Powered by Deep Web Technologies
Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Subversion Hook Scripts Arbitrary Command Injection 0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am Addthis PROBLEM: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability PLATFORM: Apache Subversion 1.x ABSTRACT: A vulnerability has been reported in Apache Subversion. REFERENCE LINKS: Apache Original Advisory Secunia Advisory SA53727 CVE-2013-2088 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an input validation error in the svn-keyword-check.pl hook script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that contrib scripts are used on the

2

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

3

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apache OFBiz Cross-Site Scripting and Code Execution 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected. references LINKS: Vendor Advisory Secunia Advisory 48800 CVE-2012-1621 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code

4

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

5

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code 48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability April 16, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in ActiveScriptRuby, which can be exploited by malicious people to potentially compromise a user's system. PLATFORM: Version(s): 1.2.2.0 and prior ABSTRACT: The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands. reference LINKS: Secunia Advisory 48811 CVE-2012-1241 IMPACT ASSESSMENT: High Discussion: ActiveScriptRuby is a software to implement Ruby into a Windows environment. ActiveScriptRuby contains a vulnerability where an arbitrary Ruby script may be executed on the web browser that can execute ActiveX

6

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

7

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

8

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

9

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

10

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

11

Quantum polar codes for arbitrary channels  

E-Print Network (OSTI)

We construct a new entanglement-assisted quantum polar coding scheme which achieves the symmetric coherent information rate by synthesizing "amplitude" and "phase" channels from a given, arbitrary quantum channel. We first demonstrate the coding scheme for arbitrary quantum channels with qubit inputs, and we show that quantum data can be reliably decoded by O(N) rounds of coherent quantum successive cancellation, followed by N controlled-NOT gates (where N is the number of channel uses). We also find that the entanglement consumption rate of the code vanishes for degradable quantum channels. Finally, we extend the coding scheme to channels with multiple qubit inputs. This gives a near-explicit method for realizing one of the most striking phenomena in quantum information theory: the superactivation effect, whereby two quantum channels which individually have zero quantum capacity can have a non-zero quantum capacity when used together.

Wilde, Mark M

2012-01-01T23:59:59.000Z

12

ScriptEase: Generating Scripting Code for Computer Role-Playing Games  

Science Conference Proceedings (OSTI)

The state-of-the-art in game scripting is to manually script individual game objects that interact in the game. Thousands of non-player characters (NPCs) and props need to be scripted before they play a part in a game adventure. This situation introduces ...

M. McNaughton; M. Cutumisu; D. Szafron; J. Schaeffer; J. Redford; D. Parker

2004-09-01T23:59:59.000Z

13

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

System Multiple Vulnerabilities U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

14

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple...

15

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

16

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

17

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

18

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

19

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

20

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

22

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

23

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

24

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE))

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

25

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

26

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

27

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

28

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

29

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

30

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

31

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

32

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

33

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

34

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

35

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

36

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

37

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

38

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

39

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

40

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

42

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

43

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

44

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

45

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

46

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

47

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

48

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

NLE Websites -- All DOE Office Websites (Extended Search)

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities August 2, 2013 - 2:25am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco WAAS (Wide Area Application Services), which can be exploited by malicious users and malicious people to compromise a vulnerable system. PLATFORM: Versions 5.0.x, 5.1.x, and 5.2.x. ABSTRACT: Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia Advisory SA54372 CVE-2013-3443 CVE-2013-3444 IMPACT ASSESSMENT: High

49

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

50

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

51

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

52

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

53

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

54

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

55

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

56

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

57

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

58

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

59

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

60

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

62

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

63

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Energy.gov (U.S. Department of Energy (DOE))

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

64

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

65

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

66

BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations  

E-Print Network (OSTI)

In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusio...

Murphy, Jeremiah W

2008-01-01T23:59:59.000Z

67

U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: VMware vCenter Operations Cross-Site Scripting Vulnerability 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory Secunia Advisory SA50795 CVE-2012-5050 IMPACT ASSESSMENT: Medium Discussion: Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Impact: A vulnerability in VMware vCenter Operations, which can be exploited to

68

BETHE-Hydro: An Arbitrary Lagrangian-Eulerian Multi-dimensional Hydrodynamics Code for Astrophysical Simulations  

E-Print Network (OSTI)

In this paper, we describe a new hydrodynamics code for 1D and 2D astrophysical simulations, BETHE-hydro, that uses time-dependent, arbitrary, unstructured grids. The core of the hydrodynamics algorithm is an arbitrary Lagrangian-Eulerian (ALE) approach, in which the gradient and divergence operators are made compatible using the support-operator method. We present 1D and 2D gravity solvers that are finite differenced using the support-operator technique, and the resulting system of linear equations are solved using the tridiagonal method for 1D simulations and an iterative multigrid-preconditioned conjugate-gradient method for 2D simulations. Rotational terms are included for 2D calculations using cylindrical coordinates. We document an incompatibility between a subcell pressure algorithm to suppress hourglass motions and the subcell remapping algorithm and present a modified subcell pressure scheme that avoids this problem. Strengths of this code include a straightforward structure, enabling simple inclusion of additional physics packages, the ability to use a general equation of state, and most importantly, the ability to solve self-gravitating hydrodynamic flows on time-dependent, arbitrary grids. In what follows, we describe in detail the numerical techniques employed and, with a large suite of tests, demonstrate that BETHE-hydro finds accurate solutions with 2$^{nd}$-order convergence.

Jeremiah W. Murphy; Adam Burrows

2008-05-21T23:59:59.000Z

69

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site 4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis PROBLEM: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 4.3.0 through 4.3.5 ABSTRACT: A vulnerability was reported in Splunk Web. REFERENCE LINKS: SecurityTracker Alert ID: 1028371 Splunk IMPACT ASSESSMENT: High DISCUSSION: Splunk Web does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Splunk Web software and will run in the security context of that site. As a result, the code will be able to access the

70

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740 Seclist.org CVE-2013-0590 CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate

71

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

72

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

73

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

74

V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: ownCloud Cross-Site Scripting and File Upload 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the filename to apps/files_versions/js/versions.js and apps/files/js/filelist.js and event title to 3rdparty/fullcalendar/js/fullcalendar.js is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

75

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

76

V-216: Drupal Monster Menus Module Security Bypass and Script Insertion  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

216: Drupal Monster Menus Module Security Bypass and Script 216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August 12, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in the Monster Menus module for Drupal PLATFORM: Drupal Monster Menus Module 6.x and 7.x ABSTRACT: The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks. REFERENCE LINKS: Secunia Advisory SA54391 Drupal Security Advisory CVE-2013-4229 CVE-2013-4230 IMPACT ASSES SMENT: Medium DISCUSSION: 1) Input passed via the title when editing page settings is not properly sanitised before being edited the next time. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's

77

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site 0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks. PLATFORM: Adobe Flex SDK 4.5.1 and earlier 4.x versions for Windows, Macintosh and Linux Adobe Flex SDK 3.6 and earlier 3.x versions for Windows, Macintosh and Linux ABSTRACT: Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: Adobe Security Bulletin CVE-2011-2461 SecurityTracker Alert ID: 1026361 IMPACT ASSESSMENT: High Discussion: A remote user may be able to cause arbitrary scripting code to be executed

78

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

79

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

80

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Example Hopper Batch Scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Example Batch Scripts Example Batch Scripts Sample Batch Scripts One of the most noted differences between the Hopper system and other NERSC systems is the number of cores per node...

