2733 #1;2000#2;. #3;7#4; S. Kawata, H.-B. Sun, T. Tanaka, and K. Takada, Nature #1;Lon- don#2; 412, 697 #1;2001#2;. #3;8#4; M. D?Angelo, M. V. Chekhova, and Y. Shih, Phys. Rev. Lett. 87, 013602 #1;2001#2;. #3;9#4; A. Pe?er, B...

Sun, Qingqing; Hemmer, Philip R.; Zubairy, M. Suhail

2007-01-01T23:59:59.000Z

282

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

#12;#12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan ii Table of Contents 1 ..............................................................................................................................1 1.2.1 DOE-approved project documents

Princeton Plasma Physics Laboratory

283

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

#12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record/schedule baseline updates #12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan ii ..............................................................................................................................1 1.2.1 DOE-approved project documents

Princeton Plasma Physics Laboratory

284

Generalized Concatenation for Quantum Codes  

E-Print Network [OSTI]

We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.

Markus Grassl; Peter W. Shor; Bei Zeng

2009-05-04T23:59:59.000Z

285

Graph concatenation for quantum codes  

E-Print Network [OSTI]

Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code and every codeword stabilized code can be described by a graph and a classical code. For the ...

Beigi, Salman

286

CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES  

E-Print Network [OSTI]

CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES John M. Shea, Florida Abstract--Turbo-codes provide communications near capac- ity when very large interleavers (and parity-check code can be used as an outer code with a turbo code as an inner code in a serial

Wong, Tan F.

287

Joint Source-Channel Coding via Turbo Codes  

E-Print Network [OSTI]

Joint Source-Channel Coding via Turbo Codes by Guang-Chong Zhu A dissertation submitted coding. One of the most exciting break- throughs in channel coding is the invention of Turbo codes, whose- tigate three joint source-channel coding issues in the context of Turbo codes. In the #12;rst part

Alajaji, Fady

288

The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report  

SciTech Connect (OSTI)

This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

Not Available

2006-09-01T23:59:59.000Z

289

Unfolding the color code  

E-Print Network [OSTI]

The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.

Aleksander Kubica; Beni Yoshida; Fernando Pastawski

2015-03-06T23:59:59.000Z

290

Building Energy Code  

Broader source: Energy.gov [DOE]

Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

291

Building Energy Code  

Broader source: Energy.gov [DOE]

''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

292

Model Building Energy Code  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

293

Compiling Codes on Euclid  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High...

294

Building Energy Code  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

295

Multiple phase estimation for arbitrary pure states under white noise  

E-Print Network [OSTI]

In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

2014-09-08T23:59:59.000Z

296

Falcon: automated optimization method for arbitrary assessment criteria  

DOE Patents [OSTI]

FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.

Yang, Tser-Yuan (Livermore, CA); Moses, Edward I. (Livermore, CA); Hartmann-Siantar, Christine (Livermore, CA)

2001-01-01T23:59:59.000Z

297

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents [OSTI]

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

Grossman, M.W.; George, W.A.

1986-12-16T23:59:59.000Z

298

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents [OSTI]

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

Grossman, Mark W. (Belmont, MA); George, William A. (Rockport, MA)

1986-01-01T23:59:59.000Z

299

Arbitrary two-qubit computation in 23 elementary gates  

SciTech Connect (OSTI)

We address the problem of constructing quantum circuits to implement an arbitrary two-qubit quantum computation. We pursue circuits without ancilla qubits and as small a number of elementary quantum gates as possible. Our lower bound for worst-case optimal two-qubit circuits calls for at least 17 gates: 15 one-qubit rotations and 2 controlled-NOT (CNOT) gates. We also constructively prove a worst-case upper bound of 23 elementary gates, of which at most four (CNOT gates) entail multiqubit interactions. Our analysis shows that synthesis algorithms suggested in previous work, although more general, entail larger quantum circuits than ours in the special case of two qubits. One such algorithm has a worst case of 61 gates, of which 18 may be CNOT gates.

Bullock, Stephen S.; Markov, Igor L. [Department of Mathematics, The University of Michigan, Ann Arbor, Michigan 48109-2122, USA (United States); Mathematical and Computational Sciences Division, National Institute of Standards and Technology, Gaithersburg, Maryland 20899-8910, USA (United States); Department of Electrical Engineering and Computer Science, The University of Michigan, 1301 Beal Avenue-EECS, Ann Arbor, Michigan 48109-2122, USA (United States)

2003-07-01T23:59:59.000Z

300

Homological Product Codes  

E-Print Network [OSTI]

Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their simple syndrome readout circuits and potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor distance scaling limited by the square-root of the code length. This is in a sharp contrast with the classical case where good families of LDPC codes are known that combine constant encoding rate and linear distance. Here we propose the first family of good quantum codes with low-weight stabilizers. The new codes have a constant encoding rate, linear distance, and stabilizers acting on at most $\\sqrt{n}$ qubits, where $n$ is the code length. For comparison, all previously known families of good quantum codes have stabilizers of linear weight. Our proof combines two techniques: randomized constructions of good quantum codes and the homological product operation from algebraic topology. We conjecture that similar methods can produce good stabilizer codes with stabilizer weight $n^a$ for any $a>0$. Finally, we apply the homological product to construct new small codes with low-weight stabilizers.

Sergey Bravyi; Matthew B. Hastings

2013-11-04T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Sustainable Acquisition Coding System | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents &...

302

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & SolarDepartmentArbitrary Code

303

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO *Arbitrary Code

304

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code |

305

Understanding Perception Through Neural 'Codes'  

E-Print Network [OSTI]

Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “

Freeman, Walter J III

2011-01-01T23:59:59.000Z

306

arbitrary grey-level optical: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Pijush K. Ghosh 1996-07-02 71 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

307

arbitrary sub-diffraction-limit pattern: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 243 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

308

adaptive arbitrary lagrangian-eulerian: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 282 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

309

arbitrary particle-channel interaction: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Washington at Seattle, University of 315 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

310

E-Print Network 3.0 - arbitrary input distributions Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

results for: arbitrary input distributions Page: << < 1 2 3 4 5 > >> 1 Generalized MercuryWaterfilling for Multiple-Input Multiple-Output Channels Summary: -interacting...

311

E-Print Network 3.0 - arbitrary waveform generation Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

arbitrary waveform synthesizer with output voltage three times higher... of 4096 Josephson junctions. With this circuit it is now possible to synthesize ... Source: Benz,...

312

Shortened Turbo Codes  

E-Print Network [OSTI]

Simple arguments suggest that shortened codes must have distance properties equal to or better than those of their parent codes, and that they should be equally practical to decode. This relationship holds true in the case of low density generator codes and low density parity check codes. We investigate the properties of shortened turbo codes. I. Motivation for Shortening In our previous work on codes based on very sparse matrices we have observed that while codes with a low density generator matrix [1] are asymptotically bad, codes with a low density parity check matrix [2] are asymptotically good [3, 4, 5]. One way of viewing the relationship between low density generator matrix codes and low density parity check matrix codes is that one obtains a low density parity check matrix by taking the M \\Theta N parity check matrix [P IM ] of a (N; K) low density generator matrix code and chopping off its right-most M columns (where M = N \\Gamma K), to yield an M \\Theta K matrix [P], which...

David J.C. MacKay

313

Code Red 2 kills off Code Red 1  

E-Print Network [OSTI]

#12;#12;Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks #12;Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back, still

Paxson, Vern

314

Scott Shreeve, MD Chief Executive Officer  

E-Print Network [OSTI]

is currently serving as chief executive office of Crossover Health, a next generation health care delivery, state wide health systems, and networks of primary care clinics. Dr. Shreeve is also founding member of the Health 2.0 technology and reform movement, serving as an advisor to the conference and spokesperson

Rose, Michael R.

315

A Market Feasibility Study Executive Summary  

E-Print Network [OSTI]

popular areblack,green,andoolongteas.Lesswellknowntypesincludewhiteand Puer tea. There is a high levelA Market Feasibility Study Executive Summary Hawai`i-Grown Tea Pacific Asian Center for Entrepreneurship #12;Overview This report is a feasibility study for developing tea into a viable and sustainable

316

Executive Education Program Freight Transportation and  

E-Print Network [OSTI]

Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

Bustamante, Fabián E.

317

February 1, 2006 Emmett Brown, Executive Director  

E-Print Network [OSTI]

February 1, 2006 Emmett Brown, Executive Director National Fresh Water Fishing Hall of Fame P deduce the length of the fish by assuming a height of the angler of 72" and using direct scaling. Even between the distance of the camera to the angler and to the fish. Discounting that distance leads

Arnold, Douglas N.

