National Library of Energy BETA

Sample records for arbitrary code execution

  1. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  2. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...

  3. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Environmental Management (EM)

    Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code...

  4. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  5. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM:...

  6. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  7. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  9. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  10. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  12. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  13. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  14. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  15. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  16. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  17. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  18. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  19. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5:Arbitrary Code

  20. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

  1. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Connected Grid Network Management System Multiple Vulnerabilities V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code U-255: Apache Wicket Input Validation...

  2. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary

  3. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  4. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  5. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  6. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Energy Savers [EERE]

    sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 5) An...

  7. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Energy Savers [EERE]

    279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code...

  8. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  9. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  10. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  11. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  12. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  13. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  14. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  15. BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations

    E-Print Network [OSTI]

    Murphy, Jeremiah W

    2008-01-01

    In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusio...

  16. BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations

    E-Print Network [OSTI]

    Jeremiah W. Murphy; Adam Burrows

    2008-07-09

    In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusion of additional physics packages, the ability to use a general equation of state, and most importantly, the ability to solve self-gravitating hydrodynamic flows on time-dependent, arbitrary grids. In what follows, we describe in detail the numerical techniques employed and, with a large suite of tests, demonstrate that BETHE-hydro finds accurate solutions with 2$^{nd}$-order convergence.

  17. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  18. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    the affected system and on the devices managed by the affected system.An error within the web service framework can be exploited to execute arbitrary code via a specially crafted...

  19. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScripting AttacksCode | Department

  20. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks | DepartmentCode |

  1. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-SavingofCode | Department of Energy 2:

  2. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScriptingDepartment ofCode |

  3. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  4. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  5. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  6. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric System Municipalization Looks

  7. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site Scripting Attacks |

  8. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of Energy 4: Google

  9. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| DepartmentEnergyUsers

  10. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultipleCross-Site Scripting

  11. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURL Address

  12. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department of Energy 7:Obtain

  13. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks || Department of

  14. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department ofDepartment of

  15. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving

  16. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6:2:

  17. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeployment

  18. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user can bypass the pop-up blocker. A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system....

  19. Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory

    E-Print Network [OSTI]

    Aickelin, Uwe

    Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory Jungwon an artificial immune system. A recently developed hypothesis in immunology, the Danger The- ory, states that our invaders, plus signals generated by the host indic- ating danger and damage. We propose the incorporation

  20. On dynamic parallel execution of large scientific codes

    E-Print Network [OSTI]

    Perez, Jason

    1994-01-01

    . The algorithm discussed in [g] uses the hyper- plane method with the same loop body restrictions [no file I/O or procedure calls) as in (2]. By partitioning the nested loop so as to require the least amount of com- munication between. a message passing... word represents a, flow control digit (flit). The compiler will insert the appropriate code before the LOOP instruction to calculate these values at, run-time. The control words are shown in Table I. Table I. DPA Control Data Packet Flit No. Flit...

  1. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  2. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  3. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  4. Secure Mobile Code Execution Service Lap-chung Lam Yang Yu Tzi-cker Chiueh

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    that come into an end user's computer over the network and start to execute with or with- out the user- parent browser plug-in or DLL, a new document viewer in- stalled on demand, an explicitly downloaded that downloads it, it can issue any system calls that the user is allowed to make, includ- ing deleting files

  5. Compiling the model code (and related issues) 1) To compile the model, you must execute a script that will produce and

    E-Print Network [OSTI]

    Gerber, Edwin

    Compiling the model code (and related issues) 1) To compile the model, you must execute a script with this procedure, but you can take a look at the compile script to see what's actually going on. First go to the directory where the compile script is located. For the spectral model, it's: > cd ~/models

  6. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  7. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  8. A loop is the only control-flow construct that lets you go back to an earlier point in the code. Loops are designed to allow us to iterate--to execute the same piece of code over and over again.

    E-Print Network [OSTI]

    Peters, Dennis

    A loop is the only control-flow construct that lets you go back to an earlier point in the code. After the body is executed, we go back and test the loop continuation condition again As soon. Note that the first example (temperature conversion) is basically a variation on this theme. Event

  9. Partitioning an arbitrary architecture

    E-Print Network [OSTI]

    Shahed, Sumon

    1994-01-01

    subsystem is the best one in terms of processor utilization. In this thesis, a good way of partitioning an arbitrary multicomputer system architecture is developed. Mesh, debruijn and hypercube structures are tested. Kernighan-Lin heuristic is used...

  10. Executive Summary: Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesof Energy8) WignerEnergy Executive Order

  11. Self-assembled software and method of overriding software execution

    DOE Patents [OSTI]

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  12. Optimal Execution with Nonlinear Impact Functions

    E-Print Network [OSTI]

    Almgren, Robert F.

    cost per share to be a power law function of the trading rate, with an arbitrary positive exponentOptimal Execution with Nonlinear Impact Functions and Trading-Enhanced Risk Robert F. Almgren October 2001 Abstract We determine optimal trading strategies for liquidation of a large single

  13. Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order 13514 Federal Leadership in Environmental,-

  14. Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof Energy Services » Program Management »Eric J.9Executive Summary

  15. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah Evan Racah 1517546HasExecutive PositionsUnited

  16. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah Evan Racah 1517546HasExecutive

  17. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah Evan Racah 1517546HasExecutive5 Nauru Island

  18. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah Evan Racah 1517546HasExecutive5 Nauru

  19. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesof Energy8) WignerEnergy Executive Order 13693Services

  20. Secure Execution of Java Applets using a Remote Playground Dahlia Malkhi Michael Reiter Avi Rubin

    E-Print Network [OSTI]

    Rubin, Avi

    it is executed. Prior to execution the applet is trans formed to use the downloading user's web browser that often deliver such code, an attacker can download and execute programs on a victim's machine with out the victim's knowledge or consent. The attacker's code could conceivably delete, modify, or steal data

  1. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  2. UNCORRECTED 2 Analytical modeling of codes with arbitrary

    E-Print Network [OSTI]

    Fraguela, Basilio B.

    , large com- 36puting times, and lack of an explanation for the 37behavior observed in many cases no explanations 40about the behavior observed and they are restricted 1383-7621/$ - see front matter 2005

  3. The Arbitrary Trajectory Quantization Method

    E-Print Network [OSTI]

    Debabrata Biswas

    2001-07-12

    The arbitrary trajectory quantization method (ATQM) is a time dependent approach to quasiclassical quantization based on the approximate dual relationship that exists between the quantum energy spectra and classical periodic orbits. It has recently been shown however, that, for polygonal billiards, the periodicity criterion must be relaxed to include closed almost-periodic (CAP) orbit families in this relationship. In light of this result, we reinvestigate the ATQM and show that at finite energies, a smoothened quasiclassical kernel corresponds to the modified formula that includes CAP families while the delta function kernel corresponding to the periodic orbit formula is recovered at high energies. Several clarifications are also provided.

  4. Interpreting and Executing Recipes with a Cooking Robot

    E-Print Network [OSTI]

    Tellex, Stefanie

    Interpreting and Executing Recipes with a Cooking Robot Mario Bollini, Stefanie Tellex, Tyler in the home, and a robotic chef capable of following arbitrary recipes would have many applications in both, and the ordered nature of recipes. We envision a robotic chef, the BakeBot, which can collect recipes online

  5. Sample Project Execution Plan

    Broader source: Energy.gov [DOE]

    The project execution plan (PEP) is the governing document that establishes the means to execute, monitor, and control projects. The plan serves as the main communication vehicle to ensure that...

  6. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Arbitrary Code U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

  7. Binary Neutron Stars with Arbitrary Spins in Numerical Relativity

    E-Print Network [OSTI]

    Tacik, Nick; Pfeiffer, Harald P; Haas, Roland; Ossokine, Serguei; Kaplan, Jeff; Muhlberger, Curran; Duez, Matt D; Kidder, Lawrence E; Scheel, Mark A; Szilgyi, Bla

    2015-01-01

    We present a code to construct initial data for binary neutron star systems in which the stars are rotating. Our code, based on a formalism developed by Tichy, allows for arbitrary rotation axes of the neutron stars and is able to achieve rotation rates near rotational breakup. We compute the neutron star angular momentum through quasi-local angular momentum integrals. When constructing irrotational binary neutron stars, we find a very small residual dimensionless spin of $\\sim 2\\times 10^{-4}$. Evolutions of rotating neutron star binaries show that the magnitude of the stars' angular momentum is conserved, and that the spin- and orbit-precession of the stars is well described by post-Newtonian approximation. We demonstrate that orbital eccentricity of the binary neutron stars can be controlled to $\\sim 0.1\\%$. The neutron stars show quasi-normal mode oscillations at an amplitude which increases with the rotation rate of the stars.

  8. Binary Neutron Stars with Arbitrary Spins in Numerical Relativity

    E-Print Network [OSTI]

    Nick Tacik; Francois Foucart; Harald P. Pfeiffer; Roland Haas; Serguei Ossokine; Jeff Kaplan; Curran Muhlberger; Matt D. Duez; Lawrence E. Kidder; Mark A. Scheel; Bla Szilgyi

    2015-08-27

    We present a code to construct initial data for binary neutron star systems in which the stars are rotating. Our code, based on a formalism developed by Tichy, allows for arbitrary rotation axes of the neutron stars and is able to achieve rotation rates near rotational breakup. We compute the neutron star angular momentum through quasi-local angular momentum integrals. When constructing irrotational binary neutron stars, we find a very small residual dimensionless spin of $\\sim 2\\times 10^{-4}$. Evolutions of rotating neutron star binaries show that the magnitude of the stars' angular momentum is conserved, and that the spin- and orbit-precession of the stars is well described by post-Newtonian approximation. We demonstrate that orbital eccentricity of the binary neutron stars can be controlled to $\\sim 0.1\\%$. The neutron stars show quasi-normal mode oscillations at an amplitude which increases with the rotation rate of the stars.

  9. Image transmission using stable solitons of arbitrary shapes in photonic lattices

    E-Print Network [OSTI]

    Chen, Zhigang

    Image transmission using stable solitons of arbitrary shapes in photonic lattices Jianke Yang,1, we propose soliton-based text/image transmission through bulk photonic structures. 2011 Optical Society of America OCIS codes: 190.0190, 160.5293. Image transmission through bulk nonlinear media

  10. Coding theory basics Toric codes

    E-Print Network [OSTI]

    Little, John B.

    Coding theory basics Toric codes Tools from the toric world Higher-dimensional polytopes. Little Toric Varieties in Coding Theory #12;Coding theory basics Toric codes Tools from the toric world(!) John B. Little Toric Varieties in Coding Theory #12;Coding theory basics Toric codes Tools from

  11. CBECS 1995 - Executive Summary

    U.S. Energy Information Administration (EIA) Indexed Site

    Executive Summary The Commercial Buildings Energy Consumption Survey (CBECS) collects information on physical characteristics of commercial buildings, building use and occupancy...

  12. Data processing with microcode designed with source coding

    DOE Patents [OSTI]

    McCoy, James A; Morrison, Steven E

    2013-05-07

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  13. Improving Code Compliance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,ExecutiveFinancingREnergy ToolsCoordinationDepartmentImproving Code

  14. Tandem Mirror Reactor Systems Code (Version I)

    SciTech Connect (OSTI)

    Reid, R.L.; Finn, P.A.; Gohar, M.Y.; Barrett, R.J.; Gorker, G.E.; Spampinaton, P.T.; Bulmer, R.H.; Dorn, D.W.; Perkins, L.J.; Ghose, S.

    1985-09-01

    A computer code was developed to model a Tandem Mirror Reactor. Ths is the first Tandem Mirror Reactor model to couple, in detail, the highly linked physics, magnetics, and neutronic analysis into a single code. This report describes the code architecture, provides a summary description of the modules comprising the code, and includes an example execution of the Tandem Mirror Reactor Systems Code. Results from this code for two sensitivity studies are also included. These studies are: (1) to determine the impact of center cell plasma radius, length, and ion temperature on reactor cost and performance at constant fusion power; and (2) to determine the impact of reactor power level on cost.

  15. Sparse Quantum Codes from Quantum Circuits

    E-Print Network [OSTI]

    Dave Bacon; Steven T. Flammia; Aram W. Harrow; Jonathan Shi

    2015-07-10

    We describe a general method for turning quantum circuits into sparse quantum subsystem codes. Using this prescription, we can map an arbitrary stabilizer code into a new subsystem code with the same distance and number of encoded qubits but where all the generators have constant weight, at the cost of adding some ancilla qubits. With an additional overhead of ancilla qubits, the new code can also be made spatially local. Applying our construction to certain concatenated stabilizer codes yields families of subsystem codes with constant-weight generators and with minimum distance $d = n^{1-\\varepsilon}$, where $\\varepsilon = O(1/\\sqrt{\\log n})$. For spatially local codes in $D$ dimensions we nearly saturate a bound due to Bravyi and Terhal and achieve $d = n^{1-\\varepsilon-1/D}$. Previously the best code distance achievable with constant-weight generators in any dimension, due to Freedman, Meyer and Luo, was $O(\\sqrt{n\\log n})$ for a stabilizer code.

  16. Baldrige Executive Fellows Program

    E-Print Network [OSTI]

    Baldrige Executive Fellows Program 5 Workforce Focus 6 Operations Focus 7 RESULTS 4 Measurement, Analysis, and Knowledge Management Organizational Profile: Environment, Relationships, and Strategic National Quality Award, the nation's highest award for organizational performance excellence. From personal

  17. Executive Summary October 2014

    E-Print Network [OSTI]

    Birmingham, University of

    Executive Summary October 2014 THE SECURITY IMPACT OF DRONES: CHALLENGES AND OPPORTUNITIES The of Drones Cover images (clockwise from top left) 1. Reaper Remotely Piloted Air System. Image by Sergeant

  18. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  19. Electromechanical coupling coefficient k31 for arbitrary

    E-Print Network [OSTI]

    Cao, Wenwu

    Electromechanical coupling coefficient k31 eff for arbitrary aspect ratio resonators made of 001 on the derived unified formula, the lateral electromechanical energy conversion efficiency k31 eff 2 decreases,3 The square of the electromechanical coupling coefficient k31 2 is used to characterize energy conversion

  20. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  1. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Execute Arbitrary Code PLATFORM: McAfee ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  2. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  3. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe...

  4. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects |SummitVOCs| Department

  5. Poisson color algebras of arbitrary degree

    E-Print Network [OSTI]

    Antonio J. Calderon; Diouf M. Cheikh

    2015-07-20

    A Poisson algebra is a Lie algebra endowed with a commutative associative product in such a way that the Lie and associative products are compatible via a Leibniz rule. If we part from a Lie color algebra, instead of a Lie algebra, a graded-commutative associative product and a graded-version Leibniz rule we get a so-called Poisson color algebra (of degree zero). This concept can be extended to any degree so as to obtain the class of Poisson color algebras of arbitrary degree. This class turns out to be a wide class of algebras containing the ones of Lie color algebras (and so Lie superalgebras and Lie algebras), Poisson algebras, graded Poisson algebras, $z$-Poisson algebras, Gerstenhaber algebras and Schouten algebras among others classes of algebras. The present paper is devoted to the study of the structure of Poisson color algebras of arbitrary degree, with restrictions neither on the dimension nor the base field.

  6. Clausius entropy for arbitrary bifurcate null surfaces

    E-Print Network [OSTI]

    Baccetti, Valentina

    2013-01-01

    Is entropy objectively "real"? Or is entropy in some sense subjective and observer-dependent? These innocent questions open a Pandora's box of often inconclusive debate. A consensus opinion, though certainly not universally held, seems to be that the Clausius entropy (thermodynamic entropy, defined via a Clausius relation d S = dQ/T) should be objectively real, but that the ontological status of the statistical entropy (the Shannon or von Neumann entropy) is much more ambiguous, and much more likely to be observer-dependent. This question is particularly pressing when it comes to understanding Bekenstein entropy (black hole entropy). To perhaps further add to the confusion, we shall argue that even Clausius entropy can often be observer-dependent. We shall demonstrate that one can meaningfully assign a notion of Clausius entropy to the matter crossing arbitrary bifurcate null surfaces --- effectively defining a virtual Clausius entropy" for arbitrary virtual causal horizons".

  7. Sustainability Initiative Executive Summary

    E-Print Network [OSTI]

    Sheridan, Jennifer

    UWMadison Sustainability Initiative Executive Summary October 2010 #12;2 We are pleased to present the final report of the campus Sustainability Task Force. This report fulfills the charge we gave to sustainability for consideration by UWMadison's leadership and campus community. There are many reasons why

  8. EUCERS Executive Energy Programme

    E-Print Network [OSTI]

    Applebaum, David

    were great with a deep background in the energy sector and the course provided a greater and technicalEUCERS Executive Energy Programme: Changes and Challenges in International Energy Markets London in the international energy landscape affect the decision making of energy companies. Faced with falling oil prices

  9. A Forced Sampled Execution Approach to Kernel Rootkit Identification

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    }@symantec.com Abstract. Kernel rootkits are considered one of the most dangerous forms of malware because they reside a forced sampled execution approach to traverse the driver's control flow graph. Through a comprehensive, 11, 4] is a piece of binary code that a computer in- truder, after breaking into a machine, installs

  10. Execution Version POWER PURCHASE AGREEMENT

    E-Print Network [OSTI]

    Firestone, Jeremy

    ") and BLUEWATER WIND DELAWARE LLC ("Seller") June 23, 2008 #12;Execution Version POWER PURCHASE AGREEMENT TableExecution Version POWER PURCHASE AGREEMENT between DELMARVA POWER & LIGHT COMPANY ("Buyer 3.5 Energy Forecasts, Scheduling and Balancing.......................................... 40 3

  11. Business Model Guide Executive Summary

    Broader source: Energy.gov [DOE]

    The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

  12. Minimal comparability completions of arbitrary graphs Pinar Heggernes

    E-Print Network [OSTI]

    Heggernes, Pinar

    Minimal comparability completions of arbitrary graphs Pinar Heggernes Federico Mancini Charis for which completion of arbitrary graphs can be achieved through such a vertex incremental approach. 1 to an arbitrary graph is called a comparability completion of the input graph. Unfortunately, computing

  13. Thermoacoustic tomography with an arbitrary elliptic operator

    E-Print Network [OSTI]

    Michael V. Klibanov

    2012-08-26

    Thermoacoustic tomography is a term for the inverse problem of determining of one of initial conditions of a hyperbolic equation from boundary measurements. In the past publications both stability estimates and convergent numerical methods for this problem were obtained only under some restrictive conditions imposed on the principal part of the elliptic operator. In this paper logarithmic stability estimates are obatined for an arbitrary variable principal part of that operator. Convergence of the Quasi-Reversibility Method to the exact solution is also established for this case. Both complete and incomplete data collection cases are considered.

  14. Casimir Forces between Arbitrary Compact Objects

    SciTech Connect (OSTI)

    Emig, T. [Laboratoire de Physique Theorique et Modeles Statistiques, CNRS UMR 8626, Universite Paris-Sud, 91405 Orsay (France); Graham, N. [Department of Physics, Middlebury College, Middlebury, Vermont 05753 (United States); Center for Theoretical Physics, Laboratory for Nuclear Science, and Department of Physics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States); Jaffe, R. L. [Center for Theoretical Physics, Laboratory for Nuclear Science, and Department of Physics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States); Kardar, M. [Department of Physics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

    2007-10-26

    We develop an exact method for computing the Casimir energy between arbitrary compact objects, either dielectrics or perfect conductors. The energy is obtained as an interaction between multipoles, generated by quantum current fluctuations. The objects' shape and composition enter only through their scattering matrices. The result is exact when all multipoles are included, and converges rapidly. A low frequency expansion yields the energy as a series in the ratio of the objects' size to their separation. As an example, we obtain this series for two dielectric spheres and the full interaction at all separations for perfectly conducting spheres.