82

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

83

scriptEnv - loading modules before starting a script  

NLE Websites -- All DOE Office Websites (Extended Search)

scriptEnv - loading modules before starting a script scriptEnv - loading modules before starting a script scriptEnv - loading modules before starting a script In some cases a script needs to load modules before the script can be executed, but it can often be inconvenient or impossible to provide wrapper scripts which load the needed modules. CGI scripts on the gpweb resources or in the NERSC portal environment which require the genepool-specific python/perl/R or databases configuration modules are a strong example of this. NERSC provides the scriptEnv as a custom drop-in replacement for /usr/bin/env. scriptEnv loads your selected modules to allow your scripts to run easily and reproducibly. After constructing your scriptEnv, you only need replace the shebang line of your script to use your custom scriptEnv

84

Example Edison Batch Scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Example Batch Scripts Example Batch Scripts Example Batch Scripts The default number of cores per node on Edison is 16, and the default "mppnppn" setting is 16. However, if you run with hyperthreading (HT), Edison compute nodes have 32 cores per node, and the mppnppn value needs to be set to 32. In addition, the "-j 2" option needs to be added to the "aprun" command. In most of the following example batch scripts, the default number of 16 cores per node is used. Basic Scripts Sample Job script This script uses the default 16 cores per node. This job will run on 64 nodes, with 1024 cores. #PBS -q debug #PBS -l mppwidth=1024 #PBS -l walltime=00:10:00 #PBS -N my_job #PBS -j oe #PBS -V cd $PBS_O_WORKDIR aprun -n 1024 ./my_executable Sample job script to run with Hyperthreading (HT)

85

Example Edison Batch Scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Example Batch Scripts Example Batch Scripts The default number of cores per node on Edison is 16, and the default "mppnppn" setting is 16. However, if you run with hyperthreading...

86

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

87

PostScript macros for Generic TeX. Dripping Faucet  

E-Print Network (OSTI)

Script code 86 D Troubleshooting 87 Table of contents 3 #12; Welcome to PSTricks PSTricks is a collection

Mintmire, John W.

88

JAVA SCRIPT IS DISABLED  

Office of Scientific and Technical Information (OSTI)

This application needs JavaScript to work correctly but your browser does not have it enabled. How do I enable JavaScript??? - follow the instructions below... If your browser is not listed, please contact your system administrator. Internet Explorer (6.0) Select 'Tools' from the top menu Choose 'Internet Options' Click on the 'Security' tab Click on 'Custom Level' Scroll down until you see section labled 'Scripting' Under 'Active Scripting', select 'Enable' and click OK Internet Explorer (7.0) Select Tools > Internet Options. Click on the Security tab. Click the Custom Level button. Scroll down to the Scripting section. Select Enable for Active Scripting and Scripting of Java Applets. Click OK. Select YES if a box appears to confirm. Click OK. Close window.

89

Example Edison Batch Scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Example Batch Scripts Example Batch Scripts Example Batch Scripts Edison has 24 cores (physical cores) per node, so the default "mppnppn" value is set to 24 for all queues. If you run with hyperthreading (HT), Edison has 48 logical cores per node, and the mppnppn value can be set to 48. However, this is not required. The "-j 2" option of the "aprun" command allows you to use all 48 logical cores on the nodes. In most of the following example batch scripts, we assume that jobs are run without Hyperthreading unless explicitly mentioned, therefore the default mppnppn value, 24, is used. Basic Scripts Sample Job script This script uses the default 24 cores per node. This job will run on 64 nodes, with 1536 cores. #PBS -q debug #PBS -l mppwidth=1536 #PBS -l walltime=00:10:00

90

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Drupal Drag & Drop Gallery Module Arbitrary File Upload 9: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability June 26, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in the Drag & Drop Gallery module for Drupal, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: Drupal Drag & Drop Gallery Module 6.x ABSTRACT: The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension. Reference Links: Original Advisory Secunia ID 49698 No Current CVE Reference IMPACT ASSESSMENT:

91

Batch Script Examples  

NLE Websites -- All DOE Office Websites (Extended Search)

Batch Script Examples Batch Script Examples Batch Script Examples My First Script This is a simple example that you can use to make sure that your settings are correct before submitting more complicated jobs. First, copy the contents of hello.sh into a file. genepool% cat hello.sh #!/bin/bash sleep 120 echo "Hello World" Then submit your job with the qsub command genepool% qsub hello.sh Monitor your job with the qstat command: genepool% qstat -u You can also get more detailed information about your job using: genepool% qstat -j The job id can be found using the qstat -u command. Basic Batch Script Here is an example of a basic script that specifies the working directory, the shell and the queue. The #$ must be used to specify the grid engine

92

Computer algebra in Java: libraries and scripting  

E-Print Network (OSTI)

We have developed two computer algebra systems (CAS) written in Java [Jolly:2007,Kredel:2006]. The Java libraries can be used as any of the numerous other Java library packages. For the use-case of interactively entering and manipulating mathematical expressions there is a need of a scripting front-end for our libraries. Most other CAS invent and implement their own scripting interface for this purpose. We, however, do not want to reinvent the wheel and propose to use a contemporary scripting language with access to Java code. In this paper we discuss the requirements for a scripting language in computer algebra and check whether the languages Python, Ruby, Groovy and Scala meet these requirements. We conclude, that with minor problems any of these languages is suitable for our purpose.

Jolly, Raphael

2008-01-01T23:59:59.000Z

93

ScriptEase: motivational behaviors for interactive characters in computer role-playing games  

Science Conference Proceedings (OSTI)

ScriptEase is a tool that allows authors with no programming experience to create interactive stories for computer role-playing games. Instead of writing scripting code manually, game authors select design patterns that encapsulate frequent game scenarios, ...

Maria Cutumisu; Duane Szafron; Jonathan Schaeffer; Kevin Waugh; Curtis Onuczko; Jeff Siegel; Allan Schumacher

2006-07-01T23:59:59.000Z

94

Cursive script postal address recognition  

E-Print Network (OSTI)

Large variations in writing styles and di culty in segmenting cursive words are the main reasons for cursive script postal address recognition being a challenging task. A scheme for locating and recognizing words based on over-segmentation followed by dynamic programming is proposed. This technique is being used for zip code extraction as well as city-state recognition in our system. Results have been reported based on cursive script images from the United States Postal Service(USPS) database. An overview of the cursive script postal address recognition system under development at the IBM Almaden Research Center, is presented. Optical Character Recognition(OCR) systems are usually trained to minimize character level errors, which does not necessarily guarantee the best results for word level recognition. Ascheme for combining character-level optimized classi ers, using a word-level optimization function, to achieve higher word level recognition rates is proposed. The optimum values for the parameters of the combination function are obtained using the gradient descent method. Improvements in word recognition rates on the USPS database by using word-level optimized ensembles of classi ers are reported. To My Family iii

Prasun Sinha; Prasun Sinha

1997-01-01T23:59:59.000Z

95

Towards a program logic for JavaScript  

Science Conference Proceedings (OSTI)

JavaScript has become the most widely used language for client-side web programming. The dynamic nature of JavaScript makes understanding its code notoriously difficult, leading to buggy programs and a lack of adequate static-analysis tools. We believe ... Keywords: javascript, separation logic, web

Philippa Anne Gardner; Sergio Maffeis; Gareth David Smith

2012-01-01T23:59:59.000Z

96

Parallel Batch Scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Parallel Batch Scripts Parallel Batch Scripts Parallel Batch Scripts Parallel Environments on Genepool You can run parallel jobs that use MPI or OpenMP on Genepool as long as you make the appropriate changes to your submission script! To investigate the parallel environments that are available on Genepool, you can use Command Description qconf -sp Show the configuration for the specified parallel environment. qconf -spl Show a list of all currently configured parallel environments. Basic Parallel Example If your job requires the default 5GB of memory per slot, you can do the following: #!/bin/bash # # == Set SGE options: # # -- ensure BASH is used # -- run the job in the current working directory (where qsub is called) #$ -cwd # -- run with the environment variables from the User's environment

97

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

98

Using PFTP in a Script at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

PFTP Shell Script PFTP Shell Script This example shows a batch script with pftp actions in it. The use of both single and multiple-file movement commands as well as directory...

99

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code Injection Vulnerability. PLATFORM: IM Manager versions prior to 8.4.18 are affected. ABSTRACT: Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. referecnce LINKS: Symantec Security Advisory SYM11-012 Symantec Security Updates Bugtraq ID: 49742 IMPACT ASSESSMENT: High Discussion: Symantec was notified of Cross-Site Scripting and Code injection/execution issues present in the Symantec IM Manager management console. The management console fails to properly filter/validate external inputs. Successful exploitation of SQL Injection or Remote Code execution might

100

Pattern-based AI scripting using ScriptEase  

Science Conference Proceedings (OSTI)

Creating realistic artificially-intelligent characters is seen as one of the major challenges of the commercial games industry. Historically, character behavior has been specified using simple finite state machines and, more recently, by AI scripting ...

Matthew McNaughton; James Redford; Jonathan Schaeffer; Duane Szafron

2003-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

ScriptEase: A generative/adaptive programming paradigm for game scripting  

Science Conference Proceedings (OSTI)

The traditional approach to implementing interactions between a player character (PC) and objects in computer games is to write scripts in a procedural scripting language. These scripts are usually so complex that they must be written by a computer programmer ... Keywords: Adaptive programming, Computer game, Game agent, Game authoring, Game scripting, Generative pattern, Scripting language

Maria Cutumisu; Curtis Onuczko; Matthew McNaughton; Thomas Roy; Jonathan Schaeffer; Allan Schumacher; Jeff Siegel; Duane Szafron; Kevin Waugh; Mike Carbonaro; Harvey Duff; Stephanie Gillis

2007-06-01T23:59:59.000Z

102

Revising the worksheet with L3: a language and environment foruser-script interaction  

SciTech Connect

This paper describes a novel approach to the parameter anddata handling issues commonly found in experimental scientific computingand scripting in general. The approach is based on the familiarcombination of scripting language and user interface, but using alanguage expressly designed for user interaction and convenience. The L3language combines programming facilities of procedural and functionallanguages with the persistence and need-based evaluation of data flowlanguages. It is implemented in Python, has access to all Pythonlibraries, and retains almost complete source code compatibility to allowsimple movement of code between the languages. The worksheet interfaceuses metadata produced by L3 to provide selection of values through thescriptit self and allow users to dynamically evolve scripts withoutre-running the prior versions. Scripts can be edited via text editors ormanipulated as structures on a drawing canvas. Computed values are validscripts and can be used further in other scripts via simplecopy-and-paste operations. The implementation is freely available underan open-source license.

Hohn, Michael H.

2008-01-22T23:59:59.000Z

103

Symbolic Script Programming for Java  

E-Print Network (OSTI)

Computer algebra in Java is a promising field of development. It has not yet reached an industrial strength, in part because of a lack of good user interfaces. Using a general purpose scripting language can bring a natural mathematical notation, akin to the one of specialized interfaces included in most computer algebra systems. We present such an interface for Java computer algebra libraries, using scripts available in the JSR 223 framework. We introduce the concept of `symbolic programming' and show its usefulness by prototypes of symbolic polynomials and polynomial rings.

Jolly, Raphael

2009-01-01T23:59:59.000Z

104

Multilevel Scripting for Responsive Multimedia  

Science Conference Proceedings (OSTI)

Responsive multimedia refers to a melding of media forms that has the ability to react in some way to audience identity, circumstances, equipment, and actions. Cutting-edge responsive multimedia works often involve a collaboration among many people of ... Keywords: scripting languages, responsive multimedia, multilevel authoring

Stefan Agamanolis; V. Michael Bove, Jr.

1997-10-01T23:59:59.000Z

105

Scripted Building Energy Modeling and Analysis: Preprint  

SciTech Connect

Building energy modeling and analysis is currently a time-intensive, error-prone, and nonreproducible process. This paper describes the scripting platform of the OpenStudio tool suite (http://openstudio.nrel.gov) and demonstrates its use in several contexts. Two classes of scripts are described and demonstrated: measures and free-form scripts. Measures are small, single-purpose scripts that conform to a predefined interface. Because measures are fairly simple, they can be written or modified by inexperienced programmers.

Hale, E.; Macumber, D.; Benne, K.; Goldwasser, D.

2012-08-01T23:59:59.000Z

106

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

107

HSI Tape Ordering Script at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Tape Ordering Script Tape Ordering Script HSI Tape Ordering Script Below is an example of a perl script that shows how one might create a list of hsi retrievals from HPSS that are ordered by tape and tape position for the most efficient way to get the files. Note that the source directory in HPSS and the destination directory on disk are hardwired along with a selection on what files to list. The script is based on using "hsi ls" with the "-P" option. Also shown is what the script prints out as it is run and a snippet of the output file it produces containing the transfer commands. #! /usr/bin/perl use strict; ### This script lists an hpss directory, sorts the files according to ### tape and position on the tape and creates a file containing ### the transfer commands. Written by ELH, 10/29/10.

108

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: High Discussion: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. The code...

109

Using HSI in a Script at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Shell Script Shell Script HSI Shell Script This example shows a script containing HSI actions. Note that in this case a single-line command is used so no "here-doc" is needed. This simplifies the script and demonstrates some of HSI's advantages over pftp or ftp. This script assumes that you have previously interactively logged into HSI at least once to encrypt your username/password. #!/bin/csh # First copy the data and program source from the submitting directory hsi -h archive.nersc.gov "cd my_HPSS_directory; get data* source.f" ./myproj data outfile # Save the output file in HPSS hsi -h archive.nersc.gov "cd my_HPSS_directory; put outfile; put restart*" exit Note that in this example the individual hsi commands are separated by semicolons and the set of commands is contained in quotes. The semicolons

110

ScriptEase: Generative Design Patterns for Computer Role-Playing Games  

Science Conference Proceedings (OSTI)

Recently, some researchers have argued that generative design patterns (GDPs) can leverage the obvious design re-use that characterizes traditional design patterns into code re-use. This paper provides additional evidence that GDPs are both useful and ... Keywords: generative design patterns, scripting languages, code generation, computer games

M. McNaughton; M. Cutumisu; D. Szafron; J. Schaeffer; J. Redford; D. Parker

2004-09-01T23:59:59.000Z

111

Parallel, Distributed Scripting with Python  

Science Conference Proceedings (OSTI)

Parallel computers used to be, for the most part, one-of-a-kind systems which were extremely difficult to program portably. With SMP architectures, the advent of the POSIX thread API and OpenMP gave developers ways to portably exploit on-the-box shared memory parallelism. Since these architectures didn't scale cost-effectively, distributed memory clusters were developed. The associated MPI message passing libraries gave these systems a portable paradigm too. Having programmers effectively use this paradigm is a somewhat different question. Distributed data has to be explicitly transported via the messaging system in order for it to be useful. In high level languages, the MPI library gives access to data distribution routines in C, C++, and FORTRAN. But we need more than that. Many reasonable and common tasks are best done in (or as extensions to) scripting languages. Consider sysadm tools such as password crackers, file purgers, etc ... These are simple to write in a scripting language such as Python (an open source, portable, and freely available interpreter). But these tasks beg to be done in parallel. Consider the a password checker that checks an encrypted password against a 25,000 word dictionary. This can take around 10 seconds in Python (6 seconds in C). It is trivial to parallelize if you can distribute the information and co-ordinate the work.

Miller, P J

2002-05-24T23:59:59.000Z

112

V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site 93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks July 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN PLATFORM: Version(s) prior to 2.3.3.216 ABSTRACT: Several scripts do not properly filter HTML code from user-supplied input before displaying the input via several parameters REFERENCE LINKS: SecurityTracker Alert ID: 1028736 Barracuda SSL VPN Release Notes Zero Science Lab IMPACT ASSESSMENT: Medium DISCUSSION: The code will originate from the Barracuda SSL VPN interface and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if

113

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

114

JavaScript Error, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Services Web Services Enabling JavaScript or Active Scripting We're Sorry, you don't seem to have JavaScript enabled in your browser. Some functions in this site may not work properly without it enabled or your web browser is running an older version of JavaScript. Please enabled your JavaScript, then go back and try again or upgrade your browser version to view this web page correctly. Press the button below to see if you have JavaScript enabled. If nothing happened, then it is possible that JavaScript is disabled on your browser. The following instructions shown below describes how to enable JavaScript or Active Scripting in your browser. If your browser isn't listed, please consult its online help pages. JavaScript Test ITD Homepage Need Help? How to Enable JavaScript

115

OOMMF Micromagnetics Public Code Project  

E-Print Network (OSTI)

Portable -- Tcl/Tk -- Windows NT & '95, Unix + X ffl Open Design -- Module level -- Tcl/Tk script level -- C++ source code level ffl Flexible -- Simplicity vs. functionality #12; Requirements ffl Tcl/Tk 7

Donahue, Michael J.

116

Script Handbook for Interactive Scientific Website Building  

E-Print Network (OSTI)

In this handbook, I collect the basic (and eventually upgraded) PHP scripts used for building the AMIDAS website (http://pisrv0.pit.physik.uni-tuebingen.de/darkmatter/amidas/), an online interactive simulation/data analysis system for direct Dark Matter detection experiments. Some basic, often used commands of (X)HTML, CSS, JavaScript, HTML DOM, and PHP are also given in an appendix.

Chung-Lin Shan

2010-08-06T23:59:59.000Z

117

Script Handbook for Interactive Scientific Website Building  

E-Print Network (OSTI)

In this handbook, I collect the basic (and eventually upgraded) PHP scripts used for building the AMIDAS website (http://pisrv0.pit.physik.uni-tuebingen.de/darkmatter/amidas/), an online interactive simulation/data analysis system for direct Dark Matter detection experiments. Some basic, often used commands of (X)HTML, CSS, JavaScript, HTML DOM, and PHP are also given in the appendix.

Shan, Chung-Lin

2010-01-01T23:59:59.000Z

118

Mega Python: Scalable Interlanguage Scripting  

NLE Websites -- All DOE Office Websites (Extended Search)

a new approach based on Swift to integrate high-level languages such as Python, R, Tcl, and the shell with native code developed in C, C++, and Fortran, through the use of...

119

Generating APL printouts with a2ps: (any to PostScript)  

Science Conference Proceedings (OSTI)

Printing APL dialects is, quite often, a frustrating task, for there is no simple method to convert the code itself into suitable output, for instance, PostScript or Portable Document Format. Generally speaking, printing of APL has relied on the interpreter ...

Pedro de Almeida

2007-09-01T23:59:59.000Z

120

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Wicket Input Validation Flaw Permits Cross-Site 5: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks September 11, 2012 - 6:00am Addthis PROBLEM: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache Software Foundation Apache Wicket 1.4.20 Apache Software Foundation Apache Wicket 1.4.18 Apache Software Foundation Apache Wicket 1.4.17 Apache Software Foundation Apache Wicket 1.4.16 ABSTRACT: A vulnerability was reported in Apache Wicket reference LINKS: Apache Wicket SecurityTracker Alert ID: 1027508 Bugtraq ID: 55445 CVE-2012-3373 IMPACT ASSESSMENT: Medium Discussion: The software does not properly filter HTML code from user-supplied input in

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

122

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

123

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

124

PostScript - CECM - Simon Fraser University  

E-Print Network (OSTI)

and other sources;. (2) A set of new integrable Abel ODE classes - some depending on arbitrary parameters -. derived from those aforementioned works;.

125

Please use "gres" settings in your batch scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Please use "gres" settings in your batch scripts Please use "gres" settings in your batch scripts September 4, 2012 by Helen He (0 Comments) We would like to encourage you to use...

126

Scripted Building Energy Modeling and Analysis (Presentation)  

SciTech Connect

Building energy analysis is often time-intensive, error-prone, and non-reproducible. Entire energy analyses can be scripted end-to-end using the OpenStudio Ruby API. Common tasks within an analysis can be automated using OpenStudio Measures. Graphical user interfaces (GUI's) and component libraries reduce time, decrease errors, and improve repeatability in energy modeling.

Macumber, D.

2012-10-01T23:59:59.000Z

127

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

128

Understanding script-based stories using commonsense reasoning  

Science Conference Proceedings (OSTI)

This paper investigates the use of commonsense reasoning to understand texts involving stereotypical activities or scripts. We present a system that understands news stories involving four terrorism scripts. The system (1) builds a commonsense reasoning ... Keywords: Commonsense reasoning, Reasoning about action and change, Scripts, Story understanding

Erik T. Mueller

2004-12-01T23:59:59.000Z

129

R.: Scripting environment for pervasive application exploration on mobile phones  

E-Print Network (OSTI)

Abstract. Research into pervasive computing has many difficult challenges: user application design, interaction models, and system architectures. Furthermore, exploratory research is limited by the fact that developing for pervasive computing devices is complex, due to the embedded system nature of the devices. Here we describe a scripting platform, Python for S60, for rapid development of applications on smartphones. It provides access to a large set of functionality needed to explore pervasive applications, including local and remote communications, UI, graphics, camera, sound and device databases. The system is easily extensible with native C++ code to improve performance and provide access to additional APIs. This technology is currently being used inside Nokia to develop and explore experimental pervasive applications. 1

Jukka Laurila; Ville Tuulos; Ronan Maclaverty

2006-01-01T23:59:59.000Z

130

DOE Patents Database - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code Download and install the DOepatents widget by copying and pasting its HTML inclusion code. <script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('d7331688-adb4-469b-b7a4-565d6bafb7a5');Get the DOepatents widget and many other great free widgets at Widgetbox! Not seeing a widget? (More

131

Automatic script identification from images using cluster-based templates  

SciTech Connect

We have developed a technique for automatically identifying the script used to generate a document that is stored electronically in bit image form. Our approach differs from previous work in that the distinctions among scripts are discovered by an automatic learning procedure, without any handson analysis. We first develop a set of representative symbols (templates) for each script in our database (Cyrillic, Roman, etc.). We do this by identifying all textual symbols in a set of training documents, scaling each symbol to a fixed size, clustering similar symbols, pruning minor clusters, and finding each cluster`s centroid. To identify a new document`s script, we identify and scale a subset of symbols from the document and compare them to the templates for each script. We choose the script whose templates provide the best match. Our current system distinguishes among the Armenian, Burmese, Chinese, Cyrillic, Ethiopic, Greek, Hebrew, Japanese, Korean, Roman, and Thai scripts with over 90% accuracy.

Hochberg, J.; Kerns, L.; Kelly, P.; Thomas, T.

1995-02-01T23:59:59.000Z

132

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

133

Anatomy of a Detector-Script  

NLE Websites -- All DOE Office Websites (Extended Search)

Anatomy of a Detector - Script Anatomy of a Detector - Script What is Fermilab? - Run II Newscasts - Analyze the Data - Online Resources - Site Outline We are flying over Fermilab’s accelerator complex. Two collider detectors: CDF and DØ are located along the main ring tunnel (in yellow). Dropping into the tunnel, we can see a proton traveling at nearly the speed of light inside the beam pipe. An antiproton passes by in the opposite direction at the same speed. Occasionally, the proton and antiproton collide violently. Sometimes, as shown in this artist’s rendition, the collision creates rarely seen particles like this top-antitop quark pair. These are unstable so they decay instantly into more conventional forms of matter: charged and neutral particles that move away from the collision. The top and anti-top quark decayed into W bosons and b quarks which in turn decayed into muons, neutrinos, and sprays of particles called jets.

134

Script identification from images using cluster-based templates  

DOE Patents (OSTI)

A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script. 17 figs.

Hochberg, J.G.; Kelly, P.M.; Thomas, T.R.

1998-12-01T23:59:59.000Z

135

Script identification from images using cluster-based templates  

DOE Patents (OSTI)

A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script.

Hochberg, Judith G. (Los Alamos, NM); Kelly, Patrick M. (Los Alamos, NM); Thomas, Timothy R. (Santa Fe, NM)

1998-01-01T23:59:59.000Z

136

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

137

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

138

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

139

OOMMF Micromagnetics Public Code Project  

E-Print Network (OSTI)

­ Tcl/Tk ­ Windows NT & '95, Unix + X · Open Design ­ Module level ­ Tcl/Tk script level ­ C++ source code level · Flexible ­ Simplicity vs. functionality #12;Requirements · Tcl/Tk 7.5/4.1+ (8

Donahue, Michael J.

140

Laboratory Equipment Donation Program - LEDP Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code Copy the code below and paste it to your website or blog: <script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('6f283a3d-1392-4025-a8bf-566030ca0281');Get the Laboratory Equipment Donation Program widget and many other great free widgets at Widgetbox! Not seeing a widget? (More

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

142

Feature extraction and classification for bilingual script (Gurmukhi and Roman)  

Science Conference Proceedings (OSTI)

The capability of recognizing multilingual documents is both novel and useful. With such capability, many applications can be supported including multilingual access to patent, business and regulatory information, translation, and keyword finding in ... Keywords: bilingual script, identification, projection profile, segmentation

Renu Dhir

2007-04-01T23:59:59.000Z

143

Microsoft Word - 02.20.07.CAES.script.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Video 1 CAES video script Groundbreaking Ceremony Feb. 20, 2007 Blake Hall, Idaho State Board of Education member This is a great opportunity for the State Board of Education to be...

144

Design and analysis of data management in scalable parallel scripting  

Science Conference Proceedings (OSTI)

We seek to enable efficient large-scale parallel execution of applications in which a shared filesystem abstraction is used to couple many tasks. Such parallel scripting (many-task computing, MTC) applications suffer poor performance and utilization ...

Zhao Zhang; Daniel S. Katz; Justin M. Wozniak; Allan Espinosa; Ian Foster

2012-11-01T23:59:59.000Z

145

Mega Python: Scalable Interlanguage Scripting for Scientific...  

NLE Websites -- All DOE Office Websites (Extended Search)

a new approach based on Swift to integrate high-level languages such as Python, R, Tcl, and the shell with native code developed in C, C++, and Fortran, through the use of...

146

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

147

Energy Citations Database (ECD) - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code <script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('4eea0226-60d0-4baa-9b90-190d0d3d52cd');Get the Energy Citations Database widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)

148

deDacota: toward preventing server-side XSS via automatic code and data separation  

Science Conference Proceedings (OSTI)

Web applications are constantly under attack. They are popular, typically accessible from anywhere on the Internet, and they can be abused as malware delivery systems. Cross-site scripting flaws are one of the most common types of vulnerabilities that ... Keywords: code and data separation, content security policy, cross-site scripting, csp, xss

Adam Doup, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, Giovanni Vigna

2013-11-01T23:59:59.000Z

149

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Reader and Acrobat Affected software versions: - Adobe Reader X (10.0) and for Windows and Macintosh - Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and...

150

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

151

diff -ruN oommf12a4pre-20100719/app/mmdisp/scripts ...  

Science Conference Proceedings (OSTI)

diff -ruN oommf12a4pre-20100719/app/mmdisp/scripts/mmdisp.tcl oommf12a4pre-20100719bis/app/mmdisp/scripts/mmdisp.tcl --- oommf12a4pre ...

2011-10-16T23:59:59.000Z

152

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

153

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis...

154

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

155

arXiv.org help - Why is my PostScript File so Large?  

NLE Websites -- All DOE Office Websites (Extended Search)

is my PostScript File so Large? Many current word processors and graphics programs create excessively large PostScript files which include large amounts of "postscript junk"....

156

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

157

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

158

U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site 7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks December 22, 2011 - 8:15am Addthis PROBLEM: WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks PLATFORM: WebSVN 2.3.0 and prior versions ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1026438 WebSVN version update WebSVN News IMPACT ASSESSMENT: Medium Discussion: The getLog() function does not properly filter HTML code from user-supplied

159

Quantum stabilizer codes and beyond  

E-Print Network (OSTI)

The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. Despite the large body of literature in quantum coding theory, many important questions, especially those centering on the issue of "good codes" are unresolved. In this dissertation the dominant underlying theme is that of constructing good quantum codes. It approaches this problem from three rather different but not exclusive strategies. Broadly, its contribution to the theory of quantum error correction is threefold. Firstly, it extends the framework of an important class of quantum codes - nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. In particular it provides many explicit constructions of stabilizer codes, most notably it simplifies the criteria by which quantum BCH codes can be constructed from classical codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. Prior to our work however, systematic methods to construct these codes were few and it was not clear how to fairly compare them with other classes of quantum codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work established a close link between subsystem codes and classical codes and it became clear that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels. This approach is based on a Calderbank- Shor-Steane construction that combines BCH and finite geometry LDPC codes.

Sarvepalli, Pradeep Kiran

2008-08-01T23:59:59.000Z

160

V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Information Bridge: DOE Scientific and Technical Information - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code <script type="text/javascript" src="http://cdn.widgetserver.com/syndication/subscriber/InsertWidget.js"><script type="text/javascript">if (WIDGETBOX) WIDGETBOX.renderWidget('56afd67a-ded2-4f6b-9875-d68ac6a9dd1e');Get the Information Bridge widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)

162

Quantization Noise Shaping on Arbitrary Frame Expansions  

E-Print Network (OSTI)

Quantization noise shaping is commonly used in oversampled A/D and D/A converters with uniform sampling. This paper considers quantization noise shaping for arbitrary finite frame expansions based on generalizing the view ...

Boufounos, Petros T.

163

Worldline Green Functions for Arbitrary Feynman Diagrams  

E-Print Network (OSTI)

We propose a general method to obtain the scalar worldline Green function on an arbitrary 1D topological space, with which the first-quantized method of evaluating 1-loop Feynman diagrams can be generalized to calculate arbitrary ones. The electric analog of the worldline Green function problem is found and a compact expression for the worldline Green function is given, which has similar structure to the 2D bosonic Green function of the closed bosonic string.

Peng Dai; Warren Siegel

2006-08-09T23:59:59.000Z

164

SAE2.py : a python script to automate parameter studies using SCREAMER with application to magnetic switching on Z.  

Science Conference Proceedings (OSTI)

The SCREAMER simulation code is widely used at Sandia National Laboratories for designing and simulating pulsed power accelerator experiments on super power accelerators. A preliminary parameter study of Z with a magnetic switching retrofit illustrates the utility of the automating script for optimizing pulsed power designs. SCREAMER is a circuit based code commonly used in pulsed-power design and requires numerous iterations to find optimal configurations. System optimization using simulations like SCREAMER is by nature inefficient and incomplete when done manually. This is especially the case when the system has many interactive elements whose emergent effects may be unforeseeable and complicated. For increased completeness, efficiency and robustness, investigators should probe a suitably confined parameter space using deterministic, genetic, cultural, ant-colony algorithms or other computational intelligence methods. I have developed SAE2 - a user-friendly, deterministic script that automates the search for optima of pulsed-power designs with SCREAMER. This manual demonstrates how to make input decks for SAE2 and optimize any pulsed-power design that can be modeled using SCREAMER. Application of SAE2 to magnetic switching on model of a potential Z refurbishment illustrates the power of SAE2. With respect to the manual optimization, the automated optimization resulted in 5% greater peak current (10% greater energy) and a 25% increase in safety factor for the most highly stressed element.

Orndorff-Plunkett, Franklin

2011-05-01T23:59:59.000Z

165

Harmonizing Above Code Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Harmonizing "Above Code" Harmonizing "Above Code" Codes Doug Lewin Executive Director, SPEER 6 Regional Energy Efficiency Organizations SPEER Members Texas grid facing an energy crisis * No new generation coming online * Old, inefficient coal-fired plants going offline * ERCOT CEO Trip Doggett said "We are very concerned about the significant drop in the reserve margin...we will be very tight on capacity next summer and have a repeat of this year's emergency procedures and conservation appeals." Higher codes needed to relieve pressure Building Codes are forcing change * 2012 IECC 30% higher than 2006 IECC * IRC, the "weaker code," will mirror IECC in 2012 * City governments advancing local codes with

166

MTC envelope: defining the capability of large scale computers in the context of parallel scripting applications  

Science Conference Proceedings (OSTI)

Many scientific applications can be efficiently expressed with the parallel scripting (many-task computing, MTC) paradigm. These applications are typically composed of several stages of computation, with tasks in different stages coupled by a shared ... Keywords: MTC, distributed file system, parallel scripting application, performance measurements

Zhao Zhang; Daniel S. Katz; Michael Wilde; Justin M. Wozniak; Ian Foster

2013-06-01T23:59:59.000Z

167

HERCULES: A Pattern Driven Code Transformation System  

Science Conference Proceedings (OSTI)

New parallel computers are emerging, but developing efficient scientific code for them remains difficult. A scientist must manage not only the science-domain complexity but also the performance-optimization complexity. HERCULES is a code transformation system designed to help the scientist to separate the two concerns, which improves code maintenance, and facilitates performance optimization. The system combines three technologies, code patterns, transformation scripts and compiler plugins, to provide the scientist with an environment to quickly implement code transformations that suit his needs. Unlike existing code optimization tools, HERCULES is unique in its focus on user-level accessibility. In this paper we discuss the design, implementation and an initial evaluation of HERCULES.

Kartsaklis, Christos [ORNL; Hernandez, Oscar R [ORNL; Hsu, Chung-Hsing [ORNL; Ilsche, Thomas [Technische Universitat Dresden; Joubert, Wayne [ORNL; Graham, Richard L [ORNL

2012-01-01T23:59:59.000Z

168

Arbitrary body segmentation in static images  

Science Conference Proceedings (OSTI)

In this paper, a novel method for segmenting arbitrary human body in static images is proposed. With the body probability map obtained by the pictorial structure model, we develop a superpixel based EM-like algorithm to refine the map, which can then ... Keywords: l1 based graph cuts, Pictorial structure, Superpixel based EM algorithm

Shifeng Li; Huchuan Lu; Lei Zhang

2012-09-01T23:59:59.000Z

169

Bell-type inequalities for arbitrary observables  

E-Print Network (OSTI)

We derive a Bell-type inequality for observables with arbitrary spectra. For the case of continuous variable systems we propose a possible experimental violation of this inequality, by using squeezed light and homodyne detection together with methods of quantum-state reconstruction. It is shown that the violation is also possible for realistic detection efficiencies.

E. Shchukin W. Vogel

2009-02-23T23:59:59.000Z

170

U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: McAfee Web Gateway Web Access Cross Site Scripting 0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis PROBLEM: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability. PLATFORM: The vulnerability is reported in versions prior to 7.1.5.2. ABSTRACT: Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI. reference LINKS: McAfee Web Gateway Release Notes Bugtraq ID: 50341 Secunia Advisory: SA46570 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in McAfee Web Gateway, which can be

171

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

172

V-028: Splunk Multiple Cross-Site Scripting and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Multiple Cross-Site Scripting and Denial of Service 8: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 - 2:00am Addthis PROBLEM: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities PLATFORM: Splunk versions 4.3.5 and 5.0 ABSTRACT: Splunk is prone to multiple vulnerabilities REFERENCE LINKS: SecurityTracker Alert ID: 1027785 SecurityTracker Alert ID: 1027784 Bugtraq ID: 56581 Secunia Advisory SA51337 Secunia Advisory SA51351 Splunk Vulnerability Descriptions IMPACT ASSESSMENT: Medium DISCUSSION: Splunk is prone to multiple cross-site scripting vulnerabilities and a denial-of-service vulnerability because it fails to properly handle user-supplied input. An attacker may leverage these issues to cause denial-of-service conditions

173

diff -crN oommf11b2/app/mmdisp/scripts/avf2ppm.tcl oommf ...  

Science Conference Proceedings (OSTI)

diff -crN oommf11b2/app/mmdisp/scripts/avf2ppm.tcl oommf/app/mmdisp/scripts/ avf2ppm.tcl *** oommf11b2/app/mmdisp/scripts/avf2ppm.tcl Wed ...

2011-06-03T23:59:59.000Z

174

Experience with SAND-Tcl: A Scripting Tool for Spatial Databases 1 CLAUDIO ESPERANC A (Contact Author)  

E-Print Network (OSTI)

Experience with SAND-Tcl: A Scripting Tool for Spatial Databases 1 CLAUDIO ESPERANC¸ A (Contact. This is illustrated by de- scribing our experience with SAND-Tcl, a scripting tool developed by us for building spatial database applications. SAND-Tcl is an extension of the Tcl embedded scripting language

Samet, Hanan

175

Optimal superdense coding over memory channels  

SciTech Connect

We study the superdense coding capacity in the presence of quantum channels with correlated noise. We investigate both the cases of unitary and nonunitary encoding. Pauli channels for arbitrary dimensions are treated explicitly. The superdense coding capacity for some special channels and resource states is derived for unitary encoding. We also provide an example of a memory channel where nonunitary encoding leads to an improvement in the superdense coding capacity.

Shadman, Z.; Kampermann, H.; Bruss, D.; Macchiavello, C. [Institute fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, DE-40225 Duesseldorf (Germany); Dipartimento di Fisica ''A. Volta'' and INFM-Unita di Pavia, Via Bassi 6, IT-27100 Pavia (Italy)

2011-10-15T23:59:59.000Z

176

On the Suitable Domain for SVM Training in Image Coding  

Science Conference Proceedings (OSTI)

Conventional SVM-based image coding methods are founded on independently restricting the distortion in every image coefficient at some particular image representation. Geometrically, this implies allowing arbitrary signal distortions in an n-dimensional ...

Gustavo Camps-Valls; Juan Gutirrez; Gabriel Gmez-Prez; Jess Malo

2008-06-01T23:59:59.000Z

177

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

178

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

179

Fluctuating surface currents: An algorithm for efficient prediction of Casimir interactions among arbitrary materials in arbitrary geometries  

E-Print Network (OSTI)

This paper presents a method for the efficient numerical computation of Casimir interactions between objects of arbitrary geometries, composed of materials with arbitrary frequency-dependent electrical properties. Our ...

Reid, M. T. Homer

180

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM TRIRIGA Application Platform Multiple Cross-Site 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are reported in versions 2.1, 2.5, 2.6, and 2.7. REFERENCE LINKS: Secunia Advisory SA54641 CVE-2013-4003 IBM Security Bulletin IMPACT ASSESSMENT: Low DISCUSSION: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks.

182

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: PHPlist Input Validation Flaws Permit Cross-Site Scripting 5: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks June 20, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. PLATFORM: Version(s): prior to 2.10.18 ABSTRACT: The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. REFERENCE LINKS: Vendor Advisory Security Tracker ID 1027181 CVE-2012-2740, CVE-2012-2741

183

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

184

Are Scripting Languages Any Good? A Validation of Perl, Python, Rexx, and Tcl  

E-Print Network (OSTI)

Are Scripting Languages Any Good? A Validation of Perl, Python, Rexx, and Tcl against C, C, Python, Rexx, Tcl) are more productive than conventional languages. In terms of run time and memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.5 Tcl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3

Prechelt, Lutz

185

Dynamic Information Flow Analysis for JavaScript in a Web Browser  

E-Print Network (OSTI)

Flow Analysis for JavaScript in a Web Browser by Thomas H.a central technology of the web, but it is also the sourceinformation flows in javascript web applications. In ACM

Austin, Thomas Howard

2013-01-01T23:59:59.000Z

186

arXiv.org help - Type 1 PostScript fonts on Linux  

NLE Websites -- All DOE Office Websites (Extended Search)

Type 1 PostScript fonts on Linux Most recent linux distributions come with teTeX, TeXLive, or similar, and therefore already have the necessary type 1 fonts. All that is required...

187

Adding control to arbitrary unknown quantum operations  

E-Print Network (OSTI)

While quantum computers promise significant advantages, the complexity of quantum algorithms remains a major technological obstacle. We have developed and demonstrated an architecture-independent technique that simplifies adding control qubits to arbitrary quantum operations-a requirement in many quantum algorithms, simulations and metrology. The technique is independent of how the operation is done, does not require knowledge of what the operation is, and largely separates the problems of how to implement a quantum operation in the laboratory and how to add a control. We demonstrate an entanglement-based version in a photonic system, realizing a range of different two-qubit gates with high fidelity.

Xiao-Qi Zhou; Timothy C. Ralph; Pruet Kalasuwan; Mian Zhang; Alberto Peruzzo; Benjamin P. Lanyon; Jeremy L. O'Brien

2010-06-14T23:59:59.000Z

188

Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities  

E-Print Network (OSTI)

2010). http://code. google.com/p/browsersec/wiki/Part1. [101] SecuriTeam. Google.com UTF-7 XSS Vulnerabilities.sensitive data of the google.com domain. In the past, Barth

Saxena, Prateek

2012-01-01T23:59:59.000Z

189

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

190

Please use "gres" settings in your batch scripts  

NLE Websites -- All DOE Office Websites (Extended Search)

Please use "gres" settings in your batch scripts Please use "gres" settings in your batch scripts Please use "gres" settings in your batch scripts September 4, 2012 by Helen He (0 Comments) We would like to encourage you to use the generic resources ("gres") setting for various file systems that your batch jobs use. This feature is currently available on Hopper and Carver. The advantage of this setting is that your jobs won't start (thus won't fail) during a scheduled file system maintenance. The syntax for the "gres" setting is: #PBS -l gres=filesystem1[%filesystem2%filesystem3...] (new recommendation) or #PBS -l gres=filesystem1:1[%filesystem2:1%filesystem3:1...] (as announced before) Note that the "%" character means "and". Therefore, if multiple file

191

Scripting in Radiation Therapy: An Automatic 3D Beam-Naming System  

Science Conference Proceedings (OSTI)

Scripts can be executed within the radiation treatment planning software framework to reduce human error, increase treatment planning efficiency, reduce confusion, and promote consistency within an institution or even among institutions. Scripting is versatile, and one application is an automatic 3D beam-naming system that describes the position of the beam relative to the patient in 3D space. The naming system meets the need for nomenclature that is conducive for clear and accurate communication of beam entry relative to patient anatomy. In radiation oncology in particular, where miscommunication can cause significant harm to patients, a system that minimizes error is essential. Frequent sharing of radiation treatment information occurs not only among members within a department but also between different treatment centers. Descriptions of treatment beams are perhaps the most commonly shared information about a patient's course of treatment in radiation oncology. Automating the naming system by the use of a script reduces the potential for human error, improves efficiency, enforces consistency, and would allow an institution to convert to a new naming system with greater ease. This script has been implemented in the Department of Radiation Oncology at the University of Washington Medical Center since December 2009. It is currently part of the dosimetry protocol and is accessible by medical dosimetrists, radiation oncologists, and medical physicists. This paper highlights the advantages of using an automatic 3D beam-naming script to flawlessly and quickly identify treatment beams with unique names. Scripting in radiation treatment planning software has many uses and great potential for improving clinical care.

Holdsworth, Clay, E-mail: clayhholdsworth@yahoo.com [Department of Radiation Oncology, University of Washington Cancer Center, Seattle, WA (United States); Hummel-Kramer, Sharon M.; Phillips, Mark [Department of Radiation Oncology, University of Washington Cancer Center, Seattle, WA (United States)

2011-10-01T23:59:59.000Z

192

Source codes as random number generators  

E-Print Network (OSTI)

AbstractA random number generator generates fair coin flips by processing deterministically an arbitrary source of nonideal randomness. An optimal random number generator generates asymptotically fair coin flips from a stationary ergodic source at a rate of bits per source symbol equal to the entropy rate of the source. Since optimal noiseless data compression codes produce incompressible outputs, it is natural to investigate their capabilities as optimal random number generators. In this paper we show under general conditions that optimal variable-length source codes asymptotically achieve optimal variable-length random bit generation in a rather strong sense. In particular, we show in what sense the LempelZiv algorithm can be considered an optimal universal random bit generator from arbitrary stationary ergodic random sources with unknown distributions. Index Terms Data compression, entropy, LempelZiv algorithm, random number generation, universal source coding.

Karthik Visweswariah; Student Member; Sanjeev R. Kulkarni; Senior Member; Sergio Verd

1998-01-01T23:59:59.000Z

193

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

194

A compact feature set for recognition of handwritten numerals and vowels in the Kanarese script  

Science Conference Proceedings (OSTI)

In this work we present a handwritten character recognition system for vowels and numerals of the Kanarese script. The system reads a handwritten character in the form of an image and translates it to a machine editable form. We have accomplished this ... Keywords: connectivity, decision trees, end points, feature extraction and classification, handwritten character recognition, preprocessing

R. Santhosh; Gowri Srinivasa

2012-08-01T23:59:59.000Z

195

Going Beyond Code | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Going Beyond Code Beyond the energy codes are stretch, green, or sustainable codes and associated labeling programs. Codes are written to lend themselves to mandatory enforcement...

196

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE))

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

197

Arbitrary Convex and Concave Rectilinear Module Packing Using TCG  

Science Conference Proceedings (OSTI)

In this paper, we deal with arbitrary convex and concave rectilinearmodule packing using the Transitive Closure Graph (TCG) representation.The geometric meanings of modules are transparent to TCG and itsinduced operations, which makes TCG an ideal representation ...

J. Lin; