Powered by Deep Web Technologies
Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Subversion Hook Scripts Arbitrary Command Injection 0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am Addthis PROBLEM: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability PLATFORM: Apache Subversion 1.x ABSTRACT: A vulnerability has been reported in Apache Subversion. REFERENCE LINKS: Apache Original Advisory Secunia Advisory SA53727 CVE-2013-2088 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an input validation error in the svn-keyword-check.pl hook script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that contrib scripts are used on the

2

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

3

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apache OFBiz Cross-Site Scripting and Code Execution 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected. references LINKS: Vendor Advisory Secunia Advisory 48800 CVE-2012-1621 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code

4

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

5

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code 48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability April 16, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in ActiveScriptRuby, which can be exploited by malicious people to potentially compromise a user's system. PLATFORM: Version(s): 1.2.2.0 and prior ABSTRACT: The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands. reference LINKS: Secunia Advisory 48811 CVE-2012-1241 IMPACT ASSESSMENT: High Discussion: ActiveScriptRuby is a software to implement Ruby into a Windows environment. ActiveScriptRuby contains a vulnerability where an arbitrary Ruby script may be executed on the web browser that can execute ActiveX

6

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

7

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

8

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

9

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

10

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

11

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

12

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

13

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January...

14

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

15

Nested Lattice Codes for Arbitrary Continuous Sources and Channels  

E-Print Network (OSTI)

Nested Lattice Codes for Arbitrary Continuous Sources and Channels Aria G. Sahebi and S. Sandeep 48109, USA. Email: ariaghs@umich.edu, pradhanv@umich.edu Abstract--In this paper, we show that nested information at the transmitter. We also show that nested lattice codes are optimal for source coding

Pradhan, Sandeep

16

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

17

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

18

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

19

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

20

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

22

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

23

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

24

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

25

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

26

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE))

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

27

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

28

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

29

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

30

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

31

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

32

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

33

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

34

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

35

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

36

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

37

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

38

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

39

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

40

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

42

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

43

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

44

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

45

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

46

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

47

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

48

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

49

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

50

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

51

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

52

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

NLE Websites -- All DOE Office Websites (Extended Search)

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities August 2, 2013 - 2:25am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco WAAS (Wide Area Application Services), which can be exploited by malicious users and malicious people to compromise a vulnerable system. PLATFORM: Versions 5.0.x, 5.1.x, and 5.2.x. ABSTRACT: Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia Advisory SA54372 CVE-2013-3443 CVE-2013-3444 IMPACT ASSESSMENT: High

53

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

54

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

55

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

56

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

57

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

58

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

59

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

60

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

62

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

page or execute a malicious .pdf document, the attacker-specified data could cause a memory corruption, resulting in the execution of code. The attacker could take advantage of...

63

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

64

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

65

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

66

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

67

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

68

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

69

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

70

U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE))

A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

71

Reduced Space-Time and Time Costs Using Dislocation Codes and Arbitrary Ancillas  

E-Print Network (OSTI)

We propose two distinct methods of improving quantum computing protocols based on surface codes. First, we analyze the use of dislocations instead of holes to produce logical qubits, potentially reducing spacetime volume required. Dislocations induce defects which, in many respects, behave like Majorana quasi-particles. We construct circuits to implement these codes and present fault-tolerant measurement methods for these and other defects which may reduce spatial overhead. One advantage of these codes is that Hadamard gates take exactly $0$ time to implement. We numerically study the performance of these codes using a minimum weight and a greedy decoder using finite-size scaling. Second, we consider state injection of arbitrary ancillas to produce arbitrary rotations. This avoids the logarithmic (in precision) overhead in online cost required if $T$ gates are used to synthesize arbitrary rotations. While this has been considered before, we consider also the parallel performance of this protocol. Arbitrary ancilla injection leads to a probabilistic protocol in which there is a constant chance of success on each round; we use an amortized analysis to show that even in a parallel setting this leads to only a constant factor slowdown as opposed to the logarithmic slowdown that might be expected naively.

M. B. Hastings; A. Geller

2014-08-14T23:59:59.000Z

72

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

73

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

74

U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: VMware vCenter Operations Cross-Site Scripting Vulnerability 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory Secunia Advisory SA50795 CVE-2012-5050 IMPACT ASSESSMENT: Medium Discussion: Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Impact: A vulnerability in VMware vCenter Operations, which can be exploited to

75

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site 4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis PROBLEM: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 4.3.0 through 4.3.5 ABSTRACT: A vulnerability was reported in Splunk Web. REFERENCE LINKS: SecurityTracker Alert ID: 1028371 Splunk IMPACT ASSESSMENT: High DISCUSSION: Splunk Web does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Splunk Web software and will run in the security context of that site. As a result, the code will be able to access the

76

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

77

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740 Seclist.org CVE-2013-0590 CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate

78

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

79

V-216: Drupal Monster Menus Module Security Bypass and Script Insertion  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

216: Drupal Monster Menus Module Security Bypass and Script 216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August 12, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in the Monster Menus module for Drupal PLATFORM: Drupal Monster Menus Module 6.x and 7.x ABSTRACT: The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks. REFERENCE LINKS: Secunia Advisory SA54391 Drupal Security Advisory CVE-2013-4229 CVE-2013-4230 IMPACT ASSES SMENT: Medium DISCUSSION: 1) Input passed via the title when editing page settings is not properly sanitised before being edited the next time. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's

80

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: ownCloud Cross-Site Scripting and File Upload 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the filename to apps/files_versions/js/versions.js and apps/files/js/filelist.js and event title to 3rdparty/fullcalendar/js/fullcalendar.js is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

82

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

83

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site 0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks. PLATFORM: Adobe Flex SDK 4.5.1 and earlier 4.x versions for Windows, Macintosh and Linux Adobe Flex SDK 3.6 and earlier 3.x versions for Windows, Macintosh and Linux ABSTRACT: Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: Adobe Security Bulletin CVE-2011-2461 SecurityTracker Alert ID: 1026361 IMPACT ASSESSMENT: High Discussion: A remote user may be able to cause arbitrary scripting code to be executed

84

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

85

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

86

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

87

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

88

Web Interfaces 1 Python Scripts in Browsers  

E-Print Network (OSTI)

Web Interfaces 1 Python Scripts in Browsers the web server Apache processing forms with Python scripts Python code to write HTML 2 Web Interfaces for the Determinant dynamic interactive forms passing, 28 October 2013 Scientific Software (MCS 507 L-27) web interfaces 28 October 2013 1 / 42 #12;Web

Verschelde, Jan

89

scriptEnv - loading modules before starting a script  

NLE Websites -- All DOE Office Websites (Extended Search)

scriptEnv - loading modules before starting a script scriptEnv - loading modules before starting a script scriptEnv - loading modules before starting a script In some cases a script needs to load modules before the script can be executed, but it can often be inconvenient or impossible to provide wrapper scripts which load the needed modules. CGI scripts on the gpweb resources or in the NERSC portal environment which require the genepool-specific python/perl/R or databases configuration modules are a strong example of this. NERSC provides the scriptEnv as a custom drop-in replacement for /usr/bin/env. scriptEnv loads your selected modules to allow your scripts to run easily and reproducibly. After constructing your scriptEnv, you only need replace the shebang line of your script to use your custom scriptEnv

90

Example Edison Batch Scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Example Batch Scripts Example Batch Scripts Example Batch Scripts The default number of cores per node on Edison is 16, and the default "mppnppn" setting is 16. However, if you run with hyperthreading (HT), Edison compute nodes have 32 cores per node, and the mppnppn value needs to be set to 32. In addition, the "-j 2" option needs to be added to the "aprun" command. In most of the following example batch scripts, the default number of 16 cores per node is used. Basic Scripts Sample Job script This script uses the default 16 cores per node. This job will run on 64 nodes, with 1024 cores. #PBS -q debug #PBS -l mppwidth=1024 #PBS -l walltime=00:10:00 #PBS -N my_job #PBS -j oe #PBS -V cd $PBS_O_WORKDIR aprun -n 1024 ./my_executable Sample job script to run with Hyperthreading (HT)

91

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

92

JAVA SCRIPT IS DISABLED  

Office of Scientific and Technical Information (OSTI)

This application needs JavaScript to work correctly but your browser does not have it enabled. How do I enable JavaScript??? - follow the instructions below... If your browser is not listed, please contact your system administrator. Internet Explorer (6.0) Select 'Tools' from the top menu Choose 'Internet Options' Click on the 'Security' tab Click on 'Custom Level' Scroll down until you see section labled 'Scripting' Under 'Active Scripting', select 'Enable' and click OK Internet Explorer (7.0) Select Tools > Internet Options. Click on the Security tab. Click the Custom Level button. Scroll down to the Scripting section. Select Enable for Active Scripting and Scripting of Java Applets. Click OK. Select YES if a box appears to confirm. Click OK. Close window.

93

Example Edison Batch Scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Example Batch Scripts Example Batch Scripts Example Batch Scripts Edison has 24 cores (physical cores) per node, so the default "mppnppn" value is set to 24 for all queues. If you run with hyperthreading (HT), Edison has 48 logical cores per node, and the mppnppn value can be set to 48. However, this is not required. The "-j 2" option of the "aprun" command allows you to use all 48 logical cores on the nodes. In most of the following example batch scripts, we assume that jobs are run without Hyperthreading unless explicitly mentioned, therefore the default mppnppn value, 24, is used. Basic Scripts Sample Job script This script uses the default 24 cores per node. This job will run on 64 nodes, with 1536 cores. #PBS -q debug #PBS -l mppwidth=1536 #PBS -l walltime=00:10:00

94

Batch Script Examples  

NLE Websites -- All DOE Office Websites (Extended Search)

Batch Script Examples Batch Script Examples Batch Script Examples My First Script This is a simple example that you can use to make sure that your settings are correct before submitting more complicated jobs. First, copy the contents of hello.sh into a file. genepool% cat hello.sh #!/bin/bash sleep 120 echo "Hello World" Then submit your job with the qsub command genepool% qsub hello.sh Monitor your job with the qstat command: genepool% qstat -u You can also get more detailed information about your job using: genepool% qstat -j The job id can be found using the qstat -u command. Basic Batch Script Here is an example of a basic script that specifies the working directory, the shell and the queue. The #$ must be used to specify the grid engine

95

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Drupal Drag & Drop Gallery Module Arbitrary File Upload 9: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability June 26, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in the Drag & Drop Gallery module for Drupal, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: Drupal Drag & Drop Gallery Module 6.x ABSTRACT: The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension. Reference Links: Original Advisory Secunia ID 49698 No Current CVE Reference IMPACT ASSESSMENT:

96

Parallel Batch Scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Parallel Batch Scripts Parallel Batch Scripts Parallel Batch Scripts Parallel Environments on Genepool You can run parallel jobs that use MPI or OpenMP on Genepool as long as you make the appropriate changes to your submission script! To investigate the parallel environments that are available on Genepool, you can use Command Description qconf -sp Show the configuration for the specified parallel environment. qconf -spl Show a list of all currently configured parallel environments. Basic Parallel Example If your job requires the default 5GB of memory per slot, you can do the following: #!/bin/bash # # == Set SGE options: # # -- ensure BASH is used # -- run the job in the current working directory (where qsub is called) #$ -cwd # -- run with the environment variables from the User's environment

97

A scripting interface for doubly linked face list based polygonal meshes  

E-Print Network (OSTI)

. . . . . . . . . . . . . . . . . . . . . . . . . . 15 14 Sample MEL code which randomizes the normals of all the faces . . . . . . . . . . . 16 15 Autodesk Maya 8.5 with embedded MEL script editor . . . . . . . . . . . . . . . . . 17 16 TopMod?s embedded Python script editor... have their own specific scripting language. Autodesk Maya, for example, is powered by the Maya Embedded Language (MEL). With MEL, users can script modeling, rendering, animation, and custom interface dialogs. Likewise, Autodesk 3D Studio Max has Max...

Tett, Stuart Tosten

2009-05-15T23:59:59.000Z

98

A scripting interface for doubly linked face list based polygonal meshes  

E-Print Network (OSTI)

. . . . . . . . . . . . . . . . . . . . . . . . . . 15 14 Sample MEL code which randomizes the normals of all the faces . . . . . . . . . . . 16 15 Autodesk Maya 8.5 with embedded MEL script editor . . . . . . . . . . . . . . . . . 17 16 TopMod’s embedded Python script editor... have their own specific scripting language. Autodesk Maya, for example, is powered by the Maya Embedded Language (MEL). With MEL, users can script modeling, rendering, animation, and custom interface dialogs. Likewise, Autodesk 3D Studio Max has Max...

Tett, Stuart Tosten

2008-10-10T23:59:59.000Z

99

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 3, MARCH 2004 417 On the Application of LDPC Codes to Arbitrary  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 3, MARCH 2004 417 On the Application of LDPC, Senior Member, IEEE Abstract--We discuss three structures of modified low-density parity-check (LDPC Gaussian noise (AWGN) channel confirming the effectiveness of the codes. Index Terms-- -ary low-density

Bennatan, Amir

100

Transparent runtime parallelization of the R scripting language  

SciTech Connect

Scripting languages such as R and Matlab are widely used in scientific data processing. As the data volume and the complexity of analysis tasks both grow, sequential data processing using these tools often becomes the bottleneck in scientific workflows. We describe pR, a runtime framework for automatic and transparent parallelization of the popular R language used in statistical computing. Recognizing scripting languages interpreted nature and data analysis codes use pattern, we propose several novel techniques: (1) applying parallelizing compiler technology to runtime, whole-program dependence analysis of scripting languages, (2) incremental code analysis assisted with evaluation results, and (3) runtime parallelization of file accesses. Our framework does not require any modification to either the source code or the underlying R implementation. Experimental results demonstrate that pR can exploit both task and data parallelism transparently and overall has better performance as well as scalability compared to an existing parallel R package that requires code modification.

Yoginath, Srikanth B [ORNL

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-216: Drupal Monster Menus Module Security Bypass and Script...  

Office of Environmental Management (EM)

Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities...

102

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by malicious users to compromise a vulnerable system. SOLUTION: Users to apply the patch. Addthis Related Articles V-129: Apache Subversion moddavsvn Multiple Denial of...

103

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code Injection Vulnerability. PLATFORM: IM Manager versions prior to 8.4.18 are affected. ABSTRACT: Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. referecnce LINKS: Symantec Security Advisory SYM11-012 Symantec Security Updates Bugtraq ID: 49742 IMPACT ASSESSMENT: High Discussion: Symantec was notified of Cross-Site Scripting and Code injection/execution issues present in the Symantec IM Manager management console. The management console fails to properly filter/validate external inputs. Successful exploitation of SQL Injection or Remote Code execution might

104

Revising the worksheet with L3: a language and environment foruser-script interaction  

SciTech Connect

This paper describes a novel approach to the parameter anddata handling issues commonly found in experimental scientific computingand scripting in general. The approach is based on the familiarcombination of scripting language and user interface, but using alanguage expressly designed for user interaction and convenience. The L3language combines programming facilities of procedural and functionallanguages with the persistence and need-based evaluation of data flowlanguages. It is implemented in Python, has access to all Pythonlibraries, and retains almost complete source code compatibility to allowsimple movement of code between the languages. The worksheet interfaceuses metadata produced by L3 to provide selection of values through thescriptit self and allow users to dynamically evolve scripts withoutre-running the prior versions. Scripts can be edited via text editors ormanipulated as structures on a drawing canvas. Computed values are validscripts and can be used further in other scripts via simplecopy-and-paste operations. The implementation is freely available underan open-source license.

Hohn, Michael H.

2008-01-22T23:59:59.000Z

105

2012 PATRIOT SCRIPT User's Guide  

SciTech Connect

PATRIOT Script is an application that executes Patriot batch runs. This document provides a description of this application and how to run it. The basic user access tool PATRIOT Client allows a user to generate several most reliable paths in one run: one can specify a list of sources (origins) and targets, and PATRIOT finds for a given architecture option and one choice of device all the most reliable paths between all these sources and targets. The main objective of PATRIOT Script is to provide a tool for making automatic PATRIOT runs not only for a prespecified set of sources and targets, but also for a pre-specified set of devices and various architecture options. Running PATRIOT Script requires two basic steps that will be explained in more detail next: (1) Pre-preparation of an excel spreadsheet with the information about the desired runs; and (2) Opening the PATRIOT Script application, reading in the excel-spreadsheet and running the desired scenarios. Sections 1 and 2 explain each of these steps, and section 3 describes the output of the PATRIOT Script. For a detail description of the models and data behind PATRIOT and a detailed explanation of all the architecture options see [1]. For instructions of how to run PATRIOT Client see [2].

Cuellar, Leticia [Los Alamos National Laboratory; Cleland, Timothy J. [Los Alamos National Laboratory; Kubicek, Deborah A. [Los Alamos National Laboratory; Mathis, Mark M. [Los Alamos National Laboratory; Stroud, Phillip D. [Los Alamos National Laboratory

2012-05-31T23:59:59.000Z

106

HyRAM Testing Script.  

SciTech Connect

The testing script is to provide a method of inspections to HyRAM (v1.0.0.244 Alpha) application features. This document will lead participants through the use of the application to make sure the application performs as designed. If a feature of the application becomes non-working, this script will relay useful information back to the designers of the application so that the feature can be fixed. This is essential to keep the application updated and performing as designed so that the users of this program can be satisfied. There will be frequent updates of this document to ensure proper testing of future application versions.

Parkins, Owen

2014-12-01T23:59:59.000Z

107

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

108

Scripted Building Energy Modeling and Analysis: Preprint  

SciTech Connect

Building energy modeling and analysis is currently a time-intensive, error-prone, and nonreproducible process. This paper describes the scripting platform of the OpenStudio tool suite (http://openstudio.nrel.gov) and demonstrates its use in several contexts. Two classes of scripts are described and demonstrated: measures and free-form scripts. Measures are small, single-purpose scripts that conform to a predefined interface. Because measures are fairly simple, they can be written or modified by inexperienced programmers.

Hale, E.; Macumber, D.; Benne, K.; Goldwasser, D.

2012-08-01T23:59:59.000Z

109

HSI Tape Ordering Script at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Tape Ordering Script Tape Ordering Script HSI Tape Ordering Script Below is an example of a perl script that shows how one might create a list of hsi retrievals from HPSS that are ordered by tape and tape position for the most efficient way to get the files. Note that the source directory in HPSS and the destination directory on disk are hardwired along with a selection on what files to list. The script is based on using "hsi ls" with the "-P" option. Also shown is what the script prints out as it is run and a snippet of the output file it produces containing the transfer commands. #! /usr/bin/perl use strict; ### This script lists an hpss directory, sorts the files according to ### tape and position on the tape and creates a file containing ### the transfer commands. Written by ELH, 10/29/10.

110

Using HSI in a Script at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Shell Script Shell Script HSI Shell Script This example shows a script containing HSI actions. Note that in this case a single-line command is used so no "here-doc" is needed. This simplifies the script and demonstrates some of HSI's advantages over pftp or ftp. This script assumes that you have previously interactively logged into HSI at least once to encrypt your username/password. #!/bin/csh # First copy the data and program source from the submitting directory hsi -h archive.nersc.gov "cd my_HPSS_directory; get data* source.f" ./myproj data outfile # Save the output file in HPSS hsi -h archive.nersc.gov "cd my_HPSS_directory; put outfile; put restart*" exit Note that in this example the individual hsi commands are separated by semicolons and the set of commands is contained in quotes. The semicolons

111

V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site 93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks July 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN PLATFORM: Version(s) prior to 2.3.3.216 ABSTRACT: Several scripts do not properly filter HTML code from user-supplied input before displaying the input via several parameters REFERENCE LINKS: SecurityTracker Alert ID: 1028736 Barracuda SSL VPN Release Notes Zero Science Lab IMPACT ASSESSMENT: Medium DISCUSSION: The code will originate from the Barracuda SSL VPN interface and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if

112

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

113

Dependent types for JavaScript  

Science Journals Connector (OSTI)

We present Dependent JavaScript (DJS), a statically typed dialect of the imperative, object-oriented, dynamic language. DJS supports the particularly challenging features such as run-time type-tests, higher-order functions, extensible objects, prototype ... Keywords: JavaScript, arrays, prototype inheritance, refinement types, strong updates

Ravi Chugh; David Herman; Ranjit Jhala

2012-11-01T23:59:59.000Z

114

UDP: an integral management system of embedded scripts implemented into the IMaX instrument of the Sunrise mission  

E-Print Network (OSTI)

The UDP (User Defined Program) system is a scripting framework for controlling and extending instrumentation software. It has been specially designed for air- and space-borne instruments with flexibility, error control, reuse, automation, traceability and ease of development as its main objectives. All the system applications are connected through a database containing the valid script commands including descriptive information and source code. The system can be adapted to different projects without changes in the framework tools, thus achieving great level of flexibility and reusability. The UDP system comprises: an embedded system for the execution of scripts by the instrument software; automatic tools for aiding in the creation, modification, documentation and tracing of new scripting language commands; and interfaces for the creation of scripts and execution control.

Munoz, R Morales; de la Rosa, J Marco

2008-01-01T23:59:59.000Z

115

Script Handbook for Interactive Scientific Website Building  

E-Print Network (OSTI)

In this script handbook, we collect the basic (and partially upgraded) PHP scripts used for building the AMIDAS website (http://pisrv0.pit.physik.uni-tuebingen.de/darkmatter/amidas/), an online interactive simulation/data analysis system for direct Dark Matter detection experiments and phenomenology. In this (1.73205) version, we add more materials and improve the scripts for offering a more convenient, comfortable and user-friendly environment on interactive scientific computing websites. Some basic, often used commands of (X)HTML, CSS, JavaScript, HTML DOM, and PHP are also given in Appendix. Online demonstrations and downloadable template scripts are given on http://www.tir.tw/iswb/ss2012/templates.php.

Chung-Lin Shan

2010-08-06T23:59:59.000Z

116

JavaScript Error, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Services Web Services Enabling JavaScript or Active Scripting We're Sorry, you don't seem to have JavaScript enabled in your browser. Some functions in this site may not work properly without it enabled or your web browser is running an older version of JavaScript. Please enabled your JavaScript, then go back and try again or upgrade your browser version to view this web page correctly. Press the button below to see if you have JavaScript enabled. If nothing happened, then it is possible that JavaScript is disabled on your browser. The following instructions shown below describes how to enable JavaScript or Active Scripting in your browser. If your browser isn't listed, please consult its online help pages. JavaScript Test ITD Homepage Need Help? How to Enable JavaScript

117

ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications  

E-Print Network (OSTI)

ScriptGard: Automatic Context-Sensitive Sanitization for Large-Scale Legacy Web Applications@microsoft.com ABSTRACT We empirically analyzed sanitizer use in a shipping web ap- plication with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis of sanitizer use of which we are aware

Livshits, Ben

118

CSc-165 Spring 2014 Week 6(c) Scripting (3-script functions)  

E-Print Network (OSTI)

.app.BaseGame; import sage.scene.SceneNode; import sage.scene.shape.Teapot; // This class demonstrates how to use JavaCharacter.js"; private File scriptFile; private Teapot t1; protected void initGame() { ScriptEngineManager factory = newManager.INPUT_ACTION_TYPE.ON_PRESS_ONLY); t1 = new Teapot(); addGameWorldObject(t1); } private void runScript() { try { FileReader file

Gordon, Scott

119

Collaboration Scripts 1 DRAFT! PLEASE DO NOT CIRCULATE  

E-Print Network (OSTI)

Collaboration Scripts 1 DRAFT! PLEASE DO NOT CIRCULATE Running Head: COLLABORATION SCRIPTS Collaboration Scripts ­ A Conceptual Analysis Ingo Kollar, Frank Fischer, and Friedrich W. Hesse Knowledge Media: i.kollar@iwm-kmrc.de Kollar, I., Fischer, F., & Hesse, F. W. (2006). Collaboration scripts

Paris-Sud XI, Université de

120

Script Handbook for Interactive Scientific Website Building  

E-Print Network (OSTI)

In this handbook, I collect the basic (and eventually upgraded) PHP scripts used for building the AMIDAS website (http://pisrv0.pit.physik.uni-tuebingen.de/darkmatter/amidas/), an online interactive simulation/data analysis system for direct Dark Matter detection experiments. Some basic, often used commands of (X)HTML, CSS, JavaScript, HTML DOM, and PHP are also given in the appendix.