  15. TABLE OF CONTENTS: Building Executive Definition.......................................................................3

    E-Print Network [OSTI]

    Capogna, Luca

    #12;TABLE OF CONTENTS: Building Executive Definition.......................................................................3 Building Executives Areas of Responsibilities ...................................................................................5 Building Safety and Security Issues

  16. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code |Arbitrary

  17. Architecture-Dependent Execution Time of Shor's Algorithm

    E-Print Network [OSTI]

    Rodney Van Meter; Kohei M. Itoh; Thaddeus D. Ladd

    2006-05-25

    We show how the execution time of algorithms on quantum computers depends on the architecture of the quantum computer, the choice of algorithms (including subroutines such as arithmetic), and the ``clock speed'' of the quantum computer. The primary architectural features of interest are the ability to execute multiple gates concurrently, the number of application-level qubits available, and the interconnection network of qubits. We analyze Shor's algorithm for factoring large numbers in this context. Our results show that, if arbitrary interconnection of qubits is possible, a machine with an application-level clock speed of as low as one-third of a (possibly encoded) gate per second could factor a 576-bit number in under one month, potentially outperforming a large network of classical computers. For nearest-neighbor-only architectures, a clock speed of around twenty-seven gates per second is required.

  18. Code constructions and code families for nonbinary quantum stabilizer code

    E-Print Network [OSTI]

    Ketkar, Avanti Ulhas

    2005-11-01

    Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer codes have received much...

  19. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservationBio-Inspired SolarAbout /Two0 - 19PortalStatusUserUserHome UserUsers' Executive

  20. Executives & Structure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah Evan Racah 1517546HasExecutive5 Naurudefault

  1. LTS Execution - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResource andfirstDevice UW Madison Line TiedExecution

  2. Consistent massive graviton on arbitrary backgrounds

    E-Print Network [OSTI]

    Laura Bernard; Cedric Deffayet; Mikael von Strauss

    2015-05-15

    We obtain the fully covariant linearized field equations for the metric perturbation in the de Rham-Gabadadze-Tolley (dRGT) ghost free massive gravities. For a subset of these theories, we show that the non dynamical metric that appears in the dRGT setup can be completely eliminated leading to the theory of a massive graviton moving in a single metric. This has a mass term which contains non trivial contributions of the space-time curvature. We show further how 5 covariant constraints can be obtained including one which leads to the tracelessness of the graviton on flat space-time and removes the Boulware-Deser ghost. The 5 constraints are obtained for a background metric which is arbitrary, i.e. which does not have to obey the background field equations.

  3. Acquisition Executive Associate Director for

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    Acquisition Executive Associate Director for Fusion Energy Sciences E. Synakowski DOE Program Offi NSTX Program Manager Fusion Energy Sciences B. Sullivan Office DOE Site Office DOE Site Manager

  4. Secure Execution of Java Applets using a Remote Playground Dahlia Malkhi Michael K. Reiter Aviel D. Rubin

    E-Print Network [OSTI]

    Reiter, Michael

    it is executed. Prior to execution the applet is trans- formed to use the downloading user's web browser on a victim's machine with- out the victim's knowledge or consent. The attacker's code could conceivably delete, modify, or steal data on the victim's machine, or otherwise abuse other re- sources available

  5. Quantum nonlocality with arbitrary limited detection efficiency

    E-Print Network [OSTI]

    Gilles Ptz; Nicolas Gisin

    2015-07-17

    The demonstration and use of nonlocality, as defined by Bell's theorem, rely strongly on dealing with non-detection events due to losses and detector inefficiencies. Otherwise, the so-called detection loophole could be exploited. The only way to avoid this is to have detection efficiencies that are above a certain threshold. We introduce the intermediate assumption of limited detection efficiency, e.g. in each run of the experiment the overall detection efficiency is lower bounded by $\\eta_{min} > 0$. Hence, in an adversarial scenario, the adversaries have arbitrary large but not full control over the inefficiencies. We analyze the set of possible correlations that fulfil Limited Detection Locality (LDL) and show that they necessarily satisfy some linear Bell-like inequalities. We prove that quantum theory predicts violation of one of these inequalities for all $\\eta_{min} > 0$. Hence, nonlocality can be demonstrated with arbitrarily small limited detection efficiencies. Finally we propose a generalized scheme that uses this characterization to deal with detection inefficiencies, which interpolates between the two usual schemes, postselection and outcome assignment.

  6. Attributed Transformational Code Generation for Dynamic Compilers \\Lambda

    E-Print Network [OSTI]

    Boyland, John Tang

    Attributed Transformational Code Generation for Dynamic Compilers \\Lambda John Boyland Computer compilers, that is, compilers that preserve execu tion state when newly compiled code is patched into an executing image, presents the compiler writer with a number of difficulties. First, all the complexity

  7. Existence of piecewise linear Lyapunov functions in arbitrary dimensions

    E-Print Network [OSTI]

    Hafstein, Sigurður Freyr

    Existence of piecewise linear Lyapunov functions in arbitrary dimensions Peter Giesl Department/Hafstein (2010) the exis- tence of a piecewise linear Lyapunov function was shown, and in Giesl/Hafstein (subm-dimensional systems. This paper generalises the existence of piecewise linear Lyapunov functions to arbitrary

  8. GRAVITY DRIVEN SHALLOW WATER MODELS FOR ARBITRARY TOPOGRAPHY

    E-Print Network [OSTI]

    Blmker, Dirk

    GRAVITY DRIVEN SHALLOW WATER MODELS FOR ARBITRARY TOPOGRAPHY FRANCOIS BOUCHUT AND MICHAEL over a general topography. A first model is valid for small slope variation, i.e. small curvature, and a second model is valid for arbitrary topography. In both cases no particular assumption is made

  9. Making arbitrary graphs transitively orientable: Minimal comparability completions

    E-Print Network [OSTI]

    Papadopoulos, Charis

    Making arbitrary graphs transitively orientable: Minimal comparability completions Pinar Heggernes to an arbitrary graph is called a comparability completion of the input graph. Unfortunately, computing a comparability completion with the minimum number of added edges (called a minimum completion) is an NP

  10. Multivariate Gaussian Simulation Outside Arbitrary Nick Ellis and Ranjan Maitra

    E-Print Network [OSTI]

    Maitra, Ranjan

    Multivariate Gaussian Simulation Outside Arbitrary Ellipsoids Nick Ellis and Ranjan Maitra Abstract Methods for simulation from multivariate Gaussian distributions restricted to be from outside an arbitrary a multivariate Gaussian distribution and accepts it if it is outside the ellipsoid is often employed: however

  11. Agilent 33210A 10 MHz Function/Arbitrary Waveform Generator

    E-Print Network [OSTI]

    California at San Diego, University of

    Agilent 33210A 10 MHz Function/Arbitrary Waveform Generator Data Sheet 10 MHz Sine and Square Waveform Generator AM, FM, and PWM modulation types Linear & logarithmic sweeps and burst operation at an affordable price The Agilent Technologies 33210A Function/Arbitrary Waveform Generator is the latest addition

  12. Distributed Generation Operational Reliability, Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability, Executive Summary Report, January 2004 Distributed Generation Operational Reliability, Executive Summary Report, January 2004 This report summarizes the results of the...

  13. CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 Hunter College of the City Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR DEGREE AUDIT UNIT Student Specialization Section #12;CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 *****A SEPARATE

  14. CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1/24/2006 Hunter College of the City-mail address Department Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR, DEGREE Section Only For January 2010 Graduate #12;CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1

  15. Quantum Szilard engines with arbitrary spin

    E-Print Network [OSTI]

    Zekun Zhuang; Shi-Dong Liang

    2015-02-02

    The quantum Szilard engine (QSZE) is a conceptual quantum engine for understanding the fundamental physics of quantum thermodynamics and information physics. We generalize the QSZE to an arbitrary spin case, i.e., a spin QSZE (SQSZE), and we systematically study the basic physical properties of both fermion and boson SQSZEs in a low-temperature approximation. We give the analytic formulation of the total work. For the fermion SQSZE, the work might be absorbed from the environment, and the change rate of the work with temperature exhibits periodicity and even-odd oscillation, which is a generalization of a spinless QSZE. It is interesting that the average absorbed work oscillates regularly and periodically in a large-number limit, which implies that the average absorbed work in a fermion SQSZE is neither an intensive quantity nor an extensive quantity. The phase diagrams of both fermion and boson SQSZEs give the SQSZE doing positive or negative work in the parameter space of the temperature and the particle number of the system, but they have different behaviors because the spin degrees of the fermion and the boson play different roles in their configuration states and corresponding statistical properties. The critical temperature of phase transition depends sensitively on the particle number. By using Landauer's erasure principle, we give the erasure work in a thermodynamic cycle, and we define an efficiency (we refer to it as information-work efficiency) to measure the engine's ability of utilizing information to extract work. We also give the conditions under which the maximum extracted work and highest information-work efficiencies for fermion and boson SQSZEs can be achieved.

  16. Mixed Speculative Multithreaded Execution Models

    E-Print Network [OSTI]

    Xekalakis, Polychronis

    2010-01-01

    The current trend toward chip multiprocessor architectures has placed great pressure on programmers and compilers to generate thread-parallel programs. Improved execution performance can no longer be obtained via traditional ...

  17. Instruction-Level Execution Migration

    E-Print Network [OSTI]

    Devadas, Srinivas

    2010-04-17

    We introduce the Execution Migration Machine (EM), a novel data-centric multicore memory system architecture based on computation migration. Unlike traditional distributed memory multicores, which rely on complex cache ...

  18. GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries

    SciTech Connect (OSTI)

    Shalf, John; Goodale, Tom

    2004-02-01

    GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

  19. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.

  20. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    Su, Xiao

    with Section 500) of the Business and Professions Code. (22) An emergency medical technician I or II, paramedic and Professions Code. (24) A marriage and family therapist trainee, as defined in subdivision (c) of Section 4980.03 of the Business and Professions Code. (25) An unlicensed marriage and family therapist intern registered under

  1. Quantum teleportation of an arbitrary superposition of atomic Dicke states

    E-Print Network [OSTI]

    Di, TG; Muthukrishnan, A.; Scully, Marlan O.; Zubairy, M. Suhail

    2005-01-01

    We propose a scheme for teleporting an arbitrary superposition of entangled Dicke states of any number of atoms (qubits) between two distant cavities. Our method relies on adiabatic passage using multi-atom dark states in each cavity, and a...

  2. Monge equation of arbitrary degree in 1 + 1 space

    E-Print Network [OSTI]

    A. N. Leznov; R. Torres-cordoba

    2013-01-31

    Solution of Monge equation of arbitrary degree (non linear differential equation n-orden) is connected with solution of functional equation for 4 functions with 4 different arguments. Some number solutions of this equation is represented in explicit form.

  3. A Markov-type inequality for arbitrary plane continua

    E-Print Network [OSTI]

    1910-51-20

    Dec 8, 2005 ... for all polynomials f. We prove a precise version of this inequality with an arbitrary continuum in the complex plane instead of the interval. [?1,1].

  4. Computation of Casimir Interactions between Arbitrary 3D Objects with Arbitrary Material Properties

    E-Print Network [OSTI]

    M. T. Homer Reid; Jacob White; Steven G. Johnson

    2011-10-20

    We extend a recently introduced method for computing Casimir forces between arbitrarily--shaped metallic objects [M. T. H. Reid et al., Phys. Rev. Lett._103_ 040401 (2009)] to allow treatment of objects with arbitrary material properties, including imperfect conductors, dielectrics, and magnetic materials. Our original method considered electric currents on the surfaces of the interacting objects; the extended method considers both electric and magnetic surface current distributions, and obtains the Casimir energy of a configuration of objects in terms of the interactions of these effective surface currents. Using this new technique, we present the first predictions of Casimir interactions in several experimentally relevant geometries that would be difficult to treat with any existing method. In particular, we investigate Casimir interactions between dielectric nanodisks embedded in a dielectric fluid; we identify the threshold surface--surface separation at which finite--size effects become relevant, and we map the rotational energy landscape of bound nanoparticle diclusters.

  5. tcc: A System for Fast, Flexible, and Highlevel Dynamic Code Generation Massimiliano Poletto, Dawson R. Engler, and M. Frans Kaashoek

    E-Print Network [OSTI]

    language, an extension of ANSI C that supports dynamic code generation [15]. `C gives power and flexibility of ANSI C that provides mechanisms for specifying and dynamically composing arbitrary ANSI C expressions

  6. EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES

    E-Print Network [OSTI]

    Falck, Justin

    2009-06-09

    Flash memory usage is becoming ever more prevalent in society today. It is being used in everything from portable data storage devices, portable music players, cell phones, and even solid-state (non-mechanical) computer ...

  7. Business Development Executive (BDE) Program

    SciTech Connect (OSTI)

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  8. Executive Summary | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof Energy Services » Program Management »Eric J.9Executive SummaryExecutive

  9. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-07-23

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    Georgia's Department of Community Affairs periodically reviews, amends and/or updates the state minimum standard codes. Georgia has "mandatory" and "permissive" codes. Georgia State Energy Code...

  12. Optimizing Tensor Contraction Expressions for Hybrid CPU-GPU Execution

    SciTech Connect (OSTI)

    Ma, Wenjing; Krishnamoorthy, Sriram; Villa, Oreste; Kowalski, Karol; Agrawal, Gagan

    2013-03-01

    Tensor contractions are generalized multidimensional matrix multiplication operations that widely occur in quantum chemistry. Efficient execution of tensor contractions on Graphics Processing Units (GPUs) requires several challenges to be addressed, including index permutation and small dimension-sizes reducing thread block utilization. Moreover, to apply the same optimizations to various expressions, we need a code generation tool. In this paper, we present our approach to automatically generate CUDA code to execute tensor contractions on GPUs, including management of data movement between CPU and GPU. To evaluate our tool, GPU-enabled code is generated for the most expensive contractions in CCSD(T), a key coupled cluster method, and incorporated into NWChem, a popular computational chemistry suite. For this method, we demonstrate speedup over a factor of 8.4 using one GPU (instead of one core per node) and over 2.6 when utilizing the entire system using hybrid CPU+GPU solution with 2 GPUs and 5 cores (instead of 7 cores per node). Finally, we analyze the implementation behavior on future GPU systems.

  13. Faculty of Information Executive Committee

    E-Print Network [OSTI]

    Toronto, University of

    and FI Memorandum of Agreement and Dean Seamus Ross moved the following motion: That the Faculty. The Executive Committee discussed the Concurrent Registration Option in Master of Information and Master Option in Master of Information and Master of Museum Studies programs is attached to this report

  14. Robert M. Goodman Executive Dean

    E-Print Network [OSTI]

    Goodman, Robert M.

    Robert M. Goodman Executive Dean School of Environmental and Biological Sciences Mukund Karwe Dean Lawson Dean Agricultural and Urban Programs Robert Hills Associate Dean Academic Programs Thomas Leustek Assistant Dean Malcolm Watford Director G. H. Cook Sr. Honors Prog. Lee Schneider Assistant Dean Michelle

  15. NARSTO OZONE ASSESSMENT EXECUTIVE SUMMARY

    E-Print Network [OSTI]

    vi NARSTO OZONE ASSESSMENT EXECUTIVE SUMMARY Prepared as a NARSTO initiative, this tropospheric O3 in the accompanying Textbox, the NARSTO Ozone Assessment contains two product components. The first of these is a set aspects of tropospheric ozone pollution. The second component, the NARSTO Ozone Assessment Document

  16. Table of Contents Executive Summary

    E-Print Network [OSTI]

    McDonald, Kirk

    Table of Contents Page Executive Summary I. Introduction 1 Neutrino Oscillation Results from Solar and Atmospheric Neutrino Data 1 Tables 7 References 5 Figures 9 II. Overview of the Long Baseline Experiment 17 Magnetic Moment, Charge Radius, and Extra Z-bosons 261 VII. Cost and Schedule 265 Project schedule 267 Work

  17. Energy-Positive Water Resource Recovery Workshop Report Executive...

    Office of Environmental Management (EM)

    Report Executive Summary Energy-Positive Water Resource Recovery Workshop Report Executive Summary Executive summary workshop report for the for the Energy-Positive Water Resource...

  18. WENO schemes on arbitrary unstructured meshes for laminar, transitional and turbulent flows

    SciTech Connect (OSTI)

    Tsoutsanis, Panagiotis, E-mail: panagiotis.tsoutsanis@cranfield.ac.uk; Antoniadis, Antonios Foivos, E-mail: a.f.antoniadis@cranfield.ac.uk; Drikakis, Dimitris, E-mail: d.drikakis@cranfield.ac.uk

    2014-01-01

    This paper presents the development and implementation of weighted-essentially-non-oscillatory (WENO) schemes for viscous flows on arbitrary unstructured grids. WENO schemes up to fifth-order accurate have been implemented in conjunction with hybrid and non-hybrid unstructured grids. The schemes are investigated with reference to numerical and experimental results for the TaylorGreen vortex, as well as for laminar and turbulent flows around a sphere, and the turbulent shock-wave boundary layer interaction flow problem. The results show that the accuracy of the schemes depends on the arbitrariness of shape and orientation of the unstructured mesh elements, as well as the compactness of directional stencils. The WENO schemes provide a more accurate numerical framework compared to second-order and third-order total variation diminishing (TVD) methods, however, the fifth-order version of the schemes is computationally too expensive to make the schemes practically usable. On the other hand, the third-order variant offers an excellent numerical framework in terms of accuracy and computational cost compared to the fifth-order WENO and second-order TVD schemes. Parallelisation of the CFD code (henceforth labelled as UCNS3D), where the schemes have been implemented, shows that the present methods offer very good scalable performance.

  19. Execution Characteristics of JustInTime Compilers Technical Report TR99071701

    E-Print Network [OSTI]

    John, Lizy Kurian

    Execution Characteristics of JustInTime Compilers Technical Report TR99071701 R@cse.psu.edu Abstract JustInTime (JIT) compilers interact with the Java Virtual Machine (JVM) at run time and compile appropriate bytecode sequences into native machine code. Loading and compilation time penalties are incurred

  20. UCSF Sustainability Action Plan: Executive Summary

    E-Print Network [OSTI]

    Yamamoto, Keith

    UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

  1. Northwest Energy Efficiency Taskforce Executive Committee

    E-Print Network [OSTI]

    #12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

  2. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAuditsCluster Compatibilitydefault SignEnvironmentAprilCompilerCompiling Codes

  3. Executive Order 13423- Strengthening Federal Environmental, Energy...

    Energy Savers [EERE]

    423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

  4. EXECUTIVE MBA in Change Management and Leadership

    E-Print Network [OSTI]

    MBA EXECUTIVE MBA in Change Management and Leadership EXECUTIVE MBA IN CHANGE MANAGEMENT AND LEADERSHIP #12;WELCOME TO THE EXECUTIVE MBA IN CHANGE MANAGEMENT AND LEADERSHIP The globalization, the core of the program is as always change management and leadership. INVESTMENT IN YOUR

  5. December 17, 2008 Robert Almgren / Encyclopedia of Quantitative Finance Execution Costs 1 Execution Costs

    E-Print Network [OSTI]

    Almgren, Robert F.

    December 17, 2008 Robert Almgren / Encyclopedia of Quantitative Finance Execution Costs 1 Execution Costs Execution costs are the difference in value between an ideal trade and what was actually done. The execution cost of a single completed trade is typically the difference between the final average trade price

  6. An Extended Network Coding Opportunity Discovery Scheme in Wireless Networks

    E-Print Network [OSTI]

    Zhao, Yunlong; Iwai, Masayuki; Sezaki, Kaoru; Tobe, Yoshito; 10.5121/ijcnc.2012.4106

    2012-01-01

    Network coding is known as a promising approach to improve wireless network performance. How to discover the coding opportunity in relay nodes is really important for it. There are more coding chances, there are more times it can improve network throughput by network coding operation. In this paper, an extended network coding opportunity discovery scheme (ExCODE) is proposed, which is realized by appending the current node ID and all its 1-hop neighbors' IDs to the packet. ExCODE enables the next hop relay node to know which nodes else have already overheard the packet, so it can discover the potential coding opportunities as much as possible. ExCODE expands the region of discovering coding chance to n-hops, and have more opportunities to execute network coding operation in each relay node. At last, we implement ExCODE over the AODV protocol, and efficiency of the proposed mechanism is demonstrated with NS2 simulations, compared to the existing coding opportunity discovery scheme.