318

NSTX Upgrade Project Project Execution Plan  

E-Print Network [OSTI]

NSTX Upgrade Project Project Execution Plan 6 PPPL Laboratory Director S.Prager Deputy Director.Gentile Centerstack Dsgn & Fab J. Chrzanowski NSTX Upgrade Project Manager R. Strykowsky Deputy and Construction Manager E. Perry Project Controls S. Langish NSTXCenterstack Manager L. Dudek NSTXNeutral Beam Manager T

Princeton Plasma Physics Laboratory

319

NSTX Upgrade Project Project Execution Plan  

E-Print Network [OSTI]

NSTX Upgrade Project Project Execution Plan Appendix 1 - WBS Dictionary 25 Appendix 1 - NSTX Upgrade Project Work Breakdown Structure This Work Breakdown Structure (WBS) organizes and defines the scope of the NSTX Upgrade using the WBS as established by the original NSTX project and modified

Princeton Plasma Physics Laboratory

320

Executive Vice President La-Verna Fountain  

E-Print Network [OSTI]

construction contracts went to MWL firms. During the past three fiscal years (2006-2008), Columbia contractedJoe Ienuso Executive Vice President La-Verna Fountain Associate Vice President Construction insurance and retirement benefits. Construction Jobs Referral Process As a service to those interested

Kim, Philip

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Academic Integrity Task Force Report Executive Summary  

E-Print Network [OSTI]

. For a more comprehensive report of the findings as well as faculty suggestions for maintaining integrity1 Academic Integrity Task Force Report Executive Summary 11/22/11 INTRODUCTION CHARGE: To determine whether there is an issue with academic integrity at UF and, if so, to determine how widespread

Roy, Subrata

322

Hawaii energy strategy: Executive summary, October 1995  

SciTech Connect (OSTI)

This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

NONE

1995-10-01T23:59:59.000Z

323

Curtin University Organisational Chart * Executive Managers  

E-Print Network [OSTI]

Curtin University Organisational Chart * Executive Managers ** Seconded to CEC (Singapore Campus Mr Wing Chung Director Internal Audit * Professor David Wood Acting Deputy Vice-Chancellor Academic Sustainable Development Inst Mr TimothyWalton Director Energy Research Initiatives Mr Paul Nicholls Director

324

TABLE OF CONTENTS 3 Executive Summary  

E-Print Network [OSTI]

. JISAO's four major research themes, Fisheries Recruitment (Marine Ecosystems), Climate, Environmental Ecosystems 34 Climate 60 Environmental Chemistry 70 Coastal Oceanography 75 Appendices 75 Appendix 1 Senior;3 EXECUTIVE SUMMARY The Joint Institute for the Study of the Atmosphere and Ocean (JISAO) fosters

Rigor, Ignatius G.

325

How to Apply for Senior Executive positions  

Broader source: Energy.gov [DOE]

To apply vacancies for SENIOR EXECUTIVE SERVICE (SES) , SENIOR LEVEL (SL), SCIENTIFIC AND PROFESSIONAL (ST) positions within the Department of Energy please visit OPM's website: http://www.usajobs.gov. From this site, you may download announcements for vacancies of interest to you.

326

Darden Executive Education Management Development Program  

E-Print Network [OSTI]

, or will soon undergo, the transition from a functional to a general management role. They may alsoDarden Executive Education Management Development Program: Driving Vision, Action, and Results ... Change the Way You Think! #12;The Program Organizations globally need to prepare middle management

Acton, Scott

327

A HIFI AND FLORIDA COOS EXECUTIVE SUMMARY  

E-Print Network [OSTI]

12.02.2006 1 A HIFI AND FLORIDA COOS EXECUTIVE SUMMARY A GULF OF MEXICO AND OCS ENERGY DISCUSSION) AND THE FLORIDA COASTAL OCEAN OBSERVING SYSTEMS (FLORIDA COOS) AS AN IOOS INITIATIVE · The Gulf of Mexico Energy necessary to protect and sustain the Gulf of Mexico's natural resources. · Failing to share qualified OCS

328

EXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS  

E-Print Network [OSTI]

, and implementation of the program. a. Multiple new programs were enhanced and added to make New Student OrientationEXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS 2012-2013 Overview The Office of New Student and Owl Family Programs plays an integral role within the University by offering a supportive, innovative

Fernandez, Eduardo

329

Extractive Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM  

E-Print Network [OSTI]

Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM Vale Columbia Center UNIVERSITY Center on Globalization and Sustainable Development EARTH INSTITUTE | COLUMBIA UNIVERSITY #12; Extractive Industries and Sustainable Development Executive Training

330

Executive Summaries for the Hydrogen Storage Materials Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Executive Summaries for the Hydrogen Storage Materials Center of Excellence - Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Executive Summaries for...

331

Executive Function and Pediatric Overweight: A Problem-Solving Framework  

E-Print Network [OSTI]

. The present study examines potential relations between aspects of executive function and pediatric weight status as well as obesity-prone eating behaviors. Executive function is operationally defined as a problem-solving construct with four steps that work...

Johnson, Audrea

2012-10-19T23:59:59.000Z

332

A Hybrid Procedural Deductive Executive For Autonomous Spacecraft  

E-Print Network [OSTI]

autonomy, including robust plan execution Pell et al. 1997b. Since aborting a plan and taking time to re of robust plans, which incorpo- rate exibility to be used by the execution system in case problems

Williams, Brian C.

333

A Principal Components Analysis of Executive Processes: Exploring the Structure of Executive Functions using Neuropsychological Tests   

E-Print Network [OSTI]

”, “Dual-Tasking” and “Planning”) and their relationship to “Intelligence”. The separability of these executive functions was explored. Ten neuropsychological tests were administered to young and healthy participants (N =103). Correlations between tests...

Maner, Safir

2011-11-23T23:59:59.000Z

334

GPU-optimized Code for Long-term Simulations of Beam-beam Effects in Colliders  

SciTech Connect (OSTI)

We report on the development of the new code for long-term simulation of beam-beam effects in particle colliders. The underlying physical model relies on a matrix-based arbitrary-order symplectic particle tracking for beam transport and the Bassetti-Erskine approximation for beam-beam interaction. The computations are accelerated through a parallel implementation on a hybrid GPU/CPU platform. With the new code, a previously computationally prohibitive long-term simulations become tractable. We use the new code to model the proposed medium-energy electron-ion collider (MEIC) at Jefferson Lab.

Roblin, Yves [JLAB; Morozov, Vasiliy [JLAB; Terzic, Balsa [JLAB; Aturban, Mohamed A. [Old Dominion University; Ranjan, D. [Old Dominion University; Zubair, Mohammed [Old Dominion University

2013-06-01T23:59:59.000Z

335

U-100: Google Chrome Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

336

The Implementation of a Hybrid-Execute-In-Place Architecture to Reduce the Embedded System Memory Footprint and Minimize Boot Time  

E-Print Network [OSTI]

Footprint and Minimize Boot Time Tony Benavides, Justin Treon, Jared Hulbert, and Willie Chang1 Flash Memory effectiveness and performance. The ability for an operating system to boot quickly combined with speedy-system where the code gets copied to RAM at boot time and executes out of the RAM. This paper explores

Chang, Weide

337

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

#12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record 10/12/2012 Update to WBS Level 2 Threshold (top of page 20), Change DOE Federal Project Director and Deputy Federal Project Director. Various OBS changes. #12;NSTX Upgrade Project Execution Plan NSTX

Princeton Plasma Physics Laboratory

338

Contracts for Model Execution Verification Eric Cariou1  

E-Print Network [OSTI]

Contracts for Model Execution Verification Eric Cariou1 , Cyril Ballagny2 , Alexandre Feugas3 a contract-based approach to specify an execution semantics for a meta-model. We show that an execution model transformation contracts for controlling the dynamic con- sistent evolution of a model during its

Paris-Sud XI, Université de

339

ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES  

SciTech Connect (OSTI)

We have built a reliable and robust system that takes as input an astronomical image, and returns as output the pointing, scale, and orientation of that image (the astrometric calibration or World Coordinate System information). The system requires no first guess, and works with the information in the image pixels alone; that is, the problem is a generalization of the 'lost in space' problem in which nothing-not even the image scale-is known. After robust source detection is performed in the input image, asterisms (sets of four or five stars) are geometrically hashed and compared to pre-indexed hashes to generate hypotheses about the astrometric calibration. A hypothesis is only accepted as true if it passes a Bayesian decision theory test against a null hypothesis. With indices built from the USNO-B catalog and designed for uniformity of coverage and redundancy, the success rate is >99.9% for contemporary near-ultraviolet and visual imaging survey data, with no false positives. The failure rate is consistent with the incompleteness of the USNO-B catalog; augmentation with indices built from the Two Micron All Sky Survey catalog brings the completeness to 100% with no false positives. We are using this system to generate consistent and standards-compliant meta-data for digital and digitized imaging from plate repositories, automated observatories, individual scientific investigators, and hobbyists. This is the first step in a program of making it possible to trust calibration meta-data for astronomical data of arbitrary provenance.

Lang, Dustin; Mierle, Keir; Roweis, Sam [Department of Computer Science, University of Toronto, 6 King's College Road, Toronto, Ontario M5S 3G4 (Canada); Hogg, David W.; Blanton, Michael [Center for Cosmology and Particle Physics, Department of Physics, New York University, 4 Washington Place, New York, NY 10003 (United States)], E-mail: dstn@astro.princeton.edu

2010-05-15T23:59:59.000Z

340

Arbitrary spin conformal fields in (A)dS  

E-Print Network [OSTI]

Totally symmetric arbitrary spin conformal fields in (A)dS space of even dimension greater than or equal to four are studied. Ordinary-derivative and gauge invariant Lagrangian formulation for such fields is obtained. Gauge symmetries are realized by using auxiliary fields and Stueckelberg fields. We demonstrate that Lagrangian of conformal field is decomposed into a sum of gauge invariant Lagrangians for massless, partial-massless, and massive fields. We obtain a mass spectrum of the partial-massless and massive fields and confirm the conjecture about the mass spectrum made in the earlier literature. In contrast to conformal fields in flat space, the kinetic terms of conformal fields in (A)dS space turn out to be diagonal with respect to fields entering the Lagrangian. Explicit form of conformal transformation which maps conformal field in flat space to conformal field in (A)dS space is obtained. Covariant Lorentz-like and de-Donder like gauge conditions leading to simple gauge-fixed Lagrangian of conformal fields are proposed. Using such gauge-fixed Lagrangian, which is invariant under global BRST transformations, we explain how the partition function of conformal field is obtained in the framework of our approach.

R. R. Metsaev

2014-07-02T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Optimal control theory with arbitrary superpositions of waveforms  

E-Print Network [OSTI]

Standard optimal control methods perform optimization in the time domain. However, many experimental settings demand the expression of the control signal as a superposition of given waveforms, a case that cannot easily be accommodated using time-local constraints. Previous approaches [1,2] have circumvented this difficulty by performing optimization in a parameter space, using the chain rule to make a connection to the time domain. In this paper, we present an extension to Optimal Control Theory which allows gradient-based optimization for superpositions of arbitrary waveforms directly in a time-domain subspace. Its key is the use of the Moore-Penrose pseudoinverse as an efficient means of transforming between a time-local and waveform-based descriptions. To illustrate this optimization technique, we study the parametrically driven harmonic oscillator as model system and reduce its energy, considering both Hamiltonian dynamics and stochastic dynamics under the influence of a thermal reservoir. We demonstrate the viability and efficiency of the method for these test cases and find significant advantages in the case of waveforms which do not form an orthogonal basis.

Selina Meister; Jürgen T. Stockburger; Rebecca Schmidt; Joachim Ankerhold

2014-11-20T23:59:59.000Z

342

Mechanical code comparator  

DOE Patents [OSTI]

A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

2002-01-01T23:59:59.000Z

343

A Global View Programming Abstraction for Transitioning MPI Codes to PGAS Languages  

SciTech Connect (OSTI)

The multicore generation of scientific high performance computing has provided a platform for the realization of Exascale computing, and has also underscored the need for new paradigms in coding parallel applications. The current standard for writing parallel applications requires programmers to use languages designed for sequential execution. These languages have abstractions that only allow programmers to operate on the process centric local view of data. To provide suitable languages for parallel execution, many research efforts have designed languages based on the Partitioned Global Address Space (PGAS) programming model. Chapel is one of the more recent languages to be developed using this model. Chapel supports multithreaded execution with high-level abstractions for parallelism. With Chapel in mind, we have developed a set of directives that serve as intermediate expressions for transitioning scientific applications from languages designed for sequential execution to PGAS languages like Chapel that are being developed with parallelism in mind.

Mintz, Tiffany M [ORNL] [ORNL; Hernandez, Oscar R [ORNL] [ORNL; Bernholdt, David E [ORNL] [ORNL

2014-01-01T23:59:59.000Z

344

Green's Conjecture for curves on arbitrary K3 Marian Aprodu and Gavril Farkas  

E-Print Network [OSTI]

Green's Conjecture for curves on arbitrary K3 surfaces Marian Aprodu and Gavril Farkas Abstract Green's Conjecture predicts than one can read off special linear series on an algebraic curve-Ramanan, provides a complete solution to Green's Conjecture for smooth curves on arbitrary K3 surfaces. 1

Farkas, Gavril

345

Optical Arbitrary Waveform Generation Based Optical-Label Switching Transmitter with  

E-Print Network [OSTI]

Optical Arbitrary Waveform Generation Based Optical-Label Switching Transmitter with All-Optical, 95616 Email: sbyoo@ucdavis.edu Abstract: This paper introduces a modulation-format transparent optical-label switching transmitter based on optical arbitrary waveform generation. Packets consisting of 100 Gb

Kolner, Brian H.

346

Electric field in hard superconductors with arbitrary cross section and general critical current law  

E-Print Network [OSTI]

Electric field in hard superconductors with arbitrary cross section and general critical current-28871 Alcala´ de Henares, Spain Received 18 February 2004; accepted 11 March 2004 The induced electric field E x during magnetic flux entry in superconductors with arbitrary cross section and general

Majós, Antonio Badía

347

Nonlinear dynamics of magnetohydrodynamic flows of heavy fluid over an arbitrary surface  

E-Print Network [OSTI]

equations system for heavy fluid over an arbitrary surface in shallow water approximation is studied to the study of nonlinear flows of heavy fluid described by the shallow water magnetohydrodynamic equations1 Nonlinear dynamics of magnetohydrodynamic flows of heavy fluid over an arbitrary surface

348

Closed Form of the Biphoton K-Vector Spectrum for Arbitrary Spatio-Temporal Pump Modes  

E-Print Network [OSTI]

A closed form solution is derived for the biphoton k-vector spectrum for an arbitrary pump spatial mode. The resulting mode coefficients for the pump input that maximize the probability of biphoton detection in the far field are found. It is thus possible to include the effect of arbitrary crystal poling strucures, and optimize the resulting biphoton flux.

Jeffrey Perkins

2011-09-02T23:59:59.000Z

349

MULTICHANNEL BLIND DECONVOLUTION OF ARBITRARY SIGNALS: ADAPTIVE ALGORITHMS AND STABILITY ANALYSIES  

E-Print Network [OSTI]

MULTICHANNEL BLIND DECONVOLUTION OF ARBITRARY SIGNALS: ADAPTIVE ALGORITHMS AND STABILITY ANALYSIES for the multichannel blind deconvolution of arbitrary non-Gaussian source mixtures. Two of the algorithms are spa- tia-temporal extensions of recently-derived blind signal separation algorithms that combine kurta- sis-based contrast

Douglas, Scott C.

350

Difficulties in vector-parallel processing of Monte Carlo codes  

SciTech Connect (OSTI)

Experiences with vectorization of production-level Monte Carlo codes such as KENO-IV, MCNP, VIM, and MORSE have shown that it is difficult to attain high speedup ratios on vector processors because of indirect addressing, nests of conditional branches, short vector length, cache misses, and operations for realization of robustness and generality. A previous work has already shown that the first, second, and third difficulties can be resolved by using special computer hardware for vector processing of Monte Carlo codes. Here, the fourth and fifth difficulties are discussed in detail using the results for a vectorized version of the MORSE code. As for the fourth difficulty, it is shown that the cache miss-hit ratio affects execution times of the vectorized Monte Carlo codes and the ratio strongly depends on the number of the particles simultaneously tracked. As for the fifth difficulty, it is shown that remarkable speedup ratios are obtained by removing operations that are not essential to the specific problem being solved. These experiences have shown that if a production-level Monte Carlo code system had a capability to selectively construct source coding that complements the input data, then the resulting code could achieve much higher performance.

Higuchi, Kenji; Asai, Kiyoshi [Japan Atomic Energy Research Inst., Tokyo (Japan). Center for Promotion of Computational Science and Engineering; Hasegawa, Yukihiro [Research Organization for Information Science and Technology, Tokai, Ibaraki (Japan)

1997-09-01T23:59:59.000Z

351

Stimulation at Desert Peak -modeling with the coupled THM code FEHM  

SciTech Connect (OSTI)

Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

kelkar, sharad

2013-04-30T23:59:59.000Z

352

Stimulation at Desert Peak -modeling with the coupled THM code FEHM  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

kelkar, sharad

353

Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner  

E-Print Network [OSTI]

Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner Finance (FO-P's). Implementation of the Index has greatly decreased data entry coding ­ Account (object) - Program (FOAP) code numbers on any of your accounting forms (Contracts, Purchase Orders

354

Graph Concatenation for Quantum Codes  

E-Print Network [OSTI]

Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code, and every codeword stabilized code can be described by a graph and a classical code. For the construction of good quantum codes of relatively large block length, concatenated quantum codes and their generalizations play an important role. We develop a systematic method for constructing concatenated quantum codes based on "graph concatenation", where graphs representing the inner and outer codes are concatenated via a simple graph operation called "generalized local complementation." Our method applies to both binary and non-binary concatenated quantum codes as well as their generalizations.

Salman Beigi; Isaac Chuang; Markus Grassl; Peter Shor; Bei Zeng

2010-02-03T23:59:59.000Z

355

Quantum gravitational corrections to propagator in arbitrary spacetimes  

E-Print Network [OSTI]

The action for a relativistic free particle of mass m receives a contribution $-m R(x,y)$ from a path of length R(x,y) connecting the events $x^i$ and $y^i$. Using this action in a path integral, one can obtain the Feynman propagator for a spinless particle of mass m in any background spacetime. If one of the effects of quantizing gravity is to introduce a minimum length scale $L_P$ in the spacetime, then one would expect the segments of paths with lengths less than $L_P$ to be suppressed in the path integral. Assuming that the path integral amplitude is invariant under the `duality' transformation ${\\cal R}\\to L_P^2/R$, one can calculate the modified Feynman propagator in an arbitrary background spacetime. It turns out that the key feature of this modification is the following: The proper distance $(\\Delta x)^2$ between two events, which are infinitesimally separated, is replaced by $\\Delta x^2 + L_P^2$; that is the spacetime behaves as though it has a `zero-point length' of $L_P$. This equivalence suggests a deep relationship between introducing a `zero-point-length' to the spacetime and postulating invariance of path integral amplitudes under duality transformations. In the Schwinger's proper time description of the propagator, the weightage for a path with proper time s becomes $m(s+L_P^2/s)$ rather than as ms. As to be expected, the ultraviolet behavior of the theory is improved significantly and divergences will disappear if this modification is taken into account. Implications of this result are discussed.

T. Padmanabhan

1997-03-18T23:59:59.000Z

356

TESLA Technical Design Report Executive Summary  

E-Print Network [OSTI]

TESLA Technical Design Report PART I Executive Summary March 2001 Editors: F.Richard, J.R.Schneider, D.Trines, A.Wagner #12;#12;Dedicated to the memory of Bjørn H. Wiik (1937-1999) #12;#12;TESLA ­ A Summary This report describes the scientific aims and potential as well as the technical de- sign of TESLA

357

Budget Formulation & Execution | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orA BRIEFAprilBudget Formulation & Execution Budget

358

Budget Formulation and Execution | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orA BRIEFAprilBudget Formulation & Execution

359

Reed-Muller Codes: Spherically-Punctured Codes and Decoding Algorithms  

E-Print Network [OSTI]

Linear codes . . . . . . . . . . . . . . . . . . . . . . .3.3 Code parameters . . . . . . . . . . . . . .of linear codes . . . . . . . . . . . . 1.5 Reed-Muller

Kapralova, Olga

2013-01-01T23:59:59.000Z

360

Universal space-time codes from demultiplexed trellis codes  

E-Print Network [OSTI]

and A. R. Calderbank, “Space-time codes for high data ratePerformance criteria and code construction,” IEEE Trans.of space–time trellis codes,” IEEE Trans. Commun. , vol. 51,

Kose, Cenk; Wesel, R D

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Relation Between Surface Codes and Hypermap-Homology Quantum Codes  

E-Print Network [OSTI]

Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.

Pradeep Sarvepalli

2014-03-14T23:59:59.000Z

362

Report number codes  

SciTech Connect (OSTI)

This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

Nelson, R.N. (ed.)

1985-05-01T23:59:59.000Z

363

Runtime Detection of C-Style Errors in UPC Code  

SciTech Connect (OSTI)

Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

2011-09-29T23:59:59.000Z

364

A three-dimensional fast solver for arbitrary vorton distributions  

SciTech Connect (OSTI)

A method which is capable of an efficient calculation of the three-dimensional flow field produced by a large system of vortons (discretized regions of vorticity) is presented in this report. The system of vortons can, in turn, be used to model body surfaces, container boundaries, free-surfaces, plumes, jets, and wakes in unsteady three-dimensional flow fields. This method takes advantage of multipole and local series expansions which enables one to make calculations for interactions between groups of vortons which are in well-separated spatial domains rather than having to consider interactions between every pair of vortons. In this work, series expansions for the vector potential of the vorton system are obtained. From such expansions, the three components of velocity can be obtained explicitly. A Fortran computer code FAST3D has been written to calculate the vector potential and the velocity components at selected points in the flow field. In this code, the evaluation points do not have to coincide with the location of the vortons themselves. Test cases have been run to benchmark the truncation errors and CPU time savings associated with the method. Non-dimensional truncation errors for the magnitudes of the vector potential and velocity fields are on the order of 10{sup {minus}4}and 10{sup {minus}3} respectively. Single precision accuracy produces errors in these quantities of up to 10{sup {minus}5}. For less than 1,000 to 2,000 vortons in the field, there is virtually no CPU time savings with the fast solver. For 100,000 vortons in the flow, the fast solver obtains solutions in 1 % to 10% of the time required for the direct solution technique depending upon the configuration.

Strickland, J.H.; Baty, R.S.

1994-05-01T23:59:59.000Z

365

Quantum convolutional stabilizer codes  

E-Print Network [OSTI]

constructions of good quantum error-correcting codes were given by Steane [2] and Calderbank and Shor [3]. These codes protect the quantum information using additional qubits and make it possible to reverse the e®ects of the most likely errors. 10 Encouraged... is that accurate computation does not require perfect physical devices. B. Background The ¯rst quantum error correcting codes were discovered independently by Shor [1] and Steane [2], as mentioned in the previous section. Shor proved that 9 qubits could be used...

Chinthamani, Neelima

2004-09-30T23:59:59.000Z

366

Unequal Error Protection Turbo Codes  

E-Print Network [OSTI]

Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure

Henkel, Werner

367

Rateless Codes for AVC Models  

E-Print Network [OSTI]

2004. [7] M. Luby, “LT codes,” in Proc. 43rd Ann. IEEE Symp.8] A. Shokrollahi, “Fountain codes,” in Proc. 41st AllertonChannel capacities for list codes,” J. Appl. Probabil. ,

Sarwate, A D; Gastpar, M

2010-01-01T23:59:59.000Z

368

Climate Code Foundation  

E-Print Network [OSTI]

Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

Barnes, Nick; Jones, David

2011-07-05T23:59:59.000Z

369

No Code: Null Programs  

E-Print Network [OSTI]

To continue the productive discussion of uninscribed artworks in Craig Dworkin’s No Medium, this report discusses, in detail, those computer programs that have no code, and are thus empty or null. Several specific examples ...

Montfort, Nick

2014-06-05T23:59:59.000Z

370

Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes  

E-Print Network [OSTI]

The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.

Dave Bacon; Andrea Casaccino

2006-10-17T23:59:59.000Z

371

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...  

Office of Environmental Management (EM)

have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM:...

372

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|| Department of

373

E-Print Network 3.0 - arbitrary microvascular geometries Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on the cell free layer and Summary: -759. Udaykumar, H.S., Kan, H.C., Shyy, W., Tran-Son-Tay, R., 1997. Multiphase dynamics in arbitrary geometries... and cow- orkers (Pozrikidis,...

374

E-Print Network 3.0 - arbitrary spins non-linearly Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences 86 Origin and Control of Spin Currents in a Magnetic Triplet Josephson Junction Philip M. R. BRYDON Summary: a spin-filter for arbitrary . As displayed in Fig....

375

E-Print Network 3.0 - arbitrary-profile slow-wave structure Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1607-7962graEGU2007-A-00262 Summary: to examine flows with arbitrary profiles of zonal wind and vertical stratification. We apply the techniques... structure. What is the role...

376

Executive Positions | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director Rich

377

Executive Order 13007 Indian Sacred Sites (1996)  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResources DOEElectricalonJusticeEnergy Efficiency|Friday,Executive|6771 Federal

378

Quantum error control codes  

E-Print Network [OSTI]

QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Abdelhamid Awad Aly Ahmed, Sala

2008-10-10T23:59:59.000Z

379

Runtime optimization of an application executing on a parallel computer  

DOE Patents [OSTI]

Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

Faraj, Daniel A; Smith, Brian E

2014-11-25T23:59:59.000Z

380

Runtime optimization of an application executing on a parallel computer  

DOE Patents [OSTI]

Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

Faraj, Daniel A.; Smith, Brian E.

2013-01-29T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Runtime optimization of an application executing on a parallel computer  

DOE Patents [OSTI]

Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

Faraj, Daniel A; Smith, Brian E

2014-11-18T23:59:59.000Z

382

CIP/multi-moment finite volume method with arbitrary order of accuracy  

E-Print Network [OSTI]

This paper presents a general formulation of the CIP/multi-moment finite volume method (CIP/MM FVM) for arbitrary order of accuracy. Reconstruction up to arbitrary order can be built on single cell by adding extra derivative moments at the cell boundary. The volume integrated average (VIA) is updated via a flux-form finite volume formulation, whereas the point-based derivative moments are computed as local derivative Riemann problems by either direct interpolation or approximate Riemann solvers.

Xiao, Feng

2012-01-01T23:59:59.000Z

383

A New Project Execution Methodology; Integrating Project Management Principles with Quality Project Execution Methodologies  

E-Print Network [OSTI]

On an annual basis, there are numerous reports in regards to a particular company or function’s inability to execute on a large number of projects. The reasons vary widely from a lack of an initial understanding of what the customer was really...

Schriner, Jesse J.

2008-07-25T23:59:59.000Z

384

Optimal Execution Under Jump Models For Uncertain Price Impact  

E-Print Network [OSTI]

May 12, 2011 ... Indeed price impact of large trades have been considered as one of the ... Investment performance is substantially related to the execution cost ...

2012-08-13T23:59:59.000Z

385

NREL: News - NREL Announces Participants in National Executive...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NREL Announces Participants in National Executive Education Program May 12, 2014 The Energy Department's National Renewable Energy Laboratory (NREL) has selected 17 leaders to...

386

assessment program executive: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

387

Optimal Execution Under Jump Models For Uncertain Price Impact  

E-Print Network [OSTI]

Aug 13, 2012 ... A major source of the execution cost comes from price impacts of both the investor's own trades and other concurrent institutional trades.

Somayeh Moazeni

2012-08-13T23:59:59.000Z

388

The Health Benefits of Tackling Climate Change: An Executive...  

Open Energy Info (EERE)

Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Health Benefits of Tackling Climate...

389

DOE executes a diverse portfolio of capital asset projects supporting...  

Broader source: Energy.gov (indexed) [DOE]

impacting the project must be endorsed by the project's Acquisition Executive per DOE Order 413.3B (the Order). Selecting an appropriate acquisition strategy, establishing a...

390

Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary  

SciTech Connect (OSTI)

This executive summary provides an overview of an NREL assessment to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region around Greensburg, Kansas.

Haase, S.

2009-11-01T23:59:59.000Z

391

CINTRAFOR's Executive Board: Peter Anderson, President, Anderson & Anderson Architecture  

E-Print Network [OSTI]

CINTRAFOR's Executive Board: Peter Anderson, President, Anderson & Anderson Architecture Paul Resources and Envir. Tom Ossinger, President, Bottomline Construction Consultants. Mark Calhoon, Program

392

Engaging Non-IT Executives in IT Infrastructure Decisions  

E-Print Network [OSTI]

This case study describes how information technology (IT) managers from Insurance Co. successfully engaged non-IT executives in IT infrastructure investment decisions. This

Fonstad, Nils O.

2008-07-01T23:59:59.000Z

393

Nested Quantum Error Correction Codes  

E-Print Network [OSTI]

The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

2009-09-28T23:59:59.000Z

394

Code: A Lightweight and Flexible Mobile Code Toolkit  

E-Print Network [OSTI]

evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of client­server and mobile code in reducing the network traffic generated by management. The theoretical¯Code: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e

Picco, Gian Pietro

395

Trusted Computing Technologies, Intel Trusted Execution Technology.  

SciTech Connect (OSTI)

We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

Guise, Max Joseph; Wendt, Jeremy Daniel

2011-01-01T23:59:59.000Z

396

U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code | Department of

397

A Fault-Oblivious Extreme-Scale Execution Environment (FOX)  

SciTech Connect (OSTI)

IBM Research’s contribution to the Fault Oblivious Extreme-scale Execution Environment (FOX) revolved around three core research deliverables: ? collaboration with Boston University around the Kittyhawk cloud infrastructure which both enabled a development and deployment platform for the project team and provided a fault-injection testbed to evaluate prototypes ? operating systems research focused on exploring role-based operating system technologies through collaboration with Sandia National Labs on the NIX research operating system and collaboration with the broader IBM Research community around a hybrid operating system model which became known as FusedOS ? IBM Research also participated in an advisory capacity with the Boston University SESA project, the core of which was derived from the K42 operating system research project funded in part by DARPA’s HPCS program. Both of these contributions were built on a foundation of previous operating systems research funding by the Department of Energy’s FastOS Program. Through the course of the X-stack funding we were able to develop prototypes, deploy them on production clusters at scale, and make them available to other researchers. As newer hardware, in the form of BlueGene/Q, came online, we were able to port the prototypes to the new hardware and release the source code for the resulting prototypes as open source to the community. In addition to the open source coded for the Kittyhawk and NIX prototypes, we were able to bring the BlueGene/Q Linux patches up to a more recent kernel and contribute them for inclusion by the broader Linux community. The lasting impact of the IBM Research work on FOX can be seen in its effect on the shift of IBM’s approach to HPC operating systems from Linux and Compute Node Kernels to role-based approaches as prototyped by the NIX and FusedOS work. This impact can be seen beyond IBM in follow-on ideas being incorporated into the proposals for the Exasacale Operating Systems/Runtime program.

Van Hensbergen, Eric; Speight, William; Xenidis, Jimi

2013-03-15T23:59:59.000Z

398

MHD Generation Code  

E-Print Network [OSTI]

A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

Frutos-Alfaro, Francisco

2015-01-01T23:59:59.000Z

399

Extended quantum color coding  

SciTech Connect (OSTI)

The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only {approx}2{radical}(N) quantum colors to order N objects in large N limit, whereas {approx}N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix.

Hayashi, A.; Hashimoto, T.; Horibe, M. [Department of Applied Physics, Fukui University, Fukui 910-8507 (Japan)

2005-01-01T23:59:59.000Z

400

Coding for Cooperative Communications  

E-Print Network [OSTI]

develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c... modulation. The CF strategy is implemented with low-density parity-check (LDPC) and irregular repeat- accumulate codes and is found to operate within 0.34 dB of the theoretical limit. For the quasi-static fading relay channel, we assume that no channel...

Uppal, Momin Ayub

2011-10-21T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Coccinelle 1D: A one-dimensional neutron kinetic code using time-step size control  

SciTech Connect (OSTI)

COCCINELLE 1D is a one-dimensional neutron kinetic code that has been adapted from Electricite de France (EDF)`s core design code : COCCINELLE. The aim of this work is to integrate a code, derived from COCCINELLE and therefore taking advantage of most of its developments, into EDF`s Pressurized Water Reactors (PWR) simulation tools. The neutronic model of COCCINELLE ID has been optimized so that the code executes as rapidly as possible. In particular, a fast and stable kinetic method has been implemented: the Generalized Runge-Kutta (GRK) method together with its associated time-step size control. Moreover, efforts have been made to structure the code such that it could be easily integrated into any PWR simulation tool. Results show that the code executes at a rate faster than real-time on several test cases, and that, once integrated in a PWR simulation tool, the system is in good agreement with an experimental transient, that is a 3-hour load follow transient.

Engrand, P.R.; Effantin, M.E.; Gherchanoc, J. [Electricite de France, Clamart (France); Larive, B. [Electricite de France, Villeurbanne (France)

1995-12-31T23:59:59.000Z

402

11/24/13 Committee Reports Executive Report  

E-Print Network [OSTI]

Trexler `14 Executive Committee 1. General Assembly Feedback 2. PostThanksgiving Executive Committee, indeed, create that kind of statement. Presumably, WesDivest will be directing their energies towards to President Roth for residential campus innovations. Many of the proposals discussed on Thursday concerned

Royer, Dana

403

Project Execution Plan Electron Beam Ion Source Project  

E-Print Network [OSTI]

Project Execution Plan for the Electron Beam Ion Source Project (EBIS) Project # 07-SC-02 at Brookhaven National Laboratory Upton, NY For the U.S. Department of Energy Office of Science Office of Nuclear Physics (SC ­ 26) Rev. 1 May 2008 #12;#12;#12;4 Project Execution Plan for the Electron Beam Ion

404

Execution-Less Performance Modeling Roman Iakymchuk and Paolo Bientinesi  

E-Print Network [OSTI]

Execution-Less Performance Modeling Roman Iakymchuk and Paolo Bientinesi AICES, RWTH Aachen occurring in higher- level algorithms--like a matrix factorization--is then pre- dicted by combining a priori; the prediction of performance therefore reduces to the pre- diction of Execution time. Our

405

Developing and Executing Goal-Based, Adjustably Autonomous Procedures  

E-Print Network [OSTI]

Developing and Executing Goal-Based, Adjustably Autonomous Procedures David Kortenkamp, R. Peter@jsc.nasa.gov This paper describes an approach to representing, authoring and executing procedures during human spaceflight missions. The approach allows for the explicit incorporation of goals into procedures. The approach also

Kortenkamp, David

406

Software Pipelined Execution of Stream Programs on GPUs  

E-Print Network [OSTI]

Software Pipelined Execution of Stream Programs on GPUs Abhishek Udupa, R. Govindarajan, Matthew J task, data and pipeline parallelism which can be exploited on modern Graphics Processing Units (GPUsIt to GPUs and propose an efficient technique to software pipeline the execution of stream programs on GPUs

Plotkin, Joshua B.

407

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris  

E-Print Network [OSTI]

for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects computing architecture, Cerium, that uses a se- cure processor to protect a program's execution, so. Instead, Cerium tells a user what pro- gram executed and what hardware and software envir- onment

408

Executive Budget Support Team Office of the President  

E-Print Network [OSTI]

Executive Budget Support Team Office of the President Provost / Executive Vice President Institute Budget Planning & Admin. Jim Kirk Asst Budget Director Vacant Sr. Budget Analyst Ebony Thompson Budget Development & Capital Budgets Director Lisa Godfrey Systems Support Engr II Vacant Sr. Budget

Jacobs, Laurence J.

409

NARSTO Quality Planning and Data Management Handbooks Executive Summary  

E-Print Network [OSTI]

'existingqualityassuranceprograms. The first of the three documents, the NARSTO Quality Systems Management Plan (QSMP), is the umbrella underNARSTO Quality Planning and Data Management Handbooks Executive Summary This brief Executive, and guidance documents for quality planning and data management. NARSTO is a non-binding, tri-national public

410

Robert D. Kimble Deputy Program Executive Officer for Strike  

E-Print Network [OSTI]

and Deputy Program Manager for Production and Quality. From January 2000 to February 2001, Mr. Kimble of Maryland. He graduated from the Defense Systems Management College and the Senior Executive ManagementRobert D. Kimble Deputy Program Executive Officer for Strike Weapons, PEO(U&W) Naval Air Systems

411

The Woodland Carbon Code  

E-Print Network [OSTI]

The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

412

Course Code: Course Title  

E-Print Network [OSTI]

- Frameworks; Decision Making Development life-cycle of a software system Bi-directional influence between-Critical Systems; Technology & Society. Brave New Worlds - Co-operative Computing; eLife. Learning OutcomesCourse Code: F29PD Course Title: Professional Development Course Co-ordinator: Sandy Jean

Painter, Kevin

413

Hydrogen Production CODES & STANDARDS  

E-Print Network [OSTI]

Hydrogen Production DELIVERY FUEL CELLS STORAGE PRODUCTION TECHNOLOGY VALIDATION CODES & STANDARDS for 2010 · Reduce the cost of distributed production of hydrogen from natural gas and/or liquid fuels to $1 SYSTEMS INTEGRATION / ANALYSES SAFETY EDUCATION RESEARCH & DEVELOPMENT Economy Pete Devlin #12;Hydrogen

414

Minor Codes Accounting 1100  

E-Print Network [OSTI]

Minor Codes Accounting 1100 Adult/Extension Education 1220 Aerospace Studies 1225 Agricultural Business Management 1250 Agricultural Mechanization and Business 1600 American Sign Language Studies 5650 and Policy 3790 Equine Business 4690 Film Studies 7756 Financial Management 3900 Food Science 4100 Forest

Bolding, M. Chad

415

All solutions of arbitrary first order autonomous partial differential equations in any dimensions  

E-Print Network [OSTI]

All solutions of $F(u,\\ u_t,\\ u_{x_1},\\ \\ldots,\\ u_{x_n})=0$ with arbitrary function $F$ can be completely determined by its symmetries $\\sigma=G(\\tau_1,\\ \\ldots,\\ \\tau_n)u_t$, where $G$ is an arbitrary function of $\\tau_i\\equiv u_{x_i}/u_t$, if one can find a special non-degenerate solution $u_s$ such that $\\{\\tau_{s,i}\\equiv u_{s,x_i}/u_{s,t},\\ i=1,\\ 2,\\ \\ldots\\ n\\}$ are functional independent. Especially, the Lax pair, recursion operator and infinitely many high order symmetries are also explicitly given for arbitrary (1+1)-dimensional first order autonomous partial differential equations.

Sen-Yue Lou; Ruo-Xia Yao

2014-06-06T23:59:59.000Z

416

Erasure Techniques in MRD codes  

E-Print Network [OSTI]

This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

2012-05-03T23:59:59.000Z

417

20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview...  

Broader source: Energy.gov (indexed) [DOE]

1: Executive Summary and Overview Summary Slides 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview Summary Slides Summary and overview slides for 20% Wind Energy...

418

REDUCED-COMPLEXITY DECODING FOR CONCATENATED CODES BASED ON RECTANGULAR PARITY-CHECK CODES AND TURBO CODES  

E-Print Network [OSTI]

AND TURBO CODES John M. Shea and Tan F. Wong University of Florida Department of Electrical and Computer-check code (RPCC) with a turbo code. These concatenated codes are referred to as RPCC+turbo codes. RPCC+turbo codes have been shown to significantly outperform turbo codes in several scenarios [1],[2]. One

Wong, Tan F.

419

Arbitrary amplitude double layers in warm dust kinetic Alfven wave plasmas  

SciTech Connect (OSTI)

Large amplitude electrostatic structures associated with low-frequency dust kinetic Alfvenic waves are investigated under the pressure (temperature) gradient indicative of dust dynamics. The set of equations governing the dust dynamics, Boltzmann electrons, ions and Maxwell's equation have been reduced to a single equation known as the Sagdeev potential equation. Parameter ranges for the existence of arbitrary amplitude double layers are observed. Exact analytical expressions for the energy integral is obtained and computed numerically through which sub-Alfvenic arbitrary amplitude rarefactive double layers are found to exist.

Gogoi, Runmoni; Devi, Nirupama [Department of Mathematics, Cotton College, Guwahati-781001, Assam (India)

2008-07-15T23:59:59.000Z

420

Optimized Generation of Data-Path from C Codes for FPGAs  

E-Print Network [OSTI]

FPGAs, as computing devices, offer significant speedup over microprocessors. Furthermore, their configurability offers an advantage over traditional ASICs. However, they do not yet enjoy high-level language programmability, as microprocessors do. This has become the main obstacle for their wider acceptance by application designers. ROCCC is a compiler designed to generate circuits from C source code to execute on FPGAs, more specifically on CSoCs. It generates RTL level HDLs from frequently executing kernels in an application. In this paper, we describe ROCCC's system overview and focus on its data path generation. We compare the performance of ROCCC-generated VHDL code with that of Xilinx IPs. The synthesis result shows that ROCCC-generated circuit takes around 2x ~ 3x area and runs at comparable clock rate.

Guo, Zhi; Najjar, Walid; Vissers, Kees

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Adaptive code generators for tree coding of speech  

E-Print Network [OSTI]

Tree coding is a promising way of obtaining good performance for medium-to-low rate speech coding. The key part of a tree coder is the code generator which consists of a short-term predictor and a long-term predictor. The best predictor designed...

Dong, Hui

1998-01-01T23:59:59.000Z

422

Nevada Energy Code for Buildings  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

423

Matlab-Kinect Interface Code  

E-Print Network [OSTI]

This .zip file contains code and installation instructions for acquiring 3d arm movements in Matlab using the Microsoft Kinect 3d camera. The provided code has been validated in 32-bit and 64-bit Matlab with 32-bit and ...

Kowalski, Kevin

2012-06-01T23:59:59.000Z

424

City of Austin- Zoning Code  

Broader source: Energy.gov [DOE]

The Zoning Code (Chapter 25-2) of the Austin City Code provides a height limitation exemption for solar installations. Solar installations may exceed the zoning district height limit by 15% or the...

425

Code of Practice Research Degrees  

E-Print Network [OSTI]

........................................................................ 15 Section Ten: FacilitiesCode of Practice For Research Degrees 2014/15 #12;2 Contents Section One: Preface ­ the purpose of the Code........................................................ 3 Section Two: Context

Evans, Paul

426

MELCOR computer code manuals  

SciTech Connect (OSTI)

MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

1995-03-01T23:59:59.000Z

427

What's coming in 2012 codes  

E-Print Network [OSTI]

Administration Why Building Energy Codes Matter Why Building Energy Codes Matter ? Buildings account for 70% of electricity use ? Buildings account for 38% of CO2 emissions (Source: US Green Building Council) Residential Progress Commercial Progress... ? Southeast Energy Efficiency Alliance ? Southwest Energy Efficiency Project Why Building Energy Codes Matter Why Building Energy Codes Matter ? Share of Energy Consumed by Major Sectors of the Economy (2010) Source: U.S. Energy Information...

Lacey, E

2011-01-01T23:59:59.000Z

428

Energy Codes and Standards: Facilities  

SciTech Connect (OSTI)

Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

2007-01-01T23:59:59.000Z

429

Design of proximity detecting codes  

E-Print Network [OSTI]

class of codes called Proximity Detecting Codes can be used to overcome this problem associated with asynchronous channels. A t-proximity detecting (t-PD) code can detect when a received word is within distance t from the transmitted codeword, when using...

Perisetty, Srinivas

1997-01-01T23:59:59.000Z

430

Code for Hydrogen Hydrogen Pipeline  

E-Print Network [OSTI]

#12;2 Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop Augusta, Georgia August development · Charge from BPTCS to B31 Standards Committee for Hydrogen Piping/Pipeline code development · B31.12 Status & Structure · Hydrogen Pipeline issues · Research Needs · Where Do We Go From Here? #12;4 Code

431

PERFORMANCE EVALUATION OF TURBO CODES  

E-Print Network [OSTI]

PERFORMANCE EVALUATION OF TURBO CODES by Guangchong Zhu A project submitted to the Department named ``Turbo codes'' which claims an extraordinary performance with reasonable decoding complexity. In this project, we begin with a study on the structure and principle of Turbo codes. We then investigate

Alajaji, Fady

432

Travel Codes Traveler Is Employee  

E-Print Network [OSTI]

Travel Codes Traveler Is Employee: 64100-Domestic Travel 64150-Mileage 64200-International Travel Supplies & Expense Codes 71410-Office Supplies 71430-Lab/Research Supplies (dollar value of each item less Charges Equipment Codes 84320-Equipment (non-computer & peripherals) with a cost of $5,000.00 or more per

Arnold, Jonathan

433

Surface code quantum communication  

E-Print Network [OSTI]

Quantum communication typically involves a linear chain of repeater stations, each capable of reliable local quantum computation and connected to their nearest neighbors by unreliable communication links. The communication rate in existing protocols is low as two-way classical communication is used. We show that, if Bell pairs are generated between neighboring stations with a probability of heralded success greater than 0.65 and fidelity greater than 0.96, two-way classical communication can be entirely avoided and quantum information can be sent over arbitrary distances with arbitrarily low error at a rate limited only by the local gate speed. The number of qubits per repeater scales logarithmically with the communication distance. If the probability of heralded success is less than 0.65 and Bell pairs between neighboring stations with fidelity no less than 0.92 are generated only every T_B seconds, the logarithmic resource scaling remains and the communication rate through N links is proportional to 1/(T_B log^2 N).

Austin G. Fowler; David S. Wang; Charles D. Hill; Thaddeus D. Ladd; Rodney Van Meter; Lloyd C. L. Hollenberg

2010-02-05T23:59:59.000Z

434

BINGO: A code for the efficient computation of the scalar bi-spectrum  

E-Print Network [OSTI]

We present a new and accurate Fortran code, the BI-spectra and Non-Gaussianity Operator (BINGO), for the efficient numerical computation of the scalar bi-spectrum and the non-Gaussianity parameter f_{NL} in single field inflationary models involving the canonical scalar field. The code can calculate all the different contributions to the bi-spectrum and the parameter f_{NL} for an arbitrary triangular configuration of the wavevectors. Focusing firstly on the equilateral limit, we illustrate the accuracy of BINGO by comparing the results from the code with the spectral dependence of the bi-spectrum expected in power law inflation. Then, considering an arbitrary triangular configuration, we contrast the numerical results with the analytical expression available in the slow roll limit, for, say, the case of the conventional quadratic potential. Considering a non-trivial scenario involving deviations from slow roll, we compare the results from the code with the analytical results that have recently been obtained in the case of the Starobinsky model in the equilateral limit. As an immediate application, we utilize BINGO to examine of the power of the non-Gaussianity parameter f_{NL} to discriminate between various inflationary models that admit departures from slow roll and lead to similar features in the scalar power spectrum. We close with a summary and discussion on the implications of the results we obtain.

Dhiraj Kumar Hazra; L. Sriramkumar; Jerome Martin

2013-05-18T23:59:59.000Z

435

Development of integrated core disruptive accident analysis code for FBR - ASTERIA-FBR  

SciTech Connect (OSTI)

The evaluation of consequence at the severe accident is the most important as a safety licensing issue for the reactor core of liquid metal cooled fast breeder reactor (LMFBR), since the LMFBR core is not in an optimum condition from the viewpoint of reactivity. This characteristics might induce a super-prompt criticality due to the core geometry change during the core disruptive accident (CDA). The previous CDA analysis codes have been modeled in plural phases dependent on the mechanism driving a super-prompt criticality. Then, the following event is calculated by connecting different codes. This scheme, however, should introduce uncertainty and/or arbitrary to calculation results. To resolve the issues and obtain the consistent calculation results without arbitrary, JNES is developing the ASTERIA-FBR code for the purpose of providing the cross-check analysis code, which is another required scheme to confirm the validity of the evaluation results prepared by applicants, in the safety licensing procedure of the planned high performance core of Monju. ASTERIA-FBR consists of the three major calculation modules, CONCORD, dynamic-GMVP, and FEMAXI-FBR. CONCORD is a three-dimensional thermal-hydraulics calculation module with multi-phase, multi-component, and multi-velocity field model. Dynamic-GMVP is a space-time neutronics calculation module. FEMAXI-FBR calculates the fuel pellet deformation behavior and fuel pin failure behavior. This paper describes the needs of ASTERIA-FBR development, major module outlines, and the model validation status. (authors)

Ishizu, T.; Endo, H.; Tatewaki, I.; Yamamoto, T. [Japan Nuclear Energy Safety Organization JNES, Toranomon Towers Office, 4-1-28, Toranomon, Minato-ku, Tokyo (Japan); Shirakawa, N. [Inst. of Applied Energy IAE, Shimbashi SY Bldg., 14-2 Nishi-Shimbashi 1-Chome, Minato-ku, Tokyo (Japan)

2012-07-01T23:59:59.000Z

436

Southeast Energy Efficiency Alliance's Building Energy Codes...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

437

2013 Reporting Unit Codes | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2013 Reporting Unit Codes 2013 Reporting Unit Codes CFC Reporting Unit Codes 2013.pdf More Documents & Publications EA-0372: Final Environmental Assessment Alignment: Achieving...

438

Random Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and  

E-Print Network [OSTI]

Random Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and David Williams School be a countably infinite set of points in R, and suppose that I has no points of accumulation and that its convex hull is the whole of R. It will be convenient to index I as {ui : i Z}, with ui

Harris, Simon Colin

439

Mass and spin content of a free relativistic particle of arbitrary spins and the group  

E-Print Network [OSTI]

of particles with several spins and masses which can exist in positive as well as negative energy states Postal 20-364, 01000 Mexico D. F., Mexico 2 Instituto de Ciencias Nucleares, UNAM, Apdo. Postal 70 approach to the free parti- cle of arbitrary spins whose relativistic equation can be obtained from

Nikitin, Anatoly

440

Fast Detection and Processing of Arbitrary Contrast Agent Injections in Coronary  

E-Print Network [OSTI]

: condura@isip.uni-luebeck.de Abstract. Percutaneous transluminal coronary angioplasty (PTCA) re- quires pre-interventional and inter- ventional X-ray images. In the pre-interventional coronary angiogramsFast Detection and Processing of Arbitrary Contrast Agent Injections in Coronary Angiography

Lübeck, Universität zu

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

A Closed-Form Solution to the Arbitrary Order Cauchy Problem with Propagators  

E-Print Network [OSTI]

The general abstract arbitrary order (N) Cauchy problem was solved in a closed form as a sum of exponential propagator functions. The infinite sparse exponential series was solved with the aid of a homogeneous differential equation. It generated a linear combination of exponential functions. The Cauchy problem solution was formed with N linear combinations of N exponential propagators.

Henrik Stenlund

2014-11-24T23:59:59.000Z

442

Reversing the weak measurement of an arbitrary field with finite photon number  

E-Print Network [OSTI]

For an arbitrary field with finite photon number inside a leaky cavity, we show that the null-result measurement can be conditionally reversed, using either multiple atoms or a multilevel atom. Even with photons detected, a certain class of fields...

Sun, Qingqing; Al-Amri, M.; Zubairy, M. Suhail.

2009-01-01T23:59:59.000Z

443

SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies  

E-Print Network [OSTI]

SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies Jayaram Mudigonda switches, which could obviate the commodity pricing of these parts. In this paper, we describe SPAIN ("Smart Path Assign- ment In Networks"). SPAIN provides multipath forward- ing using inexpensive

444

Fast and accurate direct MDCT to DFT conversion with arbitrary window functions  

E-Print Network [OSTI]

1 Fast and accurate direct MDCT to DFT conversion with arbitrary window functions Shuhua Zhang* and Laurent Girin Abstract--In this paper, we propose a method for direct con- version of MDCT coefficients of the MDCT-to- DFT conversion matrices into a Toeplitz part plus a Hankel part. The latter is split

Paris-Sud XI, Université de

445

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with  

E-Print Network [OSTI]

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with Small@uwplatt.edu Abstract We consider a model of algorithmic self-assembly of geometric shapes out of square Wang tiles Biomolecular computation, RNAse enzyme self-assembly, algorithmic self-assembly, Komogorov complexity Digital

Paris-Sud XI, Université de

446

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with  

E-Print Network [OSTI]

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with Small@uwplatt.edu This research was supported in part by NSF grant CDI-0941538 Abstract We consider a model of algorithmic self-assembly Biomolecular computation, RNAse enzyme self-assembly, algorithmic self-assembly, Komogorov complexity Digital

Demaine, Erik

447

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues  

E-Print Network [OSTI]

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues Erik D. Demaine Martin L We introduce staged self-assembly of Wang tiles, where tiles can be added dynamically in sequence- neering. Staging allows us to break through the traditional lower bounds in tile self-assembly by encoding

Demaine, Erik

448

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues  

E-Print Network [OSTI]

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues Erik D. Demaine Martin L We introduce staged self-assembly of Wang tiles, where tiles can be added dynamically in sequence-based bioengineering. Staging allows us to break through the traditional lower bounds in tile self-assembly by encoding

Demaine, Erik

449

Spectroscopic Raman Nanometrology of Graphene and Graphene Multilayers on Arbitrary Substrates  

E-Print Network [OSTI]

Spectroscopic Raman Nanometrology of Graphene and Graphene Multilayers on Arbitrary Substrates I to be an effective tool for characterization of graphene and graphene multilayers on the standard Si/SiO2 (300 nm) substrates, which allows one to determine non-destructively the number of the graphene layers and assess

450

Single crystal growth and heteroepitaxy of polyacene thin films on arbitrary substrates  

E-Print Network [OSTI]

in a number of low-cost, large area electronic applications such as flat panel displays. Organic thin film as other substrates.6-12 Recently, significant progress has been made towards fabricating high quality is to prepare single crystal films on arbitrary substrates. Here we describe two significant advances towards

Headrick, Randall L.

451

Trigger-Wave Propagation in Arbitrary Metrics in Asynchronous Cellular Logic Arrays  

E-Print Network [OSTI]

Trigger-Wave Propagation in Arbitrary Metrics in Asynchronous Cellular Logic Arrays Przemyslaw image processing tasks using trigger-wave propagation in a medium with a hardware-controlled metric. The principles of wave propagation in cellular four-connected logic arrays emulating different distance measure

Dudek, Piotr

452

Multiuser Mercury/waterfilling for Downlink OFDM with Arbitrary Signal Constellations  

E-Print Network [OSTI]

Multiuser Mercury/waterfilling for Downlink OFDM with Arbitrary Signal Constellations Angel Lozano tracked by the base station, adopts the form of a multiuser mercury/waterfilling procedure that generalizes the single-user mercury/waterfilling introduced in [1]. I. INTRODUCTION There is, of late, great

Lozano, Angel

453

The Arbitrariness of the Sign: Learning Advantages From the Structure of the Vocabulary  

E-Print Network [OSTI]

the simulations and the behavioral studies, we found that the optimal structure of the vocabulary for learningThe Arbitrariness of the Sign: Learning Advantages From the Structure of the Vocabulary Padraic and their meanings can facilitate language learning (e.g., in the form of sound symbolism or cues to grammatical

454

Conditional generation of arbitrary multimode entangled states of light with linear optics  

E-Print Network [OSTI]

We propose a universal scheme for the probabilistic generation of an arbitrary multimode entangled state of light with finite expansion in Fock basis. The suggested setup involves passive linear optics, single photon sources, strong coherent laser beams, and photodetectors with single-photon resolution. The efficiency of this setup may be greatly enhanced if, in addition, a quantum memory is available.

J. Fiurasek; S. Massar; N. J. Cerf

2003-04-01T23:59:59.000Z

455

Factorization of Darboux transformations of arbitrary order for 2D Schroedinger operators  

E-Print Network [OSTI]

We give a proof of Darboux's conjecture that every Darboux transformation of arbitrary order of a 2D Schroedinger type operator can be factorized into Darboux transformations of order one. The proof is constructive. The result was achieved in the framework of an algebraic approach to Darboux transformations which is put forward in this paper.

Ekaterina Shemyakova

2014-02-24T23:59:59.000Z

456

Comment on the shape of Hydrogen equation in spaces of arbitrary dimension  

E-Print Network [OSTI]

We note that presenting Hydrogen atom Schrodinger equation in the case of arbitrary dimensions require simultaneous modification of the Coulomb potential that only in three dimensions has the form Z/r . This was not done in a number of relatively recent papers [1-5]. Therefore some results obtained there seem to be doubtful. Some required considerations in the area are mentioned.

M. Ya. Amusia

2015-02-20T23:59:59.000Z

457

Minkovskii-type inequality for arbitrary density matrix of composite and noncomposite systems  

E-Print Network [OSTI]

New kind of matrix inequality known for bipartite system density matrix is obtained for arbitrary density matrix of composite or noncomposite qudit systems including the single qudit state. The examples of two qubit system and qudit with j=3/2 are discussed.

V. N. Chernega; O. V. Manko; V. I. Manko

2014-05-20T23:59:59.000Z

458

Renewable Energy Executive Summary High-Yield Scenario  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Efficiency & Renewable Energy Executive Summary High-Yield Scenario Workshop Series Report INLEXT-10-18930 December 2009 The 2005 Billion-Ton Study a (BTS) esti- mates the...

459

Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary  

Office of Energy Efficiency and Renewable Energy (EERE)

This executive summary provides an overview of a technical report on an assessment NREL conducted in Greensburg, Kansas, to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region.

460

Robust Execution of Bipedal Walking Tasks From Biomechanical Principles  

E-Print Network [OSTI]

Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

Hofmann, Andreas

2006-04-28T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Continuous execution : improving user feedback in the development cycle  

E-Print Network [OSTI]

Programming environments are increasing the amount of feedback given to users during the development cycle. This work continues with this trend by exploring continuous execution, a programming environment where the result ...

Su, Kevin

2007-01-01T23:59:59.000Z

462

Nuclear Energy In the United States Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0 Status and Outlook for Nuclear Energy In the United States Executive Summary The U.S. nuclear power industry continues to make pro- gress toward the construction of new nuclear...

463

Robust execution of bipedal walking tasks from biomechanical principles  

E-Print Network [OSTI]

Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

Hofmann, Andreas G. (Andreas Gunther)

2006-01-01T23:59:59.000Z

464

Summary of Differences in Approach to Executing the NGNP Project  

SciTech Connect (OSTI)

The following discuss the summary differences between the NGNP Industry Alliance’s approach to execution of the NGNP Project as described in its Project Execution Strategy, and that included in the DOE’s Report to Congress on the Next Generation Nuclear Plant dated April 2010. These summary differences are not a comprehensive description of the results of a detailed gap analysis, but rather are those differences that warrant discussion in meetings between DOE executives and the private sector represented by the Alliance. In practical fact, the full range and content of the differences will not be understood until such time as detailed discussions are engaged between the DOE and the Alliance to develop a mutually agreed-to project execution plan.

P.C. Hildebrandt

2010-08-01T23:59:59.000Z

465

Robust, goal-directed plan execution with bounded risk  

E-Print Network [OSTI]

There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For example, a fleet of unmanned aerial vehicles ...

Ono, Masahiro, Ph. D. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

466

PROGRAM INFORMATION This executive master's program with a  

E-Print Network [OSTI]

, they have helped healthcare facilities improve total-quality management, scheduling and sequencingPROGRAM INFORMATION This executive master's program with a health systems concentration: · takes and construction firms · Management consulting firms · Health insurance companies · Research and planning

Suzuki, Masatsugu

467

Error Floors of LDPC Codes and Related Topics  

E-Print Network [OSTI]

Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 LDPC Codes . . . . . . . .2.1 Binary Linear Block Codes . . . . . . .

Butler, Brian K.

468

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. April 24, 2012 U-154: IBM Rational ClearQuest ActiveX...

469

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. April 24, 2012 U-154: IBM Rational ClearQuest ActiveX...

470

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

ActiveX Control Lets Remote Users Execute Arbitrary Code A vulnerability was reported in PHP. A local user can cause denial of service conditions. January 13, 2012 U-081: McAfee...

471

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

ActiveX Control Lets Remote Users Execute Arbitrary Code A vulnerability was reported in PHP. A local user can cause denial of service conditions. January 13, 2012 U-081: McAfee...

472

U-155: WebCalendar Access Control and File Inclusion Bugs Let...  

Broader source: Energy.gov (indexed) [DOE]

were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966...

473

V-220: Juniper Security Threat Response Manager Lets Remote Authentica...  

Broader source: Energy.gov (indexed) [DOE]

commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT: Execution of arbitrary code via network, User...

474

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Office of Environmental Management (EM)

URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

475

T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

issue is caused due to the vmrun utility incorrectly loading libraries from a certain directory. This can be exploited to execute arbitrary code with privileges of the user running...

476

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType...  

Broader source: Energy.gov (indexed) [DOE]

09: Adobe AcrobatReader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code T-609: Adobe AcrobatReader Memory Corruption Error in CoolType...

477

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

478

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Broader source: Energy.gov (indexed) [DOE]

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

479

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

480

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Broader source: Energy.gov (indexed) [DOE]

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

Note: This page contains sample records for the topic "arbitrary code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially...  

Broader source: Energy.gov (indexed) [DOE]

of service. Solution: Pidgin has issued a fix (2.10.0). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

482

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime...

483

V-024: Ubuntu update for libav | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

update for tomcat6 V-051: Oracle Solaris Java Multiple Vulnerabilities U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

484

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

485

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime...

486

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

487

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

488

V-075: EMC AlphaStor Command Injection and Format String Flaws...  

Broader source: Energy.gov (indexed) [DOE]

5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

489

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

490

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications...

491

Energy Codes at a Glance  

SciTech Connect (OSTI)

Feeling dim from energy code confusion? Read on to give your inspections a charge. The U.S. Department of Energy’s Building Energy Codes Program addresses hundreds of inquiries from the energy codes community every year. This article offers clarification for topics of confusion submitted to BECP Technical Support of interest to electrical inspectors, focusing on the residential and commercial energy code requirements based on the most recently published 2006 International Energy Conservation Code® and ANSI/ASHRAE/IESNA1 Standard 90.1-2004.

Cole, Pamala C.; Richman, Eric E.

2008-09-01T23:59:59.000Z

492

Wyner-Ziv coding based on TCQ and LDPC codes and extensions to multiterminal source coding  

E-Print Network [OSTI]

to approach the Wyner-Ziv distortion limit D??W Z(R), the trellis coded quantization (TCQ) technique is employed to quantize the source X, and irregular LDPC code is used to implement Slepian-Wolf coding of the quantized source input Q(X) given the side...

Yang, Yang

2005-11-01T23:59:59.000Z

493

A Study of Execution Environments for Software Kung-Kiu Lau and Vladyslav Ukis  

E-Print Network [OSTI]

A Study of Execution Environments for Software Components Kung-Kiu Lau and Vladyslav Ukis School-kiu,vukis}@cs.man.ac.uk Abstract. Software components are deployed into an execution environment be- fore runtime. The execution environment influences the runtime execution of a component. Therefore, it is important to study existing

Lau, Kung-Kiu

494

Forest Research Executive Board Meeting 16 April 2008 by video conference  

E-Print Network [OSTI]

Forest Research Executive Board Meeting ­ 16 April 2008 by video conference Present: NRS Alice Holt

495

Job submission system and its execution monitoring for improving data processing in high energy physics experiments  

E-Print Network [OSTI]

Job submission system and its execution monitoring for improving data processing in high energy physics experiments

Jurkowski, Igor; Czekierda, ?ukasz

496

CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment  

E-Print Network [OSTI]

CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment Document Number 003-001/002.01 DRAFT-Mellon University Schenley Park Pittsburgh, PA 15213 #12;The ICE Execution Environment DRAFT 003- 001/002.01 U ncla ssified ( 2 The ICE Execution Environment #12;The ICE Execution Environment DRAFT 003

497

MARS15 Code Developments Driven by the Intensity Frontier Needs  

E-Print Network [OSTI]

The MARS15(2012) is the latest version of a multi-purpose Monte-Carlo code developed since 1974 for detailed simulation of hadronic and electromagnetic cascades in an arbitrary 3-D geometry of shielding, accelerator, detector and spacecraft components with energy ranging from a fraction of an electronvolt to 100 TeV. Driven by needs of the intensity frontier projects with their Megawatt beams, e.g., ESS, FAIR and Project X, the code has been recently substantially improved and extended. These include inclusive and exclusive particle event generators in the 0.7 to 12 GeV energy range, proton inelastic interaction modeling below 20 MeV, implementation of the EGS5 code for electromagnetic shower simulation at energies from 1 keV to 20 MeV, stopping power description in compound materials, new module for DPA calculations for neutrons from a fraction of eV to 20-150 MeV, user-friendly DeTra-based method to calculate nuclide inventories, and new ROOT-based geometry.

Mokhov, N V; Rakhno, I L; Striganov, S I; Tropin, I S; Eidelman, Yu I; Aarnio, P; Gudima, K K; Konobeev, A Yu

2014-01-01T23:59:59.000Z

498

Midwest Energy Codes Project  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L d F S i DOE TribaltheMy nameMid-LevelMidwest Energy Codes Project 2014

499

Warm wave breaking of nonlinear plasma waves with arbitrary phase velocities C. B. Schroeder, E. Esarey, and B. A. Shadwick  

E-Print Network [OSTI]

Warm wave breaking of nonlinear plasma waves with arbitrary phase velocities C. B. Schroeder, E, collisionless plasma is developed to analyze nonlinear plasma waves excited by intense drive beams. The maximum amplitude and wavelength are calculated for nonrelativistic plasma temperatures and arbitrary plasma wave

Geddes, Cameron Guy Robinson

500

Two Poisson structures invariant with respect to discrete transformation in the case of arbitrary semi-simple algebras  

E-Print Network [OSTI]

Two Poisson structures invariant with respect to discrete transformation of the Maximal root in the case of arbitrary semi-simple algebras are presented in explicit form. Thus the problem of construction of equations of n-wave hierarchy in the case of arbitrary semi simple algebra is solved finally.

A. N. Leznov

2008-01-16T23:59:59.000Z