Shan, Chung-Lin

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

122

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Wicket Input Validation Flaw Permits Cross-Site 5: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks September 11, 2012 - 6:00am Addthis PROBLEM: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache Software Foundation Apache Wicket 1.4.20 Apache Software Foundation Apache Wicket 1.4.18 Apache Software Foundation Apache Wicket 1.4.17 Apache Software Foundation Apache Wicket 1.4.16 ABSTRACT: A vulnerability was reported in Apache Wicket reference LINKS: Apache Wicket SecurityTracker Alert ID: 1027508 Bugtraq ID: 55445 CVE-2012-3373 IMPACT ASSESSMENT: Medium Discussion: The software does not properly filter HTML code from user-supplied input in

123

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

124

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

125

DOE Patents Database - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code Download and install the DOepatents widget by copying and pasting its HTML inclusion code. <script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('d7331688-adb4-469b-b7a4-565d6bafb7a5');Get the DOepatents widget and many other great free widgets at Widgetbox! Not seeing a widget? (More

126

Swift: A language for distributed parallel scripting  

Science Journals Connector (OSTI)

Scientists, engineers, and statisticians must execute domain-specific application programs many times on large collections of file-based data. This activity requires complex orchestration and data management as data is passed to, from, and among application ... Keywords: Dataflow, Parallel programming, Scripting, Swift

Michael Wilde; Mihael Hategan; Justin M. Wozniak; Ben Clifford; Daniel S. Katz; Ian Foster

2011-09-01T23:59:59.000Z

127

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2010 contenuto nel cookie) Goy - a.a. 2010/2011 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita setcookie

Goy, Anna

128

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2009 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2009/2010 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

129

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2010 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2010/2011 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

130

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2011 server contenuto nel cookie) Goy - a.a. 2011/2012 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita

Goy, Anna

131

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2012 server contenuto nel cookie) Goy - a.a. 2012/2013 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita

Goy, Anna

132

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.c Goy - a.a. 2009) Goy - a.a. 2009/2010 Programmazione Web 3 PHP: cookie - I E' possibile scrivere e leggere cookie utilizzando PHP Per scrivere un cookie, utilizzo la funzione predefinita setcookie(...): nome del cookie

Goy, Anna

133

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2012 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2012/2013 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

134

Programmazione (scripting) server-side con PHP  

E-Print Network (OSTI)

1 MODULO 1 PARTE 3 Programmazione (scripting) server-side con PHP 3.d Goy - a.a. 2011 di interazione home.html ll h identif.php cancella.php cancellato.php logout.phpacquisti.php Goy - a.a. 2011/2012 Programmazione Web 5 sess_scad.html home.html - login/registrazione utente identif.php

Goy, Anna

135

Scripted Building Energy Modeling and Analysis (Presentation)  

SciTech Connect

Building energy analysis is often time-intensive, error-prone, and non-reproducible. Entire energy analyses can be scripted end-to-end using the OpenStudio Ruby API. Common tasks within an analysis can be automated using OpenStudio Measures. Graphical user interfaces (GUI's) and component libraries reduce time, decrease errors, and improve repeatability in energy modeling.

Macumber, D.

2012-10-01T23:59:59.000Z

136

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

137

Anatomy of a Detector-Script  

NLE Websites -- All DOE Office Websites (Extended Search)

Anatomy of a Detector - Script Anatomy of a Detector - Script What is Fermilab? - Run II Newscasts - Analyze the Data - Online Resources - Site Outline We are flying over Fermilab’s accelerator complex. Two collider detectors: CDF and DØ are located along the main ring tunnel (in yellow). Dropping into the tunnel, we can see a proton traveling at nearly the speed of light inside the beam pipe. An antiproton passes by in the opposite direction at the same speed. Occasionally, the proton and antiproton collide violently. Sometimes, as shown in this artist’s rendition, the collision creates rarely seen particles like this top-antitop quark pair. These are unstable so they decay instantly into more conventional forms of matter: charged and neutral particles that move away from the collision. The top and anti-top quark decayed into W bosons and b quarks which in turn decayed into muons, neutrinos, and sprays of particles called jets.

138

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

139

Script identification from images using cluster-based templates  

DOE Patents (OSTI)

A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script.

Hochberg, Judith G. (Los Alamos, NM); Kelly, Patrick M. (Los Alamos, NM); Thomas, Timothy R. (Santa Fe, NM)

1998-01-01T23:59:59.000Z

140

Script identification from images using cluster-based templates  

DOE Patents (OSTI)

A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script. 17 figs.

Hochberg, J.G.; Kelly, P.M.; Thomas, T.R.

1998-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

AutoMicromanager: A microscopy scripting toolkit for LABVIEW and other programming environments  

Science Journals Connector (OSTI)

We present a scripting toolkit for the acquisition and analysis of a wide variety of imaging data by integrating the ease of use of various programming environments such as LABVIEW IGOR PRO MATLAB SCILAB and others. This toolkit is designed to allow the user to quickly program a variety of standard microscopy components for custom microscopy applications allowing much more flexibility than other packages. Included are both programming tools as well as graphical user interface classes allowing a standard consistent and easy to maintain scripting environment. This programming toolkit allows easy access to most commonly used cameras stages and shutters through the Micromanager project so the scripter can focus on their custom application instead of boilerplate code generation.

Brian Alan Ashcroft; Tjerk Oosterkamp

2010-01-01T23:59:59.000Z

142

Laboratory Equipment Donation Program - LEDP Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code Copy the code below and paste it to your website or blog: <script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('6f283a3d-1392-4025-a8bf-566030ca0281');Get the Laboratory Equipment Donation Program widget and many other great free widgets at Widgetbox! Not seeing a widget? (More

143

User scripting on Android using BladeDroid Ravi Bhoraskar *  

E-Print Network (OSTI)

control over the app at all interesting points. 3 Status and Next Steps We have implemented BladeUser scripting on Android using BladeDroid Ravi Bhoraskar * , Dominic Langenegger* , Pingyang He to mobile applications. Using our tool, BladeDroid, users can write scripts that enable them to customize

Ernst, Michael

144

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

145

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

146

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

147

Script generation and multitasking in HIV-1 infection : implications for everyday functioning  

E-Print Network (OSTI)

Gagnon S. (2004). Script generation following frontal andGroup. (2005). Action (verb) generation in HIV-1 infection.Note. SG = Script Generation test; MT = Multitasking test. *

Scott, James Cobb

2009-01-01T23:59:59.000Z

148

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

149

Energy Citations Database (ECD) - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code <script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('4eea0226-60d0-4baa-9b90-190d0d3d52cd');Get the Energy Citations Database widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)

150

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

151

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

152

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

a specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system...

153

Arbitrary cutting of deformable tetrahedralized objects  

Science Journals Connector (OSTI)

We propose a flexible geometric algorithm for placing arbitrary cracks and incisions on tetrahedralized deformable objects. Although techniques based on remeshing can also accommodate arbitrary fracture patterns, this flexibility comes at the risk of ...

Eftychios Sifakis; Kevin G. Der; Ronald Fedkiw

2007-08-01T23:59:59.000Z

154

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

155

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

156

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis...

157

Pianola: A script-based I/O benchmark  

SciTech Connect

Script-based I/O benchmarks record the I/O behavior of applications by using an instrumentation library to trace I/O events and their timing. A replay engine can then reproduce these events from the script in the absence of the original application. This type of benchmark reproduces real-world I/O workloads without the need to distribute, build, or run complex applications. However, faithfully recreating the I/O behavior of the original application requires careful design in both the instrumentation library and the replay engine. This paper presents the Pianola script-based benchmarking system, which includes an accurate and unobtrusive instrumentation system and a simple-to-use replay engine, along with some additional utility programs to manage the creation and replay of scripts. We show that for some sample applications, Pianola reproduces the qualitative features of the I/O behavior. Moreover, the overall replay time and the cumulative read and write times are usually within 10% of the values measured for the original applications.

May, J

2008-09-18T23:59:59.000Z

158

Scripting Coordination Styles1 Franz Achermann, Stefan Kneubuehl, Oscar Nierstrasz  

E-Print Network (OSTI)

: software architecture, scripting and object-orientation. First, it is now well-established that different architectural styles exhibit different prop- 1. Proceedings Coordination '2000, António Porto and Gruia-Catalin Roman (Eds.), LNCS, vol. 1906, Springer-Verlag, Limassol, Cyprus, September 2000, pp. 19-35. 2. Authors

Nierstrasz, Oscar

159

A taxonomy of JavaScript redirection spam  

Science Journals Connector (OSTI)

Redirection spam presents a web page with false content to a crawler for indexing, but automatically redirects the browser to a different web page. Redirection is usually immediate (on page load) but may also be triggered by a timer or a harmless user ... Keywords: JavaScript, redirection spam, web search, web spam

Kumar Chellapilla; Alexey Maykov

2007-05-01T23:59:59.000Z

160

U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site 7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks December 22, 2011 - 8:15am Addthis PROBLEM: WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks PLATFORM: WebSVN 2.3.0 and prior versions ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1026438 WebSVN version update WebSVN News IMPACT ASSESSMENT: Medium Discussion: The getLog() function does not properly filter HTML code from user-supplied

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

162

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

163

Information Bridge: DOE Scientific and Technical Information - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code <script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('56afd67a-ded2-4f6b-9875-d68ac6a9dd1e');Get the Information Bridge widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)

164

The AcroWeb script collection Robert Marik  

E-Print Network (OSTI)

The AcroWeb script collection Robert Mar´ik October 25, 2007 1 Introduction 1.1 What is AcroWeb, for example). For more details about AcroTEX see http://www.acrotex.net. The AcroWeb bundle is a collection by pdfLATEX and sent to the user's www browser. Roughly speaking, AcroWeb is an interface to build Acro

Read, Charles

165

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

166

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

167

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload...  

Office of Environmental Management (EM)

The vulnerability is caused due to the sitesallmodulesdragdropgalleryupload.php script improperly validating uploaded files, which can be exploited to execute...

168

Harmonizing Above Code Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Harmonizing "Above Code" Harmonizing "Above Code" Codes Doug Lewin Executive Director, SPEER 6 Regional Energy Efficiency Organizations SPEER Members Texas grid facing an energy crisis * No new generation coming online * Old, inefficient coal-fired plants going offline * ERCOT CEO Trip Doggett said "We are very concerned about the significant drop in the reserve margin...we will be very tight on capacity next summer and have a repeat of this year's emergency procedures and conservation appeals." Higher codes needed to relieve pressure Building Codes are forcing change * 2012 IECC 30% higher than 2006 IECC * IRC, the "weaker code," will mirror IECC in 2012 * City governments advancing local codes with

169

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

170

Scheduling algorithms for arbitrary communication networks  

E-Print Network (OSTI)

We consider the problem of designing scheduling schemes for networks with arbitrary topology and scheduling constraints. We address the optimality of scheduling schemes for packet networks in terms of throughput, delay and ...

Jagabathula, Srikanth

2008-01-01T23:59:59.000Z

171

Worldline Green Functions for Arbitrary Feynman Diagrams  

E-Print Network (OSTI)

We propose a general method to obtain the scalar worldline Green function on an arbitrary 1D topological space, with which the first-quantized method of evaluating 1-loop Feynman diagrams can be generalized to calculate arbitrary ones. The electric analog of the worldline Green function problem is found and a compact expression for the worldline Green function is given, which has similar structure to the 2D bosonic Green function of the closed bosonic string.

Peng Dai; Warren Siegel

2006-08-09T23:59:59.000Z

172

COMPUTER-SUPPORTED COLLABORATIVE INQUIRY LEARNING IN DIFFERENTLY STRUCTURED CLASSROOM SCRIPTS: EFFECTS ON HELP-  

E-Print Network (OSTI)

: EFFECTS ON HELP- SEEKING PROCESSES AND LEARNING OUTCOMES This is a post-print of an article submitted). Computer-supported collaborative inquiry learning and classroom scripts: Effects on help-seeking processes-Supported Collaborative Inquiry Learning in Differently Structured Classroom Scripts: Effects on Help-Seeking Processes

Paris-Sud XI, Université de

173

SCRIPTING BEHAVIOUR TOWARDS A NEW LANGUAGE FOR MAKING NPCS ACT INTELLIGENTLY  

E-Print Network (OSTI)

, a protected "sandbox" environment within the game engine, for the scripts to operate in. The scripts are used to create the game and its environment without being able to adversely affect the game engine itself game environment, one of the main areas in which games allow modifications of this kind

Davies, Christopher

174

Writing World-Wide Web CGI scripts in the REXX language  

SciTech Connect

This talk is aimed at people who have experience with REXX and are interested in using it to write WWW CGI scripts. As part of this, the author describes several functions that are available in a library of REXX functions that simplify writing WWW CGI scripts. This library is freely available at //www.slac.standard.edu/slac/www/tool/cgi-rexx/.

Cottrell, R.L.A.

1996-03-01T23:59:59.000Z

175

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

176

V-028: Splunk Multiple Cross-Site Scripting and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Multiple Cross-Site Scripting and Denial of Service 8: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 - 2:00am Addthis PROBLEM: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities PLATFORM: Splunk versions 4.3.5 and 5.0 ABSTRACT: Splunk is prone to multiple vulnerabilities REFERENCE LINKS: SecurityTracker Alert ID: 1027785 SecurityTracker Alert ID: 1027784 Bugtraq ID: 56581 Secunia Advisory SA51337 Secunia Advisory SA51351 Splunk Vulnerability Descriptions IMPACT ASSESSMENT: Medium DISCUSSION: Splunk is prone to multiple cross-site scripting vulnerabilities and a denial-of-service vulnerability because it fails to properly handle user-supplied input. An attacker may leverage these issues to cause denial-of-service conditions

177

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: McAfee Web Gateway Web Access Cross Site Scripting 0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis PROBLEM: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability. PLATFORM: The vulnerability is reported in versions prior to 7.1.5.2. ABSTRACT: Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI. reference LINKS: McAfee Web Gateway Release Notes Bugtraq ID: 50341 Secunia Advisory: SA46570 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in McAfee Web Gateway, which can be

178

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code  

E-Print Network (OSTI)

to reject the submission of widgets that do not meet the site's security policies. To show the practicality

Livshits, Ben

179

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HTML is displayed. Impact: System access from remote Solution: The vendor has issued a patch. Addthis Related Articles U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets...

180

Multichannel Audio Coding for Multimedia Services in Intelligent Environments  

E-Print Network (OSTI)

5 Multichannel Audio Coding for Multimedia Services in Intelligent Environments Athanasios Summary. Audio is an integral component of multimedia services in intelligent environments. Use of multiple channels in audio capturing and rendering offers the advantage of recreating arbitrary acoustic

Tsakalides, Panagiotis

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

"Dimension theory of arbitrary modules over 2  

E-Print Network (OSTI)

finite von Neumann algebras and L -Betti numbers I: Foundations to define L2-Betti n* *umbers for arbitrary topological spaces with an action of a discrete group* *n amenable group that the p-th L2-Betti number depends only on the C -module given * *by

Lück, Wolfgang

182

Data Coding  

Science Journals Connector (OSTI)

Data coding is the classification of data and assignment of a representation for that data, or the assignment of a specific code...

2008-01-01T23:59:59.000Z

183

V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM TRIRIGA Application Platform Multiple Cross-Site 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are reported in versions 2.1, 2.5, 2.6, and 2.7. REFERENCE LINKS: Secunia Advisory SA54641 CVE-2013-4003 IBM Security Bulletin IMPACT ASSESSMENT: Low DISCUSSION: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks.

184

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: PHPlist Input Validation Flaws Permit Cross-Site Scripting 5: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks June 20, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. PLATFORM: Version(s): prior to 2.10.18 ABSTRACT: The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. REFERENCE LINKS: Vendor Advisory Security Tracker ID 1027181 CVE-2012-2740, CVE-2012-2741

185

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

186

How the Arts Help Children to Create Healthy Social Scripts: Exploring the Perceptions of Elementary Teachers  

E-Print Network (OSTI)

How the Arts Help Children to Create Healthy Social Scripts:drama activities in particular—help children to develop anhuman inter- actions may help children learn healthy social

Brouillette, Liane

2009-01-01T23:59:59.000Z

187

Tentamen Programmeren in JavaScript Vrijdag 2 november 2001, 9.3012.30 uur  

E-Print Network (OSTI)

de functie van a. c. Schrijf een JavaScript-functie hoeveel (A,i) die de "gewone" getalswaarde. Leg deze be- grippen aan de hand van een klein voorbeeld duidelijk uit. b. Een zeker Java

Kosters, Walter

188

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

189

Similarity of Names Across Scripts: Edit Distance Using Learned Costs of N-Grams  

Science Journals Connector (OSTI)

Any cross-language processing application has to first tackle the problem of transliteration when facing a language using another script. The first solution consists of using existing transliteration tools, bu...

Bruno Pouliquen

2008-01-01T23:59:59.000Z

190

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

191

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

192

Corrected Analytical Solution of the Generalized Woods-Saxon Potential for Arbitrary $\\ell$ States  

E-Print Network (OSTI)

The bound state solution of the radial Schr\\"{o}dinger equation with the generalized Woods-Saxon potential is carefully examined by using the Pekeris approximation for arbitrary $\\ell$ states. The energy eigenvalues and the corresponding eigenfunctions are analytically obtained for different $n$ and $\\ell$ quantum numbers. The obtained closed forms are applied to calculate the single particle energy levels of neutron orbiting around $^{56}$Fe nucleus in order to check consistency between the analytical and Gamow code results. The analytical results are in good agreement with the results obtained by Gamow code for $\\ell=0$.

Bayrak, O

2015-01-01T23:59:59.000Z

193

Transverse Ising model with arbitrary spin  

Science Journals Connector (OSTI)

An effective-field theory that has recently been used for studying higher-spin Ising models is herein extended to the transverse Ising model with an arbitrary spin S. The general formulation for evaluating the transition line in the ?-T space and relevant statistical-mechanical quantities is derived. Numerical results are performed and analyzed for the particular cases S=3/2 and S=2.

T. Kaneyoshi; M. Jaš?ur; I. P. Fittipaldi

1993-07-01T23:59:59.000Z

194

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

195

Coding theorems for hybrid channels. II  

E-Print Network (OSTI)

The present work continues investigation of the capacities of measurement (quantum-classical) channels in the most general setting, initiated in~\\cite{HCT}. The proof of coding theorems is given for the classical capacity and entanglement-assisted classical capacity of the measurement channel with arbitrary output alphabet, without assuming that the channel is given by a bounded operator-valued density.

A. A. Kuznetsova; A. S. Holevo

2014-08-14T23:59:59.000Z

196

Code design based on metric-spectrum and applications  

E-Print Network (OSTI)

We introduced nested search methods to design (n, k) block codes for arbitrary channels by optimizing an appropriate metric spectrum in each iteration. For a given k, the methods start with a good high rate code, say k/(k + 1), and successively...

Papadimitriou, Panayiotis D.

2005-02-17T23:59:59.000Z

197

Please use "gres" settings in your batch scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Please use "gres" settings in your batch scripts Please use "gres" settings in your batch scripts Please use "gres" settings in your batch scripts September 4, 2012 by Helen He (0 Comments) We would like to encourage you to use the generic resources ("gres") setting for various file systems that your batch jobs use. This feature is currently available on Hopper and Carver. The advantage of this setting is that your jobs won't start (thus won't fail) during a scheduled file system maintenance. The syntax for the "gres" setting is: #PBS -l gres=filesystem1[%filesystem2%filesystem3...] (new recommendation) or #PBS -l gres=filesystem1:1[%filesystem2:1%filesystem3:1...] (as announced before) Note that the "%" character means "and". Therefore, if multiple file

198

Arbitrary manipulation of nonlinear optical processes  

E-Print Network (OSTI)

Nonlinear optical processes are governed by the relative-phase relationships among the relevant electromagnetic fields in these processes. In this Letter, we describe the physics of arbitrary manipulation of nonlinear optical processes (AMNOP) by artificial control of relative phases. As a typical example, we show freely designable optical-frequency conversions to extreme spectral regions, mid-infrared and vacuum-ultraviolet, with near-unity quantum efficiencies. Furthermore, we show that such optical-frequency conversions can be realized by using a surprisingly simple technology where transparent plates are placed in a nonlinear optical medium and their positions and thicknesses are adjusted precisely. In a numerical experiment assuming practically applicable parameters in detail, we demonstrate a single-frequency tunable laser that covers the whole vacuum-ultraviolet spectral range of 120 to 200 nm.

Jian Zheng; Masayuki Katsuragawa

2014-06-16T23:59:59.000Z

199

Code constructions and code families for nonbinary quantum stabilizer code  

E-Print Network (OSTI)

Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer codes have received much...

Ketkar, Avanti Ulhas

2005-11-01T23:59:59.000Z

200

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations  

E-Print Network (OSTI)

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations Angel Lozano gives the power allocation policy, referred to as mercury/waterfilling, that maximizes the sum mutual

Verdú, Sergio

202

JavaScript: Visual QuickStart Guide, 9th edition  

Science Journals Connector (OSTI)

With the proliferation of new, standards-compliant browsers, virtually all users and Web sites can successfully use the latest JavaScript techniques. This task-based, visual-reference guide has been fully revised and uses step-by-step instructions and ...

Dori Smith, Tom Negrino

2014-08-01T23:59:59.000Z

203

PHP Script Documentation for .include Pages in CODA Repositories To be able to make this work for you, your web server must be php-enabled. Please contact  

E-Print Network (OSTI)

PHP Script Documentation for .include Pages in CODA Repositories To be able to make this work for you, your web server must be php-enabled. Please contact your web administrator about this. This PDF of the script preceding the ".include". To be able to make this work for you, your browser must have PHP scripts

Koch, Christof

204

COLLABORATION SCRIPTS A CONCEPTUAL ANALYSIS This is a post-print of an article submitted for consideration in the Educational Psychology  

E-Print Network (OSTI)

COLLABORATION SCRIPTS ­ A CONCEPTUAL ANALYSIS This is a post-print of an article submitted-006-9007-2 } Please refer this manuscript as: Kollar, I., Fischer, F., & Hesse, F. W. (2006). Collaboration scripts manuscript, published in "Educational Psychology Review 18(2) (2006) 159-185" #12;Collaboration Scripts 2

Paris-Sud XI, Université de

205

Department Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Department Codes Department Codes Code Organization BO Bioscience Department BU Business Development & Analysis Office DI Business Operations NC Center for Functional Nanomaterials CO Chemistry Department AD Collider Accelerator Department PA Community, Education, Government and Public Affairs CC Computational Science Center PM Condensed Matter Physics and Materials Science Department CI Counterintelligence AE Department of Energy DC Directorate - Basic Energy Sciences DK Directorate - CEGPA DE Directorate - Deputy Director for Operations DO Directorate - Director's Office DH Directorate - Environment, Safety and Health DF Directorate - Facilities and Operations DA Directorate - Global and Regional Solutions DB Directorate - Nuclear and Particle Physics DL Directorate - Photon Sciences

206

Quantum Szilard engines with arbitrary spin  

E-Print Network (OSTI)

The quantum Szilard engine (QSZE) is a conceptual quantum engine for understanding the fundamental physics of quantum thermodynamics and information physics. We generalize the QSZE to an arbitrary spin case, i.e., a spin QSZE (SQSZE), and we systematically study the basic physical properties of both fermion and boson SQSZEs in a low-temperature approximation. We give the analytic formulation of the total work. For the fermion SQSZE, the work might be absorbed from the environment, and the change rate of the work with temperature exhibits periodicity and even-odd oscillation, which is a generalization of a spinless QSZE. It is interesting that the average absorbed work oscillates regularly and periodically in a large-number limit, which implies that the average absorbed work in a fermion SQSZE is neither an intensive quantity nor an extensive quantity. The phase diagrams of both fermion and boson SQSZEs give the SQSZE doing positive or negative work in the parameter space of the temperature and the particle number of the system, but they have different behaviors because the spin degrees of the fermion and the boson play different roles in their configuration states and corresponding statistical properties. The critical temperature of phase transition depends sensitively on the particle number. By using Landauer's erasure principle, we give the erasure work in a thermodynamic cycle, and we define an efficiency (we refer to it as information-work efficiency) to measure the engine's ability of utilizing information to extract work. We also give the conditions under which the maximum extracted work and highest information-work efficiencies for fermion and boson SQSZEs can be achieved.

Zekun Zhuang; Shi-Dong Liang

2015-02-02T23:59:59.000Z

207

PostScript versions of Dynkin diagrams This note describes a package of encapsulated PostScript figures of Dynkin diagrams. They were first  

E-Print Network (OSTI)

the plain Dynkin diagrams for the finite root systems: File Diagram an.eps bn.eps cn.eps dn.eps e6.eps e7.eps e8.eps f4.eps g2.eps Here are the corresponding affine diagrams: File Diagram anz.eps bnz.eps cnz.eps #12;PostScript versions of Dynkin diagrams 2 dnz.eps e6z.eps e7z.eps e8z.eps f4z.eps g2z.eps Here

Casselman, William

208

High Performance “Reach” Codes  

E-Print Network (OSTI)

Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

Edelson, J.

2011-01-01T23:59:59.000Z

209

Coded Data  

Science Journals Connector (OSTI)

An individual is given a number and all that individual's data is encoded under that number so that the individual cannot be recognized. Data are then collated, analyzed and reported on ... the code to the pers...

2008-01-01T23:59:59.000Z

210

Simplification of Arbitrary Polyhedral Meshes Shaun D. Ramsey  

E-Print Network (OSTI)

email: bertram@informatik.uni-kl.de Charles Hansen University of Utah Salt Lake City, UT, USA emailSimplification of Arbitrary Polyhedral Meshes Shaun D. Ramsey University of Utah Salt Lake City, UT

Hering-Bertram, Martin

211

SCALING RANDOM WALKS ON ARBITRARY SETS Simon C. Harris  

E-Print Network (OSTI)

SCALING RANDOM WALKS ON ARBITRARY SETS by Simon C. Harris , Robin Sibson and David Williams School deterministic sets I. In the 1-dimensional case discussed here and in the following paper by Harris, much

Harris, Simon Colin

212

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user can redirect users to arbitrary sites. Solution: The vendor has issued a fix. A patch matrix is available in the vendor's advisory. Microsoft Security Bulletin MS11-100...

213

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

214

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

215

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site...  

Energy Savers (EERE)

IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be...

216

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

217

Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices  

Science Journals Connector (OSTI)

......Although this attack can be really dangerous for the sensors vitality, it limits...serious threat [31], if not the most dangerous one, since the attacker can compromise...Sweden. [11] SHIMMER (2008). Sensing Health With Intelligence, Mod- ularity, Mobility......

Thanassis Giannetsos; Tassos Dimitriou; Ioannis Krontiris; Neeli R. Prasad

2010-12-01T23:59:59.000Z

218

Nested linear codes achieve Marton's inner bound for general broadcast channels  

E-Print Network (OSTI)

Nested linear codes achieve Marton's inner bound for general broadcast channels Arun Padakandla the point-to-point capacity of an arbitrary discrete memoryless channel. In this paper, we study nested with and without channel state information at the transmitter. Furthermore, we prove nested linear codes achieve

Pradhan, Sandeep

219

Codes and Standards Activities  

Energy.gov (U.S. Department of Energy (DOE))

The Fuel Cell Technologies Office works with code development organizations, code officials, industry experts, and national laboratory scientists to draft new model codes and equipment standards...

220

Green Building Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Green Building Codes Green Building Codes Green building codes go beyond minimum code requirements, raising the bar for energy efficiency. They can serve as a proving ground for future standards, and incorporate elements beyond the scope of the model energy codes, such as water and resource efficiency. As regional and national green building codes and programs become more available, they provide jurisdictions with another tool for guiding construction and development in an overall less impactful, more sustainable manner. ICC ASHRAE Beyond Codes International Green Construction Code (IgCC) The International Code Council's (ICC's) International Green Construction code (IgCC) is an overlay code, meaning it is written in a manner to be used with all the other ICC codes. The IgCC contains provisions for site

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Traveling wave current drive theory for an arbitrary m-polar configuration  

SciTech Connect

An extension of the formalism employed to describe current drive in magnetized plasmas by means of traveling magnetic fields (or double-helix configuration) is presented. In all previous theoretical studies, only driving fields with dipolar topology have been employed and the figure of merit of the current drive mechanism has never been analyzed in terms of the dissipation in the power feeding circuit. In this paper, we show how to express the model equations in terms of the current amplitude in the coils, for an arbitrary number of equally spaced coils wound around the plasma column. We present a brief review of the existing theory and a theoretical formulation, valid for an arbitrary m-polar helical symmetry, which removes the above mentioned complications and limitations. In the limit of straight coils, our magnetic field expression agrees exactly with well-established results of the literature for rotating magnetic field current drive. Finally, we present initial numerical results from a recently developed code which consistently compares the steady driven nonlinear Hall currents and steady fields, corresponding to different configurations in terms of the Ohmic dissipation in the helical coils and discuss future perspectives.

Duarte, V. N. [Instituto de Fisica, Universidade de Sao Paulo, 05508-090 Sao Paulo-SP (Brazil); Clemente, R. A. [Instituto de Fisica Gleb Wataghin, Universidade Estadual de Campinas, 13083-859 Campinas-SP (Brazil); Farengo, R. [Centro Atomico Bariloche and Instituto Balseiro, S. C. de Bariloche (8400), RN (Argentina)

2013-03-15T23:59:59.000Z

222

Teleportation of arbitrary $n$-qudit state with multipartite entanglement  

E-Print Network (OSTI)

We propose a protocol ${\\cal D}_n$ for faithfully teleporting an arbitrary $n$-qudit state with the tensor product state (TPS) of $n$ generalized Bell states (GBSs) as the quantum channel. We also put forward explicit protocol ${\\cal D}'_n$ and ${\\cal D}''_n$ for faithfully teleporting an arbitrary $n$-qudit state with two classes of $2n$-qudit GESs as the quantum channel, where the GESs are a kind of genuine entangled states we construct and can not be reducible to the TPS of $n$ GBSs.

Zhan-jun Zhang

2006-11-30T23:59:59.000Z

223

Hypersonic Arbitrary-Body Aerodynamics (HABA) for conceptual design  

SciTech Connect

The Hypersonic Arbitrary-Body Aerodynamics (HABA) computer program predicts static and dynamic aerodynamic derivatives at hypersonic speeds for any vehicle geometry. It is intended to be used during conceptual design studies where fast computational speed is required. It uses the same geometry and hypersonic aerodynamic methods as the Mark IV Supersonic/Hypersonic Arbitrary-Body Program (SHABP) developed under sponsorship of the Air Force Flight Dynamics Laboratory; however, the input and output formats have been improved to make it easier to use. This program is available as part of the Department 9140 CAE software.

Salguero, D.E.

1990-03-15T23:59:59.000Z

224

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

225

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

226

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

227

Periodic Boundary Conditions in the ALEGRA Finite Element Code  

SciTech Connect

This document describes the implementation of periodic boundary conditions in the ALEGRA finite element code. ALEGRA is an arbitrary Lagrangian-Eulerian multi-physics code with both explicit and implicit numerical algorithms. The periodic boundary implementation requires a consistent set of boundary input sets which are used to describe virtual periodic regions. The implementation is noninvasive to the majority of the ALEGRA coding and is based on the distributed memory parallel framework in ALEGRA. The technique involves extending the ghost element concept for interprocessor boundary communications in ALEGRA to additionally support on- and off-processor periodic boundary communications. The user interface, algorithmic details and sample computations are given.

AIDUN,JOHN B.; ROBINSON,ALLEN C.; WEATHERBY,JOE R.

1999-11-01T23:59:59.000Z

228

Quantum Mechanics of Successive Measurements with Arbitrary Meter Coupling  

E-Print Network (OSTI)

We study successive measurements of two observables using von Neumann's measurement model. The two-pointer correlation for arbitrary coupling strength allows retrieving the initial system state. We recover Luders rule, the Wigner formula and the Kirkwood-Dirac distribution in the appropriate limits of the coupling strength.

Lars M. Johansen; Pier A. Mello

2009-01-21T23:59:59.000Z

229

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network (OSTI)

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

230

Introduction Properties of Expander Codes  

E-Print Network (OSTI)

of Expander Codes Our Results Conclusions Background Basic Definitions LDPC Codes Expander Codes Turbo CodesIntroduction Properties of Expander Codes Our Results Conclusions Expander Codes: Constructions, Haifa 32000, Israel. Vitaly Skachek Expander Codes: Constructions and Bounds #12;Introduction Properties

Skachek, Vitaly

231

DOE Code:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

we1rbox installatiOn we1rbox installatiOn ____:....;...=.~;;....:..;=-+- DOE Code: - - !- Project Lead: Wes R1esland NEPA COMPLIANCE SURVEY J 3-24-10 1 Date: Project Information 1. Project Overview What are tne enwonmental mpacts? Contractor~~ _ _ _ _ ] 11 The purpose of this project is to prepare a pad for a 90 ton crane to get 1nto positiOn and ng up so we can 1 set our new weir box into position We will widen the existing road around 20 feet at the north end and taper our fill to about5 feet at the south end for a total of about 200 feeL and budd a near level pad for them tong up the crane on We will use the d1rt from the hill irnrnedJateiy north of the work to oe done 2. 3 4 What*s the legal location? What IS the durabon of the prOJed?

232

IFP --Oil & Gas Science and Technology --(Script : 1er specimen) --1 --Oil & Gas Science and Technology --rev. IFP, Vol. xx (2009), No X, pp. 00-00  

E-Print Network (OSTI)

IFP -- Oil & Gas Science and Technology -- (Script : 1er specimen) -- 1 -- Oil & Gas Science2010 Author manuscript, published in "Oil & Gas Science and Technology - Rev. IFP, 65, 3 (2010) 435-444" DOI : 10.2516/ogst/2010007 #12;IFP -- Oil & Gas Science and Technology -- (Script : 1er specimen) -- 2

Boyer, Edmond

233

Usage Codes Observer code Vessel code Trip ID  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Observer code Vessel code Trip ID Permit holder name/address Permit / N MMSI No. Y / N Present? Usage Water capacity (m3): Fuel capacity: m3 / tonnes Other: Other: Kw all that apply & note types of materials for each) Capacity: Usage Incinerator: Net mensuration Y / N

234

Usage Codes Observer code Vessel code Trip ID  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Sonar Observer code Vessel code Trip ID Additional Information KHz: RPM / Other _______________Global Registry ID:MMSI No. Permit expiration (dd-mm- yy): Y / N Present? Usage contact Diver / dive equipment Usage Manufacturer Hull mounted / towed Catch Y / N Other: Y / N Y / NOther

235

Utilising a collaborative macro-script to enhance student engagement: A mixed method study in a 3D virtual environment  

Science Journals Connector (OSTI)

This study examines the effect of using an online 3D virtual environment in teaching Mathematics in Primary Education. In particular, it explores the extent to which student engagement - behavioral, affective and cognitive - is fostered by such tools ... Keywords: 3D virtual environments, K-12 education, Online collaborative learning, Script, Student engagement

Hara Bouta; Symeon Retalis; Fotini Paraskeva

2012-01-01T23:59:59.000Z

236

Analytically solvable geometric network growth model with arbitrary degree distribution  

E-Print Network (OSTI)

We construct a class of network growth models capable of producing arbitrary degree distributions. The conditions necessary for generating the desired degree distribution can be derived analytically. In this model, a network is generated as a result of local interactions among agents residing on a metric space. Specifically, we study the case of random-walking agents who form bonds when they meet at designated locations we refer to as "rendezvous points." The spatial distribution of the rendezvous points determines key characteristics of the network such as the degree distribution. For any arbitrary (monotonic) degree distribution, we are able to analytically solve for the required rendezvous point distribution. Certain features of the model including high clustering coefficients suggest that it may be a suitable candidate for modeling biological and urban networks.

Dianati, Navid

2015-01-01T23:59:59.000Z

237

Arbitrary mass Majorana neutrinos in neutrinoless double beta decay  

Science Journals Connector (OSTI)

We revisit the mechanism of neutrinoless double beta (0???) decay mediated by the exchange with the heavy Majorana neutrino N of arbitrary mass mN, slightly mixed ?UeN with the electron neutrino ?e. By assuming the dominance of this mechanism, we update the well-known 0???-decay exclusion plot in the mN?UeN plane taking into account recent progress in the calculation of nuclear matrix elements within quasiparticle random phase approximation and improved experimental bounds on the 0???-decay half-life of Ge76 and Xe136. We also consider the known formula approximating the mN dependence of the 0???-decay nuclear matrix element in a simple explicit form. We analyze its accuracy and specify the corresponding parameters, allowing one to easily calculate the 0???-decay half-life for arbitrary mN for all the experimentally interesting isotopes without resorting to real nuclear structure calculations.

Amand Faessler; Marcela González; Sergey Kovalenko; Fedor Šimkovic

2014-11-21T23:59:59.000Z

238

Arbitrary mass Majorana neutrinos in neutrinoless double beta decay  

E-Print Network (OSTI)

We revisit the mechanism of neutrinoless double beta (NLDBD) decay mediated by the exchange with the heavy Majorana neutrino N of arbitrary mass mN, slightly mixed with the electron neutrino. By assuming the dominance of this mechanism, we update the well-known NLDBD-decay exclusion plot in the mass-mixing angle plane taking into account recent progress in the calculation of nuclear matrix elements within quasiparticle random phase approximation and improved experimental bounds on the NLDBD-decay half-life of Ge-76 and Xe-136. We also consider the known formula approximating the mN dependence of the NLDBD-decay nuclear matrix element in a simple explicit form. We analyze its accuracy and specify the corresponding parameters, allowing one to easily calculate the NLDBD-decay half-life for arbitrary mN for all the experimentally interesting isotopes without resorting to real nuclear structure calculations.

Amand Faessler; Marcela Gonzalez; Sergey Kovalenko; Fedor Simkovic

2014-08-26T23:59:59.000Z

239

ON THE ONE-DIMENSIONAL ISING MODEL WITH ARBITRARY SPIN (*)  

E-Print Network (OSTI)

ON THE ONE-DIMENSIONAL ISING MODEL WITH ARBITRARY SPIN (*) R. L. BOWDEN and D. M. KAPLAN Department classique de spin développé dans un autre article, une nouvelle méthode pour résoudre un modèle d'Ising de corréla- tion de paires et la susceptibilité pour champ nul pour le modèle d'Ising unidimensionnel

Boyer, Edmond

240

Security of quantum key distribution with arbitrary individual imperfections  

SciTech Connect

We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses.

Maroey, Oystein; Lydersen, Lars; Skaar, Johannes [Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim, Norway and University Graduate Center, NO-2027 Kjeller (Norway)

2010-09-15T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Dynamical density functional theory for colloidal particles with arbitrary shape  

E-Print Network (OSTI)

Starting from the many-particle Smoluchowski equation, we derive dynamical density functional theory for Brownian particles with an arbitrary shape. Both passive and active (self-propelled) particles are considered. The resulting theory constitutes a microscopic framework to explore the collective dynamical behavior of biaxial particles in nonequilibrium. For spherical and uniaxial particles, earlier derived dynamical density functional theories are recovered as special cases. Our study is motivated by recent experimental progress in preparing colloidal particles with many different biaxial shapes.

Raphael Wittkowski; Hartmut Löwen

2011-06-12T23:59:59.000Z

242

A compact, multichannel, and low noise arbitrary waveform generator  

SciTech Connect

A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

Govorkov, S. [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada)] [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada); Ivanov, B. I. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany) [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany); Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 (Russian Federation); Il'ichev, E.; Meyer, H.-G. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)] [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)

2014-05-15T23:59:59.000Z

243

Codes 101 | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101 Codes 101 This course covers basic knowledge of energy codes and standards, the development processes of each, historical timelines, adoption, implementation, and enforcement of energy codes and standards, and voluntary energy efficiency programs. Most sections have links that provide additional details on that section's topic as well as additional resources for more information. Begin Learning! Estimated Length: 1-2 hours CEUs Offered: 1.0 AIA/CES LU (HSW); .10 CEUs towards ICC renewal certification. Course Type: Self-paced, online Building Type: Commercial Residential Focus: Adoption Code Development Compliance Code Version: ASHRAE Standard 90.1 International Energy Conservation Code (IECC) Model Energy Code (MEC) Target Audience: Advocate Architect/Designer Builder

244

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability...

245

Automated searching for quantum subsystem codes  

E-Print Network (OSTI)

Quantum error correction allows for faulty quantum systems to behave in an effectively error free manner. One important class of techniques for quantum error correction is the class of quantum subsystem codes, which are relevant both to active quantum error correcting schemes as well as to the design of self-correcting quantum memories. Previous approaches for investigating these codes have focused on applying theoretical analysis to look for interesting codes and to investigate their properties. In this paper we present an alternative approach that uses computational analysis to accomplish the same goals. Specifically, we present an algorithm that computes the optimal quantum subsystem code that can be implemented given an arbitrary set of measurement operators that are tensor products of Pauli operators. We then demonstrate the utility of this algorithm by performing a systematic investigation of the quantum subsystem codes that exist in the setting where the interactions are limited to 2-body interactions between neighbors on lattices derived from the convex uniform tilings of the plane.

Gregory M. Crosswhite; Dave Bacon

2010-09-11T23:59:59.000Z

246

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

691 - 27700 of 31,917 results. 691 - 27700 of 31,917 results. Article T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). http://energy.gov/cio/articles/t-590-hp-diagnostics-input-validation-hole-permits-cross-site-scripting-attacks Article T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. http://energy.gov/cio/articles/t-539-adobe-acrobat-reader-and-flash-player-arbitrary-code-execution-vulnerability

247

Arbitrary Nesting of Spatial Computations Antoine Spicher, Olivier Michel, Jean-Louis Giavitto  

E-Print Network (OSTI)

Arbitrary Nesting of Spatial Computations Antoine Spicher, Olivier Michel, Jean-Louis Giavitto LACL-louis.giavitto@ircam.fr Abstract--Modern programming languages allow the definition and the use of arbitrary nested data structures but this is not generally considered in unconventional programming models. In this paper, we present arbitrary nesting

Paris-Sud XI, Université de

248

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

249

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

250

Ising-like models on arbitrary graphs : the Hadamard way  

E-Print Network (OSTI)

We propose a generic framework to analyse classical Ising-like models defined on arbitrary graphs. The energy spectrum is shown to be the Hadamard transform of a suitably defined vector associated with the graph. This allows a quick computation of this spectrum owing to the existence of a fast Hadamard transform algorithm (used for instance in image ccompression processes). We than go further and apply this formalism to regular graphs, such as hypercubic graphs, for which a simple recurrence relation for the spectrum is given, which speeds up even more its determination. First attempts to analyse partition functions and transfer matrices are also discussed.

Mosseri, Rémy

2014-01-01T23:59:59.000Z

251

Quantum lithography with classical light: Generation of arbitrary patterns  

E-Print Network (OSTI)

Quantum lithography with classical light: Generation of arbitrary patterns Qingqing Sun,1,2 Philip R. Hemmer,3 and M. Suhail Zubairy1,2 1Department of Physics and Institute of Quantum Studies, Texas A&M University, College Station, Texas 77843..., Phys. Rev. Lett. 85, 2733 #1;2000#2;. #3;7#4; S. Kawata, H.-B. Sun, T. Tanaka, and K. Takada, Nature #1;Lon- don#2; 412, 697 #1;2001#2;. #3;8#4; M. D?Angelo, M. V. Chekhova, and Y. Shih, Phys. Rev. Lett. 87, 013602 #1;2001#2;. #3;9#4; A. Pe?er, B...

Sun, Qingqing; Hemmer, Philip R.; Zubairy, M. Suhail

2007-01-01T23:59:59.000Z

252

Quantum teleportation of an arbitrary superposition of atomic Dicke states  

E-Print Network (OSTI)

, USA 2Departments of Chemistry and Aerospace & Mechanical Engineering, Princeton University, New Jersey 08544, USA sReceived 20 December 2004; revised manuscript received 18 February 2005; published 9 June 2005d We propose a scheme for teleporting... insetd. States uccl and ubbl represent both atoms in the same state, and subcl+ ucbld /?2 is a state with one atom in state ubl and one in state ucl. The coeffi- cients C0 I , C1 I , and C2I are arbitrary and satisfy uC0I u2+ uC1I u2 + uC 2I u2...

Di, TG; Muthukrishnan, A.; Scully, Marlan O.; Zubairy, M. Suhail

2005-01-01T23:59:59.000Z

253

Numerical simulation of waveguides of arbitrary cross section.  

SciTech Connect

Finite difference equations are derived for the simulation of dielectric waveguides using an H{sub z}-E{sub z} formulation defined on a nonuniform triangular grid. The resulting equations may be solved as a banded eigenproblem for waveguide structures of arbitrary shape composed of regions of piecewise constant isotropic dielectric, and all transverse fields then computed from the solutions. Benchmark comparisons are presented for problems with analytic solutions, as well as a sample calculation of the propagation loss of a hollow Bragg fiber.

Hadley, G. Ronald

2003-09-01T23:59:59.000Z

254

Zero sound modes of dilute Fermi gases with arbitrary spin  

Science Journals Connector (OSTI)

Motivated by the recent success of optical trapping of alkali-metal bosons, we have studied the zero sound modes of dilute Fermi gases with arbitrary spin-f, which are spin-S excitations (0<~S<~2f). The dispersion of the mode (S) depends on a single Landau parameter F(S), which is related to the scattering lengths of the system through a simple formula. Measurement of (even a subset of) these modes in finite magnetic fields will enable one to determine all the interaction parameters of the system.

S.-K. Yip and Tin-Lun Ho

1999-06-01T23:59:59.000Z

255

VizScript: Visualizing Complex Interactions in Multi-Agent Systems Jing Jin and Rajiv T. Maheswaran and Romeo Sanchez and Pedro Szekely  

E-Print Network (OSTI)

for a complex multi- agent system with an order-of-magnitude less effort than was required in a Java, and charts that show the evo- lution of nominal variables. VizScript supports the ability to Copyright c 2007

Yorke-Smith, Neil

256

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 28280 of 31,917 results. 71 - 28280 of 31,917 results. Article T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. http://energy.gov/cio/articles/t-652-mozilla-thunderbird-bugs-let-remote-users-obtain-cookies-and-execute-arbitrary Article T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. http://energy.gov/cio/articles/t-546-microsoft-mhtml-input-validation-hole-may-permit-cross-site-scripting-attacks

257

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents (OSTI)

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

Grossman, M.W.; George, W.A.

1986-12-16T23:59:59.000Z

258

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents (OSTI)

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

Grossman, Mark W. (Belmont, MA); George, William A. (Rockport, MA)

1986-01-01T23:59:59.000Z

259

Multiple phase estimation for arbitrary pure states under white noise  

E-Print Network (OSTI)

In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

2014-09-08T23:59:59.000Z

260

Optimal control theory with arbitrary superpositions of waveforms  

E-Print Network (OSTI)

Standard optimal control methods perform optimization in the time domain. However, many experimental settings demand the expression of the control signal as a superposition of given waveforms. Since this type of constraint is not time-local, Optimal Control Theory cannot be used without modifications. Simplex methods, used as a substitute in this case, tend to be less efficient and less reliable than Optimal Control Theory. In this paper, we present an extension to Optimal Control Theory which allows gradient-based optimization for superpositions of arbitrary waveforms. Its key is the use of the Moore-Penrose pseudoinverse as an efficient means of transforming from a time-local to a waveform-based description. To illustrate this optimization technique, we study the parametrically driven harmonic oscillator as model system and reduce its energy, considering both Hamiltonian dynamics and open-system dynamics. We demonstrate the viability and efficiency of the method for these test cases.

Selina Meister; Jürgen T. Stockburger; Rebecca Schmidt; Joachim Ankerhold

2014-08-27T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Arbitrary two-qubit computation in 23 elementary gates  

SciTech Connect

We address the problem of constructing quantum circuits to implement an arbitrary two-qubit quantum computation. We pursue circuits without ancilla qubits and as small a number of elementary quantum gates as possible. Our lower bound for worst-case optimal two-qubit circuits calls for at least 17 gates: 15 one-qubit rotations and 2 controlled-NOT (CNOT) gates. We also constructively prove a worst-case upper bound of 23 elementary gates, of which at most four (CNOT gates) entail multiqubit interactions. Our analysis shows that synthesis algorithms suggested in previous work, although more general, entail larger quantum circuits than ours in the special case of two qubits. One such algorithm has a worst case of 61 gates, of which 18 may be CNOT gates.

Bullock, Stephen S.; Markov, Igor L. [Department of Mathematics, The University of Michigan, Ann Arbor, Michigan 48109-2122, USA (United States); Mathematical and Computational Sciences Division, National Institute of Standards and Technology, Gaithersburg, Maryland 20899-8910, USA (United States); Department of Electrical Engineering and Computer Science, The University of Michigan, 1301 Beal Avenue-EECS, Ann Arbor, Michigan 48109-2122, USA (United States)

2003-07-01T23:59:59.000Z

262

Dielectric function of a collisional plasma for arbitrary ionic charge  

Science Journals Connector (OSTI)

A simple model for the dielectric function of a completely ionized plasma with an arbitrary ionic charge that is valid for long-wavelength high-frequency perturbations is derived using an approximate solution of a linearized Fokker-Planck kinetic equation for electrons with a Landau collision integral. The model accounts for both the electron-ion collisions and the collisions of the subthermal (cold) electrons with thermal ones. The relative contribution of the latter collisions to the dielectric function is treated phenomenologically, introducing some parameter ? that is chosen in such a way as to get a well-known expression for stationary electric conductivity in the low-frequency region and fulfill the requirement of a vanishing contribution of electron-electron collisions in the high-frequency region. This procedure ensures the applicability of our model in a wide range of plasma parameters as well as the frequency of the electromagnetic radiation. Unlike the interpolation formula proposed earlier by Brantov et al. [Brantov et al., JETP 106, 983 (2008)], our model fulfills the Kramers-Kronig relations and permits a generalization for the cases of degenerate and strongly coupled plasmas. With this in mind, a generalization of the well-known Lee-More model [Y. T. Lee and R. M. More, Phys. Fluids 27, 1273 (1984)] for stationary conductivity and its extension to dynamical conductivity [O. F. Kostenko and N. E. Andreev, GSI Annual Report No. GSI-2008-2, 2008 (unpublished), p. 44] is proposed for the case of plasmas with arbitrary ionic charge.

H. B. Nersisyan, M. E. Veysman, N. E. Andreev, and H. H. Matevosyan

2014-03-06T23:59:59.000Z

263

Model Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

264

Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

265

Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

266

Coding AuthentiCity  

E-Print Network (OSTI)

This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

Mercier, Rachel Havens

2008-01-01T23:59:59.000Z

267

Introduction to Algebraic Codes  

E-Print Network (OSTI)

for health care. These self-correcting codes that occur in nature might be better than all of. our coding theory based on algebra or algebraic geometry. It is a myth

268

Sustainable Acquisition Coding System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents &...

269

E-Print Network 3.0 - arbitrary waveform generation Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

arbitrary waveform synthesizer with output voltage three times higher... of 4096 Josephson junctions. With this circuit it is now possible to synthesize ... Source: Benz,...

270

E-Print Network 3.0 - arbitrary control loop Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

5 > >> 1 Optimizing Nested Loops with Loop Distribution and Loop Fusion Department of Computer Science and Engineering Summary: . Mckinley. Loop distribution with arbitrary control...

271

E-Print Network 3.0 - arbitrary magnetic field Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

magnetic field Search Powered by Explorit Topic List Advanced Search Sample search results for: arbitrary magnetic field Page: << < 1 2 3 4 5 > >> 1 Progress In Electromagnetics...

272

GENII Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GENII Code GENII Code GENII is a second generation of environmental dosimetry computer code compiled in the Hanford Environmental Dosimetry System (Generation II). GENII provides a...

273

LiTrack: A Fast Longitudinal Phase Space Tracking Code with Graphical User Interface  

SciTech Connect

Linac-based light sources and linear colliders typically apply longitudinal phase space manipulations in their design, including electron bunch compression and wakefield-induced energy spread control. Several computer codes handle such issues, but most also require detailed information on the transverse focusing lattice. In fact, in most linear accelerators, the transverse distributions do not significantly affect the longitudinal, and can be ignored initially. This allows the use of a fast 2D code to study longitudinal aspects without time-consuming considerations of the transverse focusing. LiTrack is based on a 15-year old code (same name) originally written by one of us (KB), which is now a Matlab [1] code with additional features, such as graphical user interface, prompt output plotting, and functional call within a script. This single-bunch tracking code includes RF acceleration, bunch compression to 3rd order, geometric and resistive short-range wakefields, aperture limits, synchrotron radiation, and flexible output plotting. The code was used to design both the LCLS [2] and the SPPS [3] projects at SLAC and typically runs 10{sub 5} particles in < 1 minute. We describe the features, show some examples, and provide free access to the code.

Bane, K.L.F.

2005-03-24T23:59:59.000Z

274

Software test-code engineering: A systematic mapping  

Science Journals Connector (OSTI)

AbstractContext As a result of automated software testing, large amounts of software test code (script) are usually developed by software teams. Automated test scripts provide many benefits, such as repeatable, predictable, and efficient test executions. However, just like any software development activity, development of test scripts is tedious and error prone. We refer, in this study, to all activities that should be conducted during the entire lifecycle of test-code as Software Test-Code Engineering (STCE). Objective As the STCE research area has matured and the number of related studies has increased, it is important to systematically categorize the current state-of-the-art and to provide an overview of the trends in this field. Such summarized and categorized results provide many benefits to the broader community. For example, they are valuable resources for new researchers (e.g., PhD students) aiming to conduct additional secondary studies. Method In this work, we systematically classify the body of knowledge related to STCE through a systematic mapping (SM) study. As part of this study, we pose a set of research questions, define selection and exclusion criteria, and systematically develop and refine a systematic map. Results Our study pool includes a set of 60 studies published in the area of STCE between 1999 and 2012. Our mapping data is available through an online publicly-accessible repository. We derive the trends for various aspects of STCE. Among our results are the following: (1) There is an acceptable mix of papers with respect to different contribution facets in the field of STCE and the top two leading facets are tool (68%) and method (65%). The studies that presented new processes, however, had a low rate (3%), which denotes the need for more process-related studies in this area. (2) Results of investigation about research facet of studies and comparing our result to other SM studies shows that, similar to other fields in software engineering, STCE is moving towards more rigorous validation approaches. (3) A good mixture of STCE activities has been presented in the primary studies. Among them, the two leading activities are quality assessment and co-maintenance of test-code with production code. The highest growth rate for co-maintenance activities in recent years shows the importance and challenges involved in this activity. (4) There are two main categories of quality assessment activity: detection of test smells and oracle assertion adequacy. (5) \\{JUnit\\} is the leading test framework which has been used in about 50% of the studies. (6) There is a good mixture of SUT types used in the studies: academic experimental systems (or simple code examples), real open-source and commercial systems. (7) Among 41 tools that are proposed for STCE, less than half of the tools (45%) were available for download. It is good to have this percentile of tools to be available, although not perfect, since the availability of tools can lead to higher impact on research community and industry. Conclusion We discuss the emerging trends in STCE, and discuss the implications for researchers and practitioners in this area. The results of our systematic mapping can help researchers to obtain an overview of existing STCE approaches and spot areas in the field that require more attention from the research community.

Vahid Garousi Yusifo?lu; Yasaman Amannejad; Aysu Betin Can

2015-01-01T23:59:59.000Z

275

Code of Conduct  

NLE Websites -- All DOE Office Websites (Extended Search)

Governance » Governance » Ethics, Accountability » Code of Conduct Code of Conduct Helping employees recognize and resolve the ethics and compliance issues that may arise in their daily work. Contact Code of Conduct (505) 667-7506 Code of Conduct LANL is committed to operating in accordance with the highest standards of ethics and compliance and with its core values of service to our nation, ethical conduct and personal accountability, excellence in our work, and mutual respect and teamwork. LANL must demonstrate to customers and the public that the Laboratory is accountable for its actions and that it conducts business in a trustworthy manner. What is LANL's Code of Conduct? Charlie McMillan 1:46 Laboratory Director Charlie McMillan introduces the code LANL's Code of Conduct is designed to help employees recognize and

276

Code Red 2 kills off Code Red 1  

E-Print Network (OSTI)

#12;#12;Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks #12;Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back, still

Paxson, Vern

277

Arbitrary spin conformal fields in (A)dS  

E-Print Network (OSTI)

Totally symmetric arbitrary spin conformal fields in (A)dS space of even dimension greater than or equal to four are studied. Ordinary-derivative and gauge invariant Lagrangian formulation for such fields is obtained. Gauge symmetries are realized by using auxiliary fields and Stueckelberg fields. We demonstrate that Lagrangian of conformal field is decomposed into a sum of gauge invariant Lagrangians for massless, partial-massless, and massive fields. We obtain a mass spectrum of the partial-massless and massive fields and confirm the conjecture about the mass spectrum made in the earlier literature. In contrast to conformal fields in flat space, the kinetic terms of conformal fields in (A)dS space turn out to be diagonal with respect to fields entering the Lagrangian. Explicit form of conformal transformation which maps conformal field in flat space to conformal field in (A)dS space is obtained. Covariant Lorentz-like and de-Donder like gauge conditions leading to simple gauge-fixed Lagrangian of conformal fields are proposed. Using such gauge-fixed Lagrangian, which is invariant under global BRST transformations, we explain how the partition function of conformal field is obtained in the framework of our approach.

R. R. Metsaev

2014-07-02T23:59:59.000Z

278

Code loops in both parities  

Science Journals Connector (OSTI)

We present equivalent definitions of code loops in any characteristic p?0. The most natural definition is via combinatorial polarization, but we also show how to realize code loops by linear codes and as a class of symplectic conjugacy ... Keywords: Characteristic form, Code loop, Combinatorial polarization, Conjugacy closed loop, Doubly even code, Even code loop, Kronecker product, Moufang loop, Odd code loop, Self-orthogonal code, Small Frattini loop, Symmetric associator, Symplectic loop

Aleš Drápal; Petr Vojt?chovský

2010-06-01T23:59:59.000Z

279

GPU-optimized Code for Long-term Simulations of Beam-beam Effects in Colliders  

SciTech Connect

We report on the development of the new code for long-term simulation of beam-beam effects in particle colliders. The underlying physical model relies on a matrix-based arbitrary-order symplectic particle tracking for beam transport and the Bassetti-Erskine approximation for beam-beam interaction. The computations are accelerated through a parallel implementation on a hybrid GPU/CPU platform. With the new code, a previously computationally prohibitive long-term simulations become tractable. We use the new code to model the proposed medium-energy electron-ion collider (MEIC) at Jefferson Lab.

Roblin, Yves [JLAB; Morozov, Vasiliy [JLAB; Terzic, Balsa [JLAB; Aturban, Mohamed A. [Old Dominion University; Ranjan, D. [Old Dominion University; Zubair, Mohammed [Old Dominion University

2013-06-01T23:59:59.000Z

280

Optical Arbitrary Waveform Generation Based Optical-Label Switching Transmitter with  

E-Print Network (OSTI)

Optical Arbitrary Waveform Generation Based Optical-Label Switching Transmitter with All-Optical, 95616 Email: sbyoo@ucdavis.edu Abstract: This paper introduces a modulation-format transparent optical-label switching transmitter based on optical arbitrary waveform generation. Packets consisting of 100 Gb

Kolner, Brian H.

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Green's Conjecture for curves on arbitrary K3 Marian Aprodu and Gavril Farkas  

E-Print Network (OSTI)

Green's Conjecture for curves on arbitrary K3 surfaces Marian Aprodu and Gavril Farkas Abstract Green's Conjecture predicts than one can read off special linear series on an algebraic curve-Ramanan, provides a complete solution to Green's Conjecture for smooth curves on arbitrary K3 surfaces. 1

Farkas, Gavril

282

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2012 20, 2012 U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses A remote user can spoof SMS source addresses. August 17, 2012 U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. August 16, 2012 U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. August 15, 2012 U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code Execution of arbitrary code via network A remote user can cause arbitrary

283

Mechanical code comparator  

DOE Patents (OSTI)

A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

2002-01-01T23:59:59.000Z

284

Building Codes Resources  

Energy.gov (U.S. Department of Energy (DOE))

Some commercial and/or residential construction codes mandate certain energy performance requirements for the design, materials, and equipment used in new construction and renovations.

285

" Row: NAICS Codes;" " Column...  

U.S. Energy Information Administration (EIA) Indexed Site

2 Number of Establishments by Usage of General Energy-Saving Technologies, 2010;" " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within General Energy-Saving...

286

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Number of Establishments by Usage of Cogeneration Technologies, 2010;" " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within Cogeneration Technologies;" " Unit:...

287

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Number of Establishments by Usage of Cogeneration Technologies, 2002; " " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within Cogeneration Technologies;" " Unit:...

288

Tokamak Systems Code  

SciTech Connect

The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

1985-03-01T23:59:59.000Z

289

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

Establishment","Onsite","per Establishment" "Code(a)","Subsector and Industry","(million sq ft)","(counts)","(sq ft)","(counts)","(counts)" ,,"Total United...

290

Codes and Standards  

Energy.gov (U.S. Department of Energy (DOE))

Currently, thirteen U.S. and two international standards development organizations (SDOs) are developing and publishing the majority of the voluntary domestic codes and standards. These...

291

" Row: NAICS Codes;" " ...  

U.S. Energy Information Administration (EIA) Indexed Site

1.3. Number of Establishments by Quantity of Purchased Electricity, Natural Gas, and Steam, 1998;" " Level: National Data; " " Row: NAICS Codes;" " Column: Supplier Sources of...

292

Quantum gravitational corrections to propagator in arbitrary spacetimes  

E-Print Network (OSTI)

The action for a relativistic free particle of mass m receives a contribution $-m R(x,y)$ from a path of length R(x,y) connecting the events $x^i$ and $y^i$. Using this action in a path integral, one can obtain the Feynman propagator for a spinless particle of mass m in any background spacetime. If one of the effects of quantizing gravity is to introduce a minimum length scale $L_P$ in the spacetime, then one would expect the segments of paths with lengths less than $L_P$ to be suppressed in the path integral. Assuming that the path integral amplitude is invariant under the `duality' transformation ${\\cal R}\\to L_P^2/R$, one can calculate the modified Feynman propagator in an arbitrary background spacetime. It turns out that the key feature of this modification is the following: The proper distance $(\\Delta x)^2$ between two events, which are infinitesimally separated, is replaced by $\\Delta x^2 + L_P^2$; that is the spacetime behaves as though it has a `zero-point length' of $L_P$. This equivalence suggests a deep relationship between introducing a `zero-point-length' to the spacetime and postulating invariance of path integral amplitudes under duality transformations. In the Schwinger's proper time description of the propagator, the weightage for a path with proper time s becomes $m(s+L_P^2/s)$ rather than as ms. As to be expected, the ultraviolet behavior of the theory is improved significantly and divergences will disappear if this modification is taken into account. Implications of this result are discussed.

T. Padmanabhan

1997-03-18T23:59:59.000Z

293

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

294

11. CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

1 PAGE 1 OF2 AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT PAGES 2. AMENDMENT/MODIFICATION NO. I 3. EFFECTIVE DATE M191 See Block 16C 4. REQUISITION/PURCHASE I 5. PROJECT NO. (If applicable) REQ. NO. 6.ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Support Department P.O. Box 5400 Albuquerque, NM 87185-5400 7. ADMINISTERED BY (If other than Item 6) CODE U.S. Department of Energy National Nuclear Security Administration Manager, Pantex Site Office P.O. Box 30030 Amarillo, TX 79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY CODE SA. AMENDMENT OF SOLICITATION NO.

295

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

296

Hydrogen Codes and Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes and Standards Codes and Standards James Ohi National Renewable Energy Laboratory 1617 Cole Blvd. Golden, CO 80401 Background The development and promulgation of codes and standards are essential if hydrogen is to become a significant energy carrier and fuel because codes and standards are critical to establishing a market-receptive environment for commercializing hydrogen-based products and systems. The Hydrogen, Fuel Cells, and Infrastructure Technologies Program of the U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL), with the help of the National Hydrogen Association (NHA) and other key stakeholders, are coordinating a collaborative national effort by government and industry to prepare, review, and promulgate hydrogen codes and standards needed to expedite hydrogen infrastructure development. The

297

Residential Building Code Compliance  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 Residential Building Code Compliance: Recent Findings and Implications Energy use in residential buildings in the U.S. is significant-about 20% of primary energy use. While several approaches reduce energy use such as appliance standards and utility programs, enforcing state building energy codes is one of the most promising. However, one of the challenges is to understand the rate of compliance within the building community. Utility companies typically use these codes as the baseline for providing incentives to builders participating in utility-sponsored residential new construction (RNC) programs. However, because builders may construct homes that fail to meet energy codes, energy use in the actual baseline is higher than would be expected if all buildings complied with the code. Also,

298

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

299

T-557: Microsoft Office Excel Office Art Object Parsing Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Office Excel Office Art Object Parsing Remote Code 7: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability February 15, 2011 - 7:00am Addthis PROBLEM: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability. PLATFORM: Microsoft Office Excel ABSTRACT: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. reference LINKS: ZDI-11-041 ZDI Public Disclosure: Microsoft CVE-2011-0979 IMPACT ASSESSMENT: High Discussion: The flaw occurs when parsing a document with a malformed Excel document.

300

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

T-643: HP OpenView Storage Data Protector Unspecified Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

643: HP OpenView Storage Data Protector Unspecified Code 643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability June 9, 2011 - 3:45pm Addthis PROBLEM: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability PLATFORM: Versions 6.0, 6.10, and 6.11 running on HP-UX, Solaris, Linux and Windows. ABSTRACT: A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Secunia Advisory SA44884 CVE-2011-1864 SecurityTracker Alert ID: 1025620 HP Document ID: c02712867 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

302

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Telnet code execution vulnerability: FreeBSD and Kerberos 69: Telnet code execution vulnerability: FreeBSD and Kerberos U-069: Telnet code execution vulnerability: FreeBSD and Kerberos December 27, 2011 - 5:18am Addthis PROBLEM: Telnet code execution vulnerability: FreeBSD and Kerberos PLATFORM: Operating System: FreeBSD 7.1, 7.3, 8.0 and 8.1 and Software: Kerberos ABSTRACT: Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. reference LINKS: FreeBSD-SA-11:08.telnetd MITKRB5-SA-2011-008 Secunia Advisory: SA47397 (FreeBSD) Secunia Advisory: SA47348 (Kerberos) SecurityTracker Alert ID: 1026460 CVE-2011-4862 IMPACT ASSESSMENT: High Discussion: When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. The telnet

303

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

304

Performance of a pressure-based unstructured code and a multi-block structured code for heat transfer and fluid flow  

Science Journals Connector (OSTI)

This paper reports a multi-block unstructured method for incompressible flows and the performance comparison with a multi-block structured method. The unstructured collocated grid is composed of arbitrary cell shapes. Pressure and velocity are stored at cell centres; Rhie and Chow interpolation is used to prevent checker boarding. The SIMPLE algorithm is used for pressureâ??velocity coupling. The code is calibrated with benchmark cases using hexahedral and prism meshes, and is shown to perform very well for all cases considered. In addition, the performances of the structured and unstructured codes are compared.

Rongguang Jia; Bengt Sunden

2005-01-01T23:59:59.000Z

305

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

306

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for z/OS Arbitrary Command 4: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability December 25, 2012 - 12:08am Addthis PROBLEM: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability PLATFORM: IBM HTTP Server for z/OS Version 5.3 ABSTRACT: A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS REFERENCE LINKS: Security vulnerability Reference #:1620945 Xforce: 80684 Secunia Advisory SA51656 CVE-2012-5955 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to compromise a vulnerable

307

E-Print Network 3.0 - arbitrary hard ellipses Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

hard to show that empty-ellipse graphs can have quadratic complexity... be an arbitrary set of n points on the positive branch of the unit cubic ... Source: Ecole Polytechnique,...

308

Network for transfer of an arbitrary $n$-qubit atomic state via cavity QED  

E-Print Network (OSTI)

I show a scheme which allows a perfect transfer of an unknown single-qubit atomic state from one atom to another by letting two atoms interact simultaneously with a cavity QED. During the interaction between atom and cavity, the cavity is only virtually excited and accordingly the scheme is insensitive to the cavity field states and cavity decay. Based on this scheme, a network for transfer of an arbitrary single-qubit atomic state between atoms is engineered. Then the scheme is generalized to perfectly transfer an arbitrary 2-qubit atomic state and accordingly a network for transfer of an arbitrary 2-qubit atomic state is designed. At last, it is proven that the schemes can be generalized to an arbitrary $n(n\\ge 3)$-qubit atomic state transfer case and a corresponding network is also proposed.

Zhan-jun Zhang

2005-04-29T23:59:59.000Z

309

E-Print Network 3.0 - arbitrary meshes nouvelles Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

3D scalar volume or a triangulated surface mesh with very low quality. Figure 1 shows the pipeline... a user-defined arbitrary triangular mesh that has very low quality or is too...

310

CIP/multi-moment finite volume method with arbitrary order of accuracy  

E-Print Network (OSTI)

This paper presents a general formulation of the CIP/multi-moment finite volume method (CIP/MM FVM) for arbitrary order of accuracy. Reconstruction up to arbitrary order can be built on single cell by adding extra derivative moments at the cell boundary. The volume integrated average (VIA) is updated via a flux-form finite volume formulation, whereas the point-based derivative moments are computed as local derivative Riemann problems by either direct interpolation or approximate Riemann solvers.

Xiao, Feng

2012-01-01T23:59:59.000Z

311

Compiling Codes on Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Compiling Codes Compiling Codes Compiling Codes on Hopper Overview Cray provides a convenient set of wrapper commands that should be used in almost all cases for compiling and linking parallel programs. Invoking the wrappers will automatically link codes with MPI libraries and other Cray system software. All MPI and Cray system include directories are also transparently imported. In addition the wrappers append the compiler's target processor arguments for the hopper compute node processors. NOTE: The intention is that programs are compiled on the login nodes and executed on the compute nodes. Because the compute nodes and login nodes have different operating systems, binaries created for compute nodes may not run on the login node. The wrappers mentioned above guarantee that

312

Code of Ethics  

Science Journals Connector (OSTI)

code of ethics clarifies the ethical principles that are followed in a specific field. In this context we refer to the , formally adopted by the American Public Health Association in 2002. It is the first b...

2008-01-01T23:59:59.000Z

313

ANNOUNCEMENT: ZIP Code Information.  

Science Journals Connector (OSTI)

THE U. S. Post Office Department has announced that the use of ZIP Codes will be mandatory on all domestic addresses for subscriptions and other mailings by 1 January 1967. Accordingly, the American Institute of Physics has established a procedure for obtaining the necessary information. You are requested to follow this procedure exactly.First, do not submit a change of address request consisting merely of the addition of your ZIP Code. Second, if your address changes in any other way, do include the ZIP Code of the new address. Third, and most important, be sure to furnish your ZIP Code in accordance with instructions included with all renewal invoices and renewal orders which have been sent out by the AIP.Failure to conform to this procedure may result in delays.

1965-09-27T23:59:59.000Z

314

Quantum error control codes  

E-Print Network (OSTI)

QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Abdelhamid Awad Aly Ahmed, Sala

2008-10-10T23:59:59.000Z

315

Joint design of multi-resolution codes and intra / inter- layer network coding  

E-Print Network (OSTI)

In this thesis, we study the joint design of multi-resolution (MR) coding and network coding. The three step coding process consists of MR source coding, layer coding and multi-stream coding. The source coding considers ...

Wang, Tong, S.M. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

316

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit 2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September 6, 2012 - 6:00am Addthis PROBLEM: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: Barracuda Web Filter 5.0.015 is vulnerable; other versions may also be affected. ABSTRACT: Barracuda Web Filter Authentication Module Multiple HTML Injection Vulnerabilities reference LINKS: Barracuda Networks Barracuda Networks Security ID: BNSEC-279/BNYF-5533 SecurityTracker Alert ID: 1027500 Bugtraq ID: 55394 seclists.org IMPACT ASSESSMENT: Medium Discussion: Two scripts not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to

317

U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName'  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' 2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks March 23, 2012 - 7:42am Addthis PROBLEM: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks PLATFORM: Apache Wicket 1.4.x ABSTRACT: A remote user can conduct cross-site scripting attacks. reference LINKS: Apache Wicket CVE-2012-0047 SecurityTracker Alert ID: 1026839 IMPACT ASSESSMENT: High Discussion: The software does not properly filter HTML code from user-supplied input in the 'wicket:pageMapName' request parameter before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target

318

Maine | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Maine Maine Last updated on 2013-11-04 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 Amendments / Additional State Code Information As of September 28, 2011, municipalities over 4,000 in population were required to enforce the new code if they had a building code in place by August 2008. Municipalities under 4,000 are not required to enforce it unless they wish to do so and have the following options: 1. Adopt and enforce the Maine Uniform Building and Energy Code 2. Adopt and enforce the Maine Uniform Building Code (the building code without energy) 3. Adopt and enforce the Maine Uniform Energy Code (energy code only) 4. Have no code Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Maine (BECP Report, Sept. 2009)

319

Nested Quantum Error Correction Codes  

E-Print Network (OSTI)

The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

2009-09-28T23:59:59.000Z

320

Higher-dimensional numerical relativity: Formulation and code tests  

SciTech Connect

We derive a formalism of numerical relativity for higher-dimensional spacetimes and develop numerical codes for simulating a wide variety of five-dimensional (5D) spacetimes for the first time. First, the Baumgarte-Shapiro-Shibata-Nakamura formalism is extended for arbitrary spacetime dimensions D{>=}4, and then, the so-called cartoon method, which was originally proposed as a robust method for simulating axisymmetric 4D spacetimes, is described for 5D spacetimes of several types of symmetries. Implementing 5D numerical relativity codes with the cartoon methods, we perform test simulations by evolving a 5D Schwarzschild spacetime and a 5D spacetime composed of a gravitational-wave packet of small amplitude. The numerical simulations are stably performed for a sufficiently long time, as done in the 4D case, and the obtained numerical results agree well with the analytic solutions: The numerical solutions are shown to converge at the correct order. We also confirm that a long-term accurate evolution of the 5D Schwarzschild spacetime is feasible using the so-called puncture approach. In addition, we derive the Landau-Lifshitz pseudotensor in arbitrary dimensions, and show that it gives a robust tool for computing the energy flux of gravitational waves. The formulations and methods developed in this paper provide a powerful tool for studying nonlinear dynamics of higher-dimensional gravity.

Yoshino, Hirotaka; Shibata, Masaru [Department of Physics, University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada); Yukawa Institute for Theoretical Physics, Kyoto University, Kyoto, 606-8502 (Japan)

2009-10-15T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Alabama | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Adoption » Status of State Energy Code Adoption Adoption » Status of State Energy Code Adoption Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Alabama Last updated on 2013-05-31 Current News The Alabama Energy and Residential Codes Board adopted the 2009 International Energy Conservation Code (IECC) for Commercial Buildings and the 2009 International Residential Code (IRC) for Residential Construction. The new codes will become effective on October 1, 2012. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information N/A Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in Alabama (BECP Report, Sept. 2009)

322

Washington | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Washington Washington Last updated on 2013-11-05 Current News The Washington State Building Code Council recently completed deliberations on adoption and amendment of the 2012 codes. This includes adoption of the 2012 IECC with state amendments. The new codes became effective July 1, 2013. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information WA 2012 Nonresidential Codes Approved Compliance Tools Nonresidential Energy Code Compliance Tools Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2010 Effective Date 07/01/2013 Adoption Date 02/01/2013 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes Washington DOE Determination Letter, May 31, 2013 Washington State Certification of Commercial and Residential Building Energy Codes

323

NAICS Codes Description:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes Codes Description: Filters: Date Signed only show values between '10/01/2006' and '09/30/2007', Contracting Agency ID show only ('8900'), Contracting Office ID show only ('00001') Contracting Agency ID: 8900, Contracting Office ID: 00001 NAICS Code NAICS Description Actions Action Obligation 541519 OTHER COMPUTER RELATED SERVICES 251 $164,546,671 541611 ADMINISTRATIVE MANAGEMENT AND GENERAL MANAGEMENT CONSULTING SERVICES 236 $52,396,806 514210 DATA PROCESSING SERVICES 195 $28,941,727 531210 OFFICES OF REAL ESTATE AGENTS AND BROKERS 190 $6,460,652 541330 ENGINEERING SERVICES 165 $33,006,079 163 $11,515,387 541690 OTHER SCIENTIFIC AND TECHNICAL CONSULTING SERVICES 92 $40,527,088 531390 OTHER ACTIVITIES RELATED TO REAL ESTATE 79 -$659,654 337214 OFFICE FURNITURE (EXCEPT WOOD) MANUFACTURING 78 $1,651,732

324

Building Energy Codes Fact Sheet  

Energy.gov (U.S. Department of Energy (DOE))

Building energy codes have been in place for over 20 years. Today's codes are providing energy savings of more than 30% compared to the codes of a decade ago. They're also saving consumers an estimated $5 billion annually as of 2012. Since 1992, building codes have saved about 300 million tons of carbon cumulatively. Read the fact sheet below to learn more about the Building Technologies Office's Building Energy Codes program.

325

Coding for Cooperative Communications  

E-Print Network (OSTI)

develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c... modulation. The CF strategy is implemented with low-density parity-check (LDPC) and irregular repeat- accumulate codes and is found to operate within 0.34 dB of the theoretical limit. For the quasi-static fading relay channel, we assume that no channel...

Uppal, Momin Ayub

2011-10-21T23:59:59.000Z

326

U-099: MySQL Unspecified Code Execution Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: MySQL Unspecified Code Execution Vulnerability 099: MySQL Unspecified Code Execution Vulnerability U-099: MySQL Unspecified Code Execution Vulnerability February 9, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in MySQL, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: MySQL 5.x ABSTRACT: Successful exploitation allows execution of arbitrary code. Reference LINKS: Secunia Advisory SA47894 No CVE references currently available. IMPACT ASSESSMENT: Medium Discussion: The vulnerability is reported in version 5.5.20. Other versions may also be affected. The exploit has been tested with mysql-5.5.20-debian6.0-i686.deb on Debian 6.0. Impact: System access from local network Solution: An effective workaround cannot currently be provided due to limited vulnerability details.

327

T-729: Mozilla Code Installation Through Holding Down Enter | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Mozilla Code Installation Through Holding Down Enter 9: Mozilla Code Installation Through Holding Down Enter T-729: Mozilla Code Installation Through Holding Down Enter September 29, 2011 - 8:30am Addthis PROBLEM: Mozilla Code Installation Through Holding Down Enter. PLATFORM: Versions prior to the following are vulnerable: Firefox 7.0 Firefox 3.6.23 Thunderbird 7.0 SeaMonkey 2.4 ABSTRACT: Attackers can exploit this issue by enticing an unsuspecting victim into viewing and interacting with a malicious Web page. An attacker may be able to exploit this issue to bypass a confirmation dialog and install an arbitrary add-on. This may aid in further attacks. reference LINKS: Mozilla Foundation Security Advisory 2011-40 Firefox Security Advisories CVE-2011-2372 CVE-2011-3001 IMPACT ASSESSMENT: High Discussion: If a user holds down the Enter key--as part of a game or test, perhaps--a

328

All solutions of arbitrary first order autonomous partial differential equations in any dimensions  

E-Print Network (OSTI)

All solutions of $F(u,\\ u_t,\\ u_{x_1},\\ \\ldots,\\ u_{x_n})=0$ with arbitrary function $F$ can be completely determined by its symmetries $\\sigma=G(\\tau_1,\\ \\ldots,\\ \\tau_n)u_t$, where $G$ is an arbitrary function of $\\tau_i\\equiv u_{x_i}/u_t$, if one can find a special non-degenerate solution $u_s$ such that $\\{\\tau_{s,i}\\equiv u_{s,x_i}/u_{s,t},\\ i=1,\\ 2,\\ \\ldots\\ n\\}$ are functional independent. Especially, the Lax pair, recursion operator and infinitely many high order symmetries are also explicitly given for arbitrary (1+1)-dimensional first order autonomous partial differential equations.

Sen-Yue Lou; Ruo-Xia Yao

2014-06-06T23:59:59.000Z

329

Usage Codes Vessel name  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Vessel name Int'l radio call sign (IRCS) Generator Other: Max hoisting Sonar Power (Kw) KHz: KHz: VMS Usage Y / N GPS: Internal / external KHz: KHz: Ratio Accuracy (m Incinerator: Burned on board: Net sensors Hull mounted / towed Wired / wireless Y / N Y / N Usage Manufacturer

330

Usage Codes Additional Information  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Additional Information Winches (on deck) Electronics RPM: Max hoistingPresent? Usage Model Ratio Accuracy (m) Type: Electric / Hydraulic / Other _________________ KHz: GPS: Internal Other: Y / N Other: Y / N Y / NOther: Hydrophone Burned on board: Net sensors Usage Manufacturer High

331

The Woodland Carbon Code  

E-Print Network (OSTI)

The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

332

Nebraska | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Nebraska Nebraska Last updated on 2013-11-04 Current News Nebraska Legislature adopted the 2009 IECC/ASHRAE 90.1-2007. The code became effective August 27, 2011. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Cities and counties may adopt codes that differ from the Nebraska Energy Code; however, state law requires the adopted code to be equivalent to the Nebraska Energy Code. For existing buildings, only those renovations that will cost more than 50 percent of the replacement cost of the building must comply with the code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Nebraska (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

333

Summary | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Summary The impact of energy codes on our future is apparent. From environmental and resource conservation to national security, energy concerns, and our economic challenges, energy codes will continue to be a key component of a sound public policy. For further information on building energy code adoption, compliance, and enforcement, review the ACE toolkits Adoption Compliance Enforcement Popular Links ACE Learning Series ACE Overview Top 10 Reasons for Energy Codes Development of Energy Codes Adoption of Energy Codes Compliance with Energy Codes Enforcement of Energy Codes Going Beyond Code Summary Acronyms and Abbreviations Toolkit Definitions Adoption Toolkit Compliance Toolkit Enforcement Toolkit Contacts Web Site Policies U.S. Department of Energy USA.gov Last Updated: Thursday, January 31, 2013 - 15:19

334

Florida | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Florida Florida Last updated on 2013-11-18 Current News The triennial code change process is currently underway. Florida expects to be equivalent to ASHRAE 90.1-10 and IECC 2012 by early 2014. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information N/A Approved Compliance Tools Can use State specific EnergyGauge Summit FlaCom State Specific Research Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/15/2012 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Florida DOE Determination Letter, May 31, 2013 Florida State Certification of Commercial Building Codes Current Code State Specific Amendments / Additional State Code Information Florida Building Code

335

Averaging over fast gravity waves for geophysical flows with arbitrary potential vorticity  

SciTech Connect

Here a mathematically rigorous framework is developed for deriving new reduced simplified dynamical equations for geophysical flows with arbitrary potential vorticity interacting with fast gravity waves. The examples include the rotating Boussinesq and rotating shallow water equations in the quasigeostrophic limit with vanishing Rossby number. For the spatial periodic case the theory implies that the quasi-geostrophic equations are valid limiting equations in the weak topology for arbitrary initial data. Furthermore, simplified reduced equations are developed for the fashion in which the vortical waves influence the gravity waves through averaging over specific gravity wave/vortical resonances. 18 refs.

Embid, P.F. [Princeton Univ., NJ (United States); Majda, A.J. [New York Univ., New York, NY (United States)

1996-12-31T23:59:59.000Z

336

Arbitrary amplitude double layers in warm dust kinetic Alfven wave plasmas  

SciTech Connect

Large amplitude electrostatic structures associated with low-frequency dust kinetic Alfvenic waves are investigated under the pressure (temperature) gradient indicative of dust dynamics. The set of equations governing the dust dynamics, Boltzmann electrons, ions and Maxwell's equation have been reduced to a single equation known as the Sagdeev potential equation. Parameter ranges for the existence of arbitrary amplitude double layers are observed. Exact analytical expressions for the energy integral is obtained and computed numerically through which sub-Alfvenic arbitrary amplitude rarefactive double layers are found to exist.

Gogoi, Runmoni; Devi, Nirupama [Department of Mathematics, Cotton College, Guwahati-781001, Assam (India)

2008-07-15T23:59:59.000Z

337

Building Energy Codes 101: An Introduction | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101: An Introduction Codes 101: An Introduction In order to provide a basic introduction to the varied and complex issues associated with building energy codes, the U.S. Department of Energy's Building Energy Codes Program, with valued assistance from the International Codes Council and ASHRAE, has prepared Building Energy Codes 101: An Introduction. This guide is designed to speak to a broad audience with an interest in building energy efficiency, including state energy officials, architects, engineers, designers, and members of the public. Publication Date: Wednesday, February 17, 2010 BECP_Building Energy Codes 101_February2010_v00.pdf Document Details Last Name: Britt Initials: M Affiliation: PNNL Document Number: PNNL-70586 Focus: Adoption Code Development Compliance Building Type:

338

Compliance with Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance with Energy Codes Compliance with Energy Codes Energy code compliance must be achieved to realize the considerable benefits inherent in energy codes. BECP supports successful compliance by making no-cost compliance tools, REScheck(tm) and COMcheck(tm), and other resources widely available to everyone. BECP has also developed several resources to help states uniformly assess the rate of compliance with their energy codes for residential and commercial buildings. It is important to note that regardless of the level of enforcement, as a law the building owner/developer is ultimately responsible to comply with the energy code. Compliance will be increased if the adopting agency prepares the building construction community to comply with the energy code and provides resources to code officials to enforce it.

339

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

340

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Onefold photoelectron-counting statistics for non-Gaussian light: scattering from an arbitrary number of weak scatterers  

Science Journals Connector (OSTI)

The onefold photoelectron-counting statistics (e.g., probability distribution and moments) are obtained when the physical system under study contains an arbitrary number of...

Barakat, Richard

1983-01-01T23:59:59.000Z

342

Adaptive code generators for tree coding of speech  

E-Print Network (OSTI)

Tree coding is a promising way of obtaining good performance for medium-to-low rate speech coding. The key part of a tree coder is the code generator which consists of a short-term predictor and a long-term predictor. The best predictor designed...

Dong, Hui

1998-01-01T23:59:59.000Z

343

SIID Tangible CONTROLLED OBJECT CODES: CAPITALIZED OBJECT CODES  

E-Print Network (OSTI)

vehicle 1811 - Motor Vehicle Other 1812 - Aircraft 1813 - Motor Vehicle (Natural Gas conversion -Passengers Cars 1814 - Motor Vehicles - Natural Gas Conversion-other 1820 - Boats 1841- Software > 100kSIID Tangible CONTROLLED OBJECT CODES: CAPITALIZED OBJECT CODES: Capital Objects Codes That Do

Hofmann, Hans A.

344

Methane Hydrates Code Comparison  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Comparison Code Comparison Set-up for Problem 7 (Long-term simulations for Mt Elbert and PBU L- Pad "Like" Deposits) As discussed in the phone conference held on 11/9/2007, it is proposed that Problem 7 be made up of three separate cases: Problem 7a will look at a deposit similar to the Mt Elbert site. Problem 7b will be based on the PBU L-Pad site, and Problem 7c will be a down-dip version of the L-Pad site. In all three cases, a standard set of parameters will be used based on those found in Problem 6 (the history matches to the MDT data). The parameters chosen were consensus values based on the experiences of the various groups in attempting to match the MDT data for the C2 formation at Mount Elbert. Given below are the detailed descriptions of the three problems and the proposed

345

Minnesota | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Minnesota Minnesota Last updated on 2013-06-03 Current News The 2009 editions of the International Residential Code (IRC), International Building Code (IBC), and International Fire Code (IFC) will be published soon and the Construction Codes and Licensing Division and the State Fire Marshal Division have been discussing this adoption. Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2004 with Amendments Amendments / Additional State Code Information Commercial Energy Code Approved Compliance Tools Compliance forms can be downloaded from ASHRAE State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Minnesota (BECP Report, Sept. 2009) Approximate Energy Efficiency Less energy efficient than ASHRAE 90.1-2004 Effective Date 06/01/2009

346

News | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

News News A variety of resources and news from BECP, states, and other news sources are available for anyone interested in learning more about building energy codes. This includes newsletters, articles, links and more. To receive BECP News and other updates from the Building Energy Codes Program via email, join our mailing list. Featured Codes News DOE Activities and Methodology for Assessing Compliance With Building Energy Codes RFI Mayors Urge Cities to Strengthen Energy Code AZ Legislature Preserves Local Control of Building Energy Efficiency Codes Washington State Home Builders Lead the Nation in Energy Code Compliance Mississippi Invests in Future Growth With Adoption of Best-in-Class Energy Efficiency Legislation Energy 2030 Report Calls for Stricter Energy Building Codes

347

Michigan | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Michigan Michigan Last updated on 2013-06-03 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 with Amendments Amendments / Additional State Code Information 2009 Commercial MI Uniform Energy Code Rules Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Michigan (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/09/2011 Adoption Date 11/08/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Michigan DOE Determination Letter, May 31, 2013 Current Code 2009 IECC with Amendments Amendments / Additional State Code Information 2009 Residential MI Uniform Energy Code Rules Approved Compliance Tools Can use REScheck

348

Nevada Energy Code for Buildings  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

349

Network coding for anonymous broadcast  

E-Print Network (OSTI)

This thesis explores the use of network coding for anonymous broadcast. Network coding, the technique of transmitting or storing mixtures of messages rather than individual messages, can provide anonymity with its mixing ...

Sergeev, Ivan A

2013-01-01T23:59:59.000Z

350

Matlab-Kinect Interface Code  

E-Print Network (OSTI)

This .zip file contains code and installation instructions for acquiring 3d arm movements in Matlab using the Microsoft Kinect 3d camera. The provided code has been validated in 32-bit and 64-bit Matlab with 32-bit and ...

Kowalski, Kevin

2012-06-01T23:59:59.000Z

351

Code of Practice Research Degrees  

E-Print Network (OSTI)

........................................................................ 15 Section Ten: FacilitiesCode of Practice For Research Degrees 2014/15 #12;2 Contents Section One: Preface ­ the purpose of the Code........................................................ 3 Section Two: Context

Evans, Paul

352

Georgia | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Georgia Georgia Last updated on 2013-07-18 Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information GA Amendments Approved Compliance Tools Can use COMcheck Must choose ASHRAE 90.1-2007 as code option. State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Georgia (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 01/01/2011 Adoption Date 11/03/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Georgia State Certification of Commercial and Residential Building Codes Extension Request Current Code 2009 IECC with Amendments Amendments / Additional State Code Information GA Amendments Approved Compliance Tools Can use REScheck

353

MODIFICATION OF THE MOOG SPECTRAL SYNTHESIS CODES TO ACCOUNT FOR ZEEMAN BROADENING OF SPECTRAL LINES  

SciTech Connect

In an attempt to widen access to the study of magnetic fields in stellar astronomy, I present MOOGStokes, a version of the MOOG one-dimensional local thermodynamic equilibrium radiative transfer code, overhauled to incorporate a Stokes vector treatment of polarized radiation through a magnetic medium. MOOGStokes is a suite of three complementary programs, which together can synthesize the disk-averaged emergent spectrum of a star with a magnetic field. The first element (a pre-processing script called CounterPoint) calculates for a given magnetic field strength, wavelength shifts, and polarizations for the components of Zeeman-sensitive lines. The second element (a MOOG driver called SynStokes derived from the existing MOOG driver Synth) uses the list of Zeeman-shifted absorption lines together with the existing machinery of MOOG to synthesize the emergent spectrum at numerous locations across the stellar disk, accounting for stellar and magnetic field geometry. The third and final element (a post-processing script called DiskoBall) calculates the disk-averaged spectrum by weighting the individual emergent spectra by limb darkening and projected area, and applying the effects of Doppler broadening. All together, the MOOGStokes package allows users to synthesize emergent spectra of stars with magnetic fields in a familiar computational framework. MOOGStokes produces disk-averaged spectra for all Stokes vectors ( I, Q, U, V ), normalized by the continuum. MOOGStokes agrees well with the predictions of INVERS10 a polarized radiative transfer code with a long history of use in the study of stellar magnetic fields. In the non-magnetic limit, MOOGStokes also agrees with the predictions of the scalar version of MOOG.

Deen, Casey P. [Max Planck Institut fuer Astronomie, Koenigstuhl 17, D-69117 Heidelberg, GermanyAND (Germany); Department of Astronomy, University of Texas at Austin, 1 University Station, Austin, TX 78712 (United States)

2013-09-15T23:59:59.000Z

354

Multiuser Mercury/waterfilling for Downlink OFDM with Arbitrary Signal Constellations  

E-Print Network (OSTI)

Multiuser Mercury/waterfilling for Downlink OFDM with Arbitrary Signal Constellations Angel Lozano tracked by the base station, adopts the form of a multiuser mercury/waterfilling procedure that generalizes the single-user mercury/waterfilling introduced in [1]. I. INTRODUCTION There is, of late, great

Lozano, Angel

355

Conditional generation of arbitrary multimode entangled states of light with linear optics  

E-Print Network (OSTI)

We propose a universal scheme for the probabilistic generation of an arbitrary multimode entangled state of light with finite expansion in Fock basis. The suggested setup involves passive linear optics, single photon sources, strong coherent laser beams, and photodetectors with single-photon resolution. The efficiency of this setup may be greatly enhanced if, in addition, a quantum memory is available.

J. Fiurasek; S. Massar; N. J. Cerf

2003-04-01T23:59:59.000Z

356

A Closed-Form Solution to the Arbitrary Order Cauchy Problem with Propagators  

E-Print Network (OSTI)

The general abstract arbitrary order (N) Cauchy problem was solved in a closed form as a sum of exponential propagator functions. The infinite sparse exponential series was solved with the aid of a homogeneous differential equation. It generated a linear combination of exponential functions. The Cauchy problem solution was formed with N linear combinations of N exponential propagators.

Henrik Stenlund

2014-11-24T23:59:59.000Z

357

An arbitrary high-order discontinuous Galerkin method for elastic waves on unstructured meshes - IV. Anisotropy  

Science Journals Connector (OSTI)

......the heterogeneous elastic anisotropic wave equation with arbitrary...coordinate system aligned with the anisotropic symmetry axis can be found...material (Mesaverde clay shale) given in [109 N m2...pattern for the case of a tilted anisotropic material. A vector plot illustrating......

Josep de la Puente; Martin Käser; Michael Dumbser; Heiner Igel

2007-06-01T23:59:59.000Z

358

How the diffusivity profile reduces the arbitrariness of protein folding free energies  

E-Print Network (OSTI)

How the diffusivity profile reduces the arbitrariness of protein folding free energies M 2010 The concept of a protein diffusing in its free-energy folding landscape has been fruitful for both as it stochastically folds and unfolds. The free-energy profiles for different RCs exhibit significant variations, some

Thirumalai, Devarajan

359

Reversing the weak measurement of an arbitrary field with finite photon number  

E-Print Network (OSTI)

For an arbitrary field with finite photon number inside a leaky cavity, we show that the null-result measurement can be conditionally reversed, using either multiple atoms or a multilevel atom. Even with photons detected, a certain class of fields...

Sun, Qingqing; Al-Amri, M.; Zubairy, M. Suhail.

2009-01-01T23:59:59.000Z

360

Proc. KR2004 1 A Logic of Arbitrary and Indefinite Objects  

E-Print Network (OSTI)

Proc. KR2004 1 A Logic of Arbitrary and Indefinite Objects Stuart C. Shapiro Department of Computer 1992; Shapiro 2000c; Shapiro & The SNePS Implementa- tion Group 2002). SNePS is a propositional. Copyright c 2004, Stuart C. Shapiro. All rights reserved. In the remainder of this section, we will give

Shapiro, Stuart C.

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Random Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and  

E-Print Network (OSTI)

Random Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and David Williams School be a countably infinite set of points in R, and suppose that I has no points of accumulation and that its convex hull is the whole of R. It will be convenient to index I as {ui : i Z}, with ui

Harris, Simon Colin

362

Spectroscopic Method for Measuring Plasma Magnetic Fields Having Arbitrary Distributions of Direction and Amplitude  

E-Print Network (OSTI)

Spectroscopic Method for Measuring Plasma Magnetic Fields Having Arbitrary Distributions of Science, Rehovot 76100, Israel (Received 21 December 2006; published 31 May 2007) An approach for measurements of magnetic fields, based on the comparison of the magnetic-field- induced contributions

363

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with  

E-Print Network (OSTI)

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with Small@uwplatt.edu Abstract We consider a model of algorithmic self-assembly of geometric shapes out of square Wang tiles Biomolecular computation, RNAse enzyme self-assembly, algorithmic self-assembly, Komogorov complexity Digital

Paris-Sud XI, Université de

364

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with  

E-Print Network (OSTI)

Self-Assembly of Arbitrary Shapes Using RNAse Enzymes: Meeting the Kolmogorov Bound with Small@uwplatt.edu This research was supported in part by NSF grant CDI-0941538 Abstract We consider a model of algorithmic self-assembly Biomolecular computation, RNAse enzyme self-assembly, algorithmic self-assembly, Komogorov complexity Digital

Demaine, Erik

365

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues  

E-Print Network (OSTI)

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues Erik D. Demaine Martin L We introduce staged self-assembly of Wang tiles, where tiles can be added dynamically in sequence- neering. Staging allows us to break through the traditional lower bounds in tile self-assembly by encoding

Demaine, Erik

366

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues  

E-Print Network (OSTI)

Staged Self-Assembly: Nanomanufacture of Arbitrary Shapes with O(1) Glues Erik D. Demaine Martin L We introduce staged self-assembly of Wang tiles, where tiles can be added dynamically in sequence-based bioengineering. Staging allows us to break through the traditional lower bounds in tile self-assembly by encoding

Demaine, Erik

367

Spectroscopic Raman Nanometrology of Graphene and Graphene Multilayers on Arbitrary Substrates  

E-Print Network (OSTI)

Spectroscopic Raman Nanometrology of Graphene and Graphene Multilayers on Arbitrary Substrates I to be an effective tool for characterization of graphene and graphene multilayers on the standard Si/SiO2 (300 nm) substrates, which allows one to determine non-destructively the number of the graphene layers and assess

368

Factorization of Darboux transformations of arbitrary order for 2D Schroedinger operators  

E-Print Network (OSTI)

We give a proof of Darboux's conjecture that every Darboux transformation of arbitrary order of a 2D Schroedinger type operator can be factorized into Darboux transformations of order one. The proof is constructive. The result was achieved in the framework of an algebraic approach to Darboux transformations which is put forward in this paper.