  7. CURRICULUM CODE 308 DEGREE CODE _40

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE 308 DEGREE CODE _40 Hunter College of the City University of New York - Office Print) E-mail address OES Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR Specialization Section #12;CURRICULUM CODE_308_ DEGREE CODE _40__ Course Prefix & Number Course Title Credits

  8. Harmonic Functions for Quadrilateral Remeshing of Arbitrary Manifolds

    E-Print Network [OSTI]

    Garland, Michael

    Harmonic Functions for Quadrilateral Remeshing of Arbitrary Manifolds S. Dong , S. Kircher, M on the use of smooth harmonic scalar fields defined over the mesh. Given such a field, we compute its for cutting the surface into patches. Key words: quad-dominant remeshing, gradient flow tracing, harmonic

  9. THERMOACOUSTIC TOMOGRAPHY WITH AN ARBITRARY ELLIPTIC OPERATOR MICHAEL V. KLIBANOV

    E-Print Network [OSTI]

    1 THERMOACOUSTIC TOMOGRAPHY WITH AN ARBITRARY ELLIPTIC OPERATOR MICHAEL V. KLIBANOV Abstract. Thermoacoustic tomography is a term for the inverse problem of determining of one of initial conditions. In thermoacoustic tomography (TAT) a short radio frequency pulse is sent in a biological tissue [1, 9]. Some energy

  10. Analysis of the ndimensional quadtree decomposition for arbitrary hyperrectangles

    E-Print Network [OSTI]

    Faloutsos, Christos

    Analysis of the n­dimensional quadtree decomposition for arbitrary hyper­rectangles Christos­ dimensional) quadtree, as well as the estimation of the search time for query hyper­rectangles. A theoretical in this paper is the analytical estimation of the number of pieces that an n­dimensional rectangle (hyper

  11. Entanglement Cost for Sequences of Arbitrary Quantum States

    E-Print Network [OSTI]

    Garry Bowen; Nilanjana Datta

    2011-01-06

    The entanglement cost of arbitrary sequences of bipartite states is shown to be expressible as the minimization of a conditional spectral entropy rate over sequences of separable extensions of the states in the sequence. The expression is shown to reduce to the regularized entanglement of formation when the n-th state in the sequence consists of n copies of a single bipartite state.

  12. Counting Packets Sent Between Arbitrary Internet Hosts Jeffrey Knockel

    E-Print Network [OSTI]

    Crandall, Jedidiah R.

    Counting Packets Sent Between Arbitrary Internet Hosts Jeffrey Knockel Dept. of Computer Science University of New Mexico jeffk@cs.unm.edu Jedidiah R. Crandall Dept. of Computer Science University of New Mexico crandall@cs.unm.edu Abstract In this paper we demonstrate a side-channel technique to infer

  13. Brief Announcement: Distributed Churn Measurement in Arbitrary Networks

    E-Print Network [OSTI]

    Gramoli, Vincent

    Brief Announcement: Distributed Churn Measurement in Arbitrary Networks Vincent Gramoli EPFL & Univ; General Terms: Algorithms Keywords: Churn, Dynamics, Gossip, Large-Scale 1. INTRODUCTION & MODEL We adress the problem of estimating in a fully distributed way the dynamism over a network, called the churn. This BA

  14. During a proverbial 'hack', an a acker o en exploits a vulnerability in a program, hijacks controlflow, and executes malicous code. Data Execu on Preven on (DEP), a hardwareenforced security feature, prevents an a acker from directly execu ng the injected

    E-Print Network [OSTI]

    Stanley, Kenneth O.

    , prevents an a acker from directly execu ng the injected mali cious code. Therefore, a ackers have resorted of stack pointer. Aravind Prakash is a PhD candidate in Dept of Electrical Engineering and Computer Science

  15. Extension Program Council's Executive Board.

    E-Print Network [OSTI]

    Marshall, Mary G.; Richardson, Burl B.

    1986-01-01

    ing committee or task force to plan an action program. The Executive Board, assisted by Ex tension agents and resource people, decides whether this need can be directed to an ex isting program area committee, a new-program area committee, or to a... at the national level are those designed to improve conditions of low-income people. Through con gressional legislation, Extension at state and county levels develops appropriate educational programs to assist low-income families and in dividuals. Programs...

  16. A He I Case-B Recombination Code

    E-Print Network [OSTI]

    R. L. Porter

    2007-05-08

    Recent calculations of collisionless, Case-B, He I emissivities were performed by Bauman et al. (2005). The source code used in the calculation has been freely available online since that paper was published. A number of changes have been made to simplify the use of the code by third parties. Here I provide details on how to obtain, compile, and execute the program and interpret the results.

  17. Automatic generation of executable communication specifications from parallel applications

    SciTech Connect (OSTI)

    Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

    2011-01-19

    Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

  18. V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department5:Arbitrary Code |

  19. Writing Effective Executive Accomplishment Narratives Executive Accomplishment Narrative (EAN)

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowingFuelWeatherize »EvePlant |MetLifeWorkshop ReportExecutive

  20. MCF: A Malicious Code Filter * Raymond W. Lo **

    E-Print Network [OSTI]

    Yoo, S. J. Ben

    to detect malicious code (e.g., computer viruses, worms, Tro­ jan­horses, and time/logic bombs) and security viruses [4], computer worms [13], Trojan horses, and programs that exploit security holes, covert channels computer viruses. Consider a hypothetical virus W that infects writable and executable programs. W infects

  1. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  2. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    variable for further evaluation. The code will run with the privileges of the target web service. Impact: A remote user can execute arbitrary commands on the target system....

  3. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Broader source: Energy.gov (indexed) [DOE]

    a memory corruption error and execute arbitrary code on the target system. IMPACT: Access control error SOLUTION: vendor recommends upgrading to version 16.0.3.51 Addthis...

  4. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  5. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  6. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Environmental Management (EM)

    Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users...

  7. 422 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 1, JANUARY 2014 Computing Linear Functions by Linear Coding

    E-Print Network [OSTI]

    Franceschetti, Massimo

    Functions by Linear Coding Over Networks Rathinakumar Appuswamy, Member, IEEE, and Massimo Franceschetti and a receiver node demands an arbi- trary linear function of these messages. We formulate an algebraic test to determine whether an arbitrary network can compute linear functions using linear codes. We identify a class

  8. Massive "spin-2" theories in arbitrary $D \\ge 3$ dimensions

    E-Print Network [OSTI]

    D. Dalmazi; A. L. R. dos Santos; E. L. Mendona

    2014-08-28

    Here we show that in arbitrary dimensions $D\\ge 3$ there are two families of second order Lagrangians describing massive "spin-2" particles via a nonsymmetric rank-2 tensor. They differ from the usual Fierz-Pauli theory in general. At zero mass one of the families is Weyl invariant. Such massless theory has no particle content in $D=3$ and gives rise, via master action, to a dual higher order (in derivatives) description of massive spin-2 particles in $D=3$ where both the second and the fourth order terms are Weyl invariant, contrary to the linearized New Massive Gravity. However, only the fourth order term is invariant under arbitrary antisymmetric shifts. Consequently, the antisymmetric part of the tensor $e_{[\\mu\

  9. Arbitrary Rotation Invariant Random Matrix Ensembles and Supersymmetry

    E-Print Network [OSTI]

    Thomas Guhr

    2006-06-03

    We generalize the supersymmetry method in Random Matrix Theory to arbitrary rotation invariant ensembles. Our exact approach further extends a previous contribution in which we constructed a supersymmetric representation for the class of norm-dependent Random Matrix Ensembles. Here, we derive a supersymmetric formulation under very general circumstances. A projector is identified that provides the mapping of the probability density from ordinary to superspace. Furthermore, it is demonstrated that setting up the theory in Fourier superspace has considerable advantages. General and exact expressions for the correlation functions are given. We also show how the use of hyperbolic symmetry can be circumvented in the present context in which the non-linear sigma model is not used. We construct exact supersymmetric integral representations of the correlation functions for arbitrary positions of the imaginary increments in the Green functions.

  10. ARM - User Executive Committee Bios

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Comments?govInstrumentsnoaacrnBarrow, AlaskaManus Site-Inactive TWP Related LinksgovDataTime inARMUser Executive

  11. STEP Participant Survey Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo. 195 -RobSSL IN PRACTICE EDWARD CLARKICE SUPPORTSTEM-ingExecutive S

  12. FY2003 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATION FY 2013MayUncosted3 Executive

  13. FY2005 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATION FY 2013MayUncosted3 Executive5

  14. FY2006 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATION FY 2013MayUncosted3 Executive56

  15. FY2007 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATION FY 2013MayUncosted3 Executive567

  16. FY2008 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATION FY 2013MayUncosted3 Executive5678

  17. Heralding an Arbitrary Decoherence-Free Qubit State

    E-Print Network [OSTI]

    C. Allen Bishop; Ryan S. Bennink; Travis S. Humble; Philip G. Evans; Mark S. Byrd

    2013-06-25

    We present an optical device which is capable of heralding a variety of DFS states which protect against collective noise. Specifically, it can prepare all three basis states which span a DFS qutrit as well as an arbitrarily encoded DFS qubit state. We also discuss an interferometric technique for determining the amplitudes associated with an arbitrary encoding. The heralded state may find use in coherent optical systems which exhibit collective correlations.

  18. A compact, multichannel, and low noise arbitrary waveform generator

    SciTech Connect (OSTI)

    Govorkov, S.; Ivanov, B. I.; Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 ; Il'ichev, E.; Meyer, H.-G.

    2014-05-15

    A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    Tennessee is a "home rule" state which leaves adoption of codes up to the local codes jurisdictions. State energy codes are passed through the legislature, apply to all construction and must be...

  20. Quantum convolutional stabilizer codes

    E-Print Network [OSTI]

    Chinthamani, Neelima

    2004-09-30

    Quantum error correction codes were introduced as a means to protect quantum information from decoherance and operational errors. Based on their approach to error control, error correcting codes can be divided into two different classes: block codes...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2009S.B. 1182created theOklahoma Uniform Building Code Commission. The 11-member Commission was given the power to conduct rulemaking processes to adopt new building codes. The codes adopted...

  2. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Kentucky Building Code (KBC) is updated every three years on a cycle one year behind the publication year for the International Building Code. Any changes to the code by the state of Kentucky...

  3. Building Energy Code

    Broader source: Energy.gov [DOE]

    The State Building Code Council revised the Washington State Energy Code(WESC)in February 2013, effective July 1, 2013. The WESC is a state-developed code based upon ASHRAE 90.1-2010 and the...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    Mississippi's existing state code is based on the 1977 Model Code for Energy Conservation (MCEC). The existing law does not mandate enforcement by localities, and any revised code will probably...

  5. Guidelines for Implementing Executive Order 11988, "Floodplain...

    Office of Environmental Management (EM)

    11988, "Floodplain Management," and Executive Order 13690, "Establishing a Federal Flood Risk Management Standard and a Process for Further Soliciting and Considering Stakeholder...

  6. Project review for the acquisition executive

    SciTech Connect (OSTI)

    NONE

    1986-10-01

    A set of view graphs for briefing the acquisition executive for the Uranium Mill Tailings Remedial Action (UMTRA) Project are presented.

  7. Budget Execution Funds Distribution and Control

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-01-09

    The Order describes Department of Energy systems, requirements, and assignment of responsibilities for control of the Department budget execution process. Supersedes DOE O 135.1.

  8. 2014 NCAI Executive Council Winter Session

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Executive Council Winter Session is a working conference where members convene for in-depthconversations about policy, legislation, and the future of Indian Country.

  9. 2009 Wind Technologies Market Report: Executive Summary

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.

    2010-08-01

    This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    The North Carolina State Building Code Council is responsible for developing all state codes. By statute, the Commissioner of Insurance has general supervision over the administration and...

  12. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Rhode Island Building Code Standards Committee adopts, promulgates and administers the state building code. Compliance is determined through the building permit and inspection process by local...

  13. A Principal Components Analysis of Executive Processes: Exploring the Structure of Executive Functions using Neuropsychological Tests

    E-Print Network [OSTI]

    Maner, Safir

    2011-11-23

    Whether executive system is a unified or separable structure is still a matter of debate. Using an individual differences approach, this study investigated the structure of five hypothesized executive functions (Updating, ...

  14. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2011-09-01

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  15. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2010-10-01

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the Grand Challenge for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  16. Comparing Counts WHO Executives of Fortune-

    E-Print Network [OSTI]

    Pasik-Duncan, Bozenna

    some variation in the number of births per sign and there are more Pisces, but is it enough to claim likely to be executives?"!), we could use a one-proportion z-test and ask if the true proportion of executives with that sign is equal to 1/ 12. However, here we have 12 hypothesized proportions, one for each

  17. A Framework for Optimizing Distributed Workflow Executions

    E-Print Network [OSTI]

    Su, Jianwen

    on families of "communicat- ing flowcharts" (CFs). In the framework, a workflow schema is first rewritten as a family of CFs that are essentially atomic and execute in parallel. The CFs can be grouped into "clus- ters". Several CFs can be combined to form a single CF, which is useful when executing a sub

  18. 2002 Fusion Summer Study Executive Summary

    E-Print Network [OSTI]

    2002 Fusion Summer Study Executive Summary 31 July 2002 #12;page 2 of 15 2002 Fusion Summer Study Executive Summary The 2002 Fusion Summer Study was conducted from July 8-19, 2002, in Snowmass, CO, and carried out a critical assessment of major next-steps in the fusion energy sciences program in both

  19. UNIVERSITY OF VERMONT FOUNDATION EXECUTIVE COMMITTEE

    E-Print Network [OSTI]

    Bermingham, Laura Hill

    UNIVERSITY OF VERMONT FOUNDATION EXECUTIVE COMMITTEE MEETING MINUTES OCTOBER 13, 2011 A meeting of the Executive Committee of The University of Vermont and State Agricultural College Foundation, Inc. ("UVM Foundation" or "Foundation") was held on Thursday, October 13, 2011 at 7:30 a.m. at the University of Vermont

  20. EXECUTIVE VICE CHANCELLOR -ACADEMIC AFFAIRS ORGANIZATION CHART

    E-Print Network [OSTI]

    Aluwihare, Lihini

    EXECUTIVE VICE CHANCELLOR - ACADEMIC AFFAIRS ORGANIZATION CHART *Acts for the Executive Vice of organized research units. University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093 Updated (1) Organized Research Units & Multicampus Research Units General Campus Non-Faculty Research

  1. Generalized Intelligent States for an Arbitrary Quantum System

    E-Print Network [OSTI]

    A. H. EL Kinani; M. Daoud

    2003-11-06

    Generalized Intelligent States (coherent and squeezed states) are derived for an arbitrary quantum system by using the minimization of the so-called Robertson-Schr\\"odinger uncertainty relation. The Fock-Bargmann representation is also considered. As a direct illustration of our construction, the P\\"oschl-Teller potentials of trigonometric type will be shosen. We will show the advantage of the Fock-Bargmann representation in obtaining the generalized intelligent states in an analytical way. Many properties of these states are studied.

  2. Symmetry classification of quasi-linear PDE's containing arbitrary functions

    E-Print Network [OSTI]

    Giampaolo Cicogna

    2007-02-02

    We consider the problem of performing the preliminary "symmetry classification'' of a class of quasi-linear PDE's containing one or more arbitrary functions: we provide an easy condition involving these functions in order that nontrivial Lie point symmetries be admitted, and a "geometrical'' characterization of the relevant system of equations determining these symmetries. Two detailed examples will elucidate the idea and the procedure: the first one concerns a nonlinear Laplace-type equation, the second a generalization of an equation (the Grad-Schl\\"uter-Shafranov equation) which is used in magnetohydrodynamics.

  3. Controlling Electromagnetic Fields at Boundaries of Arbitrary Geometries

    E-Print Network [OSTI]

    Teo, Jonathon Yi Han; Molardi, Carlo; Genevet, Patrice

    2015-01-01

    Rapid developments in the emerging field of stretchable and conformable photonics necessitate analytical expressions for boundary conditions at metasurfaces of arbitrary geometries. Here, we introduce the concept of conformal boundary optics: a design theory that determines the optical response for designer input and output fields at such interfaces. Given any object, we can realise coatings to achieve exotic effects like optical illusions and anomalous diffraction behaviour. This approach is relevant to a broad range of applications from conventional refractive optics to the design of the next-generation of wearable optical components. This concept can be generalized to other fields of research where designer interfaces with nontrivial geometries are encountered.

  4. Colored knot polynomials for arbitrary pretzel knots and links

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Galakhov, D.; Melnikov, D.; Mironov, A.; Morozov, A.; Sleptsov, A.

    2015-04-01

    A very simple expression is conjectured for arbitrary colored Jones and HOMFLY polynomials of a rich (g+1)-parametric family of pretzel knots and links. The answer for the Jones and HOMFLY is fully and explicitly expressed through the Racah matrix of Uq(SUN), and looks related to a modular transformation of toric conformal block.Knot polynomials are among the hottest topics in modern theory. They are supposed to summarize nicely representation theory of quantum algebras and modular properties of conformal blocks. The result reported in the present letter, provides a spectacular illustration and support to this general expectation.

  5. Conditioning of finite element equations with arbitrary anisotropic meshes

    E-Print Network [OSTI]

    Kamenski, Lennard; Huang, Weizhang; Xu, Hongguo

    2014-03-05

    OF COMPUTATION Volume 83, Number 289, September 2014, Pages 21872211 S 0025-5718(2014)02822-6 Article electronically published on March 5, 2014 CONDITIONING OF FINITE ELEMENT EQUATIONS WITH ARBITRARY ANISOTROPIC MESHES LENNARD KAMENSKI, WEIZHANG HUANG... scaling. This work was supported in part by the DFG (Germany) under grants KA 3215/1-1 and KA 3215/2-1 and the National Science Foundation (U.S.A.) under grants DMS-0712935 and DMS- 1115118. c2014 American Mathematical Society Reverts to public domain 28...

  6. Superstring BRST no-ghost theorem at arbitrary picture number

    E-Print Network [OSTI]

    Mykola Dedushenko

    2015-11-12

    A simple and self-contained treatment of the superstring BRST no-ghost theorem at non-zero momentum and arbitrary picture number is presented. We prove by applying the spectral sequence that the absolute BRST cohomology is isomorphic to two copies of the light-cone spectrum at adjacent ghost numbers. We single out a representative in each cohomology class. A non-degenerate pairing between the Fock spaces, an induced pairing on the cohomology and a Hermitian inner product on the cohomology are constructed.

  7. Isotropy theorem for arbitrary-spin cosmological fields

    SciTech Connect (OSTI)

    Cembranos, J.A.R.; Maroto, A.L.; Jareo, S.J. Nez, E-mail: cembra@ucm.es, E-mail: maroto@ucm.es, E-mail: sjnjareno@ucm.es [Departamento de Fsica Terica, Universidad Complutense de Madrid, Avenida Complutense s/n, Madrid, 28040 (Spain)

    2014-03-01

    We show that the energy-momentum tensor of homogeneous fields of arbitrary spin in an expanding universe is always isotropic in average provided the fields remain bounded and evolve rapidly compared to the rate of expansion. An analytic expression for the average equation of state is obtained for Lagrangians with generic power-law kinetic and potential terms. As an example we consider the behavior of a spin-two field in the standard Fierz-Pauli theory of massive gravity. The results can be extended to general space-time geometries for locally inertial observers.

  8. Richard Lazarus Named as Executive Director of National Commission...

    Energy Savers [EERE]

    Lazarus Named as Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National...

  9. White House Announces New Executive Order To Reduce Greenhouse...

    Energy Savers [EERE]

    White House Announces New Executive Order To Reduce Greenhouse Gas Emissions in the Federal Government White House Announces New Executive Order To Reduce Greenhouse Gas Emissions...

  10. Renewable Energy Requirement Guidance for EPAct 2005 and Executive...

    Office of Environmental Management (EM)

    Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies...

  11. Executive Order 12088: Federal Compliance with Pollution Control...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2088: Federal Compliance with Pollution Control Standards Executive Order 12088: Federal Compliance with Pollution Control Standards The head of each Executive agency is...

