Sample records for arbitrary code execution

  1. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  2. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...

  3. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  4. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  5. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  6. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Environmental Management (EM)

    can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid...

  7. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  9. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  10. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  11. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  12. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  13. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  14. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  15. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  16. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  17. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  18. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  19. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  20. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  1. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  2. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  3. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department

  4. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary CodeImpactEnergy

  5. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  6. U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-082: McAfee SaaS...

  7. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  8. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  9. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  10. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Broader source: Energy.gov (indexed) [DOE]

    Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  11. Quantum Coding Theorems for Arbitrary Sources, Channels and Entanglement Resources

    E-Print Network [OSTI]

    Garry Bowen; Nilanjana Datta

    2006-09-30T23:59:59.000Z

    The information spectrum approach gives general formulae for optimal rates of various information theoretic protocols, under minimal assumptions on the nature of the sources, channels and entanglement resources involved. This paper culminates in the derivation of the dense coding capacity for a noiseless quantum channel, assisted by arbitrary shared entanglement, using this approach. We also review the currently known coding theorems, and their converses, for protocols such as data compression for arbitrary quantum sources and transmission of classical information through arbitrary quantum channels. In addition, we derive the optimal rate of data compression for a mixed source

  12. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  13. ETFOD: a point model physics code with arbitrary input

    SciTech Connect (OSTI)

    Rothe, K.E.; Attenberger, S.E.

    1980-06-01T23:59:59.000Z

    ETFOD is a zero-dimensional code which solves a set of physics equations by minimization. The technique used is different than normally used, in that the input is arbitrary. The user is supplied with a set of variables from which he specifies which variables are input (unchanging). The remaining variables become the output. Presently the code is being used for ETF reactor design studies. The code was written in a manner to allow easy modificaton of equations, variables, and physics calculations. The solution technique is presented along with hints for using the code.

  14. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  15. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis...

  16. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  17. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  18. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  19. T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

  20. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia...

  1. EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES

    E-Print Network [OSTI]

    Falck, Justin

    2009-06-09T23:59:59.000Z

    fulfillment of the requirements for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK EXPLORING EFFICIENT CODING SCHEMES FOR STORING ARBITRARY TREE DATA STRUCTURES IN FLASH MEMORIES Approved by... for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by JUSTIN ALLEN FALCK iii ABSTRACT Exploring Efficient Coding Schemes for Storing Arbitrary Tree Data Structures in Flash Memories. (April 2009) Justin Allen Falck...

  2. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitraryDrupalCode | Department of

  3. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users Execute|Code |

  4. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

    2007-09-25T23:59:59.000Z

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  5. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  6. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  7. Detecting arbitrary quantum errors via stabilizer measurements on a sublattice of the surface code

    E-Print Network [OSTI]

    A. D. C髍coles; Easwar Magesan; Srikanth J. Srinivasan; Andrew W. Cross; M. Steffen; Jay M. Gambetta; Jerry M. Chow

    2014-10-23T23:59:59.000Z

    To build a fault-tolerant quantum computer, it is necessary to implement a quantum error correcting code. Such codes rely on the ability to extract information about the quantum error syndrome while not destroying the quantum information encoded in the system. Stabilizer codes are attractive solutions to this problem, as they are analogous to classical linear codes, have simple and easily computed encoding networks, and allow efficient syndrome extraction. In these codes, syndrome extraction is performed via multi-qubit stabilizer measurements, which are bit and phase parity checks up to local operations. Previously, stabilizer codes have been realized in nuclei, trapped-ions, and superconducting qubits. However these implementations lack the ability to perform fault-tolerant syndrome extraction which continues to be a challenge for all physical quantum computing systems. Here we experimentally demonstrate a key step towards this problem by using a two-by-two lattice of superconducting qubits to perform syndrome extraction and arbitrary error detection via simultaneous quantum non-demolition stabilizer measurements. This lattice represents a primitive tile for the surface code, which is a promising stabilizer code for scalable quantum computing. Furthermore, we successfully show the preservation of an entangled state in the presence of an arbitrary applied error through high-fidelity syndrome measurement. Our results bolster the promise of employing lattices of superconducting qubits for larger-scale fault-tolerant quantum computing.

  8. MSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real

    E-Print Network [OSTI]

    Turletti, Thierry

    : information-centric networking over mobile ad hoc network using the PARC CCNx code, and a seamless handoffMSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real of Tokyo, Japan INRIA, France Abstract We propose to demonstrate Direct Code Execution (DCE)1 , a ns-3

  9. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  10. BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations

    E-Print Network [OSTI]

    Jeremiah W. Murphy; Adam Burrows

    2008-07-09T23:59:59.000Z

    In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusion of additional physics packages, the ability to use a general equation of state, and most importantly, the ability to solve self-gravitating hydrodynamic flows on time-dependent, arbitrary grids. In what follows, we describe in detail the numerical techniques employed and, with a large suite of tests, demonstrate that BETHE-hydro finds accurate solutions with 2$^{nd}$-order convergence.

  11. 2-D Stellar Evolution Code Including Arbitrary Magnetic Fields. I. Mathematical Techniques and Test Cases

    E-Print Network [OSTI]

    L. H. Li; P. Ventura; S. Basu; S. Sofia; P. Demarque

    2006-01-27T23:59:59.000Z

    A high-precision two-dimensional stellar evolution code has been developed for studying solar variability due to structural changes produced by varying internal magnetic fields of arbitrary configurations. Specifically, we are interested in modeling the effects of a dynamo-type field on the detailed internal structure and on the global parameters of the Sun. The high precision is required both to model very small solar changes (of order of $10^{-4}$) and short time scales (or order of one year). It is accomplished by using the mass coordinate to replace the radial coordinate, by using fixed and adjustable time steps, a realistic stellar atmosphere, elements diffusion, and by adjusting the grid points. We have also built into the code the potential to subsequently include rotation and turbulence. The current code has been tested for several cases, including its ability to reproduce the 1-D results.

  12. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  13. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode | Department of

  14. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  15. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode | Department of

  16. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBM MultipleFixationofAuthenticationCode

  17. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. A remote user...

  18. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  19. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  20. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities | Department of

  1. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy Symantec

  2. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment ofDepartment

  3. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartmentDepartment of

  4. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks and|

  5. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergy July

  6. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of EnergyDepartmentURL

  7. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|

  8. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScripting

  9. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5|

  10. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe|2:

  11. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWith theirabout

  12. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConduct Cross-Site

  13. Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory

    E-Print Network [OSTI]

    Aickelin, Uwe

    Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory Jungwon an artificial immune system. A recently developed hypothesis in immunology, the Danger The- ory, states that our invaders, plus signals generated by the host indic- ating danger and damage. We propose the incorporation

  14. SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification

    E-Print Network [OSTI]

    Simha, Rahul

    SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification Olga those using the Internet and exploiting the vul- nerabilities in the software and applications, software 颅 for software integrity protection and authentication and presents performance results. Our system architecture

  15. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up...

  16. TOPAZ: a computer code for modeling heat transfer and fluid flow in arbitrary networks of pipes, flow branches, and vessels

    SciTech Connect (OSTI)

    Winters, W.S.

    1984-01-01T23:59:59.000Z

    An overview of the computer code TOPAZ (Transient-One-Dimensional Pipe Flow Analyzer) is presented. TOPAZ models the flow of compressible and incompressible fluids through complex and arbitrary arrangements of pipes, valves, flow branches and vessels. Heat transfer to and from the fluid containment structures (i.e. vessel and pipe walls) can also be modeled. This document includes discussions of the fluid flow equations and containment heat conduction equations. The modeling philosophy, numerical integration technique, code architecture, and methods for generating the computational mesh are also discussed.

  17. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  18. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  19. Two-Dimensional Stellar Evolution Code Including Arbitrary Magnetic Fields. II. Precision Improvement and Inclusion of Turbulence and Rotation

    E-Print Network [OSTI]

    Linghuai Li; Sabatino Sofia; Paolo Ventura; Valentina Penza; Shaolan Bi; Sarbani Basu; Pierre Demarque

    2008-10-27T23:59:59.000Z

    In the second paper of this series we pursue two objectives. First, in order to make the code more sensitive to small effects, we remove many approximations made in Paper I. Second, we include turbulence and rotation in the two-dimensional framework. The stellar equilibrium is described by means of a set of five differential equations, with the introduction of a new dependent variable, namely the perturbation to the radial gravity, that is found when the non-radial effects are considered in the solution of the Poisson equation; following the scheme of the first paper, we write the equations in such a way that the two-dimensional effects can be easily disentangled. The key concept introduced in this series is the equipotential surface. We use the underlying cause-effect relation to develop a recurrence relation to calculate the equipotential surface functions for uniform rotation, differential rotation, rotation-like toroidal magnetic fields and turbulence. We also develop a more precise code to numerically solve the two-dimensional stellar structure and evolution equations based on the equipotential surface calculations. We have shown that with this formulation we can achieve the precision required by observations by appropriately selecting the convergence criterion. Several examples are presented to show that the method works well. Since we are interested in modeling the effects of a dynamo-type field on the detailed envelope structure and global properties of the Sun, the code has been optimized for short timescales phenomena (down to 1 yr). The time dependence of the code has so far been tested exclusively to address such problems.

  20. TWO-DIMENSIONAL STELLAR EVOLUTION CODE INCLUDING ARBITRARY MAGNETIC FIELDS. II. PRECISION IMPROVEMENT AND INCLUSION OF TURBULENCE AND ROTATION

    SciTech Connect (OSTI)

    Li Linghuai; Sofia, Sabatino; Basu, Sarbani; Demarque, Pierre [Department of Astronomy, Yale University, P.O. Box 208101, New Haven, CT 06520-8101 (United States); Ventura, Paolo [INAF, Osservatorio Astronomico di Roma, 00040 Monteporzio Catone (Italy); Penza, Valentina [Universita Di Roma 'Tor Vergata', Via Della Ricerca Scientifica 1, 00133 Roma (Italy); Bi Shaolan [Department of Astronomy, Beijing Normal University, Beijing 100875 (China)], E-mail: li@astro.yale.edu

    2009-06-15T23:59:59.000Z

    In the second paper of this series we pursue two objectives. First, in order to make the code more sensitive to small effects, we remove many approximations made in Paper I. Second, we include turbulence and rotation in the two-dimensional framework. The stellar equilibrium is described by means of a set of five differential equations, with the introduction of a new dependent variable, namely the perturbation to the radial gravity, that is found when the nonradial effects are considered in the solution of the Poisson equation. Following the scheme of the first paper, we write the equations in such a way that the two-dimensional effects can be easily disentangled. The key concept introduced in this series is the equipotential surface. We use the underlying cause-effect relation to develop a recurrence relation to calculate the equipotential surface functions for uniform rotation, differential rotation, rotation-like toroidal magnetic fields, and turbulence. We also develop a more precise code to numerically solve the two-dimensional stellar structure and evolution equations based on the equipotential surface calculations. We have shown that with this formulation we can achieve the precision required by observations by appropriately selecting the convergence criterion. Several examples are presented to show that the method works well. Since we are interested in modeling the effects of a dynamo-type field on the detailed envelope structure and global properties of the Sun, the code has been optimized for short timescales phenomena (down to 1 yr). The time dependence of the code has so far been tested exclusively to address such problems.

  1. V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...

    Broader source: Energy.gov (indexed) [DOE]

    script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that...

  2. List decoding of subspace codes and rank-metric codes

    E-Print Network [OSTI]

    Mahdavifar, Hessam

    2012-01-01T23:59:59.000Z

    2.2.2 Koetter-Kschischang Codes . . . . . . . . . . . .of Subspace Codes . . . . . . . . . . . . . . 2.3.1 OverviewList-decodable Codes of Arbitrary Dimension . . . . . . .

  3. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  4. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  5. Execution timesand execution jitter analysis of real-time tasks under fixed-priority pre-emptive scheduling

    E-Print Network [OSTI]

    Bril, Reinder J.

    Execution timesand execution jitter analysis of real-time tasks under fixed-priority pre In this paper, we present worst-case and best-case execution times and (absolute) execution jitter analysis fixed-priority pre-emptive scheduling (FPPS), arbitrary phasing, (absolute) activation jitter

  6. A loop is the only control-flow construct that lets you go back to an earlier point in the code. Loops are designed to allow us to iterate--to execute the same piece of code over and over again.

    E-Print Network [OSTI]

    Peters, Dennis

    A loop is the only control-flow construct that lets you go back to an earlier point in the code. After the body is executed, we go back and test the loop continuation condition again As soon. Note that the first example (temperature conversion) is basically a variation on this theme. Event

  7. Self-assembled software and method of overriding software execution

    DOE Patents [OSTI]

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08T23:59:59.000Z

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  8. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Environmental Management (EM)

    of the DCERPC Inspection Buffer Overflow Vulnerability may cause a stack overflow and permit the execution of arbitrary commands. Solution: The vendor has issued a fix. Addthis...

  9. 8 Executive Summary Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    8 Executive Summary Executive Summary 1. World Robotics 2012 Industrial Robots 2. World Robotics 2012 Service Robots 1. World Robotics 2012 Industrial Robots 2011: The most successful year for industrial robots since 1961 In 2011, robot sales again increased by 38% to 166,028 units, by far the highest

  10. Executive Summary 11 Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    Executive Summary 11 Executive Summary 1. World Robotics 2014 Industrial Robots 2. World Robotics 2014 Service Robots 1. World Robotics 2014 Industrial Robots 2013: The highest number of industrial recorded for one year. Sales of industrial robots to the automotive, the chemical, and the rubber

  11. 10 Executive Summary Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    10 Executive Summary Executive Summary 1. World Robotics 2013 Industrial Robots 2. World Robotics 2013 Service Robots 1. World Robotics 2013 Industrial Robots 2012: Second highest number of robots sold for the slight sales reduction. Sales of industrial robots to the automotive industry continued to increase

  12. Executive Officer

    Broader source: Energy.gov [DOE]

    THIS VACANCY ANNOUNCEMENT HAS BEEN MODIFIED TO EXTEND THE CLOSING DATE. A successful candidate in this position will serve as the Executive Officer to the Administrator of the Bonneville Power...

  13. act executive orders: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Sciences Websites Summary: Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code) An administrative officer or supervisor of...

  14. Optimal Execution with Nonlinear Impact Functions

    E-Print Network [OSTI]

    Almgren, Robert F.

    cost per share to be a power law function of the trading rate, with an arbitrary positive exponentOptimal Execution with Nonlinear Impact Functions and Trading-Enhanced Risk Robert F. Almgren October 2001 Abstract We determine optimal trading strategies for liquidation of a large single

  15. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    Eirinaki, Magdalini

    Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

  16. Executive MBA* Executive MBA at a Glance

    E-Print Network [OSTI]

    Manufacturing Natural Resources Not-for-Profit Public Service Real Estate Development Technology Transportation, strategic analysis, and change management * Additional Options The Americas MBA for Executives Executive MBA

  17. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

  18. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC...

  19. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC...

  20. FEI Program Session: Date: CHRIS Code: Session Number:

    Broader source: Energy.gov (indexed) [DOE]

    OPM Federal Executive Institute - DOE CHRIS Codes: (Program Tuition Cost - 19,875.00) *Program Calendar for Fiscal Year 2015 FEI Program Session: Date: CHRIS Code: Session Number:...

  1. Virtual Private Environments for Multiphysics Code Validation on Computing Grids

    E-Print Network [OSTI]

    Paris-Sud XI, Universit茅 de

    Virtual Private Environments for Multiphysics Code Validation on Computing Grids Toan Nguyen-based computing environments and deploys, tests and analyzes multiphysics codes. A second approach executes model coupling, error correlations, alert definitions, best usage practices, code verification and code

  2. Executive Director

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /EmailMolecular Solids | MIT-HarvardExecutive Director

  3. Mathematical Modeling and Analysis The Arbitrary-Lagrangian-

    E-Print Network [OSTI]

    Kurien, Susan

    of the fluid, (ii) preserve positivity of density and specific internal energy, (iii) satisfy the maximumMathematical Modeling and Analysis The Arbitrary-Lagrangian- Eulerian Code for 1D Compressible- zone phase in which a new grid is defined, and a remapping (conservative interpolation) phase in which

  4. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

  5. T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

  6. Visualization of Program-Execution Data for Deployed

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    路 Color used to represent characteristics of code and its executions 路 Mapping of data to color dependent Collection Daemon Database Customer 1 Customer 2 Customer N program instrumented program execution data data 路 Maps field data to program representations using color 路 Provides multiple levels of abstraction

  7. Chip Laingen Executive Director

    E-Print Network [OSTI]

    Levinson, David M.

    Link 3) MilTech 路 Defense Alliance / APC Staff 1) Executive Director 2) Business / Finance Director

  8. Perturbative Gadgets at Arbitrary Orders

    E-Print Network [OSTI]

    Stephen P. Jordan; Edward Farhi

    2012-01-31T23:59:59.000Z

    Adiabatic quantum algorithms are often most easily formulated using many-body interactions. However, experimentally available interactions are generally two-body. In 2004, Kempe, Kitaev, and Regev introduced perturbative gadgets, by which arbitrary three-body effective interactions can be obtained using Hamiltonians consisting only of two-body interactions. These three-body effective interactions arise from the third order in perturbation theory. Since their introduction, perturbative gadgets have become a standard tool in the theory of quantum computation. Here we construct generalized gadgets so that one can directly obtain arbitrary k-body effective interactions from two-body Hamiltonians. These effective interactions arise from the kth order in perturbation theory.

  9. Quantum stabilizer codes and beyond

    E-Print Network [OSTI]

    Pradeep Kiran Sarvepalli

    2008-10-14T23:59:59.000Z

    The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. This dissertation makes a threefold contribution to the mathematical theory of quantum error-correcting codes. Firstly, it extends the framework of an important class of quantum codes -- nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work establishes a close link between subsystem codes and classical codes showing that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels.

  10. Tabled Execution in Scheme

    SciTech Connect (OSTI)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19T23:59:59.000Z

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  11. MacWilliams identities for codes on graphs

    E-Print Network [OSTI]

    Forney, G. David, Jr.

    The MacWilliams identity for linear time-invariant convolutional codes that has recently been found by Gluesing-Luerssen and Schneider is proved concisely, and generalized to arbitrary group codes on graphs. A similar ...

  12. Experience with Remote Job Execution

    SciTech Connect (OSTI)

    Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Green, Mark L [ORNL; Kohl, James Arthur [ORNL; Miller, Stephen D [ORNL; Ren, Shelly [ORNL; Smith, Bradford C [ORNL; Vazhkudai, Sudharshan S [ORNL

    2008-01-01T23:59:59.000Z

    The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

  13. The Arbitrary Trajectory Quantization Method

    E-Print Network [OSTI]

    Debabrata Biswas

    2001-07-12T23:59:59.000Z

    The arbitrary trajectory quantization method (ATQM) is a time dependent approach to quasiclassical quantization based on the approximate dual relationship that exists between the quantum energy spectra and classical periodic orbits. It has recently been shown however, that, for polygonal billiards, the periodicity criterion must be relaxed to include closed almost-periodic (CAP) orbit families in this relationship. In light of this result, we reinvestigate the ATQM and show that at finite energies, a smoothened quasiclassical kernel corresponds to the modified formula that includes CAP families while the delta function kernel corresponding to the periodic orbit formula is recovered at high energies. Several clarifications are also provided.

  14. T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code...

  15. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

  16. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

  17. U-052: HP Protect Tools Device Access Manager Unspecified Bug...

    Broader source: Energy.gov (indexed) [DOE]

    Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

  18. ISO 14001: An Executive Report

    E-Print Network [OSTI]

    Simon, Richard

    1998-01-01T23:59:59.000Z

    Review: ISO 14001: An Executive Report By Gordon A. West andA. and Manta, Joseph G. ISO 14001: An Executive Report.management standards, ISO 14001: An Executive Report stands

  19. Shared prefetching to reduce execution skew in multi-threaded systems

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16T23:59:59.000Z

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  20. Executive Secretariat | Department of Energy

    Energy Savers [EERE]

    Executive Secretariat The Office of the Executive Secretariat manages the Department's top-level written communications, such as letters, information, action, and decision memos,...

  1. Data processing with microcode designed with source coding

    DOE Patents [OSTI]

    McCoy, James A; Morrison, Steven E

    2013-05-07T23:59:59.000Z

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  2. Steering Committee Executive Sponsor,

    E-Print Network [OSTI]

    Alvarez-Cohen, Lisa

    , Academic Planning & Facilities Executive Vice Chancellor & Provost George W. Breslauer Members Hermalin, Representative, Budget and Interdepartmental Relations Chika Kondo, Undergraduate Student Implementation Project Team Functional Owner, Mara Hancock, Director, Educational Technology Services Members

  3. Carrie Takeyasu Executive Director

    E-Print Network [OSTI]

    Burg, Theresa

    Carrie Takeyasu Executive Director Daryl Schacher Manager, Materials Management Lyn Jose Besplug Materials Handling Worker Chris Charles Materials Handling Worker Gerry Ste Marie Materials Handling Worker Mark Sabo Materials Handling Worker Michele Roberts General Clerk Laurie Martin Purchasing

  4. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  5. Code Description Code Description

    E-Print Network [OSTI]

    Leave* 5127 Officials 5217 Faculty Sick Leave Payment 5124 Personal Service Contracts 5211 Research Services Contracts Scholarships & Fellowships Faculty Fringe Contract Services #12;Banner Account Code

  6. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

    2009-04-14T23:59:59.000Z

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  7. Executive report Building knowledge

    E-Print Network [OSTI]

    Geffner, Hector

    Executive report Building knowledge To build citizens To build cities UPF CAMPUS IC繰IA INTERNATIONAL PROJECT 2010 International Campus of Excellence Programme #12;2 UPF CAMPUS IC繰IA INTERNATIONAL this presentation from the one submitted in the CEI 2009 programme where UPF was classified as a `promising

  8. Execution Version POWER PURCHASE AGREEMENT

    E-Print Network [OSTI]

    Firestone, Jeremy

    ") and BLUEWATER WIND DELAWARE LLC ("Seller") June 23, 2008 #12;Execution Version POWER PURCHASE AGREEMENT TableExecution Version POWER PURCHASE AGREEMENT between DELMARVA POWER & LIGHT COMPANY ("Buyer 3.5 Energy Forecasts, Scheduling and Balancing.......................................... 40 3

  9. Executive Committee | Department of Energy

    Office of Environmental Management (EM)

    Executive Committee Executive Committee May 27, 2015 6:00PM to 7:00PM EDT The meeting is open to the public. Location: DOE Information Center 1 Science.Gov Way Oak Ridge, TN 37830...

  10. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code...

  11. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code...

  12. Homological Error Correction: Classical and Quantum Codes

    E-Print Network [OSTI]

    H. Bombin; M. A. Martin-Delgado

    2006-05-10T23:59:59.000Z

    We prove several theorems characterizing the existence of homological error correction codes both classically and quantumly. Not every classical code is homological, but we find a family of classical homological codes saturating the Hamming bound. In the quantum case, we show that for non-orientable surfaces it is impossible to construct homological codes based on qudits of dimension $D>2$, while for orientable surfaces with boundaries it is possible to construct them for arbitrary dimension $D$. We give a method to obtain planar homological codes based on the construction of quantum codes on compact surfaces without boundaries. We show how the original Shor's 9-qubit code can be visualized as a homological quantum code. We study the problem of constructing quantum codes with optimal encoding rate. In the particular case of toric codes we construct an optimal family and give an explicit proof of its optimality. For homological quantum codes on surfaces of arbitrary genus we also construct a family of codes asymptotically attaining the maximum possible encoding rate. We provide the tools of homology group theory for graphs embedded on surfaces in a self-contained manner.

  13. Business Model Guide Executive Summary

    Broader source: Energy.gov [DOE]

    The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

  14. National Ignition Facility project execution plan

    SciTech Connect (OSTI)

    Paisner, J., LLNL

    1997-08-01T23:59:59.000Z

    This project execution plan covers: Justification of Mission Need; Project Description; Management Roles and Responsibilities; Project Execution; Method of Accomplishment.

  15. Spinal codes

    E-Print Network [OSTI]

    Perry, Jonathan, S.M. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    Spinal codes are a new class of rateless codes that enable wireless networks to cope with time-varying channel conditions in a natural way, without requiring any explicit bit rate selection. The key idea in the code is the ...

  16. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  17. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    certificate has been disabled and incorrectly accept certificates signed by that root server CVE-2011-0214. On systems with the 'AutoFill web forms' feature enabled, a remote...

  18. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to...

  19. T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities

  20. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment

  1. Foundational Certified Code in a Metalogical KARL CRARY and SUSMIT SARKAR

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    Foundational Certified Code in a Metalogical Framework KARL CRARY and SUSMIT SARKAR Carnegie Mellon not reflect the views of this agency. #12;2 路 K. Crary and S. Sarkar the executable code is accompanied

  2. Dynamic optical arbitrary waveform generation and measurement

    E-Print Network [OSTI]

    Kolner, Brian H.

    (7), 2701颅2719 (2006). 4. N. K. Fontaine, R. P. Scott, J. Cao, A. Karalar, W. Jiang, K. Okamoto, J. PDynamic optical arbitrary waveform generation and measurement Ryan P. Scott,* Nicolas K. Fontaine. Lett. 32(7), 865颅867 (2007). 5. R. P. Scott, N. K. Fontaine, J. Cao, K. Okamoto, B. H. Kolner, J. P

  3. Architecture-Dependent Execution Time of Shor's Algorithm

    E-Print Network [OSTI]

    Rodney Van Meter; Kohei M. Itoh; Thaddeus D. Ladd

    2006-05-25T23:59:59.000Z

    We show how the execution time of algorithms on quantum computers depends on the architecture of the quantum computer, the choice of algorithms (including subroutines such as arithmetic), and the ``clock speed'' of the quantum computer. The primary architectural features of interest are the ability to execute multiple gates concurrently, the number of application-level qubits available, and the interconnection network of qubits. We analyze Shor's algorithm for factoring large numbers in this context. Our results show that, if arbitrary interconnection of qubits is possible, a machine with an application-level clock speed of as low as one-third of a (possibly encoded) gate per second could factor a 576-bit number in under one month, potentially outperforming a large network of classical computers. For nearest-neighbor-only architectures, a clock speed of around twenty-seven gates per second is required.

  4. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser ServicesUsers' Executive

  5. Chaotic Turbo Codes

    E-Print Network [OSTI]

    S. Adrian Barbulescu; Andrew Guidi; Steven S. Pietrobon

    This paper describes a new class of codes, chaotic turbo codes. They were born from a symbiosis between a chaotical digital encoder and a turbo code. This paper investigates the most important properties of both chaotic digital encoders and turbo encoders in order to understand how the two complement each other. A Chaotic Turbo Encoder is then described and initial results will be presented. I. INTRODUCTION A chaotic digital encoder was defined for the first time in [1] as a non--linear digital filter with finite precision (8 bits) which behaves in a quasi--chaotic fashion, both with zero and nonzero input sequences. A simple chaotic encoder is shown in Figure 1 [1]. D Y k X k LCIRC D Figure 1: Chaotic Digital Encoder Mapper L L L L L L 1 The main features of chaotic digital encoders that are used in this paper are: # The system is digital which makes possible its integration with a turbo code. # The output of a chaotic digital encoder with arbitrary inputs has a broad...

  6. Code design based on metric-spectrum and applications

    E-Print Network [OSTI]

    Papadimitriou, Panayiotis D.

    2005-02-17T23:59:59.000Z

    We introduced nested search methods to design (n, k) block codes for arbitrary channels by optimizing an appropriate metric spectrum in each iteration. For a given k, the methods start with a good high rate code, say k/(k + 1), and successively...

  7. Efficient quantum circuits for arbitrary sparse unitaries

    SciTech Connect (OSTI)

    Jordan, Stephen P. [Institute for Quantum Information, Caltech, Pasadena, California 91125 (United States); Wocjan, Pawel [School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida 32816 (United States)

    2009-12-15T23:59:59.000Z

    Arbitrary exponentially large unitaries cannot be implemented efficiently by quantum circuits. However, we show that quantum circuits can efficiently implement any unitary provided it has at most polynomially many nonzero entries in any row or column, and these entries are efficiently computable. One can formulate a model of computation based on the composition of sparse unitaries which includes the quantum Turing machine model, the quantum circuit model, anyonic models, permutational quantum computation, and discrete time quantum walks as special cases. Thus, we obtain a simple unified proof that these models are all contained in BQP. Furthermore, our general method for implementing sparse unitaries simplifies several existing quantum algorithms.

  8. Thermoacoustic tomography with an arbitrary elliptic operator

    E-Print Network [OSTI]

    Michael V. Klibanov

    2012-08-26T23:59:59.000Z

    Thermoacoustic tomography is a term for the inverse problem of determining of one of initial conditions of a hyperbolic equation from boundary measurements. In the past publications both stability estimates and convergent numerical methods for this problem were obtained only under some restrictive conditions imposed on the principal part of the elliptic operator. In this paper logarithmic stability estimates are obatined for an arbitrary variable principal part of that operator. Convergence of the Quasi-Reversibility Method to the exact solution is also established for this case. Both complete and incomplete data collection cases are considered.

  9. Multiboson Correlation Interferometry with arbitrary single-photon pure states

    E-Print Network [OSTI]

    Vincenzo Tamma; Simon Laibacher

    2015-04-23T23:59:59.000Z

    We provide a compact full description of multiboson correlation measurements of arbitrary order N in passive linear interferometers with arbitrary input single-photon pure states. We give evidence, even for non-identical photons, of the tremendous computational power of multiphoton quantum interference at the heart of the complexity of multiboson correlation sampling at the output of random linear interferometers. Moreover, our results describe general multiboson correlation landscapes for an arbitrary number of input single photons and arbitrary interferometers. In particular, we use two different schemes to demonstrate, respectively, arbitrary-order quantum beat interference and 100 % visibility entanglement correlations even for input photons distinguishable in their frequencies.

  10. GETRAN: A generic, modularly structured computer code for simulation of dynamic behavior of aero- and power generation gas turbine engines

    SciTech Connect (OSTI)

    Schobeiri, M.T.; Attia, M.; Lippke, C. (Texas A and M Univ., College Station, TX (United States). Dept. of Mechanical Engineering)

    1994-07-01T23:59:59.000Z

    The design concept, the theoretical background essential for the development of the modularly structured simulation code GETRAN, and several critical simulation cases are presented in this paper. The code being developed under contract with NASA Lewis Research Center is capable of simulating the nonlinear dynamic behavior of single- and multispool core engines, turbofan engines, and power generation gas turbine engines under adverse dynamic operating conditions. The modules implemented into GETRAN correspond to components of existing and new-generation aero- and stationary gas turbine engines with arbitrary configuration and arrangement. For precise simulation of turbine and compressor components, row-by-row diabatic and adiabatic calculation procedures are implemented that account for the specific turbine and compressor cascade, blade geometry, and characteristics. The nonlinear, dynamic behavior of the subject engine is calculated solving a number of systems of partial differential equations, which describe the unsteady behavior of each component individually. To identify each differential equation system unambiguously, special attention is paid to the addressing of each component. The code is capable of executing the simulation procedure at four levels, which increase with the degree of complexity of the system and dynamic event. As representative simulations, four different transient cases with single- and multispool thrust and power generation engines were simulated. These transient cases vary from throttling the exit nozzle area, operation with fuel schedule, rotor speed control, to rotating stall and surge.

  11. JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP

    E-Print Network [OSTI]

    Peak, Derek

    JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP MENTOR HANDBOOK September2014................................................................................................................................................... 3 C. Benefits of JSGS Internships .................................................................................................................................... 4 Both partner organizations and interns benefit from JSGS Executive Internships

  12. SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...

    Office of Environmental Management (EM)

    SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal Training SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal...

  13. Executive Order 13423: Strengthening Federal Environmental, Energy...

    Broader source: Energy.gov (indexed) [DOE]

    text of Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management. eo13423.pdf More Documents & Publications Executive Order 13423-...

  14. Code constructions and code families for nonbinary quantum stabilizer code

    E-Print Network [OSTI]

    Ketkar, Avanti Ulhas

    2005-11-01T23:59:59.000Z

    Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer codes have received much...

  15. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  16. A PVM Executive Program for Use with RELAP5-3D

    SciTech Connect (OSTI)

    Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

    2002-04-01T23:59:59.000Z

    A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

  17. Progress on Problem about Quantum Hamming Bound for Impure Quantum Codes

    E-Print Network [OSTI]

    Zhuo Li; Lijuan Xing

    2009-07-22T23:59:59.000Z

    A famous open problem in the theory of quantum error-correcting codes is whether or not the parameters of an impure quantum code can violate the quantum Hamming bound for pure quantum codes. We partially solve this problem. We demonstrate that there exists a threshold such that an arbitrary quantum code must obey the quantum Hamming bound whenever . We list some values of for small d and binary quantum codes.

  18. Holographic codes

    E-Print Network [OSTI]

    Latorre, Jose I

    2015-01-01T23:59:59.000Z

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  19. Holographic codes

    E-Print Network [OSTI]

    Jose I. Latorre; German Sierra

    2015-02-23T23:59:59.000Z

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  20. Extension Program Council's Executive Board.

    E-Print Network [OSTI]

    Marshall, Mary G.; Richardson, Burl B.

    1986-01-01T23:59:59.000Z

    ~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate...

  1. Regulatory constraints on executive compensation

    E-Print Network [OSTI]

    Joskow, Paul L.

    1993-01-01T23:59:59.000Z

    This paper explores the influence of economic regulation on the level and structure of executive compensation. We find substantial and persistent differences in CEO compensation between firms subject to economic regulation ...

  2. Presidential Orders Executive Order 31

    E-Print Network [OSTI]

    Yetisgen-Yildiz, Meliha

    1 Presidential Orders Executive Order 31 Non-discrimination and Affirmative Action 1. Non. As permitted by applicable law, the University will take affirmative action to ensure equality of opportunity

  3. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on...

  4. Is It Possible To Clone Using An Arbitrary Blank State?

    E-Print Network [OSTI]

    Anirban Roy; Aditi Sen; Ujjwal Sen

    2001-11-29T23:59:59.000Z

    We show that in a cloning process, whether deterministic inexact or probabilistic exact, one can take an arbitrary blank state while still using a fixed cloning machine.

  5. arbitrary optical trapping: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    passing through Schieber, Jay D. 238 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  6. arbitrary apertures ii: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington at Seattle, University of 385 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  7. arbitrary quantum system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    theory. Sergio Giardino 2013-09-10 30 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  8. arbitrary ionic strength: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington at Seattle, University of 327 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  9. arbitrary degree sequence: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington at Seattle, University of 412 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  10. arbitrary hard ellipses: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington at Seattle, University of 342 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  11. arbitrary control loop: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington at Seattle, University of 330 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  12. Parallel execution model for Prolog

    SciTech Connect (OSTI)

    Fagin, B.S.

    1987-01-01T23:59:59.000Z

    One candidate language for parallel symbolic computing is Prolog. Numerous ways for executing Prolog in parallel have been proposed, but current efforts suffer from several deficiencies. Many cannot support fundamental types of concurrency in Prolog. Other models are of purely theoretical interest, ignoring implementation costs. Detailed simulation studies of execution models are scare; at present little is known about the costs and benefits of executing Prolog in parallel. In this thesis, a new parallel execution model for Prolog is presented: the PPP model or Parallel Prolog Processor. The PPP supports AND-parallelism, OR-parallelism, and intelligent backtracking. An implementation of the PPP is described, through the extension of an existing Prolog abstract machine architecture. Several examples of PPP execution are presented, and compilation to the PPP abstract instruction set is discussed. The performance effects of this model are reported, based on a simulation of a large benchmark set. The implications of these results for parallel Prolog systems are discussed, and directions for future work are indicated.

  13. High Performance 揜each Codes

    E-Print Network [OSTI]

    Edelson, J.

    2011-01-01T23:59:59.000Z

    Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

  14. CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 Hunter College of the City Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR DEGREE AUDIT UNIT Student Specialization Section #12;CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 *****A SEPARATE

  15. CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1/24/2006 Hunter College of the City-mail address Department Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR, DEGREE Section Only For January 2010 Graduate #12;CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1

  16. Damage from pulses with arbitrary temporal shapes

    SciTech Connect (OSTI)

    Trenholme, J.B.

    1994-06-06T23:59:59.000Z

    In fusion laser designs, the laser pulse has a complicated temporal shape which undergoes significant change as it passes through the laser. Our damage data, however, was taken with pulses whose temporal shapes were (more or less) Gaussian. We want to determine the damage propensity of a material exposed to a pulse of arbitrary temporal shape , given data taken with Gaussian pulses of different pulse widths. To do so, we must adopt a physical model of damage. This model will contain some number of parameters that depend on material properties, geometry, and so forth. We determine the parameters of the model appropriate to each material by fitting the model to the Gaussian data for that material. The resulting normalized model is then applied, using the appropriate pulse shape, to find the damage level for a specific material subjected to a specific pulse. The model we shall assume is related to diffusion, although (as we shall see) the experimental results do not fit any simple diffusion model. Initially, we will discuss simple diffusion models. We then examine some experimental data, and then develop a modified diffusive model from that data. That modified model is then used to predict damage levels in various portions of the NIF laser design.

  17. Business Development Executive (BDE) Program

    SciTech Connect (OSTI)

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05T23:59:59.000Z

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  18. Virtual Clay: Haptics-based Deformable Solids of Arbitrary Topology

    E-Print Network [OSTI]

    McDonnell, Kevin

    Virtual Clay: Haptics-based Deformable Solids of Arbitrary Topology Kevin T. McDonnell and Hong Qin|qin}@cs.sunysb.edu Abstract. This paper presents Virtual Clay as a novel, interactive, dy- namic, haptics-based deformable solid of arbitrary topology. Our Virtual Clay methodology is a unique, powerful visual modeling paradigm

  19. Wavelet Radiosity on Arbitrary Planar Nicolas Holzschuch1

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Wavelet Radiosity on Arbitrary Planar Surfaces Nicolas Holzschuch1 , Franc竜is Cuny2 and Laurent Abstract. Wavelet radiosity is, by its nature, restricted to parallelograms or tri- angles. This paper presents an innovative technique enabling wavelet radiosity computations on planar surfaces of arbitrary

  20. ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES

    E-Print Network [OSTI]

    Masci, Frank

    ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES This article has CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES Dustin Lang1,2,7 , David W. Hogg3,4 , Keir Mierle1,5 , Michael Blanton3 , and Sam Roweis1,5,6 1 Department of Computer Science, University of Toronto, 6 King's College

  1. ARPREC: An arbitrary precision computation package

    SciTech Connect (OSTI)

    Bailey, David H.; Yozo, Hida; Li, Xiaoye S.; Thompson, Brandon

    2002-09-01T23:59:59.000Z

    This paper describes a new software package for performing arithmetic with an arbitrarily high level of numeric precision. It is based on the earlier MPFUN package, enhanced with special IEEE floating-point numerical techniques and several new functions. This package is written in C++ code for high performance and broad portability and includes both C++ and Fortran-90 translation modules, so that conventional C++ and Fortran-90 programs can utilize the package with only very minor changes. This paper includes a survey of some of the interesting applications of this package and its predecessors.

  2. Executive Summit on Wind Research and Development | Department...

    Office of Environmental Management (EM)

    Executive Summit on Wind Research and Development Executive Summit on Wind Research and Development Executive Summit on Wind Research and Development Each year, DOE EERE invests...

  3. Quantum Szilard engines with arbitrary spin

    E-Print Network [OSTI]

    Zekun Zhuang; Shi-Dong Liang

    2015-02-02T23:59:59.000Z

    The quantum Szilard engine (QSZE) is a conceptual quantum engine for understanding the fundamental physics of quantum thermodynamics and information physics. We generalize the QSZE to an arbitrary spin case, i.e., a spin QSZE (SQSZE), and we systematically study the basic physical properties of both fermion and boson SQSZEs in a low-temperature approximation. We give the analytic formulation of the total work. For the fermion SQSZE, the work might be absorbed from the environment, and the change rate of the work with temperature exhibits periodicity and even-odd oscillation, which is a generalization of a spinless QSZE. It is interesting that the average absorbed work oscillates regularly and periodically in a large-number limit, which implies that the average absorbed work in a fermion SQSZE is neither an intensive quantity nor an extensive quantity. The phase diagrams of both fermion and boson SQSZEs give the SQSZE doing positive or negative work in the parameter space of the temperature and the particle number of the system, but they have different behaviors because the spin degrees of the fermion and the boson play different roles in their configuration states and corresponding statistical properties. The critical temperature of phase transition depends sensitively on the particle number. By using Landauer's erasure principle, we give the erasure work in a thermodynamic cycle, and we define an efficiency (we refer to it as information-work efficiency) to measure the engine's ability of utilizing information to extract work. We also give the conditions under which the maximum extracted work and highest information-work efficiencies for fermion and boson SQSZEs can be achieved.

  4. NARSTO OZONE ASSESSMENT EXECUTIVE SUMMARY

    E-Print Network [OSTI]

    vi NARSTO OZONE ASSESSMENT EXECUTIVE SUMMARY Prepared as a NARSTO initiative, this tropospheric O3 in the accompanying Textbox, the NARSTO Ozone Assessment contains two product components. The first of these is a set aspects of tropospheric ozone pollution. The second component, the NARSTO Ozone Assessment Document

  5. Faculty of Engineering Executive Committee

    E-Print Network [OSTI]

    Petriu, Emil M.

    is in progress. #12;2 The Dean met with the ESS executive and informed then that the Faculty is open to a shared or broader use of CBY A04. Once the ESS has revised their preliminary proposal, the Faculty will undertake to be submitted this week. The Dean discussed our pilot evaluation of TAs at the academic planning committee. TA

  6. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    de Lijser, Peter

    Rev 2/2013 Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

  7. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08T23:59:59.000Z

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.

  8. UCSF Sustainability Action Plan: Executive Summary

    E-Print Network [OSTI]

    Yamamoto, Keith

    UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

  9. Northwest Energy Efficiency Taskforce Executive Committee

    E-Print Network [OSTI]

    #12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

  10. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Energy Savers [EERE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  11. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  12. Executive Order 13423- Strengthening Federal Environmental, Energy...

    Energy Savers [EERE]

    423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

  13. Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of

    E-Print Network [OSTI]

    Binder, Walter

    Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications Walter Binder and Bal碼zs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 applications. Mobile code is used for application upload, as well as for remote configuration and maintenance

  14. ByteCode 2011 LCT: An Open Source Concolic Testing Tool

    E-Print Network [OSTI]

    Heljanko, Keijo

    recently received interest is concolic testing which combines concrete and symbolic execution. Based Concolic testing [5,11,2] is a method where a given program is executed both concretely and symbolicallyByteCode 2011 LCT: An Open Source Concolic Testing Tool for Java Programs1 Kari K篓ahk篓onen, Tuomas

  15. Executive Director Carleton Sustainable Energy Research Centre

    E-Print Network [OSTI]

    Dawson, Jeff W.

    Executive Director Carleton Sustainable Energy Research Centre Carleton University is seeking to appoint an Executive Director to its Sustainable Energy Research Centre. This Centre is one of a series of recent Carleton initiatives in the area of sustainable energy. The Executive Director

  16. December 17, 2008 Robert Almgren / Encyclopedia of Quantitative Finance Execution Costs 1 Execution Costs

    E-Print Network [OSTI]

    Almgren, Robert F.

    December 17, 2008 Robert Almgren / Encyclopedia of Quantitative Finance Execution Costs 1 Execution Costs Execution costs are the difference in value between an ideal trade and what was actually done. The execution cost of a single completed trade is typically the difference between the final average trade price

  17. Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA

    E-Print Network [OSTI]

    Pasareanu, Corina

    Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA-level concrete execution for generating test cases that satisfy user-specified testing criteria. We have to testing complex safety critical software that combines unit-level symbolic execution and system

  18. Statistical Mechanical Models and Topological Color Codes

    E-Print Network [OSTI]

    H. Bombin; M. A. Martin-Delgado

    2007-11-03T23:59:59.000Z

    We find that the overlapping of a topological quantum color code state, representing a quantum memory, with a factorized state of qubits can be written as the partition function of a 3-body classical Ising model on triangular or Union Jack lattices. This mapping allows us to test that different computational capabilities of color codes correspond to qualitatively different universality classes of their associated classical spin models. By generalizing these statistical mechanical models for arbitrary inhomogeneous and complex couplings, it is possible to study a measurement-based quantum computation with a color code state and we find that their classical simulatability remains an open problem. We complement the meaurement-based computation with the construction of a cluster state that yields the topological color code and this also gives the possibility to represent statistical models with external magnetic fields.

  19. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-07-23T23:59:59.000Z

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  20. Schwinger Mechanism for Gluon Pair Production in the Presence of Arbitrary Time Dependent Chromo-Electric Field in Arbitrary Gauge

    E-Print Network [OSTI]

    Gouranga C Nayak

    2009-10-02T23:59:59.000Z

    We study non-perturbative gluon pair production from arbitrary time dependent chromo-electric field E^a(t) with arbitrary color index a =1,2,...8 via Schwinger mechanism in arbitrary covariant background gauge \\alpha. We show that the probability of non-perturbative gluon pair production per unit time per unit volume per unit transverse momentum \\frac{dW}{d^4xd^2p_T} is independent of gauge fixing parameter \\alpha. Hence the result obtained in the Fynman-'t Hooft gauge, \\alpha=1, is the correct gauge invariant and gauge parameter \\alpha independent result.

  1. A Markov-type inequality for arbitrary plane continua

    E-Print Network [OSTI]

    1910-51-20T23:59:59.000Z

    Dec 8, 2005 ... for all polynomials f. We prove a precise version of this inequality with an arbitrary continuum in the complex plane instead of the interval. [?1,1].

  2. Skin effect with arbitrary specularity in Maxwellian plasma

    E-Print Network [OSTI]

    Anatoly V. Latyshev; Alexander A. Yushkanov

    2009-12-10T23:59:59.000Z

    The problem of skin effect with arbitrary specularity in maxwellian plasma with specular--diffuse boundary conditions is solved. A new analytical method is developed that makes it possible to to obtain a solution up to an arbitrary degree of accuracy. The method is based on the idea of symmetric continuation not only the electric field, but also electron distribution function. The solution is obtained in a form of von Neumann series.

  3. Automatic generation of executable communication specifications from parallel applications

    SciTech Connect (OSTI)

    Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

    2011-01-19T23:59:59.000Z

    Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  5. NREL: Energy Executive Leadership Academy - Executive Energy Leadership

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Saleshttp://www.fnal.gov/directorate/nalcal/nalcal02_07_05_files/nalcal.gifNRELPowerNewsletterAcademy Alumni Executive Energy

  6. Executive Resources | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 Russian NuclearandJunetrackEllen|July 14,Department ofExecutive Resources

  7. STEP Participant Survey Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy atLLC - FE DKT. 10-160-LNG - ORDERSTATE ENERGY PROGRAMJulyExecutive S ummary

  8. Office of the Executive Secretariat

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National,2008aims to increaseExecutive

  9. FY2003 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive

  10. FY2005 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive5

  11. FY2006 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive56

  12. FY2007 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive567

  13. An Extended Network Coding Opportunity Discovery Scheme in Wireless Networks

    E-Print Network [OSTI]

    Zhao, Yunlong; Iwai, Masayuki; Sezaki, Kaoru; Tobe, Yoshito; 10.5121/ijcnc.2012.4106

    2012-01-01T23:59:59.000Z

    Network coding is known as a promising approach to improve wireless network performance. How to discover the coding opportunity in relay nodes is really important for it. There are more coding chances, there are more times it can improve network throughput by network coding operation. In this paper, an extended network coding opportunity discovery scheme (ExCODE) is proposed, which is realized by appending the current node ID and all its 1-hop neighbors' IDs to the packet. ExCODE enables the next hop relay node to know which nodes else have already overheard the packet, so it can discover the potential coding opportunities as much as possible. ExCODE expands the region of discovering coding chance to n-hops, and have more opportunities to execute network coding operation in each relay node. At last, we implement ExCODE over the AODV protocol, and efficiency of the proposed mechanism is demonstrated with NS2 simulations, compared to the existing coding opportunity discovery scheme.

  14. Generalized concatenated quantum codes

    E-Print Network [OSTI]

    Grassl, Markus

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using ...

  15. Budget Execution Funds Distribution and Control

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-01-09T23:59:59.000Z

    The Order describes Department of Energy systems, requirements, and assignment of responsibilities for control of the Department budget execution process. Cancels DOE O 135.1.

  16. 2009 Wind Technologies Market Report: Executive Summary

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.

    2010-08-01T23:59:59.000Z

    This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

  17. Concatenated Conjugate Codes

    E-Print Network [OSTI]

    Mitsuru Hamada

    2006-10-31T23:59:59.000Z

    A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

  18. CURRICULUM CODE 308 DEGREE CODE _40

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE 308 DEGREE CODE _40 Hunter College of the City University of New York - Office Print) E-mail address OES Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR Specialization Section #12;CURRICULUM CODE_308_ DEGREE CODE _40__ Course Prefix & Number Course Title Credits

  19. Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for

    E-Print Network [OSTI]

    Corbalan, Julita

    Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors UPC Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Polit猫cnica de Catalunya #12;Dept. d'Arquitectura de Computadors Execution Environments

  20. Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for

    E-Print Network [OSTI]

    Corbalan, Julita

    Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Polit猫cnica de Catalunya Dept. d'Arquitectura de Computadors Execution Environments for Parallel

  1. Modeling Correlation Noise Statistics at Decoder for Pixel Based Wyner-Ziv Video Coding *

    E-Print Network [OSTI]

    Pereira, Fernando

    , and is responsible to achieve the best rate-distortion (RD) performance, while the decoder remains a pure executer in Wyner-Ziv (WZ) video coding, a particular case of DVC. In the literature, many practical WZ coding once and decoded many times, i.e. one-to-many topologies, such as broadcasting or video-on-demand

  2. T-589: Citrix XenApp and Citrix Presentation Server Bug

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system.

  3. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Broader source: Energy.gov (indexed) [DOE]

    Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

  4. U-051: Skype Discloses IP Addresses to Remote Users | Department...

    Broader source: Energy.gov (indexed) [DOE]

    available at the time of this entry. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

  5. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  6. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  7. U-117: Potential security vulnerability has been identified with...

    Broader source: Energy.gov (indexed) [DOE]

    printer firmware. PLATFORM: Select HP printers and Digital Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a...

  8. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    An update that fixes 25 vulnerabilities is now available. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  9. U-017: HP MFP Digital Sending Software Lets Local Users Obtain...

    Broader source: Energy.gov (indexed) [DOE]

    TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  10. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    An update that fixes 25 vulnerabilities is now available. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  11. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  12. IBM Global Business Services Executive Report

    E-Print Network [OSTI]

    -based strategic insights for senior executives around critical public and private sector issues. This executive perspectives Creating new business models for a changing world of energy Energy and Utilities #12;IBM Institute to facilitate not only traditional energy generation and delivery, but also emerging products and services

  13. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2011-09-01T23:59:59.000Z

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  14. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2010-10-01T23:59:59.000Z

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 揋rand Challenge for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  15. THERMOACOUSTIC TOMOGRAPHY WITH AN ARBITRARY ELLIPTIC OPERATOR MICHAEL V. KLIBANOV

    E-Print Network [OSTI]

    1 THERMOACOUSTIC TOMOGRAPHY WITH AN ARBITRARY ELLIPTIC OPERATOR MICHAEL V. KLIBANOV Abstract. Thermoacoustic tomography is a term for the inverse problem of determining of one of initial conditions. In thermoacoustic tomography (TAT) a short radio frequency pulse is sent in a biological tissue [1, 9]. Some energy

  16. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    E-Print Network [OSTI]

    Fehr, Serge

    Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer and Serge Fehr BRICS-box secret sharing scheme for the threshold access structure Tt,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say

  17. Optimal BlackBox Secret Sharing over Arbitrary Abelian Groups

    E-Print Network [OSTI]

    Fehr, Serge

    Optimal Black颅Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer and Serge Fehr BRICS颅box secret sharing scheme for the threshold access structure Tt,n is one which works over any finite Abelian group G. Briefly, such a scheme di#ers from an ordinary linear secret sharing scheme (over, say, a given

  18. Homological stabilizer codes

    SciTech Connect (OSTI)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15T23:59:59.000Z

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  19. The Minimum Assumed Incentive Effect of Executive Share Options

    E-Print Network [OSTI]

    Main, Brian G M; Skovoroda, Rodion; Buck, Trevor; Bruce, Alistair

    2003-01-01T23:59:59.000Z

    In granting executive share options (ESOs), companies hand over financial assets to the executive at an opportunity cost that generally outweighs the value placed on those assets by the executive on the receiving end. This ...

  20. Insertion of operation-and-indicate instructions for optimized SIMD code

    DOE Patents [OSTI]

    Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

    2013-06-04T23:59:59.000Z

    Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

  1. Half-Product Codes

    E-Print Network [OSTI]

    Emmadi, Santosh Kumar

    2014-12-11T23:59:59.000Z

    A class of codes, half-product codes, derived from product codes, is characterized. These codes have the implementation advantages of product codes and possess a special structural property which leads them to have larger (at least 3/2 times more...

  2. Executive Order 12088: Federal Compliance with Pollution Control...

    Energy Savers [EERE]

    088: Federal Compliance with Pollution Control Standards Executive Order 12088: Federal Compliance with Pollution Control Standards The head of each Executive agency is responsible...

  3. Eastern Wind Integration and Transmission Study: Executive Summary...

    Energy Savers [EERE]

    Study: Executive Summary and Project Overview Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview This study evaluates the future operational...

  4. FY 2006 Executive Order 13101 Report: Department of Energy Affirmative...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 31207 FY 2006 Executive Order 13101 Report: Department of...

  5. American Indian Policy and Relevant DOE and Executive Orders...

    Energy Savers [EERE]

    Services Communication & Engagement Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive...

  6. Renewable Energy Requirement Guidance for EPAct 2005 and Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies conditions for...

  7. New Executive Order Establishes a Federal Flood Risk Management...

    Energy Savers [EERE]

    New Executive Order Establishes a Federal Flood Risk Management Standard New Executive Order Establishes a Federal Flood Risk Management Standard February 5, 2015 - 10:55am Addthis...

  8. Richard Lazarus Named as Executive Director of National Commission...

    Office of Environmental Management (EM)

    Lazarus Named as Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National...

  9. White House Announces New Executive Order To Reduce Greenhouse...

    Energy Savers [EERE]

    White House Announces New Executive Order To Reduce Greenhouse Gas Emissions in the Federal Government White House Announces New Executive Order To Reduce Greenhouse Gas Emissions...

  10. President Issues Executive Order Aimed at Preparing for the Impacts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for the...

  11. List of codes Language abbreviation codes

    E-Print Network [OSTI]

    Portugal MT Malta GR Greece SE Sweden TR Turkey Country codes for the ERASMUS Institutional Identification codes A Austria IR L Ireland BG Bulgaria LV Latvia B Belgium IS Iceland CY Cyprus MT Malta D Germany L

  12. Generalized Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Grassl, Markus

    We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are ...

  13. Quantum convolutional stabilizer codes

    E-Print Network [OSTI]

    Chinthamani, Neelima

    2004-09-30T23:59:59.000Z

    Quantum error correction codes were introduced as a means to protect quantum information from decoherance and operational errors. Based on their approach to error control, error correcting codes can be divided into two different classes: block codes...

  14. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2009燬.B. 1182燾reated the燨klahoma Uniform Building Code Commission. The 11-member Commission was given the power to conduct rulemaking processes to adopt new building codes. The codes adopted...

  16. Codeword Stabilized Quantum Codes

    E-Print Network [OSTI]

    Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng

    2007-09-27T23:59:59.000Z

    We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.

  17. Generalized Concatenated Quantum Codes

    E-Print Network [OSTI]

    Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng

    2009-01-09T23:59:59.000Z

    We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.

  18. Encoding Subsystem Codes

    E-Print Network [OSTI]

    Pradeep Kiran Sarvepalli; Andreas Klappenecker

    2008-06-30T23:59:59.000Z

    In this paper we investigate the encoding of operator quantum error correcting codes i.e. subsystem codes. We show that encoding of subsystem codes can be reduced to encoding of a related stabilizer code making it possible to use all the known results on encoding of stabilizer codes. Along the way we also show how Clifford codes can be encoded. We also show that gauge qubits can be exploited to reduce the encoding complexity.

  19. Project Execution Plan, Rev. 3

    SciTech Connect (OSTI)

    IT Corporation, Las Vegas

    2002-08-01T23:59:59.000Z

    This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

  20. On optimal constacyclic codes

    E-Print Network [OSTI]

    Giuliano G. La Guardia

    2013-11-11T23:59:59.000Z

    In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  2. Massive "spin-2" theories in arbitrary $D \\ge 3$ dimensions

    E-Print Network [OSTI]

    D. Dalmazi; A. L. R. dos Santos; E. L. Mendon鏰

    2014-08-28T23:59:59.000Z

    Here we show that in arbitrary dimensions $D\\ge 3$ there are two families of second order Lagrangians describing massive "spin-2" particles via a nonsymmetric rank-2 tensor. They differ from the usual Fierz-Pauli theory in general. At zero mass one of the families is Weyl invariant. Such massless theory has no particle content in $D=3$ and gives rise, via master action, to a dual higher order (in derivatives) description of massive spin-2 particles in $D=3$ where both the second and the fourth order terms are Weyl invariant, contrary to the linearized New Massive Gravity. However, only the fourth order term is invariant under arbitrary antisymmetric shifts. Consequently, the antisymmetric part of the tensor $e_{[\\mu\

  3. Arbitrary Rotation Invariant Random Matrix Ensembles and Supersymmetry

    E-Print Network [OSTI]

    Thomas Guhr

    2006-06-03T23:59:59.000Z

    We generalize the supersymmetry method in Random Matrix Theory to arbitrary rotation invariant ensembles. Our exact approach further extends a previous contribution in which we constructed a supersymmetric representation for the class of norm-dependent Random Matrix Ensembles. Here, we derive a supersymmetric formulation under very general circumstances. A projector is identified that provides the mapping of the probability density from ordinary to superspace. Furthermore, it is demonstrated that setting up the theory in Fourier superspace has considerable advantages. General and exact expressions for the correlation functions are given. We also show how the use of hyperbolic symmetry can be circumvented in the present context in which the non-linear sigma model is not used. We construct exact supersymmetric integral representations of the correlation functions for arbitrary positions of the imaginary increments in the Green functions.

  4. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    貀stein Mar鴜; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  5. A compact, multichannel, and low noise arbitrary waveform generator

    SciTech Connect (OSTI)

    Govorkov, S. [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada)] [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada); Ivanov, B. I. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany) [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany); Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 (Russian Federation); Il'ichev, E.; Meyer, H.-G. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)] [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)

    2014-05-15T23:59:59.000Z

    A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

  6. Account Executive Account Manager of Sales

    E-Print Network [OSTI]

    Engineer Naval Surface Ship Warfare Officer Network Administrator Networking/Engineering Level II NetworkAccount Executive Account Manager of Sales Administrative Assistant Advanced Systems Engineer Engineer Assistant Administrator Assistant Analyst Assistant Development Engineer Assistant Director

  7. Executive Committee meeting | Department of Energy

    Office of Environmental Management (EM)

    meeting Executive Committee meeting June 24, 2015 6:00PM to 7:00PM EDT The meeting is open to the public. Location: DOE Information Center 1 Science.Gov Way Oak Ridge, TN 37830...

  8. v 2002 SITE ENVIRONMENTAL REPORT Executive Summary

    E-Print Network [OSTI]

    Homes, Christopher C.

    Department of Environmental Conservation (NYSDEC) granted BNLs request to modify its State Pollutantv 2002 SITE ENVIRONMENTAL REPORT Executive Summary The 2002 Site Environmental Report (SER the status of Brookhaven National Laboratorys (BNL) environmental pro- grams and performance and restoration

  9. Executive Summary Mitigation of Climate Change through

    E-Print Network [OSTI]

    Brown, Sally

    Executive Summary Mitigation of Climate Change through Land Reclamation with Biosolids: Carbon storage in reclaimed mine soils, life cycle analysis of biosolids reclamation, and ecosystem services; Pacala and Socolow, 2004). Land reclamation with municipal wastewater solids (biosolids) can play

  10. Stateless and stateful implementations of faithful execution

    DOE Patents [OSTI]

    Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

    2014-12-16T23:59:59.000Z

    A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

  11. Chief executive officers: their mentoring relationships

    E-Print Network [OSTI]

    Rosser, Manda Hays

    2005-02-17T23:59:59.000Z

    CHIEF EXECUTIVE OFFICERS: THEIR MENTORING RELATIONSHIPS A Dissertation by MANDA HAYS ROSSER Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... EXECUTIVE OFFICERS: THEIR MENTORING RELATIONSHIPS A Dissertation by MANDA HAYS ROSSER Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved as to style and content by...

  12. Remote state preparation: arbitrary remote control of photon polarization Nicholas A. Peters,1

    E-Print Network [OSTI]

    Kwiat, Paul

    Remote state preparation: arbitrary remote control of photon polarization Nicholas A. Peters,1 University, Kirksville, MO 63501 (Dated: October 22, 2004) We experimentally demonstrate the first remote, we remotely prepare arbitrary states at two wavelengths. Further, we derive theoretical bounds

  13. TECATE - a code for anisotropic thermoelasticity in high-average-power laser technology. Phase 1 final report

    SciTech Connect (OSTI)

    Gelinas, R.J.; Doss, S.K.; Carlson, N.N.

    1985-01-01T23:59:59.000Z

    This report describes a totally Eulerian code for anisotropic thermoelasticity (code name TECATE) which may be used in evaluations of prospective crystal media for high-average-power lasers. The present TECATE code version computes steady-state distributions of material temperatures, stresses, strains, and displacement fields in 2-D slab geometry. Numerous heat source and coolant boundary condition options are available in the TECATE code for laser design considerations. Anisotropic analogues of plane stress and plane strain evaluations can be executed for any and all crystal symmetry classes. As with all new and/or large physics codes, it is likely that some code imperfections will emerge at some point in time.

  14. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Energy Savers [EERE]

    T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute...

  15. Generalized Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Markus Grassl; Peter W. Shor; Bei Zeng

    2009-05-04T23:59:59.000Z

    We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.

  16. Graph concatenation for quantum codes

    E-Print Network [OSTI]

    Beigi, Salman

    Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code and every codeword stabilized code can be described by a graph and a classical code. For the ...

  17. CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES

    E-Print Network [OSTI]

    Wong, Tan F.

    CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES John M. Shea, Florida Abstract--Turbo-codes provide communications near capac- ity when very large interleavers (and parity-check code can be used as an outer code with a turbo code as an inner code in a serial

  18. An arbitrary function generator for use with an analog computer

    E-Print Network [OSTI]

    Shanks, John Lee

    1956-01-01T23:59:59.000Z

    an output voltage, f(x)x which is a function of an input voltage, x. II ' THE PROBLEN Statement of the problem. It was the purpose of this research to design and build an arbitrary function generator Granino A. Kozn and Theresa N, Korn, Electronic... I CL L LI L') c) IW Qg d pJ O TABLE OF CONTENTS CHAPTER I. INTRODUCTION TO THE PROBLEM De f i ni t i on o f Terms. Analog computer Computer components. Function generator The Problem Statement of the problem Justification of the problem...

  19. Quantum memory of a squeezed vacuum for arbitrary frequency sidebands

    SciTech Connect (OSTI)

    Arikawa, Manabu; Honda, Kazuhito; Akamatsu, Daisuke; Nagatsuka, Satoshi; Akiba, Keiichirou [Department of Physics, Tokyo Institute of Technology, 2-12-1 O-okayama, Meguro-ku, Tokyo 152-8550 (Japan); Furusawa, Akira [Department of Applied Physics, School of Engineering, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo 113-8656 (Japan); Kozuma, Mikio [Department of Physics, Tokyo Institute of Technology, 2-12-1 O-okayama, Meguro-ku, Tokyo 152-8550 (Japan); CREST, Japan Science and Technology Agency, 1-9-9 Yaesu, Chuo-ku, Tokyo 103-0028 (Japan)

    2010-02-15T23:59:59.000Z

    We have developed a quantum memory that is completely compatible with current quantum information processing for continuous variables of light, where arbitrary frequency sidebands of a squeezed vacuum can be stored and retrieved using bichromatic electromagnetic induced transparency. The 2 MHz sidebands of squeezed vacuum pulses with temporal widths of 470 ns and a squeezing level of -1.78{+-}0.02 dB were stored for 3 {mu}s in laser-cooled {sup 87}Rb atoms. Squeezing of -0.44{+-}0.02 dB, which is the highest squeezing reported for a retrieved pulse, was achieved.

  20. Towards radio astronomical imaging using an arbitrary basis

    E-Print Network [OSTI]

    Petschow, Matthias

    2015-01-01T23:59:59.000Z

    The new generation of radio telescopes, such as the Square Kilometer Array (SKA), requires dramatic advances in computer hardware and software, in order to process the large amounts of produced data efficiently. In this document, we explore a new approach to wide-field imaging. By generalizing the image reconstruction, which is performed by an inverse Fourier transform, to arbitrary transformations, we gain enormous new possibilities. In particular, we outline an approach that might allow to obtain a sky image of size P times Q in (optimal) O(PQ) time. This could be a step in the direction of real-time, wide-field sky imaging for future telescopes.

  1. Generalized Intelligent States for an Arbitrary Quantum System

    E-Print Network [OSTI]

    A. H. EL Kinani; M. Daoud

    2003-11-06T23:59:59.000Z

    Generalized Intelligent States (coherent and squeezed states) are derived for an arbitrary quantum system by using the minimization of the so-called Robertson-Schr\\"odinger uncertainty relation. The Fock-Bargmann representation is also considered. As a direct illustration of our construction, the P\\"oschl-Teller potentials of trigonometric type will be shosen. We will show the advantage of the Fock-Bargmann representation in obtaining the generalized intelligent states in an analytical way. Many properties of these states are studied.

  2. Colored knot polynomials for arbitrary pretzel knots and links

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Galakhov, D.; Melnikov, D.; Mironov, A.; Morozov, A.; Sleptsov, A.

    2015-04-01T23:59:59.000Z

    A very simple expression is conjectured for arbitrary colored Jones and HOMFLY polynomials of a rich (g+1)-parametric family of pretzel knots and links. The answer for the Jones and HOMFLY is fully and explicitly expressed through the Racah matrix of Uq(SUN), and looks related to a modular transformation of toric conformal block.Knot polynomials are among the hottest topics in modern theory. They are supposed to summarize nicely representation theory of quantum algebras and modular properties of conformal blocks. The result reported in the present letter, provides a spectacular illustration and support to this general expectation.

  3. Ising Model on Networks with an Arbitrary Distribution of Connections

    E-Print Network [OSTI]

    S. N. Dorogovtsev; A. V. Goltsev; J. F. F. Mendes

    2002-04-11T23:59:59.000Z

    We find the exact critical temperature $T_c$ of the nearest-neighbor ferromagnetic Ising model on an `equilibrium' random graph with an arbitrary degree distribution $P(k)$. We observe an anomalous behavior of the magnetization, magnetic susceptibility and specific heat, when $P(k)$ is fat-tailed, or, loosely speaking, when the fourth moment of the distribution diverges in infinite networks. When the second moment becomes divergent, $T_c$ approaches infinity, the phase transition is of infinite order, and size effect is anomalously strong.

  4. The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report

    SciTech Connect (OSTI)

    Not Available

    2006-09-01T23:59:59.000Z

    This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

  5. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code...

  6. Joint Source-Channel Coding via Turbo Codes

    E-Print Network [OSTI]

    Alajaji, Fady

    Joint Source-Channel Coding via Turbo Codes by Guang-Chong Zhu A dissertation submitted coding. One of the most exciting break- throughs in channel coding is the invention of Turbo codes, whose- tigate three joint source-channel coding issues in the context of Turbo codes. In the #12;rst part

  7. Unfolding the color code

    E-Print Network [OSTI]

    Aleksander Kubica; Beni Yoshida; Fernando Pastawski

    2015-03-06T23:59:59.000Z

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.

  8. A parallel execution model for Prolog

    SciTech Connect (OSTI)

    Fagin, B.

    1987-01-01T23:59:59.000Z

    In this thesis a new parallel execution model for Prolog is presented: The PPP model or Parallel Prolog Processor. The PPP supports AND-parallelism, OR- parallelism, and intelligent backtracking. An implementation of the PPP is described, through the extension of an existing Prolog abstract machine architecture. Several examples of PPP execution are presented and compilation to the PPP abstract instructions set is discussed. The performance effects of this model are reported, based on a simulation of a large benchmark set. The implications of these results for parallel Prolog systems are discussed, and directions for future work are indicated.

  9. Dependence driven execution for multiprogrammed multiprocessor

    SciTech Connect (OSTI)

    Vajracharya, S. [Los Alamos National Lab., NM (United States); Grunwald, D. [Univ. of Colorado, Boulder, CO (United States). Dept. of Computer Science

    1998-12-31T23:59:59.000Z

    Barrier synchronizations can be very expensive on multiprogramming environment because no process can go past a barrier until all the processes have arrived. If a process participating at a barrier is swapped out by the operating system, the rest of participating processes end up waiting for the swapped-out process. This paper presents a compile-time/run-time system that uses a dependence-driven execution to overlap the execution of computations separated by barriers so that the processes do not spend most of the time idling at the synchronization point.

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy抯 (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  11. Model Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy抯 (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  12. Compiling Codes on Euclid

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High...

  13. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01T23:59:59.000Z

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  14. Introduction to Algebraic Codes

    E-Print Network [OSTI]

    for health care. These self-correcting codes that occur in nature might be better than all of. our coding theory based on algebra or algebraic geometry. It is a myth

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy抯 (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy抯 (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

  17. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang (Athens, GA); Ljungdahl, Lars G. (Athens, GA); Chen, Huizhong (Lawrenceville, GA)

    2001-02-20T23:59:59.000Z

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    The New Jersey Uniform Construction Code Act provides that model codes and standards publications shall not be adopted more frequently than once every three years. However, a revision or amendment...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    All residential and commercial structures are required to comply with the state抯 energy code. The 2009 New Mexico Energy Conservation Code (NMECC), effective June 2013, is based on 2009...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  1. Coding for Cooperative Communications

    E-Print Network [OSTI]

    Uppal, Momin Ayub

    2011-10-21T23:59:59.000Z

    of SWCNSQ based CF relaying as a performance benchmark, we will present a practical code design using low-density parity-check (LDPC) codes for error protection at the source, and nested scalar quantization plus irregular repeat-accumulate (IRA) codes... develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c...

  2. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department of

  3. U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code |Department

  4. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury atArbitrary Code and Deny

  5. Fluctuating Surface Currents: A New Algorithm for Efficient Prediction of Casimir Interactions among Arbitrary Materials in Arbitrary Geometries. I. Theory

    E-Print Network [OSTI]

    M. T. Homer Reid; Jacob White; Steven G. Johnson

    2012-07-12T23:59:59.000Z

    This paper presents a new method for the efficient numerical computation of Casimir interactions between objects of arbitrary geometries, composed of materials with arbitrary frequency-dependent electrical properties. Our method formulates the Casimir effect as an interaction between effective electric and magnetic current distributions on the surfaces of material bodies, and obtains Casimir energies, forces, and torques from the spectral properties of a matrix that quantifies the interactions of these surface currents. The method can be formulated and understood in two distinct ways: \\textbf{(1)} as a consequence of the familiar \\textit{stress-tensor} approach to Casimir physics, or, alternatively, \\textbf{(2)} as a particular case of the \\textit{path-integral} approach to Casimir physics, and we present both formulations in full detail. In addition to providing an algorithm for computing Casimir interactions in geometries that could not be efficiently handled by any other method, the framework proposed here thus achieves an explicit unification of two seemingly disparate approaches to computational Casimir physics.

  6. Homological Product Codes

    E-Print Network [OSTI]

    Sergey Bravyi; Matthew B. Hastings

    2013-11-04T23:59:59.000Z

    Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their simple syndrome readout circuits and potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor distance scaling limited by the square-root of the code length. This is in a sharp contrast with the classical case where good families of LDPC codes are known that combine constant encoding rate and linear distance. Here we propose the first family of good quantum codes with low-weight stabilizers. The new codes have a constant encoding rate, linear distance, and stabilizers acting on at most $\\sqrt{n}$ qubits, where $n$ is the code length. For comparison, all previously known families of good quantum codes have stabilizers of linear weight. Our proof combines two techniques: randomized constructions of good quantum codes and the homological product operation from algebraic topology. We conjecture that similar methods can produce good stabilizer codes with stabilizer weight $n^a$ for any $a>0$. Finally, we apply the homological product to construct new small codes with low-weight stabilizers.

  7. Understanding Perception Through Neural 'Codes'

    E-Print Network [OSTI]

    Freeman, Walter J III

    2011-01-01T23:59:59.000Z

    Perception Through Neural Codes. In: Special Issue on 揚erception Through Neural Codes. In: Special Issue on 揚erception Through Neural Codes. In: Special Issue on

  8. Baldrige Executive Fellows Program -Prospectus Program Purpose

    E-Print Network [OSTI]

    Virtual meetings and calls throughout the year to translate learnings into actions for your company with other executives that will benefit you now and into the future Knowledge of the Baldrige framework planning; sustainability; core competencies; customer engagement; employee engagement; integration

  9. Curtin University Organisational Chart * Executive Managers

    E-Print Network [OSTI]

    Curtin University Organisational Chart * Executive Managers ** Seconded to CEC (Singapore Campus Mr Wing Chung Director Internal Audit * Professor David Wood Acting Deputy Vice-Chancellor Academic Sustainable Development Inst Mr TimothyWalton Director Energy Research Initiatives Mr Paul Nicholls Director

  10. Executive Vice President La-Verna Fountain

    E-Print Network [OSTI]

    Kim, Philip

    construction contracts went to MWL firms. During the past three fiscal years (2006-2008), Columbia contractedJoe Ienuso Executive Vice President La-Verna Fountain Associate Vice President Construction insurance and retirement benefits. Construction Jobs Referral Process As a service to those interested

  11. Academic Integrity Task Force Report Executive Summary

    E-Print Network [OSTI]

    Roy, Subrata

    . For a more comprehensive report of the findings as well as faculty suggestions for maintaining integrity1 Academic Integrity Task Force Report Executive Summary 11/22/11 INTRODUCTION CHARGE: To determine whether there is an issue with academic integrity at UF and, if so, to determine how widespread

  12. Scott Shreeve, MD Chief Executive Officer

    E-Print Network [OSTI]

    Rose, Michael R.

    is currently serving as chief executive office of Crossover Health, a next generation health care delivery, state wide health systems, and networks of primary care clinics. Dr. Shreeve is also founding member of the Health 2.0 technology and reform movement, serving as an advisor to the conference and spokesperson

  13. Executive Education Program Freight Transportation and

    E-Print Network [OSTI]

    Bustamante, Fabi谩n E.

    Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 颅11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

  14. February 1, 2006 Emmett Brown, Executive Director

    E-Print Network [OSTI]

    Arnold, Douglas N.

    February 1, 2006 Emmett Brown, Executive Director National Fresh Water Fishing Hall of Fame P deduce the length of the fish by assuming a height of the angler of 72" and using direct scaling. Even between the distance of the camera to the angler and to the fish. Discounting that distance leads

  15. WORLD ROBOTICS 2009 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2009 IX EXECUTIVE SUMMARY of 1. World Robotics 2009 Industrial Robots 2. World Robotics 2009 Service Robots 1. World Robotics 2009 Industrial Robots 2008 World Robot Market Already affected by the economical downturn In 2008, the worldwide sales of industrial robots stagnated at about

  16. WORLD ROBOTICS 2010 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2010 VII EXECUTIVE SUMMARY of 1. World Robotics 2010 Industrial Robots 2. World Robotics 2010 Service Robots 1. World Robotics 2010 Industrial Robots Sales slump in 2009 In 2009, the worldwide economic and financial crisis caused a significant slump in the sales of industrial robots

  17. WORLD ROBOTICS 2011 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2011 VII EXECUTIVE SUMMARY of 1. World Robotics 2011 Industrial Robots 2. World Robotics 2011 Service Robots 1. World Robotics 2011 Industrial Robots 2010: Strong comeback of the robotics and financial crisis caused a significant slump in the sales of industrial robots. Compared to 2008, considered

  18. Carbon Management Plan 1. Executive summary 5

    E-Print Network [OSTI]

    Haase, Markus

    Carbon Management Plan June 2011 #12;2 #12;3 CONTENTS 1. Executive summary 5 2. Introduction 15 3. Background and context 16 4. Carbon management strategy 18 5. Carbon emissions baseline and projections 22 6. Past actions and achievements 30 7. Carbon Management Plan implementation 33 8. Carbon Management Plan

  19. Oracle SQL Exercise 1. Executing SQL Commands

    E-Print Network [OSTI]

    Lakshmanan, Laks V.S.

    . The command may extend over several lines and can be broken anywhere there is a space. SQL commands must end*Plus command. List n - displays the nth line of the command SQL> List 2 #12;Run - lists and executes the last in the buffer can be edited using the following commands. Only the current line is affected. c(hange) /oldstring

  20. UNIVERSITY OF CALIFORNIA HAITI INITIATIVE Executive Committee

    E-Print Network [OSTI]

    UNIVERSITY OF CALIFORNIA HAITI INITIATIVE Executive Committee Housed at the UCLA Program in Global'Etat d'Haiti Main Campus Planning and Reform Duration 3-4 weeks in Haiti, continual basis Funding While in Haiti: Cost of living, international transportation Background The UC Haiti Initiative (UCHI

  1. Middleware Based Executive for Embedded Reconfigurable Platforms

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Middleware Based Executive for Embedded Reconfigurable Platforms A. Khiar and N.Knecht and L embedded Multiprocessor Systems-on-Chip (MPSoC) platform containing reconfigurable hardware computing units of the french ANR FOSFOR (Flexible Operating System FOr Reconfigurable platforms) [1] project, the objective

  2. Hawaii energy strategy: Executive summary, October 1995

    SciTech Connect (OSTI)

    NONE

    1995-10-01T23:59:59.000Z

    This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

  3. Understanding Multi-Transputer Execution Susan Stepney

    E-Print Network [OSTI]

    Stepney, Susan

    of the execution of occam (2) programs. But even the static structure of an occam program is considerably more of the communication. Folds are used to control the amount of information being displayed. Once the static structure and understanding of occam programs. PAR router(...) mixer(...) worker(...) Susan Stepney. "Understanding Multi

  4. Residual zonal flows in tokamaks and stellarators at arbitrary wavelengths

    E-Print Network [OSTI]

    Monreal, P; S醤chez, E; Parra, F I; Bustos, A; K鰊ies, A; Kleiber, R; G鰎ler, T

    2015-01-01T23:59:59.000Z

    In the linear collisionless limit, a zonal potential perturbation in a toroidal plasma relaxes, in general, to a non-zero residual value. Expressions for the residual value in tokamak and stellarator geometries, and for arbitrary wavelengths, are derived. These expressions involve averages over the lowest order particle trajectories, that typically cannot be evaluated analytically. In this work, an efficient numerical method for the evaluation of such expressions is reported. It is shown that this method is faster than direct gyrokinetic simulations. Calculations of the residual value in stellarators are provided for much shorter wavelengths than previously available in the literature. Electrons must be treated kinetically in stellarators because, unlike in tokamaks, kinetic electrons modify the residual value even at long wavelengths. This effect, that had already been predicted theoretically, is confirmed by gyrokinetic simulations.

  5. Decay of Graviton Condensates and their Generalizations in Arbitrary Dimensions

    E-Print Network [OSTI]

    Florian Kuhnel; Bo Sundborg

    2014-09-30T23:59:59.000Z

    Classicalons are self-bound classical field configurations, which include black holes in General Relativity. In quantum theory, they are described by condensates of many soft quanta. In this work, their decay properties are studied in arbitrary dimensions. It is found that generically the decays of other classicalons are enhanced compared to pure graviton condensates, ie. black holes. The evaporation of higher dimensional graviton condensates turns out to match Hawking radiation solely due to non-linearites captured by the classicalon picture. Although less stable than black holes, all self-bound condensates are shown to be stable in the limit of large mass. Like for black holes, the effective coupling always scales as the inverse of the number of constituents, indicating that these systems are at critical points of quantum phase transitions. Consequences for cosmology, astro- and collider physics are briefly discussed.

  6. Multiple phase estimation for arbitrary pure states under white noise

    E-Print Network [OSTI]

    Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

    2014-09-08T23:59:59.000Z

    In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

  7. Magnetic and Electric Black Holes in Arbitrary Dimension

    E-Print Network [OSTI]

    Adil Belhaj; Pablo Diaz; Antonio segui

    2009-06-02T23:59:59.000Z

    In this work, we compare two different objects: electric black holes and magnetic black holes in arbitrary dimension. The comparison is made in terms of the corresponding moduli space and their extremal geometries. We treat parallelly the magnetic and the electric cases. Specifically, we discuss the gravitational solution of these spherically symmetric objects in the presence of a positive cosmological constant. Then, we find the bounded region of the moduli space allowing the existence of black holes. After identifying it in both the electric and the magnetic case, we calculate the geometry that comes out between the horizons at the coalescence points. Although the electric and magnetic cases are both very different (only dual in four dimensions), gravity solutions seem to clear up most of the differences and lead to very similar geometries.

  8. Agile high resolution arbitrary waveform generator with jitterless frequency stepping

    DOE Patents [OSTI]

    Reilly, Peter T.; Koizumi, Hideya

    2010-05-11T23:59:59.000Z

    Jitterless transition of the programmable clock waveform is generated employing a set of two coupled direct digital synthesis (DDS) circuits. The first phase accumulator in the first DDS circuit runs at least one cycle of a common reference clock for the DDS circuits ahead of the second phase accumulator in the second DDS circuit. As a phase transition through the beginning of a phase cycle is detected from the first phase accumulator, a first phase offset word and a second phase offset word for the first and second phase accumulators are calculated and loaded into the first and second DDS circuits. The programmable clock waveform is employed as a clock input for the RAM address controller. A well defined jitterless transition in frequency of the arbitrary waveform is provided which coincides with the beginning of the phase cycle of the DDS output signal from the second DDS circuit.

  9. Falcon: automated optimization method for arbitrary assessment criteria

    DOE Patents [OSTI]

    Yang, Tser-Yuan (Livermore, CA); Moses, Edward I. (Livermore, CA); Hartmann-Siantar, Christine (Livermore, CA)

    2001-01-01T23:59:59.000Z

    FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.

  10. Executive Summaries for the Hydrogen Storage Materials Center...

    Energy Savers [EERE]

    Executive Summaries for the Hydrogen Storage Materials Center of Excellence - Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Executive Summaries for...

  11. Executive Function and Pediatric Overweight: A Problem-Solving Framework

    E-Print Network [OSTI]

    Johnson, Audrea

    2012-10-19T23:59:59.000Z

    . The present study examines potential relations between aspects of executive function and pediatric weight status as well as obesity-prone eating behaviors. Executive function is operationally defined as a problem-solving construct with four steps that work...

  12. Extractive Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM

    E-Print Network [OSTI]

    Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM Vale Columbia Center UNIVERSITY Center on Globalization and Sustainable Development EARTH INSTITUTE | COLUMBIA UNIVERSITY #12; Extractive Industries and Sustainable Development Executive Training

  13. Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution

    E-Print Network [OSTI]

    Near, Joseph P.

    2014-04-22T23:59:59.000Z

    Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...

  14. ARBITRARY LAGRANGIAN-EULERIAN (ALE) METHODS IN COMPRESSIBLE FLUID DYNAMICS

    E-Print Network [OSTI]

    Kurien, Susan

    . Scalar quantities (density , pressure p, specific internal energy and temperature T) are approximated Lagrangian system is numerically treated by compatible method [8, 9] conserving total energy. Several types Lagrangian-Eulerian (ALE [1]) code for simulation of problems in compressible fluid dynamics and plasma

  15. Shortened Turbo Codes

    E-Print Network [OSTI]

    David J.C. MacKay

    Simple arguments suggest that shortened codes must have distance properties equal to or better than those of their parent codes, and that they should be equally practical to decode. This relationship holds true in the case of low density generator codes and low density parity check codes. We investigate the properties of shortened turbo codes. I. Motivation for Shortening In our previous work on codes based on very sparse matrices we have observed that while codes with a low density generator matrix [1] are asymptotically bad, codes with a low density parity check matrix [2] are asymptotically good [3, 4, 5]. One way of viewing the relationship between low density generator matrix codes and low density parity check matrix codes is that one obtains a low density parity check matrix by taking the M \\Theta N parity check matrix [P IM ] of a (N; K) low density generator matrix code and chopping off its right-most M columns (where M = N \\Gamma K), to yield an M \\Theta K matrix [P], which...

  16. EXECUTION COSTS IN FINANCIAL MARKETS WITH SEVERAL INSTITUTIONAL INVESTORS

    E-Print Network [OSTI]

    Li, Yuying

    strategies to execute a trade. For a given price-impact function, the execution cost problem dealsEXECUTION COSTS IN FINANCIAL MARKETS WITH SEVERAL INSTITUTIONAL INVESTORS Somayeh Moazeni, Yuying trade large volumes face a price impact that depends on their trading volumes simul- taneously

  17. arbitrary grey-level optical: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Pijush K. Ghosh 1996-07-02 71 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  18. arbitrary sub-diffraction-limit pattern: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington at Seattle, University of 243 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  19. adaptive arbitrary lagrangian-eulerian: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington at Seattle, University of 282 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  20. arbitrary particle-channel interaction: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington at Seattle, University of 315 Synthesising arbitrary quantum states in a superconduct-ing resonator Computer Technologies and Information Sciences Websites Summary:...

  1. GPU-optimized Code for Long-term Simulations of Beam-beam Effects in Colliders

    SciTech Connect (OSTI)

    Roblin, Yves [JLAB; Morozov, Vasiliy [JLAB; Terzic, Balsa [JLAB; Aturban, Mohamed A. [Old Dominion University; Ranjan, D. [Old Dominion University; Zubair, Mohammed [Old Dominion University

    2013-06-01T23:59:59.000Z

    We report on the development of the new code for long-term simulation of beam-beam effects in particle colliders. The underlying physical model relies on a matrix-based arbitrary-order symplectic particle tracking for beam transport and the Bassetti-Erskine approximation for beam-beam interaction. The computations are accelerated through a parallel implementation on a hybrid GPU/CPU platform. With the new code, a previously computationally prohibitive long-term simulations become tractable. We use the new code to model the proposed medium-energy electron-ion collider (MEIC) at Jefferson Lab.

  2. A Global View Programming Abstraction for Transitioning MPI Codes to PGAS Languages

    SciTech Connect (OSTI)

    Mintz, Tiffany M [ORNL] [ORNL; Hernandez, Oscar R [ORNL] [ORNL; Bernholdt, David E [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    The multicore generation of scientific high performance computing has provided a platform for the realization of Exascale computing, and has also underscored the need for new paradigms in coding parallel applications. The current standard for writing parallel applications requires programmers to use languages designed for sequential execution. These languages have abstractions that only allow programmers to operate on the process centric local view of data. To provide suitable languages for parallel execution, many research efforts have designed languages based on the Partitioned Global Address Space (PGAS) programming model. Chapel is one of the more recent languages to be developed using this model. Chapel supports multithreaded execution with high-level abstractions for parallelism. With Chapel in mind, we have developed a set of directives that serve as intermediate expressions for transitioning scientific applications from languages designed for sequential execution to PGAS languages like Chapel that are being developed with parallelism in mind.

  3. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    SciTech Connect (OSTI)

    kelkar, sharad

    2013-04-30T23:59:59.000Z

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  4. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    kelkar, sharad

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  5. Mechanical code comparator

    DOE Patents [OSTI]

    Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

    2002-01-01T23:59:59.000Z

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  6. Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner

    E-Print Network [OSTI]

    Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner Finance (FO-P's). Implementation of the Index has greatly decreased data entry coding 颅 Account (object) - Program (FOAP) code numbers on any of your accounting forms (Contracts, Purchase Orders

  7. TESLA Technical Design Report Executive Summary

    E-Print Network [OSTI]

    TESLA Technical Design Report PART I Executive Summary March 2001 Editors: F.Richard, J.R.Schneider, D.Trines, A.Wagner #12;#12;Dedicated to the memory of Bj酶rn H. Wiik (1937-1999) #12;#12;TESLA 颅 A Summary This report describes the scientific aims and potential as well as the technical de- sign of TESLA

  8. Sandia National Laboratories: Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Codes Solar Thermochemical Hydrogen Production On June 13, 2014, in SNL maintains the equipment, experts, and partnerships required to develop technology for solar thermochemical...

  9. Tokamak Systems Code

    SciTech Connect (OSTI)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01T23:59:59.000Z

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  10. Graph Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Salman Beigi; Isaac Chuang; Markus Grassl; Peter Shor; Bei Zeng

    2010-02-03T23:59:59.000Z

    Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code, and every codeword stabilized code can be described by a graph and a classical code. For the construction of good quantum codes of relatively large block length, concatenated quantum codes and their generalizations play an important role. We develop a systematic method for constructing concatenated quantum codes based on "graph concatenation", where graphs representing the inner and outer codes are concatenated via a simple graph operation called "generalized local complementation." Our method applies to both binary and non-binary concatenated quantum codes as well as their generalizations.

  11. Optimal control theory with arbitrary superpositions of waveforms

    E-Print Network [OSTI]

    Selina Meister; J黵gen T. Stockburger; Rebecca Schmidt; Joachim Ankerhold

    2014-11-20T23:59:59.000Z

    Standard optimal control methods perform optimization in the time domain. However, many experimental settings demand the expression of the control signal as a superposition of given waveforms, a case that cannot easily be accommodated using time-local constraints. Previous approaches [1,2] have circumvented this difficulty by performing optimization in a parameter space, using the chain rule to make a connection to the time domain. In this paper, we present an extension to Optimal Control Theory which allows gradient-based optimization for superpositions of arbitrary waveforms directly in a time-domain subspace. Its key is the use of the Moore-Penrose pseudoinverse as an efficient means of transforming between a time-local and waveform-based descriptions. To illustrate this optimization technique, we study the parametrically driven harmonic oscillator as model system and reduce its energy, considering both Hamiltonian dynamics and stochastic dynamics under the influence of a thermal reservoir. We demonstrate the viability and efficiency of the method for these test cases and find significant advantages in the case of waveforms which do not form an orthogonal basis.

  12. ASTROMETRY.NET: BLIND ASTROMETRIC CALIBRATION OF ARBITRARY ASTRONOMICAL IMAGES

    SciTech Connect (OSTI)

    Lang, Dustin; Mierle, Keir; Roweis, Sam [Department of Computer Science, University of Toronto, 6 King's College Road, Toronto, Ontario M5S 3G4 (Canada); Hogg, David W.; Blanton, Michael [Center for Cosmology and Particle Physics, Department of Physics, New York University, 4 Washington Place, New York, NY 10003 (United States)], E-mail: dstn@astro.princeton.edu

    2010-05-15T23:59:59.000Z

    We have built a reliable and robust system that takes as input an astronomical image, and returns as output the pointing, scale, and orientation of that image (the astrometric calibration or World Coordinate System information). The system requires no first guess, and works with the information in the image pixels alone; that is, the problem is a generalization of the 'lost in space' problem in which nothing-not even the image scale-is known. After robust source detection is performed in the input image, asterisms (sets of four or five stars) are geometrically hashed and compared to pre-indexed hashes to generate hypotheses about the astrometric calibration. A hypothesis is only accepted as true if it passes a Bayesian decision theory test against a null hypothesis. With indices built from the USNO-B catalog and designed for uniformity of coverage and redundancy, the success rate is >99.9% for contemporary near-ultraviolet and visual imaging survey data, with no false positives. The failure rate is consistent with the incompleteness of the USNO-B catalog; augmentation with indices built from the Two Micron All Sky Survey catalog brings the completeness to 100% with no false positives. We are using this system to generate consistent and standards-compliant meta-data for digital and digitized imaging from plate repositories, automated observatories, individual scientific investigators, and hobbyists. This is the first step in a program of making it possible to trust calibration meta-data for astronomical data of arbitrary provenance.

  13. MULTICHANNEL BLIND DECONVOLUTION OF ARBITRARY SIGNALS: ADAPTIVE ALGORITHMS AND STABILITY ANALYSIES

    E-Print Network [OSTI]

    Douglas, Scott C.

    MULTICHANNEL BLIND DECONVOLUTION OF ARBITRARY SIGNALS: ADAPTIVE ALGORITHMS AND STABILITY ANALYSIES for the multichannel blind deconvolution of arbitrary non-Gaussian source mixtures. Two of the algorithms are spa- tia-temporal extensions of recently-derived blind signal separation algorithms that combine kurta- sis-based contrast

  14. Closed Form of the Biphoton K-Vector Spectrum for Arbitrary Spatio-Temporal Pump Modes

    E-Print Network [OSTI]

    Jeffrey Perkins

    2011-09-02T23:59:59.000Z

    A closed form solution is derived for the biphoton k-vector spectrum for an arbitrary pump spatial mode. The resulting mode coefficients for the pump input that maximize the probability of biphoton detection in the far field are found. It is thus possible to include the effect of arbitrary crystal poling strucures, and optimize the resulting biphoton flux.

  15. Green's Conjecture for curves on arbitrary K3 Marian Aprodu and Gavril Farkas

    E-Print Network [OSTI]

    Farkas, Gavril

    Green's Conjecture for curves on arbitrary K3 surfaces Marian Aprodu and Gavril Farkas Abstract Green's Conjecture predicts than one can read off special linear series on an algebraic curve-Ramanan, provides a complete solution to Green's Conjecture for smooth curves on arbitrary K3 surfaces. 1

  16. Electric field in hard superconductors with arbitrary cross section and general critical current law

    E-Print Network [OSTI]

    Maj髎, Antonio Bad韆

    Electric field in hard superconductors with arbitrary cross section and general critical current-28871 Alcala de Henares, Spain Received 18 February 2004; accepted 11 March 2004 The induced electric field E x during magnetic flux entry in superconductors with arbitrary cross section and general

  17. Remote State Preparation: Arbitrary remote control of photon polarizations for quantum communication

    E-Print Network [OSTI]

    Kwiat, Paul

    Remote State Preparation: Arbitrary remote control of photon polarizations for quantum measurement to one photon of a polarization- entangled pair, we remotely prepare single photons in arbitrary. Finally, we discuss the states remotely preparable given a particular two-qubit resource state. Keywords

  18. Reed-Muller Codes: Spherically-Punctured Codes and Decoding Algorithms

    E-Print Network [OSTI]

    Kapralova, Olga

    2013-01-01T23:59:59.000Z

    Linear codes . . . . . . . . . . . . . . . . . . . . . . .3.3 Code parameters . . . . . . . . . . . . . .of linear codes . . . . . . . . . . . . 1.5 Reed-Muller

  19. Quantum gravitational corrections to propagator in arbitrary spacetimes

    E-Print Network [OSTI]

    T. Padmanabhan

    1997-03-18T23:59:59.000Z

    The action for a relativistic free particle of mass m receives a contribution $-m R(x,y)$ from a path of length R(x,y) connecting the events $x^i$ and $y^i$. Using this action in a path integral, one can obtain the Feynman propagator for a spinless particle of mass m in any background spacetime. If one of the effects of quantizing gravity is to introduce a minimum length scale $L_P$ in the spacetime, then one would expect the segments of paths with lengths less than $L_P$ to be suppressed in the path integral. Assuming that the path integral amplitude is invariant under the `duality' transformation ${\\cal R}\\to L_P^2/R$, one can calculate the modified Feynman propagator in an arbitrary background spacetime. It turns out that the key feature of this modification is the following: The proper distance $(\\Delta x)^2$ between two events, which are infinitesimally separated, is replaced by $\\Delta x^2 + L_P^2$; that is the spacetime behaves as though it has a `zero-point length' of $L_P$. This equivalence suggests a deep relationship between introducing a `zero-point-length' to the spacetime and postulating invariance of path integral amplitudes under duality transformations. In the Schwinger's proper time description of the propagator, the weightage for a path with proper time s becomes $m(s+L_P^2/s)$ rather than as ms. As to be expected, the ultraviolet behavior of the theory is improved significantly and divergences will disappear if this modification is taken into account. Implications of this result are discussed.

  20. Universal space-time codes from demultiplexed trellis codes

    E-Print Network [OSTI]

    Kose, Cenk; Wesel, R D

    2006-01-01T23:59:59.000Z

    and A. R. Calderbank, 揝pace-time codes for high data ratePerformance criteria and code construction, IEEE Trans.of space杢ime trellis codes, IEEE Trans. Commun. , vol. 51,

  1. Relation Between Surface Codes and Hypermap-Homology Quantum Codes

    E-Print Network [OSTI]

    Pradeep Sarvepalli

    2014-03-14T23:59:59.000Z

    Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.

  2. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect (OSTI)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29T23:59:59.000Z

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  3. Report number codes

    SciTech Connect (OSTI)

    Nelson, R.N. (ed.)

    1985-05-01T23:59:59.000Z

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  4. Executive Committee meeting | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic Plan Departmentof1-SCORECARD-09-21-11AprilWednesday,TechnologyExecutive

  5. Tribal Roundable Executive Summary | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfact sheetTransferringInc. |ofofDepartmentExecutive

  6. Other Executive Positions | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTest andOptimize carbon AboutOrganizing|Executive

  7. NREL: Energy Executive Leadership Academy - Leadership Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Saleshttp://www.fnal.gov/directorate/nalcal/nalcal02_07_05_files/nalcal.gifNRELPowerNewsletterAcademy Alumni Executive

  8. Executive Positions | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /EmailMolecular Solids | MIT-HarvardExecutive

  9. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A.; Smith, Brian E.

    2013-01-29T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  10. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-25T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  11. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-18T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  12. The role of executive capital and the market for alternative candidates in CEO dismissal and labor market consequences for dismissed chief executives

    E-Print Network [OSTI]

    Schepker, Donald Joseph

    2012-08-31T23:59:59.000Z

    ......................................................... 41 Firm Performance and Executive Dismissal...................................................... 42 The Interaction of Performance and Executive Dismissal.......................... 42 The Interaction of Performance and the Managerial Labor...

  13. Rateless Codes for AVC Models

    E-Print Network [OSTI]

    Sarwate, A D; Gastpar, M

    2010-01-01T23:59:59.000Z

    2004. [7] M. Luby, 揕T codes, in Proc. 43rd Ann. IEEE Symp.8] A. Shokrollahi, 揊ountain codes, in Proc. 41st AllertonChannel capacities for list codes, J. Appl. Probabil. ,

  14. Unequal Error Protection Turbo Codes

    E-Print Network [OSTI]

    Henkel, Werner

    Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure

  15. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Office of Environmental Management (EM)

    have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM:...

  16. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  17. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe| Department

  18. A three-dimensional fast solver for arbitrary vorton distributions

    SciTech Connect (OSTI)

    Strickland, J.H.; Baty, R.S.

    1994-05-01T23:59:59.000Z

    A method which is capable of an efficient calculation of the three-dimensional flow field produced by a large system of vortons (discretized regions of vorticity) is presented in this report. The system of vortons can, in turn, be used to model body surfaces, container boundaries, free-surfaces, plumes, jets, and wakes in unsteady three-dimensional flow fields. This method takes advantage of multipole and local series expansions which enables one to make calculations for interactions between groups of vortons which are in well-separated spatial domains rather than having to consider interactions between every pair of vortons. In this work, series expansions for the vector potential of the vorton system are obtained. From such expansions, the three components of velocity can be obtained explicitly. A Fortran computer code FAST3D has been written to calculate the vector potential and the velocity components at selected points in the flow field. In this code, the evaluation points do not have to coincide with the location of the vortons themselves. Test cases have been run to benchmark the truncation errors and CPU time savings associated with the method. Non-dimensional truncation errors for the magnitudes of the vector potential and velocity fields are on the order of 10{sup {minus}4}and 10{sup {minus}3} respectively. Single precision accuracy produces errors in these quantities of up to 10{sup {minus}5}. For less than 1,000 to 2,000 vortons in the field, there is virtually no CPU time savings with the fast solver. For 100,000 vortons in the flow, the fast solver obtains solutions in 1 % to 10% of the time required for the direct solution technique depending upon the configuration.

  19. Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes

    E-Print Network [OSTI]

    Dave Bacon; Andrea Casaccino

    2006-10-17T23:59:59.000Z

    The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.

  20. Optimal Execution Under Jump Models For Uncertain Price Impact

    E-Print Network [OSTI]

    2012-08-13T23:59:59.000Z

    May 12, 2011 ... Unfortunately current quantitative analysis of the execution cost ... Thus risk assessment under this model, particularly the tail risk, is likely to be...

  1. OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental...

    Broader source: Energy.gov (indexed) [DOE]

    OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance More Documents & Publications Microsoft PowerPoint - 08 Lawrence 2010 DOE PM...

  2. Executive Order 13148-Greening the Government Through Leadership...

    Energy Savers [EERE]

    148-Greening the Government Through Leadership in Environmental Management Executive Order 13148-Greening the Government Through Leadership in Environmental Management The head of...

  3. Implementation of Executive Order 13514, Federal Leadership in...

    Broader source: Energy.gov (indexed) [DOE]

    goal.pdf More Documents & Publications OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance FY 2012 Highlighted Sustainable...

  4. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    SciTech Connect (OSTI)

    Haase, S.

    2009-11-01T23:59:59.000Z

    This executive summary provides an overview of an NREL assessment to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region around Greensburg, Kansas.

  5. accelerator executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 163 Executive...

  6. astronomy executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 163 Executive...

  7. abstract executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 165 Executive...

  8. assessment program executive: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

  9. Written Testimony of Wes Kelley Executive Director Columbia Power...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Testimony of Wes Kelley Executive Director Columbia Power & Water Systems Columbia, Tennessee Before the Department of Energy, Quadrennial Energy Review Public Meeting 10:...

  10. No Code: Null Programs

    E-Print Network [OSTI]

    Montfort, Nick

    2014-06-05T23:59:59.000Z

    To continue the productive discussion of uninscribed artworks in Craig Dworkin抯 No Medium, this report discusses, in detail, those computer programs that have no code, and are thus empty or null. Several specific examples ...

  11. Climate Code Foundation

    E-Print Network [OSTI]

    Barnes, Nick; Jones, David

    2011-07-05T23:59:59.000Z

    Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

  12. Building Energy Code

    Broader source: Energy.gov [DOE]

    Authority for adopting the state energy codes was previously vested in the Energy Security Office of the Department of Commerce (originally the Department of Public Services). In 1999-2000, the...

  13. Quantum error control codes

    E-Print Network [OSTI]

    Abdelhamid Awad Aly Ahmed, Sala

    2008-10-10T23:59:59.000Z

    QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

  14. Nested Quantum Error Correction Codes

    E-Print Network [OSTI]

    Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

    2009-09-28T23:59:59.000Z

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  15. Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary

    E-Print Network [OSTI]

    Sason, Igal

    Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary Erasure Channel Capacity@ee.technion.ac.il Abstract The paper introduces ensembles of accumulate-repeat-accumulate (ARA) codes which asymp- totically by the first capacity-achieving ensembles of ir- regular repeat-accumulate (IRA) codes with bounded complexity

  16. Code: A Lightweight and Flexible Mobile Code Toolkit

    E-Print Network [OSTI]

    Picco, Gian Pietro

    evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of client璼erver and mobile code in reducing the network traffic generated by management. The theoreticalCode: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e

  17. A Fault-Oblivious Extreme-Scale Execution Environment (FOX)

    SciTech Connect (OSTI)

    Van Hensbergen, Eric; Speight, William; Xenidis, Jimi

    2013-03-15T23:59:59.000Z

    IBM Research抯 contribution to the Fault Oblivious Extreme-scale Execution Environment (FOX) revolved around three core research deliverables: ? collaboration with Boston University around the Kittyhawk cloud infrastructure which both enabled a development and deployment platform for the project team and provided a fault-injection testbed to evaluate prototypes ? operating systems research focused on exploring role-based operating system technologies through collaboration with Sandia National Labs on the NIX research operating system and collaboration with the broader IBM Research community around a hybrid operating system model which became known as FusedOS ? IBM Research also participated in an advisory capacity with the Boston University SESA project, the core of which was derived from the K42 operating system research project funded in part by DARPA抯 HPCS program. Both of these contributions were built on a foundation of previous operating systems research funding by the Department of Energy抯 FastOS Program. Through the course of the X-stack funding we were able to develop prototypes, deploy them on production clusters at scale, and make them available to other researchers. As newer hardware, in the form of BlueGene/Q, came online, we were able to port the prototypes to the new hardware and release the source code for the resulting prototypes as open source to the community. In addition to the open source coded for the Kittyhawk and NIX prototypes, we were able to bring the BlueGene/Q Linux patches up to a more recent kernel and contribute them for inclusion by the broader Linux community. The lasting impact of the IBM Research work on FOX can be seen in its effect on the shift of IBM抯 approach to HPC operating systems from Linux and Compute Node Kernels to role-based approaches as prototyped by the NIX and FusedOS work. This impact can be seen beyond IBM in follow-on ideas being incorporated into the proposals for the Exasacale Operating Systems/Runtime program.

  18. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement

    SciTech Connect (OSTI)

    Deng Fuguo; Zhou Hongyu [Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875 (China); Institute of Low Energy Nuclear Physics and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875 (China); Beijing Radiation Center, Beijing 100875 (China); Li Chunyan; Wang Yan [Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875 (China); Institute of Low Energy Nuclear Physics and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875 (China); Li Yansong [Department of Physics and Key Laboratory for Quantum Information and Measurements of Ministry of Education, Tsinghua University, Beijing 100084 (China)

    2005-08-15T23:59:59.000Z

    We present a way for symmetric multiparty-controlled teleportation of an arbitrary two-particle entangled state based on Bell-basis measurements by using two Greenberger-Horne-Zeilinger states, i.e., a sender transmits an arbitrary two-particle entangled state to a distant receiver, an arbitrary one of the n+1 agents, via the control of the others in a network. It will be shown that the outcomes in the cases that n is odd or is even are different in principle as the receiver has to perform a controlled-NOT operation on his particles for reconstructing the original arbitrary entangled state in addition to some local unitary operations in the former. Also we discuss the applications of this controlled teleporation for quantum secret sharing of classical and quantum information. As all the instances can be used to carry useful information, its efficiency for qubit approaches the maximal value.

  19. Use of associated polynomials for division involving polynomials over arbitrary fields

    E-Print Network [OSTI]

    Jones, James Edgar

    1968-01-01T23:59:59.000Z

    USE OF ASSOCIATED POLYNOMIALS FOR DIVISION INVOLVING POLYNOMIALS OVER ARBITRARY FIELDS A Thesis by JAMES EDGAR JOiVES Submitted to the Graduate College of the Texas A&M University in partiai fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 1968 Major Subject: MATHEJRTICS USE OF ASSOCIATED POLYNOMIALS FOR DIVISION INVOLVING POLYNOMIALS OVER ARBITRARY FIELDS A Thesis by JAMES EDGAR JONES Approved as to style and content by (Chairman of Committee) (Head...

  20. NARSTO Quality Planning and Data Management Handbooks Executive Summary

    E-Print Network [OSTI]

    'existingqualityassuranceprograms. The first of the three documents, the NARSTO Quality Systems Management Plan (QSMP), is the umbrella underNARSTO Quality Planning and Data Management Handbooks Executive Summary This brief Executive, and guidance documents for quality planning and data management. NARSTO is a non-binding, tri-national public

  1. SPACE UTILIZATION STUDY -EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES

    E-Print Network [OSTI]

    Delene, David J.

    SPACE UTILIZATION STUDY - EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES UNIVERSITY School of Medicine & Health Sciences - Space Utilization Study Grand Forks, ND EXECUTIVE SUMMARY SUITAb of Medicine and Health Sciences. It currently contains nearly 380,000 GSF (Gross Square Feet) with multiple

  2. 11/24/13 Committee Reports Executive Report

    E-Print Network [OSTI]

    Royer, Dana

    Trexler `14 Executive Committee 1. General Assembly Feedback 2. PostThanksgiving Executive Committee, indeed, create that kind of statement. Presumably, WesDivest will be directing their energies towards to President Roth for residential campus innovations. Many of the proposals discussed on Thursday concerned

  3. Executability of Scenarios in Petri Nets Robert Lorenz

    E-Print Network [OSTI]

    Desel, J枚rg

    Executability of Scenarios in Petri Nets Robert Lorenz Lehrstuhl f篓ur Angewandte Informatik whether a scenario is an execution of a Petri net. This holds for a wide variety of Petri net classes, ranging from elementary nets to general inhibitor nets. Scenarios are given by causal structures

  4. Executive Budget Support Team Office of the President

    E-Print Network [OSTI]

    Jacobs, Laurence J.

    Executive Budget Support Team Office of the President Provost / Executive Vice President Institute Budget Planning & Admin. Jim Kirk Asst Budget Director Vacant Sr. Budget Analyst Ebony Thompson Budget Development & Capital Budgets Director Lisa Godfrey Systems Support Engr II Vacant Sr. Budget

  5. Towards a New Execution Model for HPC Clouds Thomas Sterling

    E-Print Network [OSTI]

    Lumsdaine, Andrew

    Towards a New Execution Model for HPC Clouds Thomas Sterling Center for Research in Extreme Scale an alternative paradigm for bringing Clouds more closely aligned to Science, Technology, Engineering Execution Model for HPC Clouds Thomas Sterling 1. Introduction Even as HPC is transiting the pan

  6. Robert D. Kimble Deputy Program Executive Officer for Strike

    E-Print Network [OSTI]

    and Deputy Program Manager for Production and Quality. From January 2000 to February 2001, Mr. Kimble of Maryland. He graduated from the Defense Systems Management College and the Senior Executive ManagementRobert D. Kimble Deputy Program Executive Officer for Strike Weapons, PEO(U&W) Naval Air Systems

  7. Coccinelle 1D: A one-dimensional neutron kinetic code using time-step size control

    SciTech Connect (OSTI)

    Engrand, P.R.; Effantin, M.E.; Gherchanoc, J. [Electricite de France, Clamart (France); Larive, B. [Electricite de France, Villeurbanne (France)

    1995-12-31T23:59:59.000Z

    COCCINELLE 1D is a one-dimensional neutron kinetic code that has been adapted from Electricite de France (EDF)`s core design code : COCCINELLE. The aim of this work is to integrate a code, derived from COCCINELLE and therefore taking advantage of most of its developments, into EDF`s Pressurized Water Reactors (PWR) simulation tools. The neutronic model of COCCINELLE ID has been optimized so that the code executes as rapidly as possible. In particular, a fast and stable kinetic method has been implemented: the Generalized Runge-Kutta (GRK) method together with its associated time-step size control. Moreover, efforts have been made to structure the code such that it could be easily integrated into any PWR simulation tool. Results show that the code executes at a rate faster than real-time on several test cases, and that, once integrated in a PWR simulation tool, the system is in good agreement with an experimental transient, that is a 3-hour load follow transient.

  8. Fault-tolerant logical gates in quantum error-correcting codes

    E-Print Network [OSTI]

    Fernando Pastawski; Beni Yoshida

    2014-08-07T23:59:59.000Z

    Recently, Bravyi and K\\"onig have shown that there is a tradeoff between fault-tolerantly implementable logical gates and geometric locality of stabilizer codes. They consider locality-preserving operations which are implemented by a constant depth geometrically local circuit and are thus fault-tolerant by construction. In particular, they shown that, for local stabilizer codes in D spatial dimensions, locality preserving gates are restricted to a set of unitary gates known as the D-th level of the Clifford hierarchy. In this paper, we elaborate this idea and provide several extensions and applications of their characterization in various directions. First, we present a new no-go theorem for self-correcting quantum memory. Namely, we prove that a three-dimensional stabilizer Hamiltonian with a locality-preserving implementation of a non-Clifford gate cannot have a macroscopic energy barrier. Second, we prove that the code distance of a D-dimensional local stabilizer code with non-trivial locality-preserving m-th level Clifford logical gate is upper bounded by $O(L^{D+1-m})$. For codes with non-Clifford gates (m>2), this improves the previous best bound by Bravyi and Terhal. Third we prove that a qubit loss threshold of codes with non-trivial transversal m-th level Clifford logical gate is upper bounded by 1/m. As such, no family of fault-tolerant codes with transversal gates in increasing level of the Clifford hierarchy may exist. This result applies to arbitrary stabilizer and subsystem codes, and is not restricted to geometrically-local codes. Fourth we extend the result of Bravyi and K\\"onig to subsystem codes. A technical difficulty is that, unlike stabilizer codes, the so-called union lemma does not apply to subsystem codes. This problem is avoided by assuming the presence of error threshold in a subsystem code, and the same conclusion as Bravyi-K\\"onig is recovered.

  9. MHD Generation Code

    E-Print Network [OSTI]

    Frutos-Alfaro, Francisco

    2015-01-01T23:59:59.000Z

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  10. Cyclic simplex coded OTDR SNR enhancement of coded optical time domain reflectometry using cyclic simplex codes

    E-Print Network [OSTI]

    Park, Namkyoo

    Cyclic simplex coded OTDR SNR enhancement of coded optical time domain reflectometry using cyclic simplex codes *, , , e-mail : nkpark@plaza.snu.ac.kr Abstract: We propose and experimentally demonstrate the performance improvement of a coded optical time domain reflectometry using cyclic simplex

  11. Extended quantum color coding

    SciTech Connect (OSTI)

    Hayashi, A.; Hashimoto, T.; Horibe, M. [Department of Applied Physics, Fukui University, Fukui 910-8507 (Japan)

    2005-01-01T23:59:59.000Z

    The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only {approx}2{radical}(N) quantum colors to order N objects in large N limit, whereas {approx}N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix.

  12. CONCEPT computer code

    SciTech Connect (OSTI)

    Delene, J.

    1984-01-01T23:59:59.000Z

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated.

  13. Distributed Power Control and Coding-Modulation Adaptation in Wireless Networks using Annealed Gibbs Sampling

    E-Print Network [OSTI]

    Zhou, Shan; Ying, Lei

    2011-01-01T23:59:59.000Z

    In wireless networks, the transmission rate of a link is determined by received signal strength, interference from simultaneous transmissions, and available coding-modulation schemes. Rate allocation is a key problem in wireless network design, but a very challenging problem because: (i) wireless interference is global, i.e., a transmission interferes all other simultaneous transmissions, and (ii) the rate-power relation is non-convex and non-continuous, where the discontinuity is due to limited number of coding-modulation choices in practical systems. In this paper, we propose a distributed power control and coding-modulation adaptation algorithm using annealed Gibbs sampling, which achieves throughput optimality in an arbitrary network topology. We consider a realistic Signal-to-Interference-and-Noise-Ratio (SINR) based interference model, and assume continuous power space and finite rate options (coding-modulation choices). Our algorithm first decomposes network-wide interference to local interference by p...

  14. Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about Uncertainty

    E-Print Network [OSTI]

    McGregor, Andrew

    Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about: April 29, 2014 #12;Coding for Transmission Coding for Compression Bonus Section Information Theory. #12;Coding for Transmission Coding for Compression Bonus Section Encoding Messages with Redundancy

  15. 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview...

    Energy Savers [EERE]

    1: Executive Summary and Overview Summary Slides 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview Summary Slides Summary and overview slides for 20% Wind Energy...

  16. Course Code: Course Title

    E-Print Network [OSTI]

    Painter, Kevin

    - Frameworks; Decision Making Development life-cycle of a software system Bi-directional influence between-Critical Systems; Technology & Society. Brave New Worlds - Co-operative Computing; eLife. Learning OutcomesCourse Code: F29PD Course Title: Professional Development Course Co-ordinator: Sandy Jean

  17. The Woodland Carbon Code

    E-Print Network [OSTI]

    The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

  18. Erasure Techniques in MRD codes

    E-Print Network [OSTI]

    W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

    2012-05-03T23:59:59.000Z

    This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

  19. Optimized Generation of Data-Path from C Codes for FPGAs

    E-Print Network [OSTI]

    Guo, Zhi; Najjar, Walid; Vissers, Kees

    2011-01-01T23:59:59.000Z

    FPGAs, as computing devices, offer significant speedup over microprocessors. Furthermore, their configurability offers an advantage over traditional ASICs. However, they do not yet enjoy high-level language programmability, as microprocessors do. This has become the main obstacle for their wider acceptance by application designers. ROCCC is a compiler designed to generate circuits from C source code to execute on FPGAs, more specifically on CSoCs. It generates RTL level HDLs from frequently executing kernels in an application. In this paper, we describe ROCCC's system overview and focus on its data path generation. We compare the performance of ROCCC-generated VHDL code with that of Xilinx IPs. The synthesis result shows that ROCCC-generated circuit takes around 2x ~ 3x area and runs at comparable clock rate.

  20. REDUCED-COMPLEXITY DECODING FOR CONCATENATED CODES BASED ON RECTANGULAR PARITY-CHECK CODES AND TURBO CODES

    E-Print Network [OSTI]

    Wong, Tan F.

    AND TURBO CODES John M. Shea and Tan F. Wong University of Florida Department of Electrical and Computer-check code (RPCC) with a turbo code. These concatenated codes are referred to as RPCC+turbo codes. RPCC+turbo codes have been shown to significantly outperform turbo codes in several scenarios [1],[2]. One

  1. NREL: Energy Executive Leadership Academy Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster ToStaff Webmaster

  2. John Hairston rounds out BPA's executive office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as Ready for(SC) Jetting

  3. Coded modulation with Low Density Parity Check codes

    E-Print Network [OSTI]

    Narayanaswami, Ravi

    2001-01-01T23:59:59.000Z

    This thesis proposes the design of Low Density Parity Check (LDPC) codes for cases where coded modulation is used. We design these codes by extending the idea of Density Evolution (DE) that has been introduced as a powerful tool to analyze LDPC...

  4. Generating Code for High-Level Operations through Code Composition

    E-Print Network [OSTI]

    Generating Code for High-Level Operations through Code Composition James M. Stichnoth August 1997 of the authors and should not be interpreted as necessarily representing the official policies or endorsements: Compilers, code generation, parallelism, communication generation #12;Abstract A traditional compiler

  5. Multiclass learning with simplex coding

    E-Print Network [OSTI]

    Mroueh, Youssef

    In this paper we discuss a novel framework for multiclass learning, defined by a suitable coding/decoding strategy, namely the simplex coding, that allows us to generalize to multiple classes a relaxation approach commonly ...

  6. Distributed control of coded networks

    E-Print Network [OSTI]

    Zhao, Fang, Ph. D. Massachusetts Institute of Technology

    2010-01-01T23:59:59.000Z

    The introduction of network coding has the potential to revolutionize the way people operate networks. For the benefits of network coding to be realized, distributed solutions are needed for various network problems. In ...

  7. Nevada Energy Code for Buildings

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy抯 (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  8. Confocal coded aperture imaging

    DOE Patents [OSTI]

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01T23:59:59.000Z

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  9. Understanding the Team Dynamics of an Executive Virtual Team

    E-Print Network [OSTI]

    Riley, Ramona Leonard

    2011-10-21T23:59:59.000Z

    employ virtuality in their work regimen. Therefore, organizations employ virtual executives to work teams with ideal skill sets to effectively persevere and complete tasks through distance, space, and time. The purpose of this study was to identify...

  10. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE)

    This executive summary provides an overview of a technical report on an assessment NREL conducted in Greensburg, Kansas, to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region.

  11. Robust, goal-directed plan execution with bounded risk

    E-Print Network [OSTI]

    Ono, Masahiro, Ph. D. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For example, a fleet of unmanned aerial vehicles ...

  12. Robust execution of bipedal walking tasks from biomechanical principles

    E-Print Network [OSTI]

    Hofmann, Andreas G. (Andreas Gunther)

    2006-01-01T23:59:59.000Z

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  13. Robust Execution of Bipedal Walking Tasks From Biomechanical Principles

    E-Print Network [OSTI]

    Hofmann, Andreas

    2006-04-28T23:59:59.000Z

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  14. Learning Structured Reactive Navigation Plans from Executing MDP Navigation Policies

    E-Print Network [OSTI]

    Cremers, Daniel

    Learning Structured Reactive Navigation Plans from Executing MDP Navigation Policies Michael Beetz, beetz,belker@cs.uni-bonn.de Abstract. Autonomous robots, such as robot office couriers, need navigation

  15. Paducah CAB Executive Board - May | Department of Energy

    Energy Savers [EERE]

    - May Paducah CAB Executive Board - May May 11, 2015 3:30PM to 5:30PM CDT Paducah CAB Office, 111 Memorial Drive, Paducah, KY 42001 Contact Buz Smith, DOE Site Office 270-441-6821...

  16. Summary of Differences in Approach to Executing the NGNP Project

    SciTech Connect (OSTI)

    P.C. Hildebrandt

    2010-08-01T23:59:59.000Z

    The following discuss the summary differences between the NGNP Industry Alliance抯 approach to execution of the NGNP Project as described in its Project Execution Strategy, and that included in the DOE抯 Report to Congress on the Next Generation Nuclear Plant dated April 2010. These summary differences are not a comprehensive description of the results of a detailed gap analysis, but rather are those differences that warrant discussion in meetings between DOE executives and the private sector represented by the Alliance. In practical fact, the full range and content of the differences will not be understood until such time as detailed discussions are engaged between the DOE and the Alliance to develop a mutually agreed-to project execution plan.

  17. PROGRAM INFORMATION This executive master's program with a

    E-Print Network [OSTI]

    Suzuki, Masatsugu

    , they have helped healthcare facilities improve total-quality management, scheduling and sequencingPROGRAM INFORMATION This executive master's program with a health systems concentration: takes and construction firms Management consulting firms Health insurance companies Research and planning

  18. Plasma diagnostics in TFTR using emission of cyclotron radiation at arbitrary frequencies

    SciTech Connect (OSTI)

    Fidone, I.; Giruzzi, G.; Taylor, G.

    1995-07-01T23:59:59.000Z

    Emission of cyclotron radiation at arbitrary wave frequency for diagnostic purposes is discussed. It is shown that the radiation spectrum at arbitrary frequencies is more informative than the first few harmonics and it is suited for diagnosis of superthermal electrons without any {open_quotes}ad hoc{close_quotes} value of the wall reflection coefficient. Thermal radiation from TFTR is investigated and it is shown that the bulk and the tail of the electron momentum distribution during strong neutral beam injection is a Maxwellian with a single temperature in all ranges of electron energies.

  19. MELCOR computer code manuals

    SciTech Connect (OSTI)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01T23:59:59.000Z

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  20. Executive Summary A FAculty-Driven PlAn

    E-Print Network [OSTI]

    Watson, Craig A.

    Executive Summary A FAculty-Driven PlAn SePtember 2009 reSeArch uF/iFAS roADmAP #12;UF/IFAS ReSeARch RoAdmAp Executive Summary 2 It is easier to plan when resources are plentiful, but it is far more. With these realities in mind, we began the process of developing a Research Roadmap. It was purposely designed

  1. Travel Codes Traveler Is Employee

    E-Print Network [OSTI]

    Arnold, Jonathan

    Travel Codes Traveler Is Employee: 64100-Domestic Travel 64150-Mileage 64200-International Travel Supplies & Expense Codes 71410-Office Supplies 71430-Lab/Research Supplies (dollar value of each item less Charges Equipment Codes 84320-Equipment (non-computer & peripherals) with a cost of $5,000.00 or more per

  2. Rotationally invariant multilevel block codes

    E-Print Network [OSTI]

    Kulandaivelu, Anita

    1993-01-01T23:59:59.000Z

    The objective of this thesis is to evaluate the performance of block codes that are designed to be rotationally invariant, in a multilevel coding scheme, over a channel modelled to be white gaussian noise. Also, the use of non-binary codes...

  3. Design of proximity detecting codes

    E-Print Network [OSTI]

    Perisetty, Srinivas

    1997-01-01T23:59:59.000Z

    delay insensitive, codes like unordered codes have been proposed. Although these codes are delay insensitive, the receiver still has to wait for all the 1s in the transmitted data to be received before sending an acknowledge signal to the sender. A new...

  4. Code for Hydrogen Hydrogen Pipeline

    E-Print Network [OSTI]

    #12;2 Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop Augusta, Georgia August development 路 Charge from BPTCS to B31 Standards Committee for Hydrogen Piping/Pipeline code development 路 B31.12 Status & Structure 路 Hydrogen Pipeline issues 路 Research Needs 路 Where Do We Go From Here? #12;4 Code

  5. Energy Codes and Standards: Facilities

    SciTech Connect (OSTI)

    Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

    2007-01-01T23:59:59.000Z

    Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

  6. PERFORMANCE EVALUATION OF TURBO CODES

    E-Print Network [OSTI]

    Alajaji, Fady

    PERFORMANCE EVALUATION OF TURBO CODES by Guangchong Zhu A project submitted to the Department named ``Turbo codes'' which claims an extraordinary performance with reasonable decoding complexity. In this project, we begin with a study on the structure and principle of Turbo codes. We then investigate

  7. Southeast Energy Efficiency Alliance's Building Energy Codes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

  8. 2013 Reporting Unit Codes | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    2013 Reporting Unit Codes 2013 Reporting Unit Codes CFC Reporting Unit Codes 2013.pdf More Documents & Publications EA-0372: Final Environmental Assessment Alignment: Achieving...

  9. Error Floors of LDPC Codes and Related Topics

    E-Print Network [OSTI]

    Butler, Brian K.

    Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 LDPC Codes . . . . . . . .2.1 Binary Linear Block Codes . . . . . . .

  10. CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment

    E-Print Network [OSTI]

    CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment Document Number 003-001/002.01 DRAFT-Mellon University Schenley Park Pittsburgh, PA 15213 #12;The ICE Execution Environment DRAFT 003- 001/002.01 U ncla ssified ( 2 The ICE Execution Environment #12;The ICE Execution Environment DRAFT 003

  11. A Study of Execution Environments for Software Kung-Kiu Lau and Vladyslav Ukis

    E-Print Network [OSTI]

    Lau, Kung-Kiu

    A Study of Execution Environments for Software Components Kung-Kiu Lau and Vladyslav Ukis School-kiu,vukis}@cs.man.ac.uk Abstract. Software components are deployed into an execution environment be- fore runtime. The execution environment influences the runtime execution of a component. Therefore, it is important to study existing

  12. Forest Research Executive Board Meeting 16 April 2008 by video conference

    E-Print Network [OSTI]

    Forest Research Executive Board Meeting 颅 16 April 2008 by video conference Present: NRS Alice Holt

  13. Development of integrated core disruptive accident analysis code for FBR - ASTERIA-FBR

    SciTech Connect (OSTI)

    Ishizu, T.; Endo, H.; Tatewaki, I.; Yamamoto, T. [Japan Nuclear Energy Safety Organization JNES, Toranomon Towers Office, 4-1-28, Toranomon, Minato-ku, Tokyo (Japan); Shirakawa, N. [Inst. of Applied Energy IAE, Shimbashi SY Bldg., 14-2 Nishi-Shimbashi 1-Chome, Minato-ku, Tokyo (Japan)

    2012-07-01T23:59:59.000Z

    The evaluation of consequence at the severe accident is the most important as a safety licensing issue for the reactor core of liquid metal cooled fast breeder reactor (LMFBR), since the LMFBR core is not in an optimum condition from the viewpoint of reactivity. This characteristics might induce a super-prompt criticality due to the core geometry change during the core disruptive accident (CDA). The previous CDA analysis codes have been modeled in plural phases dependent on the mechanism driving a super-prompt criticality. Then, the following event is calculated by connecting different codes. This scheme, however, should introduce uncertainty and/or arbitrary to calculation results. To resolve the issues and obtain the consistent calculation results without arbitrary, JNES is developing the ASTERIA-FBR code for the purpose of providing the cross-check analysis code, which is another required scheme to confirm the validity of the evaluation results prepared by applicants, in the safety licensing procedure of the planned high performance core of Monju. ASTERIA-FBR consists of the three major calculation modules, CONCORD, dynamic-GMVP, and FEMAXI-FBR. CONCORD is a three-dimensional thermal-hydraulics calculation module with multi-phase, multi-component, and multi-velocity field model. Dynamic-GMVP is a space-time neutronics calculation module. FEMAXI-FBR calculates the fuel pellet deformation behavior and fuel pin failure behavior. This paper describes the needs of ASTERIA-FBR development, major module outlines, and the model validation status. (authors)

  14. BINGO: A code for the efficient computation of the scalar bi-spectrum

    E-Print Network [OSTI]

    Dhiraj Kumar Hazra; L. Sriramkumar; Jerome Martin

    2013-05-18T23:59:59.000Z

    We present a new and accurate Fortran code, the BI-spectra and Non-Gaussianity Operator (BINGO), for the efficient numerical computation of the scalar bi-spectrum and the non-Gaussianity parameter f_{NL} in single field inflationary models involving the canonical scalar field. The code can calculate all the different contributions to the bi-spectrum and the parameter f_{NL} for an arbitrary triangular configuration of the wavevectors. Focusing firstly on the equilateral limit, we illustrate the accuracy of BINGO by comparing the results from the code with the spectral dependence of the bi-spectrum expected in power law inflation. Then, considering an arbitrary triangular configuration, we contrast the numerical results with the analytical expression available in the slow roll limit, for, say, the case of the conventional quadratic potential. Considering a non-trivial scenario involving deviations from slow roll, we compare the results from the code with the analytical results that have recently been obtained in the case of the Starobinsky model in the equilateral limit. As an immediate application, we utilize BINGO to examine of the power of the non-Gaussianity parameter f_{NL} to discriminate between various inflationary models that admit departures from slow roll and lead to similar features in the scalar power spectrum. We close with a summary and discussion on the implications of the results we obtain.

  15. Surface code quantum communication

    E-Print Network [OSTI]

    Austin G. Fowler; David S. Wang; Charles D. Hill; Thaddeus D. Ladd; Rodney Van Meter; Lloyd C. L. Hollenberg

    2010-02-05T23:59:59.000Z

    Quantum communication typically involves a linear chain of repeater stations, each capable of reliable local quantum computation and connected to their nearest neighbors by unreliable communication links. The communication rate in existing protocols is low as two-way classical communication is used. We show that, if Bell pairs are generated between neighboring stations with a probability of heralded success greater than 0.65 and fidelity greater than 0.96, two-way classical communication can be entirely avoided and quantum information can be sent over arbitrary distances with arbitrarily low error at a rate limited only by the local gate speed. The number of qubits per repeater scales logarithmically with the communication distance. If the probability of heralded success is less than 0.65 and Bell pairs between neighboring stations with fidelity no less than 0.92 are generated only every T_B seconds, the logarithmic resource scaling remains and the communication rate through N links is proportional to 1/(T_B log^2 N).

  16. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT: Execution of arbitrary code via network, User...

  17. U-141: Sourcefire Defense Center Bugs | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Traversal Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct...

  18. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  19. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player...

  20. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Broader source: Energy.gov (indexed) [DOE]

    were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE...

  1. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Broader source: Energy.gov (indexed) [DOE]

    RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were...

  2. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Broader source: Energy.gov (indexed) [DOE]

    execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were...

  3. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  4. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow...

    Energy Savers [EERE]

    a fix. Addthis Related Articles T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-196: Cisco...

  5. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

  6. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

  7. V-075: EMC AlphaStor Command Injection and Format String Flaws...

    Broader source: Energy.gov (indexed) [DOE]

    5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

  8. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

  9. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications...

  10. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    cause arbitrary code to be executed on the target user's system. April 23, 2012 U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service Two...

  11. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    cause arbitrary code to be executed on the target user's system. April 23, 2012 U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service Two...

  12. Trigger-Wave Propagation in Arbitrary Metrics in Asynchronous Cellular Logic Arrays

    E-Print Network [OSTI]

    Dudek, Piotr

    Trigger-Wave Propagation in Arbitrary Metrics in Asynchronous Cellular Logic Arrays Przemyslaw image processing tasks using trigger-wave propagation in a medium with a hardware-controlled metric. The principles of wave propagation in cellular four-connected logic arrays emulating different distance measure

  13. Off-diagonal Bethe ansatz solution of the XXX spin-chain with arbitrary boundary conditions

    E-Print Network [OSTI]

    Cao, Junpeng; Shi, Kangjie; Wang, Yupeng

    2013-01-01T23:59:59.000Z

    With the off-diagonal Bethe ansatz method proposed recently by the present authors, we exactly diagonalize the $XXX$ spin chain with arbitrary boundary fields. By constructing a functional relation between the eigenvalues of the transfer matrix and the quantum determinant, the associated $T-Q$ relation and the Bethe ansatz equations are derived.

  14. Off-diagonal Bethe ansatz solution of the XXX spin-chain with arbitrary boundary conditions

    E-Print Network [OSTI]

    Junpeng Cao; Wenli Yang; Kangjie Shi; Yupeng Wang

    2013-08-12T23:59:59.000Z

    With the off-diagonal Bethe ansatz method proposed recently by the present authors, we exactly diagonalize the $XXX$ spin chain with arbitrary boundary fields. By constructing a functional relation between the eigenvalues of the transfer matrix and the quantum determinant, the associated $T-Q$ relation and the Bethe ansatz equations are derived.

  15. Factorization of Darboux transformations of arbitrary order for 2D Schroedinger operators

    E-Print Network [OSTI]

    Ekaterina Shemyakova

    2015-05-04T23:59:59.000Z

    We give a proof of Darboux's conjecture that every Darboux transformation of arbitrary order of a 2D Schroedinger type operator can be factorized into Darboux transformations of order one. The proof is constructive. The result is obtained in the framework of an algebraic approach to Darboux transformations which is suggested in this paper and is a further improvement of S. Tsarev's earlier idea.

  16. Comment on the shape of Hydrogen equation in spaces of arbitrary dimension

    E-Print Network [OSTI]

    M. Ya. Amusia

    2015-02-20T23:59:59.000Z

    We note that presenting Hydrogen atom Schrodinger equation in the case of arbitrary dimensions require simultaneous modification of the Coulomb potential that only in three dimensions has the form Z/r . This was not done in a number of relatively recent papers [1-5]. Therefore some results obtained there seem to be doubtful. Some required considerations in the area are mentioned.

  17. SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies

    E-Print Network [OSTI]

    SPAIN: COTS Data-Center Ethernet for Multipathing over Arbitrary Topologies Jayaram Mudigonda switches, which could obviate the commodity pricing of these parts. In this paper, we describe SPAIN ("Smart Path Assign- ment In Networks"). SPAIN provides multipath forward- ing using inexpensive

  18. Intro Algo ring Arbitrary graphs Conclusion PING PONG IN DANGEROUS GRAPHS

    E-Print Network [OSTI]

    Fondements et Applications, Universit Paris 7

    Intro Algo ring Arbitrary graphs Conclusion PING PONG IN DANGEROUS GRAPHS Optimal Black Hole Search blocking and destroying any mobile agent entering it. Motivations : Site which is destroyed or dangerous blocking and destroying any mobile agent entering it. Motivations : Site which is destroyed or dangerous

  19. The Arbitrariness of the Sign: Learning Advantages From the Structure of the Vocabulary

    E-Print Network [OSTI]

    the simulations and the behavioral studies, we found that the optimal structure of the vocabulary for learningThe Arbitrariness of the Sign: Learning Advantages From the Structure of the Vocabulary Padraic and their meanings can facilitate language learning (e.g., in the form of sound symbolism or cues to grammatical

  20. How the diffusivity profile reduces the arbitrariness of protein folding free energies

    E-Print Network [OSTI]

    Thirumalai, Devarajan

    How the diffusivity profile reduces the arbitrariness of protein folding free energies M 2010 The concept of a protein diffusing in its free-energy folding landscape has been fruitful for both as it stochastically folds and unfolds. The free-energy profiles for different RCs exhibit significant variations, some

  1. Fast Detection and Processing of Arbitrary Contrast Agent Injections in Coronary

    E-Print Network [OSTI]

    L眉beck, Universit盲t zu

    : condura@isip.uni-luebeck.de Abstract. Percutaneous transluminal coronary angioplasty (PTCA) re- quires pre-interventional and inter- ventional X-ray images. In the pre-interventional coronary angiogramsFast Detection and Processing of Arbitrary Contrast Agent Injections in Coronary Angiography

  2. A Closed-Form Solution to the Arbitrary Order Cauchy Problem with Propagators

    E-Print Network [OSTI]

    Henrik Stenlund

    2014-11-24T23:59:59.000Z

    The general abstract arbitrary order (N) Cauchy problem was solved in a closed form as a sum of exponential propagator functions. The infinite sparse exponential series was solved with the aid of a homogeneous differential equation. It generated a linear combination of exponential functions. The Cauchy problem solution was formed with N linear combinations of N exponential propagators.

  3. Fast and accurate direct MDCT to DFT conversion with arbitrary window functions

    E-Print Network [OSTI]

    Paris-Sud XI, Universit茅 de

    1 Fast and accurate direct MDCT to DFT conversion with arbitrary window functions Shuhua Zhang* and Laurent Girin Abstract--In this paper, we propose a method for direct con- version of MDCT coefficients of the MDCT-to- DFT conversion matrices into a Toeplitz part plus a Hankel part. The latter is split

  4. Mass and spin content of a free relativistic particle of arbitrary spins and the group

    E-Print Network [OSTI]

    Nikitin, Anatoly

    of particles with several spins and masses which can exist in positive as well as negative energy states Postal 20-364, 01000 Mexico D. F., Mexico 2 Instituto de Ciencias Nucleares, UNAM, Apdo. Postal 70 approach to the free parti- cle of arbitrary spins whose relativistic equation can be obtained from

  5. Any: from scalarity to arbitrariness Lucia M. Tovena and Jacques Jayez

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Any: from scalarity to arbitrariness Lucia M. Tovena and Jacques Jayez ITC-IRST EHESS Trento Paris) it is neither an indefinite nor a quantifier but a more abstract item which signals that some property holds), is asserted to hold of absolutely every individual of the N class, not only of the most typical ones

  6. Single crystal growth and heteroepitaxy of polyacene thin films on arbitrary substrates

    E-Print Network [OSTI]

    Headrick, Randall L.

    in a number of low-cost, large area electronic applications such as flat panel displays. Organic thin film as other substrates.6-12 Recently, significant progress has been made towards fabricating high quality is to prepare single crystal films on arbitrary substrates. Here we describe two significant advances towards

  7. Minkovskii-type inequality for arbitrary density matrix of composite and noncomposite systems

    E-Print Network [OSTI]

    V. N. Chernega; O. V. Manko; V. I. Manko

    2014-05-20T23:59:59.000Z

    New kind of matrix inequality known for bipartite system density matrix is obtained for arbitrary density matrix of composite or noncomposite qudit systems including the single qudit state. The examples of two qubit system and qudit with j=3/2 are discussed.

  8. Optical Arbitrary Waveform Generation and Measurement Transmission Systems and Its Application to Flexible Bandwidth

    E-Print Network [OSTI]

    Kolner, Brian H.

    Optical Arbitrary Waveform Generation and Measurement Transmission Systems and Its Application to Flexible Bandwidth Networking By David Jason Geisler B.S. (Tufts University) 2004 M.S. (University . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.4.1 The Case for Flexible Bandwidth Networking . . . . . . . . 11 1.4.2 Impairment Awareness

  9. Statewide Electrical Energy Cost Savings and Peak Demand Reduction from the IECC Code-Compliant, Single-Family Residences in Texas (2002-2009)

    E-Print Network [OSTI]

    Kim, H; Baltazar, J.C.; Haberl, J.

    ESL-TR-11-02-01 STATEWIDE ELECTRICITY AND DEMAND CAPACITY SAVINGS FROM THE INTERNATIONAL ENERGY CONSERVATION CODE (IECC) ADOPTION FOR SINGLE-FAMILY RESIDENCES IN TEXAS (2002-2009) Hyojin Kim Juan-Carlos Baltazar...&M University EXECUTIVE SUMMARY Statewide electricity and electric demand savings achieved from the adoption of the different International Energy Conservation Code (IECC) versions for single-family residences in Texas and the corresponding construction...

  10. T ID CODE I

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 | NUMBER 1 | MARCHT ID CODE I

  11. MARS15 Code Developments Driven by the Intensity Frontier Needs

    E-Print Network [OSTI]

    Mokhov, N V; Rakhno, I L; Striganov, S I; Tropin, I S; Eidelman, Yu I; Aarnio, P; Gudima, K K; Konobeev, A Yu

    2014-01-01T23:59:59.000Z

    The MARS15(2012) is the latest version of a multi-purpose Monte-Carlo code developed since 1974 for detailed simulation of hadronic and electromagnetic cascades in an arbitrary 3-D geometry of shielding, accelerator, detector and spacecraft components with energy ranging from a fraction of an electronvolt to 100 TeV. Driven by needs of the intensity frontier projects with their Megawatt beams, e.g., ESS, FAIR and Project X, the code has been recently substantially improved and extended. These include inclusive and exclusive particle event generators in the 0.7 to 12 GeV energy range, proton inelastic interaction modeling below 20 MeV, implementation of the EGS5 code for electromagnetic shower simulation at energies from 1 keV to 20 MeV, stopping power description in compound materials, new module for DPA calculations for neutrons from a fraction of eV to 20-150 MeV, user-friendly DeTra-based method to calculate nuclide inventories, and new ROOT-based geometry.

  12. Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about Uncertainty

    E-Print Network [OSTI]

    McGregor, Andrew

    Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about 1, 2013 #12;Coding for Transmission Coding for Compression Bonus Section Information Theory Encoding for Transmission Coding for Compression Bonus Section Encoding Messages with Redundancy: Error Correcting Suppose

  13. PICLE: a 2-D code for laser-beam - gas-jet interaction studies

    SciTech Connect (OSTI)

    Dunning, M.J.

    1981-01-01T23:59:59.000Z

    A heat transport hydrodynamic PIC code was adapted for application to the KMSF gas-jet experiments. The input material density profile was changed from the original solid slab geometry to a cylindrically symmetric profile modeling the gas-jet plume. The target material was changed from the original Z = 1 to arbitrary Z. Energy deposition was modified to include inverse bremsstrahlung and resonance absorption. Preliminary results indicate electron thermal conduction dominates over mass flow for times up to about the laser pulse length. Electron thermal conduction is seen to vary between classical and flux-limited values spatially and temporally according to plasma conditions. Applications of this code, entitled PICLE (Particle-In-Cell Laser Equipment code), to absorption and flux-limit parameter studies are described. A source listing and sample input deck are included.

  14. Quantum serial turbo-codes

    E-Print Network [OSTI]

    David Poulin; Jean-Pierre Tillich; Harold Ollivier

    2009-06-10T23:59:59.000Z

    We present a theory of quantum serial turbo-codes, describe their iterative decoding algorithm, and study their performances numerically on a depolarization channel. Our construction offers several advantages over quantum LDPC codes. First, the Tanner graph used for decoding is free of 4-cycles that deteriorate the performances of iterative decoding. Secondly, the iterative decoder makes explicit use of the code's degeneracy. Finally, there is complete freedom in the code design in terms of length, rate, memory size, and interleaver choice. We define a quantum analogue of a state diagram that provides an efficient way to verify the properties of a quantum convolutional code, and in particular its recursiveness and the presence of catastrophic error propagation. We prove that all recursive quantum convolutional encoder have catastrophic error propagation. In our constructions, the convolutional codes have thus been chosen to be non-catastrophic and non-recursive. While the resulting families of turbo-codes have bounded minimum distance, from a pragmatic point of view the effective minimum distances of the codes that we have simulated are large enough not to degrade the iterative decoding performance up to reasonable word error rates and block sizes. With well chosen constituent convolutional codes, we observe an important reduction of the word error rate as the code length increases.

  15. Conjugate Codes and Applications to Cryptography

    E-Print Network [OSTI]

    Mitsuru Hamada

    2006-10-23T23:59:59.000Z

    A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.

  16. Turbo and LDPC Codes: Implementation, Simulation,

    E-Print Network [OSTI]

    Valenti, Matthew C.

    1 Turbo and LDPC Codes: Implementation, Simulation, and Standardization June 7, 2006 Matthew/7/2006 Turbo and LDPC Codes 2/133 Tutorial Overview Channel capacity Convolutional codes 颅 the MAP algorithm Turbo codes 颅 Standard binary turbo codes: UMTS and cdma2000 颅 Duobinary CRSC turbo codes: DVB

  17. Warm wave breaking of nonlinear plasma waves with arbitrary phase velocities C. B. Schroeder, E. Esarey, and B. A. Shadwick

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    Warm wave breaking of nonlinear plasma waves with arbitrary phase velocities C. B. Schroeder, E, collisionless plasma is developed to analyze nonlinear plasma waves excited by intense drive beams. The maximum amplitude and wavelength are calculated for nonrelativistic plasma temperatures and arbitrary plasma wave

  18. Using true concurrency to model execution of parallel programs

    SciTech Connect (OSTI)

    Ben-Asher, Y.; Farchi, E.

    1994-08-01T23:59:59.000Z

    Parallel execution of a program R (intuitively regarded as a partial order) is usually modeled by sequentially executing one of the total orders (interleavings) into which it can be embedded. Our work deviates from this serialization principle by using true concurrency to model parallel execution. True concurrency is represented via completions of R to semi total orders, called time diagrams. These orders are characterized via a set of conditions (denoted by Ct), yielding orders of time diagrams which preserve some degree of the intended parallelism in R. Another way to express semi total orders is to use re-writing or derivation rules (denoted by Cx) which for any program R generates a set of semi-total orders. This paper includes a classification of parallel execution into three classes according to three different types of Ct conditions. For each class a suitable Cx is found and a proof of equivalence between the set of all time diagrams satisfying Ct and the set of all terminal Cx derivations of R is devised. This equivalence between time diagram conditions and derivation rules is used to define a novel notion of correctness for parallel programs. This notion is demonstrated by showing that a specific asynchronous program enforces synchronous execution, which always halts, showing that true concurrency can be useful in the context of parallel program verification.

  19. Benchmark of the IMPACT Code for High Intensity Beam DynamicsSimulation

    SciTech Connect (OSTI)

    Qiang, J.; Ryne, R.D.

    2006-11-16T23:59:59.000Z

    The IMPACT (Integrated Map and Particle Accelerator Tracking) code was first developed under Computational Grand Challenge project in the mid 1990s [1]. It started as a three-dimensional (3D) data parallel particle-in-cell (PIC) code written in High Performance Fortran. The code used a split-operator based method to solve the Hamiltonian equations of motion. It contained linear transfer maps for drifts, quadrupole magnets and rf cavities. The space-charge forces were calculated using an FFT-based method with 3D open boundary conditions and longitudinal periodic boundary conditions. This code was completely rewritten in the late 1990s based on a message passing parallel programming paradigm using Fortran 90 and MPI following an object-oriented software design. This improved the code's scalability on large parallel computer systems and also gave the code better software maintainability and extensibility [2]. In the following years, under the SciDAC-1 accelerator project, the code was extended to include more accelerating and focusing elements such as DTL, CCL, superconducting linac, solenoid, dipole, multipoles, and others. Besides the original split-operator based integrator, a direct integration of Lorentz equations of motion using a leap-frog algorithm was also added to the IMPACT code to handle arbitrary external nonlinear fields. This integrator can read in 3D electromagnetic fields in a Cartesian grid or in a cylindrical coordinate system. Using the Lorentz integrator, we also extended the original code to handle multiple charge-state beams. The space-charge solvers were also extended to include conducting wall effects for round and rectangular pipes with longitudinal open and periodic boundary conditions. Recently, it has also been extended to handle short-range wake fields (longitudinal monopole and transverse dipole) and longitudinal coherent synchrotron radiation wake fields. Besides the parallel macroparticle tracking code, an rf linac lattice design code, an envelope matching and analysis code, and a number of pre- and post-processing codes were also developed to form the IMPACT code suite. The IMPACT code suite has been used to study beam dynamics in the SNS linac, the J-PARC linac commissioning, the CERN superconducting linac design, the Los Alamos Low Energy Demonstration Accelerator (LEDA) halo experiment, the Rare Isotope Accelerator (RIA) driver linac design, and the FERMI{at}Elettra FEL linac design [3-8]. It has also been used to study space-charge resonance in anisotropic beams [9-11].

  20. EXTENSION OF THE EMPIRE CODE TO THE RESONANCE REGION.

    SciTech Connect (OSTI)

    CHO,Y.S.; HERMAN, M.; MUGHABGHAB, S.F.; OBLOZINSKY, P.; ROCHMAN, D.; LEE, Y.O.

    2007-04-22T23:59:59.000Z

    The preliminary version of a new module has been developed to be added to a nuclear reaction model code EMPIRE to allow for an evaluation of neutron cross sections in a resonance region. It automates most of the evaluation procedures and can be executed within EMPIRE or as a stand-alone program. The module includes a graphic user interface (GUI) and a number of codes and scripts that read individual, as well as average, resonance parameters from the Atlas of Neutron Resonances and other physical constants from RIPL-2, perform an analysis of the available resonances, carry out statistical distributions, and compute cross sections in resolved and unresolved resonance regions which are then compared with experimental data. The module also provides an ENDF-formatted file for a resonance region and various plots allowing for a verification of the procedure. The formatted file can be integrated later into the final ENDF-6 file as generated by the EMPIRE code. However, as a preliminary version, extensive testing and further improvements are needed before this new capability can be incorporated into the production version of EMPIRE.