Ekaterina Shemyakova

2014-02-24T23:59:59.000Z

369

Robust LT codes with alternating feedback  

Science Journals Connector (OSTI)

In this paper, we propose robust LT codes with alternating feedback (LT-AF codes), which lightly utilize the feedback channel and surpass the performance of existing LT codes with feedback. In LT-AF codes, we consider a loss prone feedback channel for ... Keywords: Erasure channel, Feedback channel, Forward error correction codes, LT codes, Rateless codes

Ali Talari, Nazanin Rahnavard

2014-08-01T23:59:59.000Z

370

What's coming in 2012 codes  

E-Print Network (OSTI)

Administration Why Building Energy Codes Matter Why Building Energy Codes Matter ? Buildings account for 70% of electricity use ? Buildings account for 38% of CO2 emissions (Source: US Green Building Council) Residential Progress Commercial Progress... ? Southeast Energy Efficiency Alliance ? Southwest Energy Efficiency Project Why Building Energy Codes Matter Why Building Energy Codes Matter ? Share of Energy Consumed by Major Sectors of the Economy (2010) Source: U.S. Energy Information...

Lacey, E

2011-01-01T23:59:59.000Z

371

2009 Solar Decathlon Building Code  

NLE Websites -- All DOE Office Websites (Extended Search)

BUILDING CODE Last Updated: September 29, 2008 2009 Solar Decathlon Building Code i September 29, 2008 Contents Section 1. Introduction ............................................................................................................................................................. 1 Section 2. Adopted Codes ........................................................................................................................................................ 1 Section 3. Building Planning and Construction .............................................................................................................. 1 3-1. Fire Protection and Prevention ................................................................................................................................. 1

372

Rotationally invariant multilevel block codes  

E-Print Network (OSTI)

The objective of this thesis is to evaluate the performance of block codes that are designed to be rotationally invariant, in a multilevel coding scheme, over a channel modelled to be white gaussian noise. Also, the use of non-binary codes...

Kulandaivelu, Anita

2012-06-07T23:59:59.000Z

373

MATH 406/806 Introduction to Coding Theory  

E-Print Network (OSTI)

, convolutional codes, turbo codes, expander codes, low-density parity-check (LDPC) codes. References: R.M. Roth

Offin, Dan

374

Development of integrated core disruptive accident analysis code for FBR - ASTERIA-FBR  

SciTech Connect

The evaluation of consequence at the severe accident is the most important as a safety licensing issue for the reactor core of liquid metal cooled fast breeder reactor (LMFBR), since the LMFBR core is not in an optimum condition from the viewpoint of reactivity. This characteristics might induce a super-prompt criticality due to the core geometry change during the core disruptive accident (CDA). The previous CDA analysis codes have been modeled in plural phases dependent on the mechanism driving a super-prompt criticality. Then, the following event is calculated by connecting different codes. This scheme, however, should introduce uncertainty and/or arbitrary to calculation results. To resolve the issues and obtain the consistent calculation results without arbitrary, JNES is developing the ASTERIA-FBR code for the purpose of providing the cross-check analysis code, which is another required scheme to confirm the validity of the evaluation results prepared by applicants, in the safety licensing procedure of the planned high performance core of Monju. ASTERIA-FBR consists of the three major calculation modules, CONCORD, dynamic-GMVP, and FEMAXI-FBR. CONCORD is a three-dimensional thermal-hydraulics calculation module with multi-phase, multi-component, and multi-velocity field model. Dynamic-GMVP is a space-time neutronics calculation module. FEMAXI-FBR calculates the fuel pellet deformation behavior and fuel pin failure behavior. This paper describes the needs of ASTERIA-FBR development, major module outlines, and the model validation status. (authors)

Ishizu, T.; Endo, H.; Tatewaki, I.; Yamamoto, T. [Japan Nuclear Energy Safety Organization JNES, Toranomon Towers Office, 4-1-28, Toranomon, Minato-ku, Tokyo (Japan); Shirakawa, N. [Inst. of Applied Energy IAE, Shimbashi SY Bldg., 14-2 Nishi-Shimbashi 1-Chome, Minato-ku, Tokyo (Japan)

2012-07-01T23:59:59.000Z

375

Southeast Energy Efficiency Alliance's Building Energy Codes...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

376

Cal. Wat. Code § 13376 | Open Energy Information  

Open Energy Info (EERE)

Wat. Code 13376Legal Abstract Cal. Wat. Code 13376, current through August 14, 2014. Published NA Year Signed or Took Effect 2014 Legal Citation Cal. Wat. Code 13376...

377

Development | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Printable Version Printable Version Development Commercial Residential Adoption Compliance Regulations Resource Center Development The U.S. Department of Energy (DOE) supports and participates in the model building energy code development processes administered by the ASHRAE and the International Code Council (ICC). DOE activities include developing and submitting code change proposals, conducting analysis of building energy efficiency and cost savings, and formulating underlying evaluation methodologies. Through participation in model energy code development for both commercial and residential buildings, DOE strives to make cost-effective, energy efficient upgrades to current model codes. DOE also establishes energy efficiency standards for federal buildings and manufactured housing. Further information on this process is defined under

378

Energy Codes at a Glance  

SciTech Connect

Feeling dim from energy code confusion? Read on to give your inspections a charge. The U.S. Department of Energy’s Building Energy Codes Program addresses hundreds of inquiries from the energy codes community every year. This article offers clarification for topics of confusion submitted to BECP Technical Support of interest to electrical inspectors, focusing on the residential and commercial energy code requirements based on the most recently published 2006 International Energy Conservation Code® and ANSI/ASHRAE/IESNA1 Standard 90.1-2004.

Cole, Pamala C.; Richman, Eric E.

2008-09-01T23:59:59.000Z

379

Wyner-Ziv coding based on TCQ and LDPC codes and extensions to multiterminal source coding  

E-Print Network (OSTI)

to approach the Wyner-Ziv distortion limit D??W Z(R), the trellis coded quantization (TCQ) technique is employed to quantize the source X, and irregular LDPC code is used to implement Slepian-Wolf coding of the quantized source input Q(X) given the side...

Yang, Yang

2005-11-01T23:59:59.000Z

380

Two Poisson structures invariant with respect to discrete transformation in the case of arbitrary semi-simple algebras  

E-Print Network (OSTI)

Two Poisson structures invariant with respect to discrete transformation of the Maximal root in the case of arbitrary semi-simple algebras are presented in explicit form. Thus the problem of construction of equations of n-wave hierarchy in the case of arbitrary semi simple algebra is solved finally.

A. N. Leznov

2008-01-16T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

X-Band EPR Spectrometer with Customizable Arbitrary Waveform Generator based on a 1 GHz DAC Board  

E-Print Network (OSTI)

X-Band EPR Spectrometer with Customizable Arbitrary Waveform Generator based on a 1 GHz DAC Board-4120 , Email: songi@chem.ucsb.edu Abstract We present an EPR spectrometer featuring an arbitrary waveform of pulsed electron paramagnetic resonance (EPR) and enable new experiments. It generates shaped X

Martinis, John M.

382

Pennsylvania | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Pennsylvania Pennsylvania Last updated on 2013-11-05 Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Pennsylvania's current code is the 2009 IECC with reference to ASHRAE 90.1-2007. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Pennsylvania (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 12/31/2009 Adoption Date 12/10/2009 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Pennsylvania DOE Determination Letter, May 31, 2013 Pennsylvania State Certification of Commercial and Residential Building Energy Codes Current Code 2009 IECC Amendments / Additional State Code Information Pennsylvania's current residential code is the 2009 IECC, 2009 IRC, Chapter 11, and/or PA-Alt. Adherence to Pennsylvania's Alternative Residential Energy Provisions 2009 is an acceptable means of demonstrating compliance with the energy conservation code requirements of the Uniform Construction Code.

383

Ohio | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Ohio Ohio Last updated on 2013-10-21 Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Ohio's commercial code is the 2009 IECC with a direct reference to ASHRAE 90.1-07. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Ohio (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 11/01/2011 Adoption Date 03/07/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Ohio DOE Determination Letter, May 31, 2013 Ohio State Certification of Commercila and Residential Building Energy Codes Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Effective January 1, 2013 the residential code in Ohio is based on Chapter 11 of the 2009 IRC. It includes the 2009 IECC and state-specific alternative compliance paths. The 2013 Residential Code of Ohio (RCO) contains amendments to allow compliance to be demonstrated in three ways: (1) 2009 IECC; or (2) RCO Sections 1101 through 1104; or RCO Section 1105 ("The Ohio Homebuilder's Association Alternative Energy Code Option").

384

Kentucky | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Kentucky Kentucky Last updated on 2013-08-02 Current News Kentucky moves forward with the 2009 IECC by reference in their updated 2007 Kentucky Building Code. 2009 IECC is effective 3/6/2011 with mandatory compliance beginning 6/1/2011. Kentucky residential code was also updated to the 2009 IECC. The code is effective 7/1/2012 with an enforcement date of 10/1/2012. Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Amendments are contained in the latest update to the 2007 Kentucky Building Code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Kentucky (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

385

Wyoming | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Wyoming Wyoming Last updated on 2013-06-03 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information The International Conference of Building Officials (ICBO) Uniform Building Code, which is based on the 1989 Model Energy Code (MEC), may be adopted and enforced by local jurisdictions. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE Standard 90.1-2007 for Commercial Buildings in the State of Wyoming (BECP Report, Sept. 2009) Approximate Energy Efficiency Less energy efficient than 2003 IECC Effective Date 08/13/2008 Code Enforcement Voluntary DOE Determination ASHRAE Standard 90.1-2007: No ASHRAE Standard 90.1-2010: No Wyoming DOE Determination Letter, May 31, 2013 Current Code None Statewide

386

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

387

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

388

PICLE: a 2-D code for laser-beam - gas-jet interaction studies  

SciTech Connect

A heat transport hydrodynamic PIC code was adapted for application to the KMSF gas-jet experiments. The input material density profile was changed from the original solid slab geometry to a cylindrically symmetric profile modeling the gas-jet plume. The target material was changed from the original Z = 1 to arbitrary Z. Energy deposition was modified to include inverse bremsstrahlung and resonance absorption. Preliminary results indicate electron thermal conduction dominates over mass flow for times up to about the laser pulse length. Electron thermal conduction is seen to vary between classical and flux-limited values spatially and temporally according to plasma conditions. Applications of this code, entitled PICLE (Particle-In-Cell Laser Equipment code), to absorption and flux-limit parameter studies are described. A source listing and sample input deck are included.

Dunning, M.J.

1981-01-01T23:59:59.000Z

389

Building Energy Codes News | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Codes News Building Energy Codes News News Category: National Policy DOE Activities and Methodology for Assessing Compliance With Building Energy Codes RFI Posted: Tuesday, August 6, 2013 On August 6, DOE published an RFI on its methodology for assessing code compliance into the Federal Register. Based on feedback received from the individual state compliance pilot studies in 2011-2012, the RFI seeks input on DOE's methodology and fundamental assumptions from the general public. Read the full article... Source: U.S. Department of Energy Building Energy Codes Program Energy 2030 Report Calls for Stricter Energy Building Codes Posted: Tuesday, February 12, 2013 The Alliance Commission on National Energy Efficiency Policy aims to double US energy productivity by 2030, and one of its many ways to achieve that

390

Top 10 Reasons for Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Top 10 Reasons for Energy Codes Top 10 Reasons for Energy Codes The projected energy savings attributable to energy codes translates into an estimated cumulative savings of 800 million metric tons of carbon dioxide by 2030-that's equivalent to removing 145 million vehicles from our nation's roadways. Here are the top 10 reasons for adopting and implementing energy codes. Today's global energy, economic, and environmental challenges necessitate a U.S. strategy identifying a suite of energy-efficiency-related initiatives that is implemented by the building industry and relevant stakeholders. Energy codes are a core component of that strategy and, in addition, have an impact on other strategies to improve our built environment. Energy Codes... SAVE money and help reduce needless consumption of energy to heat,

391

Fully relativistic description of the magneto-optical properties of arbitrary layered systems  

Science Journals Connector (OSTI)

A fully relativistic formalism is presented that allows us to define the frequency-dependent optical conductivity tensor for arbitrary layered systems in a layer-resolved way. This opens in particular the way to deal with the magneto-optical properties of magnetic surface layer systems and to calculate the corresponding magneto-optical Kerr spectra. The formalism, based on a fully relativistic description of response theory in arbitrary order, is described in some detail. For an implementation the very flexible spin polarized relativistic Korringa-Kohn-Rostoker method of band structure calculation has been used. Results of corresponding applications to the elemental ferromagnets bcc-Fe and fcc-Co treated as homogeneous layer systems are presented.

T. Huhne and H. Ebert

1999-11-01T23:59:59.000Z

392

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 28580 of 31,917 results. 71 - 28580 of 31,917 results. Article T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. http://energy.gov/cio/articles/t-701-citrix-access-gateway-enterprise-edition-input-validation-flaw-logon-portal Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article IRS Announces New Tribal Economic Development Bond Allocation Guidance Treasury and the IRS published new guidance today allocating Tribal

393

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 29, 2011 July 29, 2011 T-679: VMware Security Advisory - VMSA-2011-0010 The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 20, 2011 T-672: Oracle Critical Patch Update Advisory - July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends

394

Massless fields of arbitrary spin, uniformly accelerated frames, and the zero-point energy  

Science Journals Connector (OSTI)

The autocorrelation functions of fields of arbitrary spin are defined and the formal equivalence between quantized fields and random classical fields is shown explicitly. The thermal effects of acceleration through massless fields with spin are investigated; the spectra of the corresponding zero-point fields appear in a uniformly accelerated frame with extra terms which have the forms of (massless) Fermi-Dirac or Planck functions. Some peculiar features of fields of high spin are briefly discussed.

S. Hacyan

1985-12-15T23:59:59.000Z

395

Random Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and  

E-Print Network (OSTI)

j 6=i q i;j (u j u i ) = 0 for every i: (1:1) Write ` i and r i for the gaps to the leftRandom Walk on an Arbitrary Set By Simon C. Harris, Robin Sibson, and David Williams School be a countably in#12;nite set of points in R, and suppose that I has no points of accumulation and that its

Harris, Simon Colin

396

On the mean Euler characteristic and mean Betti numbers of the Ising model with arbitrary spin  

E-Print Network (OSTI)

The behaviour of the mean Euler-Poincar\\'{e} characteristic and mean Betti's numbers in the Ising model with arbitrary spin on $\\mathbbm{Z}^2$ as functions of the temperature is investigated through intensive Monte Carlo simulations. We also consider these quantities for each color $a$ in the state space $S\\_Q = \\{- Q, - Q + 2, ..., Q \\}$ of the model. We find that these topological invariants show a sharp transition at the critical point.

Philippe Blanchard; Christophe Dobrovolny; Daniel Gandolfo; Jean Ruiz

2006-01-16T23:59:59.000Z

397

Laser ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refi  

NLE Websites -- All DOE Office Websites (Extended Search)

ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refinement ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refinement hydrocode This article has been downloaded from IOPscience. Please scroll down to see the full text article. 2010 J. Phys.: Conf. Ser. 244 032022 (http://iopscience.iop.org/1742-6596/244/3/032022) Download details: IP Address: 50.136.219.251 The article was downloaded on 18/04/2013 at 01:39 Please note that terms and conditions apply. View the table of contents for this issue, or go to the journal homepage for more Home Search Collections Journals About Contact us My IOPscience Laser Ray Tracing in a Parallel Arbitrary Lagrangian-Eulerian Adaptive Mesh Refinement Hydrocode N D Masters 1 , T B Kaiser 1 , R W Anderson 1 , D C Eder 1 , A C Fisher 1 , A E Koniges 2 1 Lawrence Livermore National Laboratory, Livermore, CA U.S.A. 2 National

398

A Reconstructed Discontinuous Galerkin Method for the Compressible Navier-Stokes Equations on Arbitrary Grids  

SciTech Connect

A reconstruction-based discontinuous Galerkin (RDG) method is presented for the solution of the compressible Navier–Stokes equations on arbitrary grids. The RDG method, originally developed for the compressible Euler equations, is extended to discretize viscous and heat fluxes in the Navier–Stokes equations using a so-called inter-cell reconstruction, where a smooth solution is locally reconstructed using a least-squares method from the underlying discontinuous DG solution. Similar to the recovery-based DG (rDG) methods, this reconstructed DG method eliminates the introduction of ad hoc penalty or coupling terms commonly found in traditional DG methods. Unlike rDG methods, this RDG method does not need to judiciously choose a proper form of a recovered polynomial, thus is simple, flexible, and robust, and can be used on arbitrary grids. The developed RDG method is used to compute a variety of flow problems on arbitrary meshes to demonstrate its accuracy, efficiency, robustness, and versatility. The numerical results indicate that this RDG method is able to deliver the same accuracy as the well-known Bassi–Rebay II scheme, at a half of its computing costs for the discretization of the viscous fluxes in the Navier–Stokes equations, clearly demonstrating its superior performance over the existing DG methods for solving the compressible Navier–Stokes equations.

Hong Luo; Luqing Luo; Robert Nourgaliev; Vincent A. Mousseau

2010-09-01T23:59:59.000Z

399

A Reconstructed Discontinuous Galerkin Method for the Compressible Navier-Stokes Equations on Arbitrary Grids  

SciTech Connect

A reconstruction-based discontinuous Galerkin (RDG) method is presented for the solution of the compressible Navier-Stokes equations on arbitrary grids. The RDG method, originally developed for the compressible Euler equations, is extended to discretize viscous and heat fluxes in the Navier-Stokes equations using a so-called inter-cell reconstruction, where a smooth solution is locally reconstructed using a least-squares method from the underlying discontinuous DG solution. Similar to the recovery-based DG (rDG) methods, this reconstructed DG method eliminates the introduction of ad hoc penalty or coupling terms commonly found in traditional DG methods. Unlike rDG methods, this RDG method does not need to judiciously choose a proper form of a recovered polynomial, thus is simple, flexible, and robust, and can be used on arbitrary grids. The developed RDG method is used to compute a variety of flow problems on arbitrary meshes to demonstrate its accuracy, efficiency, robustness, and versatility. The numerical results indicate that this RDG method is able to deliver the same accuracy as the well-known Bassi-Rebay II scheme, at a half of its computing costs for the discretization of the viscous fluxes in the Navier-Stokes equations, clearly demonstrating its superior performance over the existing DG methods for solving the compressible Navier-Stokes equations.

Hong Luo; Luqing Luo; Robert Nourgaliev; Vincent A. Mousseau

2010-01-01T23:59:59.000Z

400

Arkansas | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Arkansas Arkansas Last updated on 2013-12-10 Current News ASHRAE 90.1-2007 became the effective commercial code in Arkansas on January 1, 2013. Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 with Amendments Amendments / Additional State Code Information Arkansas Supplements and Amendments Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Arkansas Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 01/01/2013 Adoption Date 01/13/2012 Code Enforcement Mandatory DOE Determination ASHRAE Standard 90.1-2007: Yes ASHRAE Standard 90.1-2010: No Energy cost savings for Arkansas resulting from the state updating its commercial and residential building energy codes in accordance with federal law are significant, estimated to be on the order of nearly $100 million annually by 2030.

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Delaware | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Delaware Last updated on 2013-08-02 Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Agriculture structures are excluded. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Delaware (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2010 Adoption Date 07/29/2009 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Delaware DOE Determination Letter, May 31, 2013 Delaware State Certification of Commercial and Residential Building Energy Codes

402

Chapter 28 - Perceptual Audio Coding  

Science Journals Connector (OSTI)

Abstract Audio Coding has proliferated as a mainstream enabling digital technology for all types of applications that provide audio and multimedia to consumers using transmission or storage channels with limited capacity. Since its infancies in the eighties and early nineties, the technology behind low bitrate audio coding has developed rapidly until today. Nonetheless, the technology generations seen to date follow several common themes, including the use of time/frequency-domain processing, redundancy reduction (entropy coding), and irrelevancy removal through the pronounced exploitation of perceptual effects. The latter aspect is of paramount importance to the understanding and the performance of the coding systems and has gained more and more in importance over time. Starting from basic principles, this article provides an overview of methods for low bitrate perceptual audio coding and its evolution over time along with some related coding standards (e.g., “mp3”) and typical applications.

Jürgen Herre; Sascha Disch

2014-01-01T23:59:59.000Z

403

PostScript file  

E-Print Network (OSTI)

For the Bona-Smith system (a = 0,b > 0,c 0) the decay ..... amplitude long waves in nonlinear dispersive media I: Derivation and the linear theory, J.

404

News-scripts  

Science Journals Connector (OSTI)

The Office of Naval Research, biology branch, is listening in on homing pigeons, hoping to pick up a few pointers on piloting. ... ONR's electronic bird tracking device features transistorized oscillator and amplifier and a tiny radio transmitter that weighs less than an ounce. ...

1961-06-12T23:59:59.000Z

405

Scripting Support in Spring  

Science Journals Connector (OSTI)

This is just a simple introduction to closures. In the next section, we develop a simple rule engine by using Groovy and Spring; closures are used also. For a... http://groovy.c...

Chris Schaefer; Clarence Ho; Rob Harrop

2014-01-01T23:59:59.000Z

406

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 9520 of 28,905 results. 11 - 9520 of 28,905 results. Article V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code http://energy.gov/cio/articles/v-012-mozilla-firefox-windowlocation-bugs-permit-cross-site-scripting-attacks-and-may Download Letter: Transition of Closure Sites from the Office of Environmental Management to other DOE Organizations From: Deputy Secretary of Energy, Kyle E. McSlarrow (DS-1) To: Todd Martin, Chair, Hanford Advisory Board http://energy.gov/em/downloads/letter-transition-closure-sites-office-environmental-management-other Rebate Georgia Hazardous Site Response Act (Georgia)

407

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1280 of 29,416 results. 71 - 1280 of 29,416 results. Article V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code http://energy.gov/cio/articles/v-012-mozilla-firefox-windowlocation-bugs-permit-cross-site-scripting-attacks-and-may Article Agencies Decide to Dig Up Contaminated Soil at Hanford Site- Federal and state agencies determine cleanup plans for four areas near central Hanford RICHLAND, Wash. -The Department of Energy (DOE) and the U.S. Environmental Protection Agency (EPA), in coordination with the Washington Department of Ecology, have made plans for remediating contaminated soil at

408

T-623: HP Business Availability Center Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Business Availability Center Input Validation Hole 3: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks May 16, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in HP Business Availability Center. A remote user can conduct cross-site scripting attacks. PLATFORM: HP Business Availability Center software 8.06 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: SecurityTracker Alert ID:1025535 HP Knowledge Base CVE-2011-1856 Secunia ID: SA44569 HP Document ID:c02823184 | ESB-2011.0525 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed by the

409

SEAMOPT - Stirling engine optimization code  

SciTech Connect

Experience is described with use of a fast-running Stirling engine optimization code developed at Argonne intended for public release. Stirling engine modeling is provided by the SEAM1 thermodynamic code. An interface was written to combine SEAM1 with a general optimization code and assess maximum component stress levels. Thus full engine thermodynamic and structural simulation is done during the optimization process. Several examples of the use of this code to optimize the GPU-3 engine are described. In one case efficiency was improved by over 25%.

Heames, T.J.; Daley, J.G.

1984-01-01T23:59:59.000Z

410

BPA Hotline & Codes of Conduct  

NLE Websites -- All DOE Office Websites (Extended Search)

Hotline & Codes of Conduct Pages default Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

411

FOUNDATION REVENUE OBJECT CODES LSU Foundation Revenue Object Codes  

E-Print Network (OSTI)

FOUNDATION REVENUE OBJECT CODES 4 page 1 LSU Foundation Revenue Object Codes 0F00 Foundation - Balance Forward 0F01 Foundation - Other Contributions 0F02 Foundation - State of Louisiana 0F03 Foundation - Corporate Contributions 0F04 Foundation - Corporate Match Contributions 0F05 Foundation - Individual

Harms, Kyle E.

412

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31087, R 408.31088, R 408.31089, and R 408.31090 of the Michigan Administrative Code are amended and R 408.31087a is added to the code as follows: PART 10a MICHIGAN UNIFORM ENERGY CODE R 408.31087 Applicable code. Rule 1087. Rules governing the energy efficiency for the design and construction of buildings and structures, not including residential buildings, shall be those contained in the international energy conservation code, 2009 edition, section 501.1 and the ASHRAE

413

The Predicted Impact of Coding Single Nucleotide Polymorphisms Database  

Science Journals Connector (OSTI)

...an additional script coordinated sequence retrieval, SIFT automation, and data collection (available on request). SIFT scores...Available from: http://caroll.vjf.cnrs.fr/cancergene/HOME.html [Accessed 2004 July]. 16 Maglott DR, Katz KS, Sicotte...

Matthew F. Rudd; Richard D. Williams; Emily L. Webb; Steffen Schmidt; Gabrielle S. Sellick; and Richard S. Houlston

2005-11-01T23:59:59.000Z

414

Louisiana | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Louisiana Louisiana Last updated on 2013-08-02 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 Amendments / Additional State Code Information N/A Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Louisiana (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 07/20/2011 Adoption Date 07/20/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Louisiana DOE Determination Letter, May 31, 2013 Louisiana State Certification of Commercial and Residential Building Energy Codes Current Code 2006 IRC Amendments / Additional State Code Information Louisiana's current residential code is the 2006 IRC with direct reference to the 2006 IECC. All AC duct insulation is R6 instead of R8 and to include Section R301.2.1.1 of the 2003 edition of the IRC in lieu of Section R301.2.1.1 of the 2006 edition.

415

LFSC - Linac Feedback Simulation Code  

SciTech Connect

The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

Ivanov, Valentin; /Fermilab

2008-05-01T23:59:59.000Z

416

on education Code of Ethics  

E-Print Network (OSTI)

the forum Abroad on education Code of Ethics for Education Abroad #12;The Forum on Education Abroad Code of Ethics for Education Abroad Contents Page Section I Preamble 2 Section II Ethical Principles for Education Abroad 3 Section III Ethical Guidelines: Examples of Ethical Best 6 Practices for Education Abroad

Illinois at Chicago, University of

417

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network (OSTI)

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

418

Tennessee | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Tennessee Tennessee Last updated on 2013-08-02 Commercial Residential Code Change Current Code 2006 IECC Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Tennessee (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2006 IECC Effective Date 07/01/2011 Adoption Date 06/02/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Tennessee DOE Determination Letter, May 31, 2013 Tennessee State Certification of Commercial and Residential Building Energy Codes Current Code 2006 IECC Approved Compliance Tools Can use REScheck State Specific Research Impacts of the 2009 IECC for Residential Buildings in the State of Tennessee (BECP Report, Sept. 2009)

419

ALOHA Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ALOHA Code ALOHA Code ALOHA Code Central Registry Toolbox Code Version(s): V5.2.3 Code Owner: National Oceanic and Atmospheric Administration (NOAA) Description: The Arial Locations of Hazardous Atmospheres (ALOHA) is atmospheric dispersion model maintained by the Hazardous Materials Division of National Oceanic and Atmospheric Administration (NOAA). ALOHA is one of three separate, integrated software applications in the Computer-Aided Management of Emergency Operations (CAMEO) suite. While the other two software applications: Cameo is primarily a database application and Marplot is the mapping application. ALOHA is used primarily for the evaluations of the consequences of atmospheric releases of chemical species. In addition to safety analysis applications in the Department of Energy (DOE) Complex, ALOHA is applied

420

Alaska | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Printable Version Development Adoption Compliance Regulations Resource Center Alaska Last updated on 2013-12-10 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information N/A Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Alaska (BECP Report, Sept. 2009) Approximate Energy Efficiency Effective Date Code Enforcement DOE Determination ASHRAE Standard 90.1-2007: No ASHRAE Standard 90.1-2010: No Energy cost savings for Alaska resulting from the state updating its commercial and residential building energy codes in accordance with federal law are significant, estimated to be on the order of nearly $50 million annually by 2030. Alaska DOE Determination Letter, May 31, 2013

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

GENII Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GENII Code GENII Code GENII Code GENII is a second generation of environmental dosimetry computer code compiled in the Hanford Environmental Dosimetry System (Generation II). GENII provides a state-of-the-art, technically peer-reviewed, documented set of programs for calculating radiation dose and risk from radio nuclides released into the environment. The GENII System includes capabilities for calculating radiation doses following postulated chronic and acute releases. Version 2.10 is currently being evaluated for inclusion in the Central Registry. For more information on GENII to: http://radiologicalsciences.pnl.gov/resources/hardware.asp The GENII code-specific guidance report has been issued identifying applicable regimes in accident analysis, default inputs, and special

422

Massachusetts | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Massachusetts Massachusetts Last updated on 2013-11-04 Current News The BBRS voted to adopt the 2012 IECC and ASHRAE 90.1-2010 on July 9, 2013. They will be phased in over an extended concurrency period, and is expected to become the sole effective baseline energy code on July 1, 2014. Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information 13.0 Energy Conservation- 2009 IECC Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Massachusetts (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2010 Adoption Date 01/01/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes

423

Virginia | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Virginia Virginia Last updated on 2013-11-05 Current News BHCD/DHCD workgroups are currently meeting over the next 12+ months for the 2012 USBC/IECC regulatory process, with an anticipated effective date in early 2014. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Virginia's current code is the 2009 IECC with reference to ASHRAE 90.1-2007. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Virginia (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 03/01/2011 Adoption Date 07/26/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Virginia DOE Determination Letter, May 31, 2013

424

A Computational Method for Determining Distributed Aerodynamic Loads on Planforms of Arbitrary Shape in Compressible Subsonic Flow  

E-Print Network (OSTI)

The methods presented in this work are intended to provided an easy to understand and easy to apply method for determining the distributed aerodynamic loads and aerodynamic characteristics of planforms of nearly arbitrary shape. Through application...

Brown, Matthew Alan

2013-12-31T23:59:59.000Z

425

deForm: An interactive malleable surface for capturing 2.5D arbitrary objects, tools and touch  

E-Print Network (OSTI)

We introduce a novel input device, deForm, that supports 2.5D touch gestures, tangible tools, and arbitrary objects through real-time structured light scanning of a malleable surface of interaction. DeForm captures ...

Ishii, Hiroshi

426

Building Technologies Office: Advancing Building Energy Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Codes Building Energy Codes Printable Version Share this resource Send a link to Building Technologies Office: Advancing Building Energy Codes to someone by E-mail Share Building Technologies Office: Advancing Building Energy Codes on Facebook Tweet about Building Technologies Office: Advancing Building Energy Codes on Twitter Bookmark Building Technologies Office: Advancing Building Energy Codes on Google Bookmark Building Technologies Office: Advancing Building Energy Codes on Delicious Rank Building Technologies Office: Advancing Building Energy Codes on Digg Find More places to share Building Technologies Office: Advancing Building Energy Codes on AddThis.com... Popular Links Success Stories Previous Next Lighten Energy Loads with System Design. Warming Up to Pump Heat.

427

Building Energy Code | Open Energy Information  

Open Energy Info (EERE)

Code Code Jump to: navigation, search Building energy codes adopted by states (and some local governments) require commercial and/or residential construction to adhere to certain energy standards. While some governmental bodies have developed their own building energy codes, many use existing codes, such as the International Energy Conservation Code (IECC), developed and published by the International Code Council (ICC); or ASHRAE 90.1, developed by the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE). A few local building energy codes require certain commercial facilities to meet green building standards. [1] Building Energy Code Incentives CSV (rows 1 - 85) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

428

Business Models for Code Compliance | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance Compliance Site Map Printable Version Development Adoption Compliance Basics Compliance Evaluation Software & Web Tools Regulations Resource Center Business Models for Code Compliance The U.S. Department of Energy is coordinating strategies and activities with companies, individuals, and government entities to demonstrate, quantify, and monetize energy code compliance and coordinate deployment at the local, state, and regional levels. Consumer Assurance through Code Compliance Energy efficiency measures in the buildings sector, if properly realized and captured, provide a tremendous opportunity to reduce energy consumption and expenditures. Yet currently there is a lack of assurance that buildings as designed realize the levels of energy efficiency established in the

429

San Francisco Building Code Amendments to the  

E-Print Network (OSTI)

occupancy types regulated by the San Francisco Building Code, including: A, B, E, F, H, I, L, M, R, S, and U1 2010 San Francisco Building Code Amendments to the 2010 California Green Building Standards Code (Omitting amendments to 2010 California Building Code and 2010 California Residential Code which do

430

Recovery of Galilean Invariance in Thermal Lattice Boltzmann Models for Arbitrary Prandtl Number  

E-Print Network (OSTI)

In this paper, we demonstrate a set of fundamental conditions required for the formulation of a thermohydrodynamic lattice Boltzmann model at an arbitrary Prandtl number. A specific collision operator form is then proposed that is in compliance with these conditions. It admits two independent relaxation times, one for viscosity and another for thermal conductivity. But more importantly, the resulting thermohydrodynamic equations based on such a collision operator form is theoretically shown to remove the well known non-Galilean invariant artifact at non-unity Prandtl numbers in previous thermal lattice Boltzmann models with multiple relaxation times.

Chen, Hudong; Zhang, Raoyang

2014-01-01T23:59:59.000Z

431

Arbitrary-level hanging nodes for adaptive hphp-FEM approximations in 3D  

SciTech Connect

In this paper we discuss constrained approximation with arbitrary-level hanging nodes in adaptive higher-order finite element methods (hphp-FEM) for three-dimensional problems. This technique enables using highly irregular meshes, and it greatly simplifies the design of adaptive algorithms as it prevents refinements from propagating recursively through the finite element mesh. The technique makes it possible to design efficient adaptive algorithms for purely hexahedral meshes. We present a detailed mathematical description of the method and illustrate it with numerical examples.

Pavel Kus; Pavel Solin; David Andrs

2014-11-01T23:59:59.000Z

432

Divergence form nonlinear nonsmooth parabolic equations with locally arbitrary growth conditions and nonlinear maximal regularity  

E-Print Network (OSTI)

This is a generalization of our prior work on the compact fixed point theory for the elliptic Rosseland-type equations. We obtain the maximum principle without the technical Steklov techniques. Inspired by the Rosseland equation in the conduction-radiation coupled heat transfer, we use the locally arbitrary growth conditions instead of the common global restricted growth conditions. Its physical meaning is: the absolute temperature should be positive and bounded. There exists a fixed point for the linearized map (compact and continuous in $L^2$) in a closed convex set. We also consider the nonlinear maximal regularity in Sobolev space.

Qiao-fu Zhang

2012-05-15T23:59:59.000Z

433

Lower bound on concurrence and distillation for arbitrary-dimensional bipartite quantum states  

SciTech Connect

We present a lower bound of concurrence for arbitrary-dimensional bipartite quantum states. This lower bound may be used to improve all the known lower bounds of concurrence. Moreover, the lower bound gives rise to an operational sufficient criterion of distillability of quantum entanglement. The significance of our result is illustrated by quantitative evaluation of entanglement for entangled states that fail to be identified by the usual concurrence estimation method and by showing the distillability of mixed states that cannot be recognized by other distillability criteria.

Zhao, Ming-Jing; Li-Jost, Xianqing [Max Planck Institute for Mathematics in the Sciences, D-04103 Leipzig (Germany); Zhu, Xue-Na [Department of Mathematics, School of Science, South China University of Technology, Guangzhou 510640 (China); Fei, Shao-Ming [Max Planck Institute for Mathematics in the Sciences, D-04103 Leipzig (Germany); School of Mathematical Sciences, Capital Normal University, Beijing 100048 (China)

2011-12-15T23:59:59.000Z

434

Predictive wavefront control for Adaptive Optics with arbitrary control loop delays  

SciTech Connect

We present a modification of the closed-loop state space model for AO control which allows delays that are a non-integer multiple of the system frame rate. We derive the new forms of the Predictive Fourier Control Kalman filters for arbitrary delays and show that they are linear combinations of the whole-frame delay terms. This structure of the controller is independent of the delay. System stability margins and residual error variance both transition gracefully between integer-frame delays.

Poyneer, L A; Veran, J

2007-10-30T23:59:59.000Z

435

Longitudinal permeability of collisional plasmas under arbitrary degree of degeneration of electron gas  

E-Print Network (OSTI)

Electric conductivity and dielectric permeability of the non-degenerate electronic gas for the collisional plasmas under arbitrary degree of degeneration of electron gas is found. The kinetic equation of Wigner - Vlasov - Boltzmann with collision integral in relaxation form BGK (Bhatnagar, Gross and Krook) in coordinate space is used. Dielectric permeability with using of the relaxation equation in the momentum space has been received by Mermin. Comparison with Mermin's formula has been realized. It is shown, that in the limit when Planck's constant tends to zero expression for dielectric permeability passes in the classical.

A. V. Latyshev; A. A. Yushkanov

2010-03-04T23:59:59.000Z

436

About Building Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance Compliance Regulations Resource Center About Building Energy Codes U.S. Energy Consumption by Sector (2011) Source: U.S. Energy Information Administration, Annual Energy Review According to the U.S. Energy Information Administration's Electric Power Annual, U.S. residential and commercial buildings account for approximately 41% of all energy consumption and 72% of electricity usage. Building energy codes increase energy efficiency in buildings, resulting in significant cost savings in both the private and public sectors of the U.S. economy. Efficient buildings reduce power demand and have less of an environmental impact. The Purpose of Building Energy Codes Energy codes and standards set minimum efficiency requirements for new and renovated buildings, assuring reductions in energy use and emissions over

437

Building Energy Codes Survey Tool  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes Program Codes Program Building Energy Codes Survey Tool The following surveys are available: No available surveys Please contact ( webmaster@energycode.pnl.gov ) for further assistance. English Albanian Arabic Basque Belarusian Bosnian Bulgarian Catalan Chinese (Simplified) Chinese (Traditional; Hong Kong) Chinese (Traditional; Taiwan) Croatian Czech Danish Dutch Dutch Informal English Estonian Finnish French Galician German German informal Greek Hebrew Hindi Hungarian Icelandic Indonesian Irish Italian Italian (formal) Japanese Korean Latvian Lithuanian Macedonian Malay Maltese Norwegian (Bokmal) Norwegian (Nynorsk) Persian Polish Portuguese Portuguese (Brazilian) Punjabi Romanian Russian Serbian Sinhala Slovak Slovenian Spanish Spanish (Mexico) Swedish Thai Turkish Urdu Vietnamese Welsh

438

BUILDING TECHNOLOGIES PROGRAM CODE NOTES  

NLE Websites -- All DOE Office Websites (Extended Search)

Residential Fan Efficiency Residential Fan Efficiency 2012 IECC Over the past several code cycles, mechanical ventilation requirements have been added to ensure adequate outside air is provided for ventilation whenever residences are occupied. These ventilation requirements can be found in the International Residential Code for homes and the International Mechanical Code for dwelling units in multifamily buildings. As a result of the new ventilation requirements, fans designated for whole-house ventilation will have many more operating hours than bathroom or kitchen exhaust fans that are temporarily operated to remove local humidity or odors. Earlier ventilation practices relied on infiltration or operable windows as the primary source of ventilation air. Homes and

439

Graphical models for coding and computation  

E-Print Network (OSTI)

n, k, d ) linear code over F q , with generator matrix G andrepresents the generator matrix of a random linear code. Asrepresents the generator matrix of a random linear code. As

Santhi, Nandakishore

2006-01-01T23:59:59.000Z

440

Arbitrary amplitude solitary and shock waves in an unmagnetized quantum dusty electron-positron-ion plasma  

SciTech Connect

The behavior of quantum dust ion acoustic soliton and shocks in a plasma including inertialess quantum electrons and positrons, classical cold ions, and stationary negative dust grains are studied, using arbitrary amplitude approach. The effect of dissipation due to viscosity of ions is taken into account. The numerical analysis of Sagdeev potential for small value of quantum diffraction parameter (H) shows that for chosen plasma, only compressive solitons can exist and the existence domain of this type of solitons is decreased by increasing dust density (d). Additionally, the possibility of propagation of both subsonic and supersonic compressive solitons is investigated. It is shown that there is a critical dust density above which only supersonic solitons are observed. Moreover, increasing d leads to a reduction in the existence domain of compressive solitons and the possibility of propagation of rarefactive soliton is provided. So, rarefactive solitons are observed only due to the presence of dust particles in this model quantum plasma. Furthermore, numerical solution of governed equations for arbitrary amplitude shock waves has been investigated. It is shown that only compressive large amplitude shocks can propagate. Finally, the effects of plasma parameters on these structures are investigated. This research will be helpful in understanding the properties of dense astrophysical (i.e., white dwarfs and neutron stars) and laboratory dusty plasmas.

Rouhani, M. R.; Akbarian, A.; Mohammadi, Z. [Department of Physics, Alzahra University, P. O. Box 1993891176, Tehran (Iran, Islamic Republic of)] [Department of Physics, Alzahra University, P. O. Box 1993891176, Tehran (Iran, Islamic Republic of)

2013-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Decay of a weak shock followed by a tail of arbitrary waveform  

Science Journals Connector (OSTI)

Weak?shock theory is used to find the decay of a shock that is propagating into a quiet fluid. The tail or flow field behind the shock is assumed to be smooth but otherwise arbitrary. Let the time wave?form of the pressure at the initial measurement point be given by p = P 0 g(t) where P 0 is the initial pressure amplitude and g(t) is the arbitrary tail function normalized so that g(0) = 1. For plane waves the dependence of the shock amplitude P on distance x is found from the following coupled equations: Ax?=?[g(? b )] ?2 ? ? 0 ? b ?g(?)d? and P = P 0 g(? b ) where A is a constant and ? b is the time?like parameter (for the shock) from the Earnshaw solution. For example if G = exp(?at) (an exponential tail) the coupled equations yield P?=?(P 0 /Ax)[(2Ax?+?1) ?1/2 ?+?1] in agreement with P. H. Rogers' result [J. Acoust. Soc. Am. 62 1412–1419 (1977)]. Solutions have also been obtained for the model tail functions described by J. W. Reed [J. Acoust. Soc. Am. 61 39–49 (1977)]. For spherical waves replace x by r 0 ln(r/r 0) where r is radial distance and r 0 is the initial measurement distance. [Work supported by ONR and AFOSR.

David T. Blackstock

1978-01-01T23:59:59.000Z

442

Universality of the isospecial relativity for the invariant description of arbitrary speeds of light  

E-Print Network (OSTI)

We review the recent experimental evidence on arbitrary values of the speed of light within physical media (interior dynamical problems); we recall that classical (operator) theories with speeds of light different than that in vacuum are noncanonically (nonunitarily) related to the special relativity, thus losing the original invariant character with consequential rather serious problems of physical consistency; we show that the isominkowskian geometry, the isopoincar\\'e symmetry and the isospecial relativity provide a formulation of arbitrary speeds of light within physical media as invariant as that of the special relativity for the propagation of light in vacuum; we prove that the isospecial relativity is directly universal, in the sense of holding for all possible spacetime models with a symmetric metric directly in the frame of the observer; we outline the broader genotopic and hyperstructural formulations which are directly universal for single- and multiple-valued irreversible systems, respectively, with a generally nonsymmetric metric; we review the anti-isomorphic isodual formulations for the classical and operator representation of antimatter and the prediction of the new "isodual photon"; we finally point out a few representative connections between the invariant isotopic formulations and a rather large variety of generalized theories existing in the literature.

Ruggero Maria Santilli

1998-12-31T23:59:59.000Z

443

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

444

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2011 , 2011 T-547: Microsoft Windows Human Interface Device (HID) Vulnerability Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. January 31, 2011 T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. January 28, 2011 T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code A vulnerability was reported in RealPlayer. A remote user can cause

445

YNOGK: A NEW PUBLIC CODE FOR CALCULATING NULL GEODESICS IN THE KERR SPACETIME  

SciTech Connect

Following the work of Dexter and Agol, we present a new public code for the fast calculation of null geodesics in the Kerr spacetime. Using Weierstrass's and Jacobi's elliptic functions, we express all coordinates and affine parameters as analytical and numerical functions of a parameter p, which is an integral value along the geodesic. This is the main difference between our code and previous similar ones. The advantage of this treatment is that the information about the turning points does not need to be specified in advance by the user, and many applications such as imaging, the calculation of line profiles, and the observer-emitter problem, become root-finding problems. All elliptic integrations are computed by Carlson's elliptic integral method as in Dexter and Agol, which guarantees the fast computational speed of our code. The formulae to compute the constants of motion given by Cunningham and Bardeen have been extended, which allow one to readily handle situations in which the emitter or the observer has an arbitrary distance from, and motion state with respect to, the central compact object. The validation of the code has been extensively tested through applications to toy problems from the literature. The source FORTRAN code is freely available for download on our Web site http://www1.ynao.ac.cn/{approx}yangxl/yxl.html.

Yang Xiaolin; Wang Jiancheng, E-mail: yangxl@ynao.ac.cn [National Astronomical Observatories, Yunnan Observatory, Chinese Academy of Sciences, Kunming 650011 (China)

2013-07-01T23:59:59.000Z

446

YNOGK: A new public code for calculating null geodesics in the Kerr spacetime  

E-Print Network (OSTI)

Following \\cite{dexagol2009} we present a new public code for the fast calculation of null geodesics in the Kerr spacetime. Using Weierstrass' and Jacobi's elliptic functions, we express all coordinates and affine parameters as analytical and numerical functions of a parameter $p$, which is an integral value along the geodesic. This is a main difference of our code compares with previous similar ones. The advantage of this treatment is that the information about the turning points do not need to be specified in advance by the user, and many applications such as imaging, the calculation of line profiles or the observer-emitter problem, etc become root finding problems. All elliptic integrations are computed by Carlson's elliptic integral method as \\cite{dexagol2009} did, which guarantees the fast computational speed of our code. The formulae to compute the constants of motion given by \\cite{cunnbard1973} have been extended, which allow one readily to handle the situations, in which the emitter or the observer has arbitrary distance and motion state with respect to the central compact object. The validation of the code has been extensively tested by its application to toy problems from the literature. The source FORTRAN code is freely available for download on the web.

Xiaolin Yang; Jiancheng Wang

2013-05-06T23:59:59.000Z

447

Illinois | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Illinois Illinois Last updated on 2013-11-04 Current News Senate Bill 3724, signed by the Governor on August 17, 2012, amends the effective date of the 2012 IECC to January 1, 2013. Administrative Rules to adopt the 2012 IECC with amendments were approved by the Joint Committee on Administrative Rules on December 11, 2012. Commercial Residential Code Change Current Code 2012 IECC with Amendments Amendments / Additional State Code Information N/A Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE Standard 90.1-2007 for Commercial Buildings in the State of Illinois (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2012 IECC Effective Date 01/01/2013 Adoption Date 12/11/2012 Code Enforcement Mandatory DOE Determination ASHRAE Standard 90.1-2007: No

448

Nevada | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Nevada Nevada Last updated on 2013-06-27 Current News On November 10, 2011, The Nevada State office of Energy adopted the 2009 IECC with an effective date of July 1, 2012. Jurisdictions in southern Nevada adopted the 2009 IECC effective July 5, 2011. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information The commercial code in Nevada effective July 1, 2012 is the 2009 IECC with reference to 90.1-2007. Jurisdictions in southern Nevada adopted the 2009 IECC Effective July 5, 2011. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Nevada (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2012

449

Idaho | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Idaho Idaho Last updated on 2013-06-03 Current News As of January 1, 2011, all jurisdictions are required to comply with the 2009 IECC. Commercial Residential Code Change Current Code 2009 IECC Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Idaho (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 01/01/2011 Adoption Date 06/08/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Idaho DOE Determination Letter, May 31, 2013 Current Code 2009 IECC Approved Compliance Tools Can use REScheck State Specific Research Impacts of the 2009 IECC for Residential Buildings in the State of Idaho (BECP Report, Sept. 2009)

450

II.CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

1 1 II.CONTRACT ID CODE ~AGE 1 of AMENDMENT OF SOLICITATIONIMODIFICATION OF CONTRACT PAGES AC 5. PROJECT NO. (If applicable) 3. EFFECTNE DATE 2. AMENDMENTfMODIFICA TION NO. 4. REQUISITIONIPURCHASE REQ. NO. See Block 16c. NOPR 7. ADMINISTERED BY (If other than Item 6) CODE 05008 6. ISSUED BY CODE 05008 U.S. Department of Energy National Nuclear Security Administration U.S. Department of Energy National Nuclear Security Administration P.O. Box 2050 Oak Ridge, TN 37831 P.O. Box 2050 Oak Ridge, TN 37831 9A. AMENDMENT OF SOLICITATION NO. 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Y-12, LLC P.O. Box 2009 MS 8014 9B. DATED (SEE ITEM 11) Oak Ridge, TN 37831-8014 lOA. MODIFICATION OF CONTRACT/ORDER NO.

451

Kansas | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Kansas Kansas Last updated on 2013-06-03 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information The State has adopted the 2006 IECC as the applicable EE standard for commercial and industrial buildings in Kansas (KSA 66-1227). The same law also states that "the state corporation commission has no authority to adopt or enforce energy efficiency standards for residential, commercial, or industrial structures." Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Kansas (BECP Report, Sept. 2009) Effective Date 04/10/2007 Code Enforcement Voluntary DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Kansas DOE Determination Letter, May 31, 2013

452

Texas | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Texas Texas Last updated on 2013-12-10 Current News Cities in Texas are beginning to move their energy codes forward. The city of Cedar Park adopted the 2012 IECC, effective October 1, 2012. Amarillo has also adopted the 2012 IECC, although with some weakining provisions. In addition, the Houston City Council recently voted to require all new residential construction to be 10% higher than the 2009 IECC. Commercial Residential Code Change Current Code 2009 IECC Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Texas (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 04/01/2011 Adoption Date 06/04/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes

453

Vermont | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Vermont Vermont Last updated on 2013-06-03 Current News The Vermont Commercial Building Energy Standards (CBES) became effective January 3, 2012. The CBES incorporates elements of the 2012 IECC. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information 2011 Vermont Commercial Building Energy Standards (CBES) are based on the 2009 IECC. Commercial Building Energy Standards Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Vermont (BECP Report, Sept. 2009) Approximate Energy Efficiency More energy efficient than 2009 IECC Effective Date 01/03/2012 Adoption Date 10/03/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No

454

code | OpenEI Community  

Open Energy Info (EERE)

by Graham7781(2017) Super contributor 14 April, 2014 - 09:48 National Day of Civic Hacking code community data Event hacking international national OpenEI The National Day of...

455

NFPA's Hydrogen Technologies Code Project  

SciTech Connect

This article discusses the development of National Fire Protection Association 2 (NFPA), a comprehensive hydrogen safety code. It analyses the contents of this document with particular attention focused on new requirements for setting hydrogen storage systems. These new requirements use computational fluid dynamic modeling and risk assessment procedures to develop requirements that are based on both technical analyses and defined risk criteria. The intent is to develop requirements based on procedures that can be replicated based on the information provided in the code document. This code will require documentation of the modeling inputs and risk criteria and analyses in the supporting information. This article also includes a description of the codes and standards that address hydrogen technologies in general.

Rivkin, C. H.

2008-12-01T23:59:59.000Z

456

Frequently Used Codes and Standards  

Science Journals Connector (OSTI)

The Merriam-Webster dictionary definition of “Code” is a systematic statement of a body of law, specially one given statutory force, and “Standard” is something established by authority, custom, ... engineering c...

Javad Khazaii

2014-01-01T23:59:59.000Z

457

Montana Coal Mining Code (Montana)  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Labor and Industry is authorized to adopt rules pertaining to safety standards for all coal mines in the state. The Code requires coal mine operators to make an accurate map or...

458

Appliance Standards and Building Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Manager Presentation Program Manager Presentation Appliance Standards and Building Codes John Cymbalsky U.S Department of Energy - Building Technologies Office john.cymbalsky@ee.doe.gov 202.287.1692 2 | Building Technologies Office eere.energy.gov Appliance Standards and Building Codes Program Goals Appliance Standards Program Goals Provide cost-effective energy savings through national appliance and equipment standards: Issue 23 final rules by end of FY2015 Deliver at least 1 qBtu of savings annually by

459

Quantum stabilizer codes and beyond  

E-Print Network (OSTI)

QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2008 Major... Subject: Computer Science QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Sarvepalli, Pradeep Kiran

2008-10-10T23:59:59.000Z

460

Guam - Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guam - Building Energy Code Guam - Building Energy Code Guam - Building Energy Code < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Program Info Program Type Building Energy Code Provider Department of Public Works NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by the legislature before it is official. This entry and information will be updated accordingly. Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Technical Standards, Safety Analysis Toolbox Codes - November...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Standards, Safety Analysis Toolbox Codes - November 2003 November 2003 Software Quality Assurance Plan and Criteria for the Safety Analysis Toolbox Codes Safety analysis...

462

Safety, Codes, and Standards | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety, Codes, and Standards Safety, Codes, and Standards 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation Meeting, May 18-22,...

463

Code Tables | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

System NMMSS Information, Reports & Forms Code Tables Code Tables U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

464

Chemistry and Material Sciences Codes at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemistry and Material Sciences Codes Chemistry and Material Sciences Codes at NERSC April 6, 2011 L ast edited: 2014-06-02 08:59:45...

465

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Residential  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31059, R 408.31060, R 408.31061, R 408.31062, R 408.31063, R 408.31064, R 408.31065, R 408.31066, R 408.31069, and R 408.31070, of the Michigan Administrative Code are amended, and R 408.31060a, R 408.31060b, R 408.31060c, R 408.31060d, R 408.31060e, and R 408.31063a are added to the Code as follows: PART 10 MICHIGAN UNIFORM ENERGY CODE R 408.31059 Applicable code. Rule 1059. The provisions of the international energy conservation code, 2009 edition, except for sections 102.1.1, 107.2 to 107.5, 301.2, 301.3, 402.3.2, 501.1, to 506.6.2 and Tables

466

FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and  

NLE Websites -- All DOE Office Websites (Extended Search)

Current Approaches Current Approaches to Safety, Codes and Standards to someone by E-mail Share FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Facebook Tweet about FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Twitter Bookmark FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Google Bookmark FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Delicious Rank FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Digg Find More places to share FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on AddThis.com... Home Basics Current Approaches to Safety, Codes & Standards

467

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

468

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

469

Fano-Hopfield model and photonic band gaps for an arbitrary atomic lattice  

SciTech Connect

We study the light dispersion relation in a periodic ensemble of atoms at fixed positions in the Fano-Hopfield model (the atomic dipole being modeled with harmonic oscillators). Compared to earlier works, we do not restrict to cubic lattices, and we do not regularize the theory by hand but we renormalize it in a systematic way using a Gaussian cutoff in momentum space. Whereas no omnidirectional spectral gap is known for light in a Bravais atomic lattice, we find that, for a wide range of parameters, an omnidirectional gap occurs in a diamond atomic lattice, which may be realized in an experiment with ultracold atoms. The long-wavelength limit of the theory also provides a Lorentz-Lorenz (or Clausius-Mossotti) relation for an arbitrary lattice.

Antezza, Mauro; Castin, Yvan [Laboratoire Kastler Brossel, Ecole Normale Superieure, CNRS and UPMC, 24 rue Lhomond, 75231 Paris (France)

2009-07-15T23:59:59.000Z

470

Fano-Hopfield model and photonic band gaps for an arbitrary atomic lattice  

Science Journals Connector (OSTI)

We study the light dispersion relation in a periodic ensemble of atoms at fixed positions in the Fano-Hopfield model (the atomic dipole being modeled with harmonic oscillators). Compared to earlier works, we do not restrict to cubic lattices, and we do not regularize the theory by hand but we renormalize it in a systematic way using a Gaussian cutoff in momentum space. Whereas no omnidirectional spectral gap is known for light in a Bravais atomic lattice, we find that, for a wide range of parameters, an omnidirectional gap occurs in a diamond atomic lattice, which may be realized in an experiment with ultracold atoms. The long-wavelength limit of the theory also provides a Lorentz-Lorenz (or Clausius-Mossotti) relation for an arbitrary lattice.

Mauro Antezza and Yvan Castin

2009-07-21T23:59:59.000Z

471

Device For Determining Therophysical Properties Of A Multi-Component Gas At Arbitrary Temperature And Pressure  

DOE Patents (OSTI)

A computer product for determining thermodynamic properties of a natural gas hydrocarbon, when the speed of sound in the gas is known at an arbitrary temperature and pressure. Thus, the known parameters are the sound speed, temperature, pressure, and concentrations of any dilute components of the gas. The method uses a set of reference gases and their calculated density and speed of sound values to estimate the density of the subject gas. Additional calculations can be made to estimate the molecular weight of the subject gas, which can then be used as the basis for mass flow calculations, to determine the speed of sound at standard pressure and temperature, and to determine various thermophysical characteristics of the gas.

Morrow, Thomas B. (San Antonio, TX); Behring, II, Kendricks A. (Gilbert, AZ)

2005-02-01T23:59:59.000Z

472

Casimir-Lifshitz force out of thermal equilibrium and heat transfer between arbitrary bodies  

E-Print Network (OSTI)

We study the Casimir-Lifshitz force and the radiative heat transfer occurring between two arbitrary bodies, each one held at a given temperature, surrounded by environmental radiation at a third temperature. The system, in stationary configuration out of thermal equilibrium, is characterized by a force and a heat transfer depending on the three temperatures, and explicitly expressed in terms of the scattering operators of each body. We find a closed-form analytic expression valid for bodies of any geometry and dielectric properties. As an example, the force between two parallel slabs of finite thickness is calculated, showing the importance of the environmental temperature as well as the occurrence of a repulsive interaction. An analytic expression is also provided for the force acting on an atom in front of a slab. Our predictions can be relevant for experimental and technological purposes.

Riccardo Messina; Mauro Antezza

2010-12-23T23:59:59.000Z

473

A unified physical boundary condition for massless fields of arbitrary spin  

E-Print Network (OSTI)

Boundary conditions for the Maxwell and Dirac fields at material surfaces are widely-used and physically well-motivated, but do not appear to have been generalised to deal with higher spin fields. A consequence of this is that calculations of, for example, Casimir forces associated with higher spin fields always select some arbitrary mathematical boundary conditions, rather than those which are physically motivated. Here, we use the two-spinor calculus formalism to present a unified treatment of the boundary conditions routinely employed in the treatment of spin-1/2 and spin-1 fields. We then use this unification to obtain a completely new boundary condition that can be applied to massless fields of any spin, including the spin-2 graviton, and its supersymmetric partner the spin-3/2 gravitino. We demonstrate one important consequence of our generalisation, which is that periodic boundary conditions cannot be applied to any physically-confined fermionic field.

Adam Stokes; Robert Bennett

2014-11-04T23:59:59.000Z

474

A unified physical boundary condition for massless fields of arbitrary spin  

E-Print Network (OSTI)

Boundary conditions for the Maxwell and Dirac fields at material surfaces are widely-used and physically well-motivated, but do not appear to have been generalised to deal with higher spin fields. A consequence of this is that calculations of, for example, Casimir forces associated with higher spin fields always select some arbitrary mathematical boundary conditions, rather than those which are physically motivated. Here, we use the two-spinor calculus formalism to present a unified treatment of the boundary conditions routinely employed in the treatment of spin-1/2 and spin-1 fields. We then use this unification to obtain a completely new boundary condition that can be applied to massless fields of any spin, including the spin-2 graviton, and its supersymmetric partner the spin-3/2 gravitino. We demonstrate one important consequence of our generalisation, which is that periodic boundary conditions cannot be applied to any physically-confined fermionic field.

Stokes, Adam

2014-01-01T23:59:59.000Z

475

The Smoluchowski-Kramers limit of stochastic differential equations with arbitrary state-dependent friction  

E-Print Network (OSTI)

We study a class of systems of stochastic differential equations describing diffusive phenomena. The Smoluchowski-Kramers approximation is used to describe their dynamics in the small mass limit. Our systems have arbitrary state-dependent friction and noise coefficients. We identify the limiting equation and, in particular, the additional drift term that appears in the limit is expressed in terms of the solution to a Lyapunov matrix equation. The proof uses a theory of convergence of stochastic integrals developed by Kurtz and Protter. The result is sufficiently general to include systems driven by both white and Ornstein-Uhlenbeck colored noises. We discuss applications of the main theorem to several physical phenomena, including the experimental study of Brownian motion in a diffusion gradient.

Scott Hottovy; Austin McDaniel; Giovanni Volpe; Jan Wehr

2014-04-08T23:59:59.000Z

476

Measurement of arbitrary two-photon entanglement state with the photonic Faraday rotation  

E-Print Network (OSTI)

We propose an efficient protocol for measuring the concurrence of arbitrary two-photon pure entangled state with the help of the photonic Faraday rotation. In the protocol, the concurrence of the photonic entangled state can be conversed into the total success probability for picking up the odd-parity photonic state. For completing the measurement task, we require some auxiliary three-level atoms, which are trapped in the low-quality cavities. Our protocol can be well realized under current experimental conditions. Moreover, under practical imperfect atom state detection and photonic Faraday rotation conditions, our protocol can also work well. Based on these features, our protocol may be useful in current quantum information processing.

Lan Zhou

2014-02-05T23:59:59.000Z

477

Two-particle multichannel systems in a finite volume with arbitrary spin  

SciTech Connect

The quantization condition for two-particle systems with arbitrary number of two-body open coupled channels, spin and masses in a finite cubic volume with either periodic or twisted boundary conditions is presented. The condition presented is in agreement with all previous studies of two-body systems in a finite volume. The result is relativistic, holds for all momenta below the three- and four-particle thresholds, and is exact up to exponential volume corrections that are governed by L/r, where L is the spatial extent of the volume and r is the range of the interactions between the particles. For hadronic systems the range of the interaction is set by the inverse of the pion mass, m?, and as a result the formalism presented is suitable for m?L>>1. Implications of the formalism for the studies of multichannel baryon-baryon systems are discussed.

Briceno, Raul A. [JLAB

2014-04-01T23:59:59.000Z

478

The second law of thermodynamics in the quantum Brownian oscillator at an arbitrary temperature  

E-Print Network (OSTI)

In the classical limit no work is needed to couple a system to a bath with sufficiently weak coupling strength (or with arbitrarily finite coupling strength for a linear system) at the same temperature. In the quantum domain this may be expected to change due to system-bath entanglement. Here we show analytically that the work needed to couple a single linear oscillator with finite strength to a bath cannot be less than the work obtainable from the oscillator when it decouples from the bath. Therefore, the quantum second law holds for an arbitrary temperature. This is a generalization of the previous results for zero temperature [1,2]; in the high temperature limit we recover the classical behavior.

Ilki Kim; Guenter Mahler

2007-12-04T23:59:59.000Z

479

Construction of invisibility cloaks of arbitrary shape and size using planar layers of metamaterials  

Science Journals Connector (OSTI)

Transformation optics (TO) is a powerful tool for the design of electromagnetic and optical devices with novel functionality derived from the unusual properties of the transformation media. In general the fabrication of TO media is challenging requiring spatially varying material properties with both anisotropic electric and magnetic responses. Though metamaterials have been proposed as a path for achieving such complex media the required properties arising from the most general transformations remain elusive and cannot implemented by state-of-the-art fabrication techniques. Here we propose faceted approximations of TO media of arbitrary shape in which the volume of the TO device is divided into flat metamaterial layers. These layers can be readily implemented by standard fabrication and stacking techniques. We illustrate our approximation approach for the specific example of a two-dimensional omnidirectional “invisibility cloak ” and quantify its performance using the total scattering cross section as a practical figure of merit.

Oliver Paul; Yaroslav Urzhumov; Christoffer Elsen; David Smith; Marco Rahm

2012-01-01T23:59:59.000Z

480

Electromagnetic Properties for Arbitrary Spin Particles: Part 1 $-$ Electromagnetic Current and Multipole Decomposition  

E-Print Network (OSTI)

In a set of two papers, we propose to study an old-standing problem, namely the electromagnetic interaction for particles of arbitrary spin. Based on the assumption that light-cone helicity at tree level and $Q^2=0$ should be conserved non-trivially by the electromagnetic interaction, we are able to derive \\emph{all} the natural electromagnetic moments for a pointlike particle of \\emph{any} spin. In this first paper, we propose a transparent decomposition of the electromagnetic current in terms of covariant vertex functions. We also define in a general way the electromagnetic multipole form factors, and show their relation with the electromagnetic moments. Finally, by considering the Breit frame, we relate the covariant vertex functions to multipole form factors.

Cédric Lorcé

2009-01-27T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

An Arbitrary Lagrangian-Eulerian Discretization of MHD on 3D Unstructured Grids  

SciTech Connect

We present an arbitrary Lagrangian-Eulerian (ALE) discretization of the equations of resistive magnetohydrodynamics (MHD) on unstructured hexahedral grids. The method is formulated using an operator-split approach with three distinct phases: electromagnetic diffusion, Lagrangian motion, and Eulerian advection. The resistive magnetic dynamo equation is discretized using a compatible mixed finite element method with a 2nd order accurate implicit time differencing scheme which preserves the divergence-free nature of the magnetic field. At each discrete time step, electromagnetic force and heat terms are calculated and coupled to the hydrodynamic equations to compute the Lagrangian motion of the conducting materials. By virtue of the compatible discretization method used, the invariants of Lagrangian MHD motion are preserved in a discrete sense. When the Lagrangian motion of the mesh causes significant distortion, that distortion is corrected with a relaxation of the mesh, followed by a 2nd order monotonic remap of the electromagnetic state variables. The remap is equivalent to Eulerian advection of the magnetic flux density with a fictitious mesh relaxation velocity. The magnetic advection is performed using a novel variant of constrained transport (CT) that is valid for unstructured hexahedral grids with arbitrary mesh velocities. The advection method maintains the divergence free nature of the magnetic field and is second order accurate in regions where the solution is sufficiently smooth. For regions in which the magnetic field is discontinuous (e.g. MHD shocks) the method is limited using a novel variant of algebraic flux correction (AFC) which is local extremum diminishing (LED) and divergence preserving. Finally, we verify each stage of the discretization via a set of numerical experiments.

Rieben, R N; White, D A; Wallin, B K; Solberg, J M

2006-06-12T23:59:59.000Z

482

Energy Consumption of Minimum Energy Coding in  

E-Print Network (OSTI)

Energy Consumption of Minimum Energy Coding in CDMA Wireless Sensor Networks Benigno Zurita Ares://www.ee.kth.se/control Abstract. A theoretical framework is proposed for accurate perfor- mance analysis of minimum energy coding energy consumption is analyzed for two coding schemes proposed in the literature: Minimum Energy coding

Johansson, Karl Henrik

483

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Building Energy Code < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Program Info State Alabama Program Type Building Energy Code Provider Alabama Department of Economic and Community Affairs ''Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the [http://www.energycodes.gov/states/ DOE] and [http://bcap-ocean.org/ BCAP] web sites.'' Legislation passed in March 2010 authorized the Alabama Energy and

484

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Building Energy Code < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Program Info State Massachusetts Program Type Building Energy Code Provider State Board of Building Regulations and Standards ''Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the [http://www.energycodes.gov/states/ DOE] and [http://bcap-ocean.org/ BCAP] websites.'' The Massachusetts Board of Building Regulations and Standards has authority

485

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Building Energy Code < Back Eligibility Commercial Multi-Family Residential Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Program Info State Ohio Program Type Building Energy Code Provider Ohio Department of Commerce ''Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the [http://www.energycodes.gov/states/ DOE] and [http://bcap-ocean.org/ BCAP] websites.'' The Board of Building Standards is the primary state agency that protects

486

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Building Energy Code < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Bioenergy Solar Lighting Windows, Doors, & Skylights Alternative Fuel Vehicles Hydrogen & Fuel Cells Heating Buying & Making Electricity Water Water Heating Wind Program Info State Connecticut Program Type Building Energy Code Provider Connecticut Office of Policy and Management ''Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the [http://www.energycodes.gov/states/

487

Building Energy Codes | Open Energy Information  

Open Energy Info (EERE)

Codes Codes Jump to: navigation, search Building energy codes adopted by states (and some local governments) require commercial and/or residential construction to adhere to certain energy standards. While some governmental bodies have developed their own building energy codes, many use existing codes, such as the International Energy Conservation Code (IECC), developed and published by the International Code Council (ICC); or ASHRAE 90.1, developed by the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE). A few local building energy codes require certain commercial facilities to meet green building standards. [1] Contents 1 Building Energy Code Incentives 2 References Building Energy Code Incentives CSV (rows 1 - 85) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

488

Building Technologies Office: Advancing Building Energy Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Advancing Building Energy Codes Advancing Building Energy Codes The Building Technologies Office (BTO) supports greater adoption of residential and commercial building energy codes through collaborative efforts with local governments and industry groups, and by providing key tools and assistance for code development, adoption, and implementation. Through advancing building codes, we aim to improve building energy efficiency by 50%, and to help states achieve 90% compliance with their energy codes. 75% of U.S. Buildings will be New or Renovated by 2035, Building Codes will Ensure They Use Energy Wisely. Learn More 75% of U.S. Buildings will be New or Renovated by 2035; Building Codes will Ensure They Use Energy Wisely Learn More Energy Codes Ensure Efficiency in Buildings We offer guidance and technical resources to policy makers, compliance verification professionals, architects, engineers, contractors, and other stakeholders who depend on building energy codes.

489

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Building Energy Code < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Program Info State Montana Program Type Building Energy Code Provider Building Codes Bureau ''Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the [http://www.energycodes.gov/states/ DOE] and [http://bcap-ocean.org/ BCAP] websites.'' The energy codes are reviewed on a three-year cycle corresponding to the adoption of new versions of the International Code Conference (ICC) Uniform

490

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Michigan Michigan Program Type Building Energy Code Provider Michigan Department of Labor and Economic Growth ''Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the [http://www.energycodes.gov/states/ DOE] and [http://bcap-ocean.org/ BCAP] websites.'' The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code. The state energy code is evaluated for revisions or modifications every three years. The new code requirements are adopted at the beginning of each state building code cycle (which corresponds with the three-year cycle of

491

Contacts | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts Contacts Provide feedback, ask questions, or formally request assistance: Website Contact Report broken links and suggest content and/or updates to information on this website. Please use the Online Help Desk for questions or issues with the compliance software tools. Online Help Desk Submit questions regarding energy codes, compliance, REScheck(tm), COMcheck(tm), or other BECP tools to a building energy codes expert. Technical Assistance Request Submit a formal, state or local jurisdiction-level request for technical assistance. Program Contacts U.S. Department of Energy (DOE) contacts for the Building Energy Codes Program (BECP). Federal (DOE) Contact Program Area Jeremy Williams, Project Manager Adoption Compliance Compliance Tools- REScheck& COMcheck Technical Assistance

492

Wisconsin | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Wisconsin Wisconsin Last updated on 2013-07-18 Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information SPS Chapter 363 specifically addresses amendments to the 2009 IECC. For example, if there is reference to SPS 363.0503, then the SPS 363 references only those amendments associated with the 2009 IECC (as based on language adopted in SPS 361.05), and 0503 indicates that section 503 of the 2009 IECC is being amended. WI Amendments as addressed by SPS 361.05 Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Wisconsin (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 09/01/2011 Adoption Date 07/01/2011

493

THE GOVERNANCE OF CODE: CODE AS GOVERNANCE Serena Syme[1  

E-Print Network (OSTI)

by the creation of information property. The establishment of a market involves the development of a bundle of rights that both create property and define the rules under which property-based transactions might occur, proprietary licenses, and the Uniform Computer Information Transactions Act (UCITA). The open code licenses

Camp, L. Jean

494

Hybrid codes: Methods and applications  

SciTech Connect

In this chapter we discuss hybrid'' algorithms used in the study of low frequency electromagnetic phenomena, where one or more ion species are treated kinetically via standard PIC methods used in particle codes and the electrons are treated as a single charge neutralizing massless fluid. Other types of hybrid models are possible, as discussed in Winske and Quest, but hybrid codes with particle ions and massless fluid electrons have become the most common for simulating space plasma physics phenomena in the last decade, as we discuss in this paper.

Winske, D. (Los Alamos National Lab., NM (USA)); Omidi, N. (California Univ., San Diego, La Jolla, CA (USA))

1991-01-01T23:59:59.000Z

495

Safety, Codes, and Standards Fact Sheet | Department of Energy  

Energy Savers (EERE)

Fuel Cell Technologies Office describing hydrogen safety, codes, and standards. Safety, Codes, and Standards...

496

ON MINIMAL TREE REALIZATIONS OF LINEAR CODES NAVIN KASHYAP  

E-Print Network (OSTI)

associated with them are now a major focus area of research in coding theory. Turbo codes, low-density parity-check (LDPC) codes, and expander codes are all examples of codes defined, in one way or another, on underlying

Kashyap, Navin

497

Project Juno Code of Practice  

E-Print Network (OSTI)

Project Juno Code of Practice Institute of Physics Advancing women's careers in physics higher: Appointment, promotion and selection processes and procedures that encourage men and women to apply for academic posts at all levels. 2.1 Transparent processes and procedures 2.1.1 Ensure that selection criteria

Davies, Christopher

498

COLOR-CODING CHROMEVALENT ANTIGEN  

Science Journals Connector (OSTI)

...disturbing surface antigenicity (Wood, Science 112:86, 1950...color-coded by affixing a red or blue designa- tion to...dissociate from solution and form red, blue, or white aggre- gates in contrast to a blue, red, or purple back- ground...

M. Gershman

1963-10-01T23:59:59.000Z

499

Free Energy Code Online Discussion  

E-Print Network (OSTI)

Free Energy Code Online Discussion for Building Department Personnel Join us for this FREE 90 by California utility customers under the auspices of the California Public Utilities Commission and in support -- availability subject to enrollment levels: Tuesday, October 1 ­ Click here to register Wednesday, October 2

500

Advancing Building Energy Codes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Advancing Building Energy Codes Advancing Building Energy Codes 75% of U.S. buildings will be new or renovated by 2035. Building codes will ensure they use energy wisely. 75% of U.S. buildings will be new or renovated by 2035. Building codes will ensure they use energy wisely. The Building Technologies Office (BTO) supports greater adoption of residential and commercial building energy codes through collaborative efforts with local governments and industry groups, and by providing key tools and assistance for code development, adoption, and implementation. Through advancing building codes, we aim to improve building energy efficiency by 50%, and to help states achieve 90% compliance with their energy codes. Energy Codes Ensure Efficiency in Buildings