  12. New Executive Order Establishes a Federal Flood Risk Management...

    Energy Savers [EERE]

    New Executive Order Establishes a Federal Flood Risk Management Standard New Executive Order Establishes a Federal Flood Risk Management Standard February 5, 2015 - 10:55am Addthis...

  13. Eastern Wind Integration and Transmission Study: Executive Summary...

    Energy Savers [EERE]

    Study: Executive Summary and Project Overview Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview This study evaluates the future operational...

  14. FY 2015 Senior Executive Service (SES) and Senior Professional...

    Energy Savers [EERE]

    FY 2015 Senior Executive Service (SES) and Senior Professional (SP) Performance Appraisal Opening Guidance FY 2015 Senior Executive Service (SES) and Senior Professional (SP)...

  15. Roadmap to Secure Control Systems in the Energy: Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to...

  16. American Indian Policy and Relevant DOE and Executive Orders...

    Office of Environmental Management (EM)

    Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive Orders Over the course of American history,...

  17. Executive Order -- Preparing the United States for the Impacts...

    Office of Environmental Management (EM)

    Executive Order -- Preparing the United States for the Impacts of Climate Change Executive Order -- Preparing the United States for the Impacts of Climate Change...

  18. Guidance for Meeting Executive Order 13514 Water Goals | Department...

    Energy Savers [EERE]

    Water Efficiency Guidance for Meeting Executive Order 13514 Water Goals Guidance for Meeting Executive Order 13514 Water Goals The Federal Energy Management Program offers...

  19. Fluctuating Surface Currents: A New Algorithm for Efficient Prediction of Casimir Interactions among Arbitrary Materials in Arbitrary Geometries. I. Theory

    E-Print Network [OSTI]

    M. T. Homer Reid; Jacob White; Steven G. Johnson

    2012-07-12

    This paper presents a new method for the efficient numerical computation of Casimir interactions between objects of arbitrary geometries, composed of materials with arbitrary frequency-dependent electrical properties. Our method formulates the Casimir effect as an interaction between effective electric and magnetic current distributions on the surfaces of material bodies, and obtains Casimir energies, forces, and torques from the spectral properties of a matrix that quantifies the interactions of these surface currents. The method can be formulated and understood in two distinct ways: \\textbf{(1)} as a consequence of the familiar \\textit{stress-tensor} approach to Casimir physics, or, alternatively, \\textbf{(2)} as a particular case of the \\textit{path-integral} approach to Casimir physics, and we present both formulations in full detail. In addition to providing an algorithm for computing Casimir interactions in geometries that could not be efficiently handled by any other method, the framework proposed here thus achieves an explicit unification of two seemingly disparate approaches to computational Casimir physics.

  20. Unfolding the color code

    E-Print Network [OSTI]

    Aleksander Kubica; Beni Yoshida; Fernando Pastawski

    2015-03-06

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.

  1. How Does Code Obfuscation Impact Energy Usage? Cagri Sahin, Philip Tornquist, Ryan McKenna, Zachary Pearson, and James Clause

    E-Print Network [OSTI]

    Taufer, Michela

    How Does Code Obfuscation Impact Energy Usage? Cagri Sahin, Philip Tornquist, Ryan McKenna, Zachary of the effects of 18 code obfuscations on the amount of energy consumed by executing a total of 15 usage can have a statistically significant impact on energy usage and are significantly more likely

  2. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, M.W.; George, W.A.

    1986-12-16

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

  3. Residual zonal flows in tokamaks and stellarators at arbitrary wavelengths

    E-Print Network [OSTI]

    Monreal, P; Snchez, E; Parra, F I; Bustos, A; Knies, A; Kleiber, R; Grler, T

    2015-01-01

    In the linear collisionless limit, a zonal potential perturbation in a toroidal plasma relaxes, in general, to a non-zero residual value. Expressions for the residual value in tokamak and stellarator geometries, and for arbitrary wavelengths, are derived. These expressions involve averages over the lowest order particle trajectories, that typically cannot be evaluated analytically. In this work, an efficient numerical method for the evaluation of such expressions is reported. It is shown that this method is faster than direct gyrokinetic simulations. Calculations of the residual value in stellarators are provided for much shorter wavelengths than previously available in the literature. Electrons must be treated kinetically in stellarators because, unlike in tokamaks, kinetic electrons modify the residual value even at long wavelengths. This effect, that had already been predicted theoretically, is confirmed by gyrokinetic simulations.

  4. Multiple phase estimation for arbitrary pure states under white noise

    E-Print Network [OSTI]

    Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

    2014-09-08

    In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

  5. Laplace-Runge-Lenz vector for arbitrary spin

    SciTech Connect (OSTI)

    Nikitin, A. G.

    2013-12-15

    A countable set of superintegrable quantum mechanical systems is presented which admit the dynamical symmetry with respect to algebra so(4). This algebra is generated by the Laplace-Runge-Lenz vector generalized to the case of arbitrary spin. The presented systems describe neutral particles with non-trivial multipole momenta. Their spectra can be found algebraically like in the case of hydrogen atom. Solutions for the systems with spins 1/2 and 1 are presented explicitly, solutions for spin 3/2 can be expressed via solutions of an ordinary differential equation of first order. A more extended version of this paper including detailed calculations is published as an e-print arXiv:1308.4279.

  6. Falcon: automated optimization method for arbitrary assessment criteria

    DOE Patents [OSTI]

    Yang, Tser-Yuan (Livermore, CA); Moses, Edward I. (Livermore, CA); Hartmann-Siantar, Christine (Livermore, CA)

    2001-01-01

    FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.

  7. Agile high resolution arbitrary waveform generator with jitterless frequency stepping

    DOE Patents [OSTI]

    Reilly, Peter T. A.; Koizumi, Hideya

    2010-05-11

    Jitterless transition of the programmable clock waveform is generated employing a set of two coupled direct digital synthesis (DDS) circuits. The first phase accumulator in the first DDS circuit runs at least one cycle of a common reference clock for the DDS circuits ahead of the second phase accumulator in the second DDS circuit. As a phase transition through the beginning of a phase cycle is detected from the first phase accumulator, a first phase offset word and a second phase offset word for the first and second phase accumulators are calculated and loaded into the first and second DDS circuits. The programmable clock waveform is employed as a clock input for the RAM address controller. A well defined jitterless transition in frequency of the arbitrary waveform is provided which coincides with the beginning of the phase cycle of the DDS output signal from the second DDS circuit.

  8. The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report

    SciTech Connect (OSTI)

    Not Available

    2006-09-01

    This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

  9. Strategic Plan 2014-2019 Executive Summary

    E-Print Network [OSTI]

    Wilf, Peter

    1 Strategic Plan 2014-2019 Executive Summary the University (and elsewhere) that may deviate from this strategic plan but leverage this goal we will: 1) Hire a diverse cadre of new faculty in strategic areas

  10. Executive Summit on Wind Research and Development

    Broader source: Energy.gov [DOE]

    The Executive Summit on Wind Research and Development is a two-day Summit that takes place from November 23 in the Cottonwoods Pavilion at the Hyatt Regency Tamaya Resort and Spa in Albuquerque,...

  11. Stateless and stateful implementations of faithful execution

    DOE Patents [OSTI]

    Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

    2014-12-16

    A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

  12. Plan Execution Failure Analysis Using Plan Deconstruction

    E-Print Network [OSTI]

    McNeill, F.; Bundy, Alan; Walton, Ch.; Schorlemmer, Marco

    We consider the challenges that arise when plans are based on an incorrect representation of the domain in which they are executed. We describe how information about plan formation, and how the way in which each plan step ...

  13. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    New Hampshire adopted a mandatory statewide building code in 2002 based on the 2000 IECC. SB 81 was enacted in July 2007, and it upgraded the New Hampshire Energy Code to the 2006 IECC. In...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more deta...

  16. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Indiana Residential Building Code is based on the 2003 IRC with state amendments (eff. 9/11/05). This code applies to 1 and 2 family dwellings and townhouses. During the adoption process,...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    Changes to the energy code are submitted to the Uniform Building Code Commission. The proposed change is reviewed by the Commission at a monthly meeting to decide if it warrants further...

  18. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2006 Iowa enactedH.F. 2361,requiring the State Building Commissioner to adopt energy conservation requirements based on a nationally recognized building energy code. The State Building Code...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  2. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  3. Building Energy Code

    Broader source: Energy.gov [DOE]

    The New Jersey Uniform Construction Code Act provides that model codes and standards publications shall not be adopted more frequently than once every three years. However, a revision or amendment...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 2012 IECC is in effect for all residential and commercial buildings, Idaho schools, and Idaho jurisdictions that adopt and enforce building codes, unless a local code exists that is more...

  5. Building Energy Code

    Broader source: Energy.gov [DOE]

    Delaware Energy Code is reviewed by Delaware Energy Office every three years for potential updates to the most recent version of International Energy Conservation Code (IECC) and ASHRAE Standard ...

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    Legislation passed in March 2010 authorized the Alabama Energy and Residential Code (AERC) Board to adopt mandatory residential and commercial energy codes for all jurisdictions. This is the firs...

  7. Building Energy Code

    Broader source: Energy.gov [DOE]

    All residential and commercial structures are required to comply with the states energy code. The 2009 New Mexico Energy Conservation Code (NMECC), effective June 2013, is based on 2009...

  8. Building Energy Code

    Broader source: Energy.gov [DOE]

    In September 2011 the Nebraska Building Energy Code was updated to the 2009 International Energy Conservation Code (IECC) standards. As with the previous 2003 IECC standards, which had been in...

  9. Green Construction Codes

    E-Print Network [OSTI]

    Blake, S.

    2011-01-01

    The network coding is a new paradigm that has been shown to improve throughput, fault tolerance, and other quality of service parameters in communication networks. The basic idea of the network coding techniques is to ...

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Florida Building Commission (FBC) is directed to adopt, revise, update, and maintain the Florida Building Code in accordance with Chapter 120 of the state statutes. The code is mandatory...

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    A mandatory energy code is not enforced at the state level. If a local energy code is adopted, it is enforced at the local level. Builders or sellers of new residential buildings (single-family or...

  12. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 1993 State Legislature updated the state energy code to the 1989 Model Energy Code (MEC) and established a procedure to update the standard. Then in 1995, following consultation with an...

  13. Building Energy Code

    Broader source: Energy.gov [DOE]

    Public Act 093-0936 (Illinois Energy Conservation Code for Commercial Buildings) was signed into law in August, 2004. The Illinois Energy Conservation Code for Commercial Buildings became effective...

  14. Coding with side information

    E-Print Network [OSTI]

    Cheng, Szeming

    2005-11-01

    Source coding and channel coding are two important problems in communications. Although side information exists in everyday scenario, the e?ect of side information is not taken into account in the conventional setups. ...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Virginia Uniform Statewide Building Code (USBC) is a statewide minimum requirement that local jurisdictions cannot amend. The code is applicable to all new buildings in the commonwealth. The...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    In March 2006, SB 459 was enacted to promote renewable energy and update the state's building energy codes.

  17. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code | Department

  18. Coding theory basics Evaluation codes from algebraic varieties

    E-Print Network [OSTI]

    Little, John B.

    Coding theory basics Evaluation codes from algebraic varieties Interlude ­ counting rational points theory basics Evaluation codes from algebraic varieties Interlude ­ counting rational points on varieties Cubic surfaces and codes Outline 1 Coding theory basics 2 Evaluation codes from algebraic varieties 3

  19. Simulation of neoclassical transport with the continuum gyrokinetic code COGENT

    SciTech Connect (OSTI)

    Dorf, M. A.; Cohen, R. H.; Dorr, M.; Rognlien, T.; Hittinger, J.; Compton, J.; Colella, P.; Martin, D.; McCorquodale, P.

    2013-01-15

    The development of the continuum gyrokinetic code COGENT for edge plasma simulations is reported. The present version of the code models a nonlinear axisymmetric 4D (R, v{sub Parallel-To }, {mu}) gyrokinetic equation coupled to the long-wavelength limit of the gyro-Poisson equation. Here, R is the particle gyrocenter coordinate in the poloidal plane, and v{sub Parallel-To} and {mu} are the guiding center velocity parallel to the magnetic field and the magnetic moment, respectively. The COGENT code utilizes a fourth-order finite-volume (conservative) discretization combined with arbitrary mapped multiblock grid technology (nearly field-aligned on blocks) to handle the complexity of tokamak divertor geometry with high accuracy. Topics presented are the implementation of increasingly detailed model collision operators, and the results of neoclassical transport simulations including the effects of a strong radial electric field characteristic of a tokamak pedestal under H-mode conditions.

  20. Generality of the concatenated five-qubit code

    E-Print Network [OSTI]

    Long Huang; Bo You; Xiaohua Wu; Tao Zhou

    2015-10-31

    In this work, a quantum error correction (QEC) procedure with the concatenated five-qubit code is used to construct a near-perfect effective qubit channel (with a error below $10^{-5}$) from arbitrary noise channels. The exact performance of the QEC is characterized by a Choi matrix, which can be obtained via a simple and explicit protocol. In a noise model with five free parameters, our numerical results indicate that the concatenated five-qubit code is general: To construct a near-perfect effective channel from the noise channels, the necessary size of the concatenated five-qubit code depends only on the entanglement fidelity of the initial noise channels.

  1. Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA

    E-Print Network [OSTI]

    Pasareanu, Corina

    Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA Software Corina S. Pasareanu, Peter C. Mehlitz, David H. Bushnell, Karen Gundy-Burlet, Michael Lowry NASA.h.bushnell, karen.gundy-burlet, michael.r.lowry}@nasa.gov Suzette Person Department of Computer Science

  2. Arbitrary axisymmetric steady streaming: Flow, force and propulsion

    E-Print Network [OSTI]

    Spelman, Tamsin A

    2015-01-01

    A well-developed method to induce mixing on microscopic scales is to exploit flows generated by steady streaming. Steady streaming is a classical fluid dynamics phenomenon whereby a time-periodic forcing in the bulk or along a boundary is enhanced by inertia to induce a non-zero net flow. Building on classical work for simple geometrical forcing and motivated by the complex shape oscillations of elastic capsules and bubbles, we develop the mathematical framework to quantify the steady streaming of a spherical body with arbitrary axisymmetric time-periodic boundary conditions. We compute the flow asymptotically for small-amplitude oscillations of the boundary in the limit where the viscous penetration length scale is much smaller than the body. In that case, the flow has a boundary layer structure and the fluid motion is solved by asymptotic matching. Our results, presented in the case of no-slip boundary conditions and extended to include the motion of vibrating free surfaces, recovers classical work as parti...

  3. Closed Form of the Biphoton K-Vector Spectrum for Arbitrary Spatio-Temporal Pump Modes

    E-Print Network [OSTI]

    Jeffrey Perkins

    2011-09-02

    A closed form solution is derived for the biphoton k-vector spectrum for an arbitrary pump spatial mode. The resulting mode coefficients for the pump input that maximize the probability of biphoton detection in the far field are found. It is thus possible to include the effect of arbitrary crystal poling strucures, and optimize the resulting biphoton flux.

  4. Building curves with arbitrary small MOV degree over nite prime elds

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Building curves with arbitrary small MOV degree over #12;nite prime #12;elds R. Dupont, A. Enge, F for building ordinary elliptic curves over #12;nite prime #12;elds having arbitrary small MOV degree. The el and Shacham leave it as an open problem to build curves with k = 10). In [22] Miyaji, Nakabayashi and Takano

  5. Ocean response to arbitrary wind perturbations in the low-frequency approximation: implications for ENSO and

    E-Print Network [OSTI]

    expansion about a small parameter that involves the dominant frequency of the wind forcing and the oceanic1 Ocean response to arbitrary wind perturbations in the low-frequency approximation: implications study the response of the ocean thermocline in the Pacific to arbitrary periodic wind stress

  6. Optical Arbitrary Waveform Generation Based Optical-Label Switching Transmitter with

    E-Print Network [OSTI]

    Kolner, Brian H.

    Optical Arbitrary Waveform Generation Based Optical-Label Switching Transmitter with All-Optical, 95616 Email: sbyoo@ucdavis.edu Abstract: This paper introduces a modulation-format transparent optical-label switching transmitter based on optical arbitrary waveform generation. Packets consisting of 100 Gb

  7. Mechanical code comparator

    DOE Patents [OSTI]

    Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  8. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Office of the State Fire Marshal is granted the authority to promulgate amendments, revisions, and alternative compliance methods for the code.

  9. Tokamak Systems Code

    SciTech Connect (OSTI)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    Kansas adopted the 2006 International Energy Conservation Code (IECC) as "the applicable state standard" for commercial and industrial buildings. Enforcement is provided by local jurisdictions; t...

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    Pennsylvania Department of Labor and Industry (DLI) has the authority to upgrade commercial and residential energy standards through the regulatory process. The current code, the 2009 UCC, became...

  12. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Energy Conservation Construction Code of New York State (ECCCNYS) requires that all government, commercial and residential buildings, including renovations involving building system replaceme...

  13. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Maryland Building Performance Standards (MBPS) are adopted by the Maryland Department of Housing and Community Development (DHCD) Codes Administration. As required by legislation passed in...

  14. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    commands on the target system. The code will run with the privileges of the target web service Impact: A remote user can execute arbitrary code on the target system....

  15. Quantum gravitational corrections to propagator in arbitrary spacetimes

    E-Print Network [OSTI]

    T. Padmanabhan

    1997-03-18

    The action for a relativistic free particle of mass m receives a contribution $-m R(x,y)$ from a path of length R(x,y) connecting the events $x^i$ and $y^i$. Using this action in a path integral, one can obtain the Feynman propagator for a spinless particle of mass m in any background spacetime. If one of the effects of quantizing gravity is to introduce a minimum length scale $L_P$ in the spacetime, then one would expect the segments of paths with lengths less than $L_P$ to be suppressed in the path integral. Assuming that the path integral amplitude is invariant under the `duality' transformation ${\\cal R}\\to L_P^2/R$, one can calculate the modified Feynman propagator in an arbitrary background spacetime. It turns out that the key feature of this modification is the following: The proper distance $(\\Delta x)^2$ between two events, which are infinitesimally separated, is replaced by $\\Delta x^2 + L_P^2$; that is the spacetime behaves as though it has a `zero-point length' of $L_P$. This equivalence suggests a deep relationship between introducing a `zero-point-length' to the spacetime and postulating invariance of path integral amplitudes under duality transformations. In the Schwinger's proper time description of the propagator, the weightage for a path with proper time s becomes $m(s+L_P^2/s)$ rather than as ms. As to be expected, the ultraviolet behavior of the theory is improved significantly and divergences will disappear if this modification is taken into account. Implications of this result are discussed.

  16. Massive graviton on arbitrary background: derivation, syzygies, applications

    E-Print Network [OSTI]

    Laura Bernard; Cedric Deffayet; Mikael von Strauss

    2015-04-16

    We give the detailed derivation of the fully covariant form of the quadratic action and the derived linear equations of motion for a massive graviton in an arbitrary background metric (which were presented in arXiv:1410.8302 [hep-th]). Our starting point is the de Rham-Gabadadze-Tolley (dRGT) family of ghost free massive gravities and using a simple model of this family, we are able to express this action and these equations of motion in terms of a single metric in which the graviton propagates, hence removing in particular the need for a "reference metric" which is present in the non perturbative formulation. We show further how 5 covariant constraints can be obtained including one which leads to the tracelessness of the graviton on flat space-time and removes the Boulware-Deser ghost. This last constraint involves powers and combinations of the curvature of the background metric. The 5 constraints are obtained for a background metric which is unconstrained, i.e. which does not have to obey the background field equations. We then apply these results to the case of Einstein space-times, where we show that the 5 constraints become trivial, and Friedmann-Lema\\^{\\i}tre-Robertson-Walker space-times, for which we correct in particular some results that appeared elsewhere. To reach our results, we derive several non trivial identities, syzygies, involving the graviton fields, its derivatives and the background metric curvature. These identities have their own interest. We also discover that there exist backgrounds for which the dRGT equations cannot be unambiguously linearized.

  17. EXECUTIVE COMMITTEE MEETING June 28, 2006

    E-Print Network [OSTI]

    Stephens, Jacqueline

    for Consent Agenda) (c) The assignment of oil, gas and mineral leases located in East Baton Rouge Parish Manchac Point Field. (Recommended for Consent Agenda) (d) Award of an oil, gas, and mineral lease;Minutes-Executive Committee Meeting June 28, 2006 (h) Bogalusa Medical Center Hospital Expansion

  18. Hawaii energy strategy: Executive summary, October 1995

    SciTech Connect (OSTI)

    1995-10-01

    This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

  19. Executive Summary CONSUMER RESPONSE TO TAX REBATES

    E-Print Network [OSTI]

    Cafarella, Michael J.

    Executive Summary CONSUMER RESPONSE TO TAX REBATES Matthew D. Shapiro and Joel Slemrod University of Michigan November, 2001 Many households received income tax rebates in 2001 of $300 or $600. These rebates of a representative sample of households, only 22 percent of households said that receiving the rebate would lead them

  20. Executing Verified Compiler Specification Koji Okuma1

    E-Print Network [OSTI]

    Minamide, Yasuhiko

    Executing Verified Compiler Specification Koji Okuma1 and Yasuhiko Minamide2 1 Doctoral Program {okuma,minamide}@score.is.tsukuba.ac.jp Abstract. Much work has been done in verifying a compiler compiler specification and a correct compiler implementation. To fill this gap and obtain a correct

  1. British Psychology in 2001. Executive Summary

    E-Print Network [OSTI]

    Abrahams, I. David

    1 British Psychology in 2001. Executive Summary: RAE2001 has delivered an increase in volume and quality of psychological research reflecting the healthy state of the discipline overall. Growth has been. There is high quality research in most areas of UK psychology, but there is variability in the scale of activity

  2. xvii 1999 SITE ENVIRONMENTAL REPORT Executive Summary

    E-Print Network [OSTI]

    xvii 1999 SITE ENVIRONMENTAL REPORT Executive Summary Throughout the scientific community-class scientific research with an internationally recognized environmen- tal protection program. The 1999 Site PROGRAMS The calendar year 1999 represented the first full year of operation under the management

  3. A HIFI AND FLORIDA COOS EXECUTIVE SUMMARY

    E-Print Network [OSTI]

    12.02.2006 1 A HIFI AND FLORIDA COOS EXECUTIVE SUMMARY A GULF OF MEXICO AND OCS ENERGY DISCUSSION) AND THE FLORIDA COASTAL OCEAN OBSERVING SYSTEMS (FLORIDA COOS) AS AN IOOS INITIATIVE The Gulf of Mexico Energy Security Act of 2006 (S.3711) authorizes drilling in the Eastern Gulf of Mexico west of the Military

  4. Baldrige Executive Fellows Program -Prospectus Program Purpose

    E-Print Network [OSTI]

    Virtual meetings and calls throughout the year to translate learnings into actions for your company with other executives that will benefit you now and into the future Knowledge of the Baldrige framework planning; sustainability; core competencies; customer engagement; employee engagement; integration

  5. SALARY SURVEY SEPTEMBER 2012 EXECUTIVE SUMMARY

    E-Print Network [OSTI]

    Olszewski Jr., Edward A.

    SALARY SURVEY NACE SEPTEMBER 2012 EXECUTIVE SUMMARY National Association of Colleges and Employers | www.naceweb.org STARTING SALARIES FOR NEW COLLEGE GRADUATES DATA REPORTED BY EMPLOYERS ALL DATA ARE REPORTED BY EMPLOYERS #12;2 | Salary Survey National Association of Colleges and Employers | www

  6. EXECUTIVE SUMMARY Salary Projections for Bachelor's,

    E-Print Network [OSTI]

    Shyu, Mei-Ling

    EXECUTIVE SUMMARY Featuring: · Salary Projections for Bachelor's, Master's, and Doctoral Degrees and Employers | www.naceweb.org SALARY SURVEYJANUARY 2015 STARTING SALARIES FOR NEW COLLEGE GRADUATES · DATA REPORTED BY EMPLOYERS #12;B | Salary Survey National Association of Colleges and Employers | www

  7. FORUM ON INTERNATIONAL PHYSICS Executive Committee Meeting

    E-Print Network [OSTI]

    Nahar, Sultana Nurun

    FORUM ON INTERNATIONAL PHYSICS Executive Committee Meeting Sunday, March 17, 2013 - 8:30 - 4) Report from the Past Chair (Barletta) 6) Report from the APS Council (Winick) 7) Report from CISA 8) Report from APS Office of International Affairs (Flatten) 9) International Engagement (Alp, Unit

  8. FORUM ON INTERNATIONAL PHYSICS Executive Committee Meeting

    E-Print Network [OSTI]

    Nahar, Sultana Nurun

    FORUM ON INTERNATIONAL PHYSICS Executive Committee Meeting Saturday, March 31, 2012 - 8:30 - 3) Report from the Past Chair (Newman) 6) Report from the APS Council (Winick) 7) Report from CISA 8) Report from APS Office of International Affairs (Flatten) 9) International Travel Grant Award Program (Ulloa

  9. Conditional Offer Letter Executive/Senior Administrative

    E-Print Network [OSTI]

    Acton, Scott

    Conditional Offer Letter Web Form Executive/Senior Administrative University Staff Introduction below will generate a standard conditional offer letter based on information entered by the user. This conditional offer letter web form is specific to the hiring of E&SA University Staff employees

  10. Carbon Management Plan 1. Executive summary 5

    E-Print Network [OSTI]

    Haase, Markus

    Carbon Management Plan June 2011 #12;2 #12;3 CONTENTS 1. Executive summary 5 2. Introduction 15 3. Background and context 16 4. Carbon management strategy 18 5. Carbon emissions baseline and projections 22 6. Past actions and achievements 30 7. Carbon Management Plan implementation 33 8. Carbon Management Plan

  11. 2010 Economic Impact Study Executive Summary Preview

    E-Print Network [OSTI]

    Rock, Chris

    2010 Economic Impact Study Executive Summary Preview The main campus of Texas Tech University estimates of the economic impact of Texas Tech University on Lubbock County in the year 2009. In addition a total economic impact of $1.26 billion per year for Lubbock County Texas Tech University helps sustain

  12. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    kelkar, sharad

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  13. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    kelkar, sharad

    2013-04-30

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  14. Quantum Random Access Codes using Single $d$-level Systems

    E-Print Network [OSTI]

    Armin Tavakoli; Alley Hameedi; Breno Marques; Mohamed Bourennane

    2015-04-30

    Random access codes (RACs) are used by a party to despite limited communication access an arbitrary subset of information held by another party. Quantum resources are known to enable RACs that break classical limitations. Here, we study quantum and classical RACs with high-level communication. We derive average performances of classical RACs and present families of high-level quantum RACs. Our results show that high-level quantum systems can significantly increase the advantage of quantum RACs over the classical counterparts. We demonstrate our findings in an experimental realization of a quantum RAC with four-level communication.

  15. A Global View Programming Abstraction for Transitioning MPI Codes to PGAS Languages

    SciTech Connect (OSTI)

    Mintz, Tiffany M [ORNL] [ORNL; Hernandez, Oscar R [ORNL] [ORNL; Bernholdt, David E [ORNL] [ORNL

    2014-01-01

    The multicore generation of scientific high performance computing has provided a platform for the realization of Exascale computing, and has also underscored the need for new paradigms in coding parallel applications. The current standard for writing parallel applications requires programmers to use languages designed for sequential execution. These languages have abstractions that only allow programmers to operate on the process centric local view of data. To provide suitable languages for parallel execution, many research efforts have designed languages based on the Partitioned Global Address Space (PGAS) programming model. Chapel is one of the more recent languages to be developed using this model. Chapel supports multithreaded execution with high-level abstractions for parallelism. With Chapel in mind, we have developed a set of directives that serve as intermediate expressions for transitioning scientific applications from languages designed for sequential execution to PGAS languages like Chapel that are being developed with parallelism in mind.

  16. Robert M. Goodman Executive Dean, Agriculture & Natural Resources

    E-Print Network [OSTI]

    Goodman, Robert M.

    Robert M. Goodman Executive Dean, Agriculture & Natural Resources Executive Dean, School. Thomas Leustek Assoc. Dean Academic Administration Robert Hills Assoc. Dean Academic Programs Rebecca and Business Administration Barbara Turpin Campus Dean G. H. Cook Campus School of Environmental and Biological

  17. New Mexico Federal Executive Board awards NNSA Supervisory Contract...

    National Nuclear Security Administration (NNSA)

    Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog New Mexico Federal Executive Board awards NNSA ... New Mexico Federal Executive Board awards NNSA...

  18. Course Information SER 221 Programming Languages and Their Execution Environment

    E-Print Network [OSTI]

    Course Information SER 221 Programming Languages and Their Execution Environment Catalog Description Introduces the fundamental programming language concepts of data, type, control, abstraction, and structure; software development and execution environments; programming language paradigms

  19. SUEZ: A Distributed Safe Execution Environment for System Administration Trials

    E-Print Network [OSTI]

    Venkatakrishnan, V.N.

    SUEZ: A Distributed Safe Execution Environment for System Administration Trials Doo San Sim and V of safely and conveniently performing ``trial'' experiments in system administration tasks. System administrators often perform such trial executions that involve installing new software or experimenting

  20. Executive Summaries for the Hydrogen Storage Materials Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summaries for the Hydrogen Storage Materials Center of Excellence - Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Executive Summaries for...

  1. Construction Management Applications: Challenges in Developing Execution Plans

    E-Print Network [OSTI]

    Onder, Nilufer

    Steel suppliers Detailers Design development Develop contract documents Bidding General contract award fabricator Steel erector Lower tier subcontractors Steel suppliers Detailers Steel contract execution the execution deviates from the as- planned schedule (APS), automatically suggest alternatives Assumptions

  2. Ecological Assesment of Executive Function in Healthy Aging

    E-Print Network [OSTI]

    Robertson, Lorne

    2008-03-12

    Objectives: Recent literature has highlighted the requirement for ecologically valid and broad measures of executive function. In the current study, a relatively new virtual reality measure of executive function designed ...

  3. Report number codes

    SciTech Connect (OSTI)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  4. POLICY FLASH 2014-12 Executive Compensation Cap | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuilding energy codes have a more thanPNM2 Executive Compensation Cap

  5. DEEP: A Provenance-Aware Executable Document System

    E-Print Network [OSTI]

    Browne, William J.

    DEEP: A Provenance-Aware Executable Document System Huanjia Yang1 , Danius T. Michaelides1 , Chris of both techniques. In this paper, we introduce the design and development of Deep, an executable document. In the e-Stat project, we have devel- oped Deep(Documents with Embedded Execution and Provenance), a system

  6. + University of California Riverside + Executive Management Policy Group

    E-Print Network [OSTI]

    to this guide The Executive Management Policy Group (EMPG) is the executive level oversight and strategic involved in the day-to-day management of the crisis. The EMPG makes proactive policy and strategicCrisis & Emergency + University of California Riverside + Executive Management Policy Group Crisis

  7. EXECUTION MACHINE FOR SYNCHRONOUS LANGUAGES Charles ANDR Hdi BOUFAED

    E-Print Network [OSTI]

    André, Charles

    EXECUTION MACHINE FOR SYNCHRONOUS LANGUAGES Charles ANDR? Hédi BOUFAÏED Laboratoire I3S, Université on a the synchronous paradigm, and explains the role and the architecture of the execution machine. Keywords: synchronous programming, execution machine, control, implementation. NOMENCLATURE We use Courier as the font

  8. Instrumenting Executables for Dynamic Analysis Jeff Perkins and Michael Ernst

    E-Print Network [OSTI]

    Ernst, Michael

    Instrumenting Executables for Dynamic Analysis Jeff Perkins and Michael Ernst MIT CSAIL 14 Nov 2005 09:45Page 1 Jeff PerkinsInstrumenting Executables for Dynamic Analysis #12;Compiled Instrumentation:45Page 2 Jeff PerkinsInstrumenting Executables for Dynamic Analysis #12;Source to Source Easy to create

  9. A Query Simulation System To Illustrate Database Query Execution

    E-Print Network [OSTI]

    Wagner, Paul J.

    the steps a DBMS performs during query execution. Database students need to be familiar with the underlying query execution process in order to understand how the DBMS implements commits and rollbacks. The query execution process also impacts query optimization techniques, and provides the foundation for how the DBMS

  10. EXECUTION COSTS IN FINANCIAL MARKETS WITH SEVERAL INSTITUTIONAL INVESTORS

    E-Print Network [OSTI]

    Li, Yuying

    strategies to execute a trade. For a given price-impact function, the execution cost problem dealsEXECUTION COSTS IN FINANCIAL MARKETS WITH SEVERAL INSTITUTIONAL INVESTORS Somayeh Moazeni, Yuying trade large volumes face a price impact that depends on their trading volumes simul- taneously

  11. TRANSF code user manual

    SciTech Connect (OSTI)

    Weaver, H.J.

    1981-11-01

    The TRANSF code is a semi-interactive FORTRAN IV program which is designed to calculate the model parameters of a (structural) system by performing a least square parameter fit to measured transfer function data. The code is available at LLNL on both the 7600 and the Cray machines. The transfer function data to be fit is read into the code via a disk file. The primary mode of output is FR80 graphics, although, it is also possible to have results written to either the TTY or to a disk file.

  12. Nevada Energy Code for Buildings

    Broader source: Energy.gov [DOE]

    Legislation signed in 2009 changed the process of adopting building codes in the state. Previously, the statewide code would only apply to local governments that had not already adopted a code,...

  13. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect (OSTI)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  14. Compiling Codes on Euclid

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    example.x example.c For C++ source code use mpiCC: % mpiCC -o example.x example.C PGI Compilers (CC++Fortran) See PGI compiler for information about this compiler. GNU Compilers...

  15. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    example.x example.c For C++ source code use CC % CC -fast -o example.x example.C All compilers on Hopper, PGI, Pathscale, Cray, GNU, and Intel, are provided via five programming...

  16. Climate Code Foundation

    E-Print Network [OSTI]

    Barnes, Nick; Jones, David

    2011-07-05

    Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    Missouri does not have a statewide building or energy code for private residential and commercial buildings, andthere currently is no state regulatory agency authorized to promulgate, adopt, or...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Oregon Energy Code amendments were most recently updated for both residential and non-residential construction in 2014. In October 2010 Oregon also adopted the Oregon Solar Installation...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Texas State Energy Conservation Office (SECO) by rule may choose to adopt the latest published editions of the energy efficiency provisions of the International Residential Code (IRC) or the...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    Authority for adopting the state energy codes was previously vested in the Energy Security Office of the Department of Commerce (originally the Department of Public Services). In 1999-2000, the...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Massachusetts Board of Building Regulations and Standards has authority to promulgate the Massachusetts State Building Code (MSBC). The energy provisions in the MSBC were developed by the Boa...

  2. Systematic wireless network coding

    E-Print Network [OSTI]

    Shrader, Brooke E.

    We present a systematic network coding strategy for cooperative communication, in which some nodes may replicate-and-forward packets in addition to sending random linear combinations of the packets. We argue that if this ...

  3. Executive roundtable on coal-fired generation

    SciTech Connect (OSTI)

    2009-09-15

    Power Engineering magazine invited six industry executives from the coal-fired sector to discuss issues affecting current and future prospects of coal-fired generation. The executives are Tim Curran, head of Alstom Power for the USA and Senior Vice President and General Manager of Boilers North America; Ray Kowalik, President and General Manager of Burns and McDonnell Energy Group; Jeff Holmstead, head of Environmental Strategies for the Bracewell Giuliani law firm; Jim Mackey, Vice President, Fluor Power Group's Solid Fuel business line; Tom Shelby, President Kiewit Power Inc., and David Wilks, President of Energy Supply for Excel Energy Group. Steve Blankinship, the magazine's Associate Editor, was the moderator. 6 photos.

  4. Executive Committee meeting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof Energy Services » Program Management »Eric J.9 ExaminationExecutive

  5. UMC Executive Committee May 16, 2013

    E-Print Network [OSTI]

    Minnesota, University of

    in Dowell Hall to bring them up to ADA code Renovation of restrooms in Skyberg Hall Addressing Nest, Sahlstrom Conference Center New paint in 121 and 125 Dowell Hall Rich will do his best

  6. Integrating S6 Code Search and Code Bubbles

    E-Print Network [OSTI]

    Reiss, Steven P.

    the results of the search. Index Terms--Code search, integrated development envi- ronments, test-based searchIntegrating S6 Code Search and Code Bubbles Steven P. Reiss Department of Computer Science Brown search over open source repositories as part of the Code Bub- bles integrated development environment

  7. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  8. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6: Adobe|

  9. Network Coding in Distributed, Dynamic, and Wireless Environments: Algorithms and Applications

    E-Print Network [OSTI]

    Chaudhry, Mohammad

    2012-02-14

    based on general linear codes. For each scenario, the optimal set of paths to retrieve packets a, b, and c is shown by thick lines. : : : : 101 43 Execution of the algorithm for three-tier networks (a) A three- tier instance of Problem DDR with ve...). : : : : : : : : : : : 114 44 Execution of the algorithm for general networks. (a) A general instance for Problem DDR. (b) Construction of an auxiliary graph H(V^1; V^2; E^) (nodes in V^1 are black and nodes in V^2 are shown in white). (c) Bi-partite graphH(V^1; V^2; E...

  10. Quantum error control codes

    E-Print Network [OSTI]

    Abdelhamid Awad Aly Ahmed, Sala

    2008-10-10

    by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Oce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major Subject: Computer Science QUANTUM ERROR CONTROL CODES A... Members, Mahmoud M. El-Halwagi Anxiao (Andrew) Jiang Rabi N. Mahapatra Head of Department, Valerie Taylor May 2008 Major Subject: Computer Science iii ABSTRACT Quantum Error Control Codes. (May 2008) Salah Abdelhamid Awad Aly Ahmed, B.Sc., Mansoura...

  11. General form of the covariant field equations of arbitrary spin and the relativistic canonical quantum mechanics

    E-Print Network [OSTI]

    Simulik, V M

    2015-01-01

    The investigation of arXiv 1409.2766v2 [quant-ph] has been continued by the general form of the numerous equations with partial values of arbitrary spin, which were considered in above mentioned preprint. The general forms of quantum-mechanical and covariant equations for arbitrary spin together with the general description of the arbitrary spin field formalism are presented. The corresponding relativistic quantum mechanics of arbitrary spin is given as the system of axioms. Previously ignored partial example of the spin s=(0,0) particle-antiparticle doublet is considered. The partial example of spin s=(3/2,3/2) particle-antiparticle doublet is highlighted. The new 64 dimensional Clifford--Dirac algebra over the field of real numbers is suggested. The general operator, which transformed the relativistic canonical quantum mechanics of arbitrary spin into the locally covariant field theory, has been introduced. Moreover, the study of the place of the results given in arXiv 1409.2766v2 [quant-ph] among the resul...

  12. Hydrogen Codes and Standards and Permitting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12,ExecutiveFinancingR Walls -Hydro-Pac Inc., A High Pressure&Codes and

  13. Executive Positions | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'aExecutive Positions | National Nuclear

  14. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-18

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  15. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-25

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  16. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A.; Smith, Brian E.

    2013-01-29

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  17. Realization of arbitrary discrete unitary transformations using spatial and internal modes of light

    E-Print Network [OSTI]

    Dhand, Ish

    2015-01-01

    Any lossless transformation on $n_{s}$ spatial and $n_{p}$ internal modes of light can be described by an $n_{s}n_{p}\\times n_{s}n_{p}$ unitary matrix, but no procedure to effect arbitrary $n_{s}n_{p}\\times n_{s}n_{p}$ unitary matrix on the combined spatial and internal modes is known. We devise an algorithm to realize an arbitrary discrete unitary transformation on the combined spatial and internal degrees of freedom of light. Our realization uses beamsplitters and operations on internal modes to effect arbitrary linear transformations. The number of beamsplitters required to realize a unitary transformation is reduced as compared to existing realization by a factor equal to the dimension of the employed internal degree of freedom. Our algorithm thus enables the optical implementation of higher dimensional unitary transformations.

  18. Student Code Number: Thermodynamics

    E-Print Network [OSTI]

    Feeny, Brian

    Student Code Number: Thermodynamics Ph.D. Qualifying Exam Department of Mechanical Engineering;Thermodynamics Qualifier January 2013 Problem 1 Air is compressed in an axial-flow compressor operating at steady of exergy destruction within the compressor, in kJ per kg of air flowing. #12;Thermodynamics Qualifier

  19. Introduction to Algebraic Codes

    E-Print Network [OSTI]

    Purdue University. W.Lafayette, Indiana ..... information. It motivated many scientists to study the codes transmitted by living beings, ...... We have the following diagram, where lines indicate inclusion relation,. ?. Fp4 Fp6 Fp10 ...... K over. the field K. There is a serious problem of being incomplete for the affine spaces: 69...

  20. Trusted Computing Technologies, Intel Trusted Execution Technology.

    SciTech Connect (OSTI)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  1. Engaging Non-IT Executives in IT Infrastructure Decisions

    E-Print Network [OSTI]

    Fonstad, Nils O.

    2008-07-01

    This case study describes how information technology (IT) managers from Insurance Co. successfully engaged non-IT executives in IT infrastructure investment decisions. This

  2. Written Testimony of Wes Kelley Executive Director Columbia Power...

    Broader source: Energy.gov (indexed) [DOE]

    facing distribution utilities, especially with the advent and rapid growth of distributed energy resources (DERs). My name is Wes Kelley, and I serve as the Executive Director of...

  3. Memorandum of Understanding on Environmental Justice and Executive...

    Office of Environmental Management (EM)

    and WHEREAS, Executive Order 12898 applies to the following agencies: the Department of Agriculture, Department of Commerce, Department of Defense, Department of Energy,...

  4. New Executive Order Establishes a Federal Flood Risk Management...

    Broader source: Energy.gov (indexed) [DOE]

    President Obama signed Executive Order (E.O.) 13690, Establishing a Federal Flood Risk Management Standard and a Process for Further Soliciting and Considering Stakeholder Input,...

  5. Executive Order 13175: Consultation and Coordination with Indian...

    Office of Environmental Management (EM)

    7249 Federal Register Vol. 65, No. 218 Thursday, November 9, 2000 Title 3- The President Executive Order 13175 of November 6, 2000 Consultation and Coordination With Indian Tribal...

  6. FEMP First Thursday Seminar Covers Executive Order 13693 Updates...

    Office of Environmental Management (EM)

    with a comprehensive update on Executive Order (E.O.) 13693 provisions related to energy, water, greenhouse gas emissions, electronic stewardship, sustainable purchasing,...

  7. Foresight and reconsideration in hierarchical planning and execution

    E-Print Network [OSTI]

    Levihn, Martin

    We present a hierarchical planning and execution architecture that maintains the computational efficiency of hierarchical decomposition while improving optimality. It provides mechanisms for monitoring the belief state ...

  8. Generating and executing programs for a floating point single...

    Office of Scientific and Technical Information (OSTI)

    Generating and executing programs for a floating point single instruction multiple data instruction set architecture Citation Details In-Document Search Title: Generating and...

  9. Executive Order 13212 - Actions To Expedite Energy-Related Projects...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Expedite Energy-Related Projects: Federal Register Notice Volume 66, No. 99 - May 18, 2001 Executive Order 13212 - Actions To Expedite Energy-Related Projects: Federal Register...

  10. President Issues Executive Order Aimed at Preparing for the Impacts...

    Broader source: Energy.gov (indexed) [DOE]

    2013 report detailing the latest scientific findings and projections related to climate change, President Obama signed an Executive Order on November 1 directing federal...

  11. Draft Revised Guidelines for Implementing Executive Order 11988, "Floodplain Management"

    Broader source: Energy.gov [DOE]

    The Federal Emergency Management Agency published the draft Revised Guidelines for Implementing Executive Order 11988, Floodplain Management for public review and comment on January 30, 2015.

  12. Executive Order 13045, Protection of Children from Environmental...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    045, Protection of Children from Environmental Health Risks and Safety Risks Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks Each...

  13. Approved Module Information for BMM601, 2014/5 Module Title/Name: Marketing Management Module Code: BMM601

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for BMM601, 2014/5 Module Title/Name: Marketing Management Module Code in marketing to guide the development and execution of marketing strategies To develop the skills to critically analyse marketing situations facing organisations To gain understanding of marketing decision options

  14. A Fault-Oblivious Extreme-Scale Execution Environment (FOX)

    SciTech Connect (OSTI)

    Van Hensbergen, Eric; Speight, William; Xenidis, Jimi

    2013-03-15

    IBM Researchs contribution to the Fault Oblivious Extreme-scale Execution Environment (FOX) revolved around three core research deliverables: ? collaboration with Boston University around the Kittyhawk cloud infrastructure which both enabled a development and deployment platform for the project team and provided a fault-injection testbed to evaluate prototypes ? operating systems research focused on exploring role-based operating system technologies through collaboration with Sandia National Labs on the NIX research operating system and collaboration with the broader IBM Research community around a hybrid operating system model which became known as FusedOS ? IBM Research also participated in an advisory capacity with the Boston University SESA project, the core of which was derived from the K42 operating system research project funded in part by DARPAs HPCS program. Both of these contributions were built on a foundation of previous operating systems research funding by the Department of Energys FastOS Program. Through the course of the X-stack funding we were able to develop prototypes, deploy them on production clusters at scale, and make them available to other researchers. As newer hardware, in the form of BlueGene/Q, came online, we were able to port the prototypes to the new hardware and release the source code for the resulting prototypes as open source to the community. In addition to the open source coded for the Kittyhawk and NIX prototypes, we were able to bring the BlueGene/Q Linux patches up to a more recent kernel and contribute them for inclusion by the broader Linux community. The lasting impact of the IBM Research work on FOX can be seen in its effect on the shift of IBMs approach to HPC operating systems from Linux and Compute Node Kernels to role-based approaches as prototyped by the NIX and FusedOS work. This impact can be seen beyond IBM in follow-on ideas being incorporated into the proposals for the Exasacale Operating Systems/Runtime program.

  15. What's the Code? Automatic Classification of Source Code Archives

    E-Print Network [OSTI]

    Giles, C. Lee

    show that source code can be accurately and automatically classified into topical categories and canWhat's the Code? Automatic Classification of Source Code Archives Secil Ugurel1, Robert Krovetz2, C.psu.edu 2NECResearchInstitute 4 IndependenceWay, Princeton,NJ 08540 {krovetz, dpennock, compuman} @research

  16. Space time coded code division multiplexing on SC140 DSP

    E-Print Network [OSTI]

    Menon, Murali P

    2001-01-01

    is implemented on StarCore's SC140 fixed-point DSP core. The very large instruction word architecture of the SC140 is utilized to efficiently implement space-time coded code-division multiplexing system. The goal is to evaluate the suitability of space-time coded...

  17. Generating Code for High-Level Operations through Code Composition

    E-Print Network [OSTI]

    Generating Code for High-Level Operations through Code Composition James M. Stichnoth August 1997 of the authors and should not be interpreted as necessarily representing the official policies or endorsements: Compilers, code generation, parallelism, communication generation #12;Abstract A traditional compiler

  18. Adaptive code generators for tree coding of speech

    E-Print Network [OSTI]

    Dong, Hui

    1998-01-01

    Tree coding is a promising way of obtaining good performance for medium-to-low rate speech coding. The key part of a tree coder is the code generator which consists of a short-term predictor and a long-term predictor. The ...

  19. Code Completion From Abbreviated Input

    E-Print Network [OSTI]

    Miller, Robert C.

    Abbreviation Completion is a novel technique to improve the efficiency of code-writing by supporting code completion of multiple keywords based on non-predefined abbreviated input - a different approach from conventional ...

  20. Network coding for anonymous broadcast

    E-Print Network [OSTI]

    Sergeev, Ivan A

    2013-01-01

    This thesis explores the use of network coding for anonymous broadcast. Network coding, the technique of transmitting or storing mixtures of messages rather than individual messages, can provide anonymity with its mixing ...

  1. Rotationally invariant multilevel block codes

    E-Print Network [OSTI]

    Kulandaivelu, Anita

    1993-01-01

    The objective of this thesis is to evaluate the performance of block codes that are designed to be rotationally invariant, in a multilevel coding scheme, over a channel modelled to be white gaussian noise. Also, the use ...

  2. Confocal coded aperture imaging

    DOE Patents [OSTI]

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  3. MELCOR computer code manuals

    SciTech Connect (OSTI)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  4. A Closed-Form Solution to the Arbitrary Order Cauchy Problem with Propagators

    E-Print Network [OSTI]

    Henrik Stenlund

    2014-11-24

    The general abstract arbitrary order (N) Cauchy problem was solved in a closed form as a sum of exponential propagator functions. The infinite sparse exponential series was solved with the aid of a homogeneous differential equation. It generated a linear combination of exponential functions. The Cauchy problem solution was formed with N linear combinations of N exponential propagators.

  5. REGRESSION PERFORMANCE OF GROUP LASSO FOR ARBITRARY DESIGN MATRICES Marco F. Duarte,1,

    E-Print Network [OSTI]

    Bajwa, Waheed U.

    REGRESSION PERFORMANCE OF GROUP LASSO FOR ARBITRARY DESIGN MATRICES Marco F. Duarte,1, Waheed U.duarte,w.bajwa,robert.calderbank}@duke.edu ABSTRACT In many linear regression problems, explanatory variables are activated in groups or clusters; group lasso has been proposed for regression in such cases. This paper studies the non- asymptotic

  6. Integration In this Chapter, we define the integral of real-valued functions on an arbitrary

    E-Print Network [OSTI]

    Hunter, John K.

    CHAPTER 4 Integration In this Chapter, we define the integral of real-valued functions on an arbitrary measure space and derive some of its basic properties. We refer to this integral as the Lebesgue integral, whether or not the domain of the functions is subset of Rn equipped with Lebesgue measure

  7. Single-crystalline silicon lift-off films for metaloxidesemiconductor devices on arbitrary substrates

    E-Print Network [OSTI]

    Ludwig-Maximilians-Universitt, Mnchen

    Single-crystalline silicon lift-off films for metaloxidesemiconductor devices on arbitrary Received 9 March 2000; accepted for publication 31 May 2000 We present a technique to mount single-crystalline,4 Combining silicon microelectronics on crystalline, high- quality thin silicon films with the properties

  8. Intro Algo ring Arbitrary graphs Conclusion PING PONG IN DANGEROUS GRAPHS

    E-Print Network [OSTI]

    Fondements et Applications, Universit Paris 7

    Intro Algo ring Arbitrary graphs Conclusion PING PONG IN DANGEROUS GRAPHS Optimal Black Hole Search blocking and destroying any mobile agent entering it. Motivations : Site which is destroyed or dangerous blocking and destroying any mobile agent entering it. Motivations : Site which is destroyed or dangerous

  9. Comment on the shape of Hydrogen equation in spaces of arbitrary dimension

    E-Print Network [OSTI]

    M. Ya. Amusia

    2015-02-20

    We note that presenting Hydrogen atom Schrodinger equation in the case of arbitrary dimensions require simultaneous modification of the Coulomb potential that only in three dimensions has the form Z/r . This was not done in a number of relatively recent papers [1-5]. Therefore some results obtained there seem to be doubtful. Some required considerations in the area are mentioned.

  10. Efficient Algorithms for Computing the Triplet and Quartet Distance Between Trees of Arbitrary Degree

    E-Print Network [OSTI]

    Schierup, Mikkel Heide

    Efficient Algorithms for Computing the Triplet and Quartet Distance Between Trees of Arbitrary- ficient algorithms for computing these distances. We show how to compute the triplet distance in time O against unresolved (non-binary) topologies. The previous best algorithm for computing the triplet

  11. SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies

    E-Print Network [OSTI]

    SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies Jayaram Mudigonda bandwidth over both simulated and experimental data-center net- works. 1 Introduction Data-center operators. They thus desire scalable data-center net- works. Data-center operators also must reduce costs for both

  12. Static magnetic solution in magnetic composites with arbitrary susceptibility inhomogeneity and anisotropy

    E-Print Network [OSTI]

    Chen, Long-Qing

    Static magnetic solution in magnetic composites with arbitrary susceptibility inhomogeneity nanoparticles with biaxial anisotropy J. Appl. Phys. 113, 053903 (2013); 10.1063/1.4789848 Static and high://scitation.aip.org/termsconditions. Downloaded to ] IP: 128.118.37.128 On: Fri, 13 Mar 2015 21:15:38 #12;Static magnetic solution in magnetic

  13. Wave scattering by small bodies of arbitrary shapes. Alexander G.Ramm

    E-Print Network [OSTI]

    bodies the fundamental integral equations of the theory can be solved numerically to studyWave scattering by small bodies of arbitrary shapes. Alexander G.Ramm In: Acoustic, Electromagnetic Introduction The theory of wave scattering by small bodies was initiated by Rayleigh (1871). Thomp- son (1893

  14. How the diffusivity profile reduces the arbitrariness of protein folding free energies

    E-Print Network [OSTI]

    Thirumalai, Devarajan

    How the diffusivity profile reduces the arbitrariness of protein folding free energies M 2010 The concept of a protein diffusing in its free-energy folding landscape has been fruitful for both as it stochastically folds and unfolds. The free-energy profiles for different RCs exhibit significant variations, some

  15. TaylUR 3, a multivariate arbitrary-order automatic differentiation package for Fortran 95

    E-Print Network [OSTI]

    G. M. von Hippel

    2009-11-26

    This new version of TaylUR is based on a completely new core, which now is able to compute the numerical values of all of a complex-valued function's partial derivatives up to an arbitrary order, including mixed partial derivatives.

  16. Message-Optimal and Latency-Optimal Termination Detection Algorithms for Arbitrary

    E-Print Network [OSTI]

    Mittal, Neeraj

    Message-Optimal and Latency-Optimal Termination Detection Algorithms for Arbitrary Topologies. Detecting termination of a distributed computation is a fun- damental problem in distributed systems. We present two optimal algo- rithms for detecting termination of a non-diffusing distributed computa- tion

  17. Factorization of Darboux transformations of arbitrary order for 2D Schroedinger operators

    E-Print Network [OSTI]

    Ekaterina Shemyakova

    2015-05-04

    We give a proof of Darboux's conjecture that every Darboux transformation of arbitrary order of a 2D Schroedinger type operator can be factorized into Darboux transformations of order one. The proof is constructive. The result is obtained in the framework of an algebraic approach to Darboux transformations which is suggested in this paper and is a further improvement of S. Tsarev's earlier idea.

  18. Uniform WKB approximation of Coulomb wave functions for arbitrary partial wave

    E-Print Network [OSTI]

    N. Michel

    2008-12-12

    Coulomb wave functions are difficult to compute numerically for extremely low energies, even with direct numerical integration. Hence, it is more convenient to use asymptotic formulas in this region. It is the object of this paper to derive analytical asymptotic formulas valid for arbitrary energies and partial waves. Moreover, it is possible to extend these formulas for complex values of parameters.

  19. Wave Energy Converter Design Tool for Point Absorbers with Arbitrary Device Geometry Kelley Ruehl

    E-Print Network [OSTI]

    Siefert, Chris

    Wave Energy Converter Design Tool for Point Absorbers with Arbitrary Device Geometry Kelley Ruehl University Corvallis, OR, USA ABSTRACT In order to promote and support the wave energy industry, a Wave strategies. KEY WORDS: wave energy; point absorber; time-domain; design tool. INTRODUCTION Wave Energy

  20. BINGO: a code for the efficient computation of the scalar bi-spectrum

    SciTech Connect (OSTI)

    Hazra, Dhiraj Kumar [Harish-Chandra Research Institute, Chhatnag Road, Jhunsi, Allahabad 211019 (India); Sriramkumar, L. [Department of Physics, Indian Institute of Technology Madras, Chennai 600036 (India); Martin, Jrme, E-mail: dhiraj@apctp.org, E-mail: sriram@physics.iitm.ac.in, E-mail: jmartin@iap.fr [Institut d'Astrophysique de Paris, UMR7095-CNRS, Universit Pierre et Marie Curie, 98bis boulevard Arago, 75014 Paris (France)

    2013-05-01

    We present a new and accurate Fortran code, the BI-spectra and Non-Gaussianity Operator (BINGO), for the efficient numerical computation of the scalar bi-spectrum and the non-Gaussianity parameter f{sub NL} in single field inflationary models involving the canonical scalar field. The code can calculate all the different contributions to the bi-spectrum and the parameter f{sub NL} for an arbitrary triangular configuration of the wavevectors. Focusing firstly on the equilateral limit, we illustrate the accuracy of BINGO by comparing the results from the code with the spectral dependence of the bi-spectrum expected in power law inflation. Then, considering an arbitrary triangular configuration, we contrast the numerical results with the analytical expression available in the slow roll limit, for, say, the case of the conventional quadratic potential. Considering a non-trivial scenario involving deviations from slow roll, we compare the results from the code with the analytical results that have recently been obtained in the case of the Starobinsky model in the equilateral limit. As an immediate application, we utilize BINGO to examine of the power of the non-Gaussianity parameter f{sub NL} to discriminate between various inflationary models that admit departures from slow roll and lead to similar features in the scalar power spectrum. We close with a summary and discussion on the implications of the results we obtain.

  1. Design of proximity detecting codes

    E-Print Network [OSTI]

    Perisetty, Srinivas

    1997-01-01

    class of codes called Proximity Detecting Codes can be used to overcome this problem associated with asynchronous channels. A t-proximity detecting (t-PD) code can detect when a received word is within distance t from the transmitted codeword, when using...

  2. A Mechanically Verified Code Generator

    E-Print Network [OSTI]

    Boyer, Robert Stephen

    A Mechanically Verified Code Generator William D. Young Technical Report 37 January, 1989, one which generates semantically equivalent target language code for any given source language program we describe the implementation and proof of a code generator, a major component of a compiler

  3. DOE Coordination Meeting CODES & STANDARDS

    E-Print Network [OSTI]

    industry and code officials, develop templates of commercially viable footprints for fueling stations-order continuing education for code officials. 3 Date (FY)DescriptionMilestone #12;Hydrogen Safety Neil RossmeisslDOE Coordination Meeting DELIVERY FUEL CELLS STORAGE PRODUCTION TECHNOLOGY VALIDATION CODES

  4. Southeast Energy Efficiency Alliance's Building Energy Codes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

  5. Combining Symbolic Execution and Model Checking for Data Flow Testing

    E-Print Network [OSTI]

    Su, Zhendong

    . Dynamic Symbolic Execution [14], [15] (DSE) is a widely accepted and effective approach for automatic testCombining Symbolic Execution and Model Checking for Data Flow Testing Ting Su Zhoulai Fu Geguang Pu@cs.ucdavis.edu Abstract--Data flow testing (DFT) focuses on the flow of data through a program. Despite its higher fault

  6. CRITIQUING TEAM PROCEDURE EXECUTION Stephanie Guerlain Peter Bullemer

    E-Print Network [OSTI]

    Virginia, University of

    at a major petrochemical refinery. This refinery hastwo identical reactors in one part of their process in the more dynamic world of process control. Specifically, we support the execution of complex procedures in petrochemical plants with an on-line, executable dynamic procedures decision support system,where we introduce

  7. Three NASA Application Domains for Integrated Planning, Scheduling and Execution

    E-Print Network [OSTI]

    Kortenkamp, David

    Three NASA Application Domains for Integrated Planning, Scheduling and Execution David Kortenkamp. NASA Johnson Space Center { ER2 Houston, TX 77058 kortenkamp@jsc.nasa.gov Abstract This paper describes three application domains for in- tegrating planning, scheduling and execution at NASA Johnson Space

  8. Reconstructing Critical Paths from Execution Traces Martijn Hendriks

    E-Print Network [OSTI]

    Vaandrager, Frits

    Reconstructing Critical Paths from Execution Traces Martijn Hendriks Embedded Systems Institute of constructing critical paths from incomplete information. In general, a directed acyclic graph of tasks with their execution times (i.e., a task graph) is necessary to extract critical paths. We assume, however, that only

  9. An Approach for Energy Efficient Execution of Hybrid Parallel Programs

    E-Print Network [OSTI]

    Teo, Yong-Meng

    An Approach for Energy Efficient Execution of Hybrid Parallel Programs Lavanya Ramapantulu system. One of the key challenges for energy efficient execution of hybrid programs is to determine time and energy efficient hardware configurations among a large system configuration space. Given a hybrid program

  10. Towards a New Execution Model for HPC Clouds Thomas Sterling

    E-Print Network [OSTI]

    Lumsdaine, Andrew

    Towards a New Execution Model for HPC Clouds Thomas Sterling Center for Research in Extreme Scale an alternative paradigm for bringing Clouds more closely aligned to Science, Technology, Engineering Execution Model for HPC Clouds Thomas Sterling 1. Introduction Even as HPC is transiting the pan

  11. Knowledge and plan execution management in planning fire fighting operations

    E-Print Network [OSTI]

    Fernndez Olivares, Juan

    Knowledge and plan execution management in planning fire fighting operations Marc de la Asunci to assist human experts in the design of forest fire fighting plans. Issues about how to engineer planning knowledge for such a system, how to monitor the execution of fighting plans and how to patch unfeasible

  12. Surface code quantum communication

    E-Print Network [OSTI]

    Austin G. Fowler; David S. Wang; Charles D. Hill; Thaddeus D. Ladd; Rodney Van Meter; Lloyd C. L. Hollenberg

    2010-02-05

    Quantum communication typically involves a linear chain of repeater stations, each capable of reliable local quantum computation and connected to their nearest neighbors by unreliable communication links. The communication rate in existing protocols is low as two-way classical communication is used. We show that, if Bell pairs are generated between neighboring stations with a probability of heralded success greater than 0.65 and fidelity greater than 0.96, two-way classical communication can be entirely avoided and quantum information can be sent over arbitrary distances with arbitrarily low error at a rate limited only by the local gate speed. The number of qubits per repeater scales logarithmically with the communication distance. If the probability of heralded success is less than 0.65 and Bell pairs between neighboring stations with fidelity no less than 0.92 are generated only every T_B seconds, the logarithmic resource scaling remains and the communication rate through N links is proportional to 1/(T_B log^2 N).

  13. Wyner-Ziv coding based on TCQ and LDPC codes and extensions to multiterminal source coding

    E-Print Network [OSTI]

    Yang, Yang

    2005-11-01

    performs only 0.2 dB away from the Wyner-Ziv limit D??W Z(R) at high rate, which mirrors the performance of entropy-coded TCQ in classic source coding. Practical designs perform 0.83 dB away from D??W Z(R) at medium rates. With 2-D trellis-coded vector...

  14. Two Poisson structures invariant with respect to discrete transformation in the case of arbitrary semi-simple algebras

    E-Print Network [OSTI]

    A. N. Leznov

    2008-01-16

    Two Poisson structures invariant with respect to discrete transformation of the Maximal root in the case of arbitrary semi-simple algebras are presented in explicit form. Thus the problem of construction of equations of n-wave hierarchy in the case of arbitrary semi simple algebra is solved finally.

  15. 1652 JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 28, NO. 11, JUNE 1, 2010 Large Time-Bandwidth Product Microwave Arbitrary

    E-Print Network [OSTI]

    Yao, Jianping

    Microwave Arbitrary Waveform Generation Using a Spatially Discrete Chirped Fiber Bragg Grating Chao Wang and experimentally demonstrate an approach to generating large time-bandwidth product (TBWP) microwave arbitrary of a bandwidth-limited photodetector (PD), a smooth microwave waveform is obtained. The SD-CFBG is fabricated

  16. Coding Archives - Nercenergy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAuditsCluster Compatibility Mode Cluster CompatibilityCoalCode of

  17. T-618: Debian update for exim4: Mail Transport Agent

    Broader source: Energy.gov [DOE]

    It was discovered that Exim, the default mail transport agent in Debian, uses DKIM data obtain from DNS directly in a format string, potentially allowing malicious mail senders to execute arbitrary code.

  18. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

  19. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Broader source: Energy.gov (indexed) [DOE]

    Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

  20. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

  1. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

  2. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  3. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  4. V-200: Apache Struts DefaultActionMapper Redirection and OGNL...

    Broader source: Energy.gov (indexed) [DOE]

    tcher.mapper.DefaultActionMapper) can be exploited to e.g. inject and execute arbitrary Java code via OGNL (Object-Graph Navigation Language) expressions. IMPACT: Security Bypass...

  5. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  6. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in...

  7. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and...

    Broader source: Energy.gov (indexed) [DOE]

    is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an...

  8. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  9. 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Executive Summary and Overview Summary Slides 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview Summary Slides Summary and overview slides for 20% Wind Energy...

  10. Transport properties of dense dissipitive hard-sphere fluids for arbitrary energy loss models

    E-Print Network [OSTI]

    James F. Lutsko

    2005-03-17

    The revised Enskog approximation for a fluid of hard spheres which lose energy upon collision is discussed for the case that the energy is lost from the normal component of the velocity at collision but is otherwise arbitrary. Granular fluids with a velocity-dependent coefficient of restitution are an important special case covered by this model. A normal solution to the Enskog equation is developed using the Chapman-Enskog expansion. The lowest order solution describes the general homogeneous cooling state and a generating function formalism is introduced for the determination of the distribution function. The first order solution, evaluated in the lowest Sonine approximation, provides estimates for the transport coefficients for the Navier-Stokes hydrodynamic description. All calculations are performed in an arbitrary number of dimensions.

  11. Collision of arbitrary strong gravitational and electromagnetic waves in the expanding universe

    E-Print Network [OSTI]

    Alekseev, G A

    2015-01-01

    A completely analytical model of the process of collision and nonlinear interaction of gravitational and electromagnetic soliton wave pulses and strong electromagnetic travelling waves of arbitrary profiles propagating in the expanding universe (symmetric Kasner space-time) is presented. In contrast to intuitive expectations that rather strong travelling waves can destroy the soliton, it occurs that the soliton survives during its interaction with electromagnetic wave of arbitrary amplitude and profile, but its parameters begin to evolve under the influence of this interaction. If a travelling electromagnetic wave possesses a finite duration, the soliton parameters after interaction take constant values again, but these values in general are different from those before the interaction. Based on exact solutions of Einstein - Maxwell equations, our model demonstrates a series of nonlinear phenomena, such as (a) creation of gravitational waves in the collision of two electromagnetic waves, (b) creation of electr...

  12. Vacuum energies due to delta-like currents: simulating classical objects along branes with arbitrary codimensions

    E-Print Network [OSTI]

    F. A. Barone; G. Flores-Hidalgo

    2008-12-20

    In this paper we investigate the vacuum energies of several models of quantum fields interacting with static external currents (linear couplings) concentrated along parallel branes with an arbitrary number of codimensions. We show that we can simulate the presence of static charges distributions as well as the presence of classical static dipoles in any dimension for massive and massless fields. We also show that we can produce confining potentials with massless self interacting scalar fields as well as long range anisotropic potentials.

  13. Efficient Admission Control for Enforcing Arbitrary Real-Time Demand-Curve Interfaces

    E-Print Network [OSTI]

    Fisher, Nathan W.

    the advantage of providing temporal isolation between subsystems co-executing upon a shared processing platform of portability and integration of independently-developed subsystems upon a shared platform. Such systems of such real-time open environments include automotive subsystems, each with strict temporal requirements

  14. What's coming in 2012 codes

    E-Print Network [OSTI]

    Lacey, E

    2011-01-01

    The 2012 IECC America?s Model Building Energy Code November 9, 2011 Presentation to Clean Air Through Energy Efficiency Conference Dallas, TX Eric Lacey Responsible Energy Codes Alliance Responsible Energy Codes Alliance ? A broad... Texas Building Energy Performance Standards What is effective now? ? 2009 IRC ? January 1, 2012 ? Applies to all 1- and 2-family dwellings ? 2009 IECC ? April 1, 2011 ? Applies to all other buildings Texas Websites ? http://www.seco.cpa.s tate...

  15. T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26.

  16. GENII Code | Department of Energy

    Office of Environmental Management (EM)

    For more information on GENII to: http:radiologicalsciences.pnl.govresourceshardware.asp The GENII code-specific guidance report has been issued identifying applicable...

  17. Clark County- Energy Conservation Code

    Broader source: Energy.gov [DOE]

    In September 2010, Clark County adopted Ordinance 3897, implementing the Southern Nevada version of the 2009 International Energy Conservation Code for both residential and commercial buildings...

  18. Marin County- Solar Access Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Marin County's Energy Conservation Code is designed to assure new subdivisions provide for future passive or natural heating or cooling opportunities in the subdivision to the extent feasible. ...

  19. Continuous execution : improving user feedback in the development cycle

    E-Print Network [OSTI]

    Su, Kevin

    2007-01-01

    Programming environments are increasing the amount of feedback given to users during the development cycle. This work continues with this trend by exploring continuous execution, a programming environment where the result ...

  20. Renewable Energy Executive Summary High-Yield Scenario

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Efficiency & Renewable Energy Executive Summary High-Yield Scenario Workshop Series Report INLEXT-10-18930 December 2009 The 2005 Billion-Ton Study a (BTS) esti- mates the amount...

  1. Robust execution of bipedal walking tasks from biomechanical principles

    E-Print Network [OSTI]

    Hofmann, Andreas G. (Andreas Gunther)

    2006-01-01

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  2. Robust Execution of Bipedal Walking Tasks From Biomechanical Principles

    E-Print Network [OSTI]

    Hofmann, Andreas

    2006-04-28

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  3. Executive coaching : crafting a versatile self in corporate America

    E-Print Network [OSTI]

    Ozkan, Esra

    2008-01-01

    In recent years, coaching has become a major form of personal and professional development service offered to executives to help develop leadership skills, enhance performance, and remediate patterns of problematic workplace ...

  4. Summary of Differences in Approach to Executing the NGNP Project

    SciTech Connect (OSTI)

    P.C. Hildebrandt

    2010-08-01

    The following discuss the summary differences between the NGNP Industry Alliances approach to execution of the NGNP Project as described in its Project Execution Strategy, and that included in the DOEs Report to Congress on the Next Generation Nuclear Plant dated April 2010. These summary differences are not a comprehensive description of the results of a detailed gap analysis, but rather are those differences that warrant discussion in meetings between DOE executives and the private sector represented by the Alliance. In practical fact, the full range and content of the differences will not be understood until such time as detailed discussions are engaged between the DOE and the Alliance to develop a mutually agreed-to project execution plan.

  5. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    Broader source: Energy.gov [DOE]

    This executive summary provides an overview of a technical report on an assessment NREL conducted in Greensburg, Kansas, to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region.

  6. MARVIN S. FERTEL President and Chief Executive Officer

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    MARVIN S. FERTEL President and Chief Executive Officer 1201 F Street, NW, Suite 1100 Washington, DC 20004 P: 202.739.8125 msf@nei.org nei.org May 5, 2014 The Honorable Ernest Moniz...

  7. Understanding the Team Dynamics of an Executive Virtual Team

    E-Print Network [OSTI]

    Riley, Ramona Leonard

    2011-10-21

    employ virtuality in their work regimen. Therefore, organizations employ virtual executives to work teams with ideal skill sets to effectively persevere and complete tasks through distance, space, and time. The purpose of this study was to identify...

  8. Nuclear Energy In the United States Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0 Status and Outlook for Nuclear Energy In the United States Executive Summary The U.S. nuclear power industry continues to make pro- gress toward the construction of new nuclear...

  9. Robust, goal-directed plan execution with bounded risk

    E-Print Network [OSTI]

    Ono, Masahiro, Ph. D. Massachusetts Institute of Technology

    2012-01-01

    There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For example, a fleet of unmanned aerial vehicles ...

  10. Needs Assessment of the Roadmap Molecular Libraries Program Executive Summary

    E-Print Network [OSTI]

    Ungerleider, Leslie G.

    Needs Assessment of the Roadmap Molecular Libraries Program Executive Summary This report discusses the findings of a needs assessment of the Roadmap Molecular Libraries Program (MLP). The MLP is an integrated

  11. What's the code? Automatic Classification of Source Code Archives

    E-Print Network [OSTI]

    Giles, C. Lee

    What's the code? Automatic Classification of Source Code Archives Secil Ugurel 1 , Robert Krovetz 2, zha} @cse.psu.edu 2 NEC Research Institute 4 Independence Way, Princeton, NJ 08540 {krovetz, dpennock, compuman} @research.nj.nec.com 3 School of Information Sciences and Technology The Pennsylvania State

  12. Executive Summary A FAculty-Driven PlAn

    E-Print Network [OSTI]

    Watson, Craig A.

    Executive Summary A FAculty-Driven PlAn SePtember 2009 reSeArch uF/iFAS roADmAP #12;UF/IFAS ReSeARch RoAdmAp Executive Summary 2 It is easier to plan when resources are plentiful, but it is far more. With these realities in mind, we began the process of developing a Research Roadmap. It was purposely designed

  13. Recent developments in DYNSUB: New models, code optimization and parallelization

    SciTech Connect (OSTI)

    Daeubler, M.; Trost, N.; Jimenez, J.; Sanchez, V. [Karlsruhe Institute of Technology, Institute for Neutron Physics and Reactor Technology, Hermann-von-Helmholtz-Platz 1, 76344 Eggenstein-Leopoldshafen (Germany)

    2013-07-01

    DYNSUB is a high-fidelity coupled code system consisting of the reactor simulator DYN3D and the sub-channel code SUBCHANFLOW. It describes nuclear reactor core behavior with pin-by-pin resolution for both steady-state and transient scenarios. In the course of the coupled code system's active development, super-homogenization (SPH) and generalized equivalence theory (GET) discontinuity factors may be computed with and employed in DYNSUB to compensate pin level homogenization errors. Because of the largely increased numerical problem size for pin-by-pin simulations, DYNSUB has bene fitted from HPC techniques to improve its numerical performance. DYNSUB's coupling scheme has been structurally revised. Computational bottlenecks have been identified and parallelized for shared memory systems using OpenMP. Comparing the elapsed time for simulating a PWR core with one-eighth symmetry under hot zero power conditions applying the original and the optimized DYNSUB using 8 cores, overall speed up factors greater than 10 have been observed. The corresponding reduction in execution time enables a routine application of DYNSUB to study pin level safety parameters for engineering sized cases in a scientific environment. (authors)

  14. Static Analysis Executables Detect Malicious Patterns Mihai Christodorescu Somesh Jha

    E-Print Network [OSTI]

    Miller, Barton P.

    initially focused our attention on viruses. computer virus replicates itself inserting copy code code@cs.wisc.edu jha@cs.wisc.edu Computer Sciences Department University Wisconsin, Madison Abstract Malicious malicious detectors, as antivirus software. tested resilience three commercial virus scanners against code

  15. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    SciTech Connect (OSTI)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  16. Accelerator Physics Code Web Repository

    SciTech Connect (OSTI)

    Zimmermann, F.; Basset, R.; Bellodi, G.; Benedetto, E.; Dorda, U.; Giovannozzi, M.; Papaphilippou, Y.; Pieloni, T.; Ruggiero, F.; Rumolo, G.; Schmidt, F.; Todesco, E.; Zotter, B.W.; Payet, J.; Bartolini, R.; Farvacque, L.; Sen, T.; Chin, Y.H.; Ohmi, K.; Oide, K.; Furman, M.; /LBL, Berkeley /Oak Ridge /Pohang Accelerator Lab. /SLAC /TRIUMF /Tech-X, Boulder /UC, San Diego /Darmstadt, GSI /Rutherford /Brookhaven

    2006-10-24

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  17. Secure Symmetrical Multilevel Diversity Coding

    E-Print Network [OSTI]

    Li, Shuo

    2012-07-16

    Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

  18. LFSC - Linac Feedback Simulation Code

    SciTech Connect (OSTI)

    Ivanov, Valentin; /Fermilab

    2008-05-01

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  19. Publications NODC Taxonomic Code and

    E-Print Network [OSTI]

    Center (NODC) has announced the availability of the third edition of its Taxonomic Code. This expanded edition has nearly 28,000 entries giving the sci- entific names and corresponding numer- ical codes (MESA) project and the Outer Conti- nental Shelf Environmental Assessment Program (OCSEAP) conducted

  20. Executive Order 13514: Federal Leadership in Environmental, Energy, and Economic Performance; Comprehensive Federal Fleet Management Handbook

    SciTech Connect (OSTI)

    2010-06-17

    Comprehensive Federal fleet management guide offered as a companion to Executive Order 13514 Section 12 guidance.

  1. Approved Module Information for EE2CSY, 2014/5 Module Title/Name: Communication Systems Module Code: EE2CSY

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    Approved Module Information for EE2CSY, 2014/5 Module Title/Name: Communication Systems Module Code techniques used in communications system * The ability to plan and execute safely a series of measurements Science. BEng Communications Engineering. Available to Exchange Students? Not Specified Module Learning

  2. Portable code development in C

    SciTech Connect (OSTI)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  3. Brownian dynamics simulations of ions channels: A general treatment of electrostatic reaction fields for molecular pores of arbitrary geometry

    E-Print Network [OSTI]

    Im, Wonpil; Roux, Benoî t

    2001-01-01

    A general method has been developed to include the electrostatic reaction field in Brownian dynamics (BD) simulations of ions diffusing through complex molecular channels of arbitrary geometry. Assuming that the solvent ...

  4. One-step transfer or exchange of arbitrary multipartite quantum states with a single-qubit coupler

    E-Print Network [OSTI]

    Yang, Chui-Ping; Su, Qi-Ping; Zheng, Shi-Biao; Han, Siyuan

    2015-08-18

    coupler, arbitrary multipartite quantum states (either entangled or separable) can be transferred or exchanged simultaneously between two sets of qubits. During the entire process, the coupler remains unexcited minimizing the effect of coupler decoherence...

  5. San Francisco Building Code Amendments to the

    E-Print Network [OSTI]

    . The California San Francisco Green Building Standards Code is Part 11 of twelve parts Chapter 13C of the official1 2010 San Francisco Building Code Amendments to the 2010 California Green Building Standards Code (Omitting amendments to 2010 California Building Code and 2010 California Residential Code which do

  6. Multiterminal source coding: sum-rate loss, code designs, and applications to video sensor networks

    E-Print Network [OSTI]

    Yang, Yang

    2009-05-15

    Driven by a host of emerging applications (e.g., sensor networks and wireless video), distributed source coding (i.e., Slepian-Wolf coding, Wyner-Ziv coding and various other forms of multiterminal source coding), has ...

  7. ETR/ITER systems code

    SciTech Connect (OSTI)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L.

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  8. Dynamical polarizability of atoms in arbitrary light fields: general theory and application to cesium

    E-Print Network [OSTI]

    Fam Le Kien; Philipp Schneeweiss; Arno Rauschenbeutel

    2012-12-06

    We present a systematic derivation of the dynamical polarizability and the ac Stark shift of the ground and excited states of atoms interacting with a far-off-resonance light field of arbitrary polarization. We calculate the scalar, vector, and tensor polarizabilities of atomic cesium using resonance wavelengths and reduced matrix elements for a large number of transitions. We analyze the properties of the fictitious magnetic field produced by the vector polarizability in conjunction with the ellipticity of the polarization of the light field.

  9. Study of stopping power for a proton moving in a plasma with arbitrary degeneracy

    SciTech Connect (OSTI)

    Zhang, Ya; Song, Yuan-Hong; Wang, You-Nian [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)] [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)

    2013-10-15

    Excitation of bulk solid electrons with arbitrary degeneracy, by external charged particles, is investigated by a two-dimensional nonlinear quantum hydrodynamic (QHD) model. The nonlinear stopping power and wake potential are calculated by solving the nonlinear QHD equations with the flux corrected transport numerical method. Two cases of fully degenerated and partially degenerated electrons are compared and discussed in the same self-consistent QHD model. Our results are consistent with the well known dielectric calculation of the stopping power at higher velocity, but include the nonlinear terms of the interactions and give larger stopping power at smaller velocity.

  10. A priori estimates for high frequency scattering by obstacles of arbitrary shape

    E-Print Network [OSTI]

    Evgeny Lakshtanov; Boris Vainberg

    2012-04-03

    High frequency estimates for the Dirichlet-to-Neumann and Neumann-to-Dirichlet operators are obtained for the Helmholtz equation in the exterior of bounded obstacles. These a priori estimates are used to study the scattering of plane waves by an arbitrary bounded obstacle and to prove that the total cross section of the scattered wave does not exceed four geometrical cross sections of the obstacle in the limit as the wave number $k\\to \\infty$. This bound of the total cross section is sharp.

  11. On the Motion of Free Material Test Particles in Arbitrary Spatial Flows

    E-Print Network [OSTI]

    Tom Martin

    1999-06-03

    We show how the motion of free material test particles in arbitrary spatial flows is easily determined within the context of ordinary vector calculus. This may be useful for everyone, including engineers and other non-specialists, when thinking about gravitational problems. It already has valid application to simple problems such as the problems of motion in rotating and accelerating frames and to the gravitational problem of the single spherically symmetric attractor. When applied to the two body gravitational problem, it may help us determine the actual direction of the flow.

  12. Recursive polarization of nuclear spins in diamond at arbitrary magnetic fields

    SciTech Connect (OSTI)

    Pagliero, Daniela; Laraoui, Abdelghani; Henshaw, Jacob D.; Meriles, Carlos A.

    2014-12-15

    We introduce an alternate route to dynamically polarize the nuclear spin host of nitrogen-vacancy (NV) centers in diamond. Our approach articulates optical, microwave, and radio-frequency pulses to recursively transfer spin polarization from the NV electronic spin. Using two complementary variants of the same underlying principle, we demonstrate nitrogen nuclear spin initialization approaching 80% at room temperature both in ensemble and single NV centers. Unlike existing schemes, our approach does not rely on level anti-crossings and is thus applicable at arbitrary magnetic fields. This versatility should prove useful in applications ranging from nanoscale metrology to sensitivity-enhanced NMR.

  13. Example of Environmental Restoration Code of Accounts

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28

    This chapter describes the fundamental structure of an example remediation cost code system, lists and describes the Level 1 cost codes, and lists the Level 2 and Level 3 cost codes.

  14. Multiterminal Video Coding: From Theory to Application

    E-Print Network [OSTI]

    Zhang, Yifu

    2012-10-19

    Multiterminal (MT) video coding is a practical application of the MT source coding theory. For MT source coding theory, two problems associated with achievable rate regions are well investigated into in this thesis: a new ...

  15. Using true concurrency to model execution of parallel programs

    SciTech Connect (OSTI)

    Ben-Asher, Y.; Farchi, E.

    1994-08-01

    Parallel execution of a program R (intuitively regarded as a partial order) is usually modeled by sequentially executing one of the total orders (interleavings) into which it can be embedded. Our work deviates from this serialization principle by using true concurrency to model parallel execution. True concurrency is represented via completions of R to semi total orders, called time diagrams. These orders are characterized via a set of conditions (denoted by Ct), yielding orders of time diagrams which preserve some degree of the intended parallelism in R. Another way to express semi total orders is to use re-writing or derivation rules (denoted by Cx) which for any program R generates a set of semi-total orders. This paper includes a classification of parallel execution into three classes according to three different types of Ct conditions. For each class a suitable Cx is found and a proof of equivalence between the set of all time diagrams satisfying Ct and the set of all terminal Cx derivations of R is devised. This equivalence between time diagram conditions and derivation rules is used to define a novel notion of correctness for parallel programs. This notion is demonstrated by showing that a specific asynchronous program enforces synchronous execution, which always halts, showing that true concurrency can be useful in the context of parallel program verification.

  16. The Cost of Enforcing Building Energy Codes: Phase 1

    E-Print Network [OSTI]

    Williams, Alison

    2013-01-01

    practices among code officials. Stakeholders recommendboth applicants and code officials and help to inform thecomply with the code and code officials to enforce the new

  17. Technical Standards, Safety Analysis Toolbox Codes - November...

    Broader source: Energy.gov (indexed) [DOE]

    report, Selection of Computer Codes for DOE Safety Analysis Applications, (August, 2002). Technical Standards, Safety Analysis Toolbox Codes More Documents & Publications DOE G...

  18. Program School/ Career: Descripton ISIS Program Codes

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School;Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School/ College 1

  19. Towards secure multiresolution network coding

    E-Print Network [OSTI]

    Medard, Muriel

    Emerging practical schemes indicate that algebraic mixing of different packets by means of random linear network coding can increase the throughput and robustness of streaming services over wireless networks. However, ...

  20. Commercial Building Codes and Standards

    Broader source: Energy.gov [DOE]

    Once an energy-efficient technology or practice is widely available in the market, it can become the baseline of performance through building energy codes and equipment standards. The Building...

  1. Gas Code of Conduct (Connecticut)

    Broader source: Energy.gov [DOE]

    The Gas Code of Conduct sets forth the standard of conduct for transactions, direct or indirect, between gas companies and their affiliates. The purpose of these regulations is to promote...

  2. A Comparative Study of Different Reconstruction Schemes for a Reconstructed Discontinuous Galerkin Method on Arbitrary Grids

    SciTech Connect (OSTI)

    Hong Luo; Hanping Xiao; Robert Nourgaliev; Chunpei Cai

    2011-06-01

    A comparative study of different reconstruction schemes for a reconstruction-based discontinuous Galerkin, termed RDG(P1P2) method is performed for compressible flow problems on arbitrary grids. The RDG method is designed to enhance the accuracy of the discontinuous Galerkin method by increasing the order of the underlying polynomial solution via a reconstruction scheme commonly used in the finite volume method. Both Green-Gauss and least-squares reconstruction methods and a least-squares recovery method are implemented to obtain a quadratic polynomial representation of the underlying discontinuous Galerkin linear polynomial solution on each cell. These three reconstruction/recovery methods are compared for a variety of compressible flow problems on arbitrary meshes to access their accuracy and robustness. The numerical results demonstrate that all three reconstruction methods can significantly improve the accuracy of the underlying second-order DG method, although the least-squares reconstruction method provides the best performance in terms of both accuracy and robustness.

  3. Trace formulae for non-equilibrium Casimir interactions, heat radiation and heat transfer for arbitrary objects

    E-Print Network [OSTI]

    Matthias Krger; Giuseppe Bimonte; Thorsten Emig; Mehran Kardar

    2012-07-16

    We present a detailed derivation of heat radiation, heat transfer and (Casimir) interactions for N arbitrary objects in the framework of fluctuational electrodynamics in thermal non-equilibrium. The results can be expressed as basis-independent trace formulae in terms of the scattering operators of the individual objects. We prove that heat radiation of a single object is positive, and that heat transfer (for two arbitrary passive objects) is from the hotter to a colder body. The heat transferred is also symmetric, exactly reversed if the two temperatures are exchanged. Introducing partial wave-expansions, we transform the results for radiation, transfer and forces into traces of matrices that can be evaluated in any basis, analogous to the equilibrium Casimir force. The method is illustrated by (re)deriving the heat radiation of a plate, a sphere and a cylinder. We analyze the radiation of a sphere for different materials, emphasizing that a simplification often employed for metallic nano-spheres is typically invalid. We derive asymptotic formulae for heat transfer and non-equilibrium interactions for the cases of a sphere in front a plate and for two spheres, extending previous results. As an example, we show that a hot nano-sphere can levitate above a plate with the repulsive non-equilibrium force overcoming gravity -- an effect that is not due to radiation pressure.

  4. Stress and heat flux for arbitrary multi-body potentials: A unified framework

    E-Print Network [OSTI]

    Admal, Nikhil Chandra

    2015-01-01

    A two-step unified framework for the evaluation of continuum field expressions from molecular simulations for arbitrary interatomic potentials is presented. First, pointwise continuum fields are obtained using a generalization of the Irving-Kirkwood procedure to arbitrary multi-body potentials. Two ambiguities associated with the original Irving-Kirkwood procedure (which was limited to pair potential interactions) are addressed in its generalization. The first ambiguity is due to the non-uniqueness of the decomposition of the force on an atom as a sum of central forces, which is a result of the non-uniqueness of the potential energy representation in terms of distances between the particles. This is in turn related to the shape space of the system. The second ambiguity is due to the non-uniqueness of the energy decomposition between particles. The latter can be completely avoided through an alternate derivation for the energy balance. It is found that the expressions for the specific internal energy and the h...

  5. Quantum stabilizer codes and beyond

    E-Print Network [OSTI]

    Sarvepalli, Pradeep Kiran

    2008-10-10

    Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2008 Major Subject: Computer Science QUANTUM STABILIZER CODES... Committee Members, Donald K. Friesen Jennifer L. Welch Scott L. Miller Head of Department, Valerie E. Taylor August 2008 Major Subject: Computer Science iii ABSTRACT Quantum Stabilizer Codes and Beyond. (August 2008) Pradeep Kiran Sarvepalli, B.Tech., Indian...

  6. Streamlining of the RELAP5-3D Code

    SciTech Connect (OSTI)

    Mesina, George L; Hykes, Joshua; Guillen, Donna Post

    2007-11-01

    RELAP5-3D is widely used by the nuclear community to simulate general thermal hydraulic systems and has proven to be so versatile that the spectrum of transient two-phase problems that can be analyzed has increased substantially over time. To accommodate the many new types of problems that are analyzed by RELAP5-3D, both the physics and numerical methods of the code have been continuously improved. In the area of computational methods and mathematical techniques, many upgrades and improvements have been made decrease code run time and increase solution accuracy. These include vectorization, parallelization, use of improved equation solvers for thermal hydraulics and neutron kinetics, and incorporation of improved library utilities. In the area of applied nuclear engineering, expanded capabilities include boron and level tracking models, radiation/conduction enclosure model, feedwater heater and compressor components, fluids and corresponding correlations for modeling Generation IV reactor designs, and coupling to computational fluid dynamics solvers. Ongoing and proposed future developments include improvements to the two-phase pump model, conversion to FORTRAN 90, and coupling to more computer programs. This paper summarizes the general improvements made to RELAP5-3D, with an emphasis on streamlining the code infrastructure for improved maintenance and development. With all these past, present and planned developments, it is necessary to modify the code infrastructure to incorporate modifications in a consistent and maintainable manner. Modifying a complex code such as RELAP5-3D to incorporate new models, upgrade numerics, and optimize existing code becomes more difficult as the code grows larger. The difficulty of this as well as the chance of introducing errors is significantly reduced when the code is structured. To streamline the code into a structured program, a commercial restructuring tool, FOR_STRUCT, was applied to the RELAP5-3D source files. The methodology employed follows Dijkstra's structured programming paradigm, which is based on splitting programs into sub-sections, each with single points of entry and exit and in which control is passed downward through the structure with no unconditional branches to higher levels. GO TO commands are typically avoided, since they alter the flow and control of a programs execution by allowing a jump from one place in the routine to another. The restructuring of RELAP5-3D subroutines is complicated by several issues. The first is use of code other than standard FORTRAN77. The second is restructuring limitations of FOR_STRUCT. The third is existence of pre-compiler directives and the complication of nested directives. Techniques were developed to overcome all these difficulties and more and these are reported. By implementing these developments, all subroutines of RELAP were restructured. Measures of code improvement relative to maintenance and development are presented.

  7. Estimates of Energy Cost Savings Achieved from 2009 IECC Code-Compliant, Single Family Residences in Texas

    E-Print Network [OSTI]

    Kim, H.; Baltazar, J. C.; Haberl, J.

    2011-01-01

    -01-01 ESTIMATES OF ENERGY COST SAVINGS ACHIEVED FROM 2009 IECC CODE-COMPLIANT, SINGLE-FAMILY RESIDENCES IN TEXAS Hyojin Kim Juan-Carlos Baltazar, Ph.D. Jeff Haberl, Ph.D., P.E. January 2011 (Revised...) ENERGY SYSTEMS LABORATORY Texas Engineering Experiment Station Texas A&M University System 2009 IECC Cost Savings Report, p.i January 2011 Energy Systems Laboratory, Texas A&M University EXECUTIVE SUMMARY This report presents estimates...

  8. Nuclear Energy Advanced Modeling and Simulation (NEAMS) waste Integrated Performance and Safety Codes (IPSC) : gap analysis for high fidelity and performance assessment code development.

    SciTech Connect (OSTI)

    Lee, Joon H.; Siegel, Malcolm Dean; Arguello, Jose Guadalupe, Jr.; Webb, Stephen Walter; Dewers, Thomas A.; Mariner, Paul E.; Edwards, Harold Carter; Fuller, Timothy J.; Freeze, Geoffrey A.; Jove-Colon, Carlos F.; Wang, Yifeng

    2011-03-01

    This report describes a gap analysis performed in the process of developing the Waste Integrated Performance and Safety Codes (IPSC) in support of the U.S. Department of Energy (DOE) Office of Nuclear Energy Advanced Modeling and Simulation (NEAMS) Campaign. The goal of the Waste IPSC is to develop an integrated suite of computational modeling and simulation capabilities to quantitatively assess the long-term performance of waste forms in the engineered and geologic environments of a radioactive waste storage or disposal system. The Waste IPSC will provide this simulation capability (1) for a range of disposal concepts, waste form types, engineered repository designs, and geologic settings, (2) for a range of time scales and distances, (3) with appropriate consideration of the inherent uncertainties, and (4) in accordance with rigorous verification, validation, and software quality requirements. The gap analyses documented in this report were are performed during an initial gap analysis to identify candidate codes and tools to support the development and integration of the Waste IPSC, and during follow-on activities that delved into more detailed assessments of the various codes that were acquired, studied, and tested. The current Waste IPSC strategy is to acquire and integrate the necessary Waste IPSC capabilities wherever feasible, and develop only those capabilities that cannot be acquired or suitably integrated, verified, or validated. The gap analysis indicates that significant capabilities may already exist in the existing THC codes although there is no single code able to fully account for all physical and chemical processes involved in a waste disposal system. Large gaps exist in modeling chemical processes and their couplings with other processes. The coupling of chemical processes with flow transport and mechanical deformation remains challenging. The data for extreme environments (e.g., for elevated temperature and high ionic strength media) that are needed for repository modeling are severely lacking. In addition, most of existing reactive transport codes were developed for non-radioactive contaminants, and they need to be adapted to account for radionuclide decay and in-growth. The accessibility to the source codes is generally limited. Because the problems of interest for the Waste IPSC are likely to result in relatively large computational models, a compact memory-usage footprint and a fast/robust solution procedure will be needed. A robust massively parallel processing (MPP) capability will also be required to provide reasonable turnaround times on the analyses that will be performed with the code. A performance assessment (PA) calculation for a waste disposal system generally requires a large number (hundreds to thousands) of model simulations to quantify the effect of model parameter uncertainties on the predicted repository performance. A set of codes for a PA calculation must be sufficiently robust and fast in terms of code execution. A PA system as a whole must be able to provide multiple alternative models for a specific set of physical/chemical processes, so that the users can choose various levels of modeling complexity based on their modeling needs. This requires PA codes, preferably, to be highly modularized. Most of the existing codes have difficulties meeting these requirements. Based on the gap analysis results, we have made the following recommendations for the code selection and code development for the NEAMS waste IPSC: (1) build fully coupled high-fidelity THCMBR codes using the existing SIERRA codes (e.g., ARIA and ADAGIO) and platform, (2) use DAKOTA to build an enhanced performance assessment system (EPAS), and build a modular code architecture and key code modules for performance assessments. The key chemical calculation modules will be built by expanding the existing CANTERA capabilities as well as by extracting useful components from other existing codes.

  9. SECTION GS1020 CONSTRUCTION CODE REQUIREMENTS

    E-Print Network [OSTI]

    Zhang, Yuanlin

    101, Life Safety Code; 5. National Fire Protection Association Codes and Standards; 6. ANSI/ASME A17SECTION GS1020 ­ CONSTRUCTION CODE REQUIREMENTS PART 1 - GENERAL 1.1 RELATED DOCUMENTS A. Drawings includes the following: 1. Construction code requirements for all construction at Texas Tech University. 1

  10. @ Ontario 2006 Building Code Structural Design

    E-Print Network [OSTI]

    Sheikh, Shamim A.

    @ Ontario 2006 Building Code Part 4 Structural Design Structural Losds and P r o ~ d u l r;2006 Building Code @Ontario Division B -Part 4 #12;@Ontario 2006 Building Code Part 4 Structural Design Section #12;2006 Building Code @Ontario 4.q.2. Spsclfled Loads and Effects 4 . . 2 Loads and Effects (See

  11. Arithmetic completely regular codes J. H. Koolen

    E-Print Network [OSTI]

    Martin, Bill

    Arithmetic completely regular codes J. H. Koolen W. S. Lee W. J. Martin December 4, 2013 Abstract In this paper, we explore completely regular codes in the Hamming graphs and related graphs. Experimental evidence suggests that many completely regular codes have the property that the eigenvalues of the code

  12. Energy Consumption of Minimum Energy Coding in

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Energy Consumption of Minimum Energy Coding in CDMA Wireless Sensor Networks Benigno Zurita Ares://www.ee.kth.se/control Abstract. A theoretical framework is proposed for accurate perfor- mance analysis of minimum energy coding energy consumption is analyzed for two coding schemes proposed in the literature: Minimum Energy coding

  13. EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET

    E-Print Network [OSTI]

    US Army Corps of Engineers

    and quality. VE contributes to the overall management objectives of streamlining operations, improving qualityEXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 December, improve performance, enhance quality, and foster the use of innovation. Agencies should maintain policies

  14. IBM Human Ability and Accessibility Center Executive brief

    E-Print Network [OSTI]

    to making products and services accessible, to its commitment to research, IBM has been an industry leader graduated from New York's Pace University with a Master's degree in computer science. A skilled and highlyIBM Human Ability and Accessibility Center Executive brief Accessibility at IBM: An integrated

  15. CRICKET Campaign: Setup and Execution LWA Memo Report

    E-Print Network [OSTI]

    Ellingson, Steven W.

    CRICKET Campaign: Setup and Execution LWA Memo Report K. F. Dymond1 , C. Watts2 , C. Coker1 , N-dimensional picture of the ionosphere over the Southwestern United States and to tie this into the global picture United States. The experiment was to be performed during three ~1.5-hour-long observing windows or Epochs

  16. Speculative Execution Exception Recovery Write-back Suppression

    E-Print Network [OSTI]

    Mahlke, Scott A.

    Speculative Execution Exception Recovery using Write-back Suppression Roger A. Bringmann Scott A or extra register pressure. This paper introduces a new architecture scheme referred to as write-back that with a modest amount of hardware, write- back suppression supports accurate reporting and handling of exceptions

  17. Detailed Execution Planning for Large Oil and Gas Construction Projects

    E-Print Network [OSTI]

    Calgary, University of

    Detailed Execution Planning for Large Oil and Gas Construction Projects Presented by James Lozon, University of Calgary There is currently 55.8 billion dollars worth of large oil and gas construction projects scheduled or underway in the province of Alberta. Recently, large capital oil and gas projects

  18. Environmental Credit Marketing Survey Executive Summary -August 2010

    E-Print Network [OSTI]

    Environmental Credit Marketing Survey Executive Summary - August 2010 The land and those living and investment purposes. Who's interested? Landowners with a general awareness of carbon markets. Landowners a conservation easement is required. General thoughts on ecosystem markets 75% know about carbon markets

  19. Regulation and Execution of Meiosis in Drosophh Males

    E-Print Network [OSTI]

    9 Regulation and Execution of Meiosis in Drosophh Males lean Maines and Steven Wasserm. Identification of Male Meiotic Mutant\\ IT. Regulation of the Meiotic Cell Divisions A. Entry into Meiosis B. Regulation of the Cell Cycle Machinery C. Coordination of Meio\\i\\ with Diflerentiation D. Regulation

  20. Furlough or Reduction in Force in the Senior Executive Service

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-05-15

    To establish requirements and assign responsibilities for furlough and reduction in force (RIF) of the Senior Executive Service (SES) in the Department of Energy (DOE) and the National Nuclear Security Administration (NNSA). Supersedes O DOE 3350.1 Chg 1 and DOE 3351.2 Chg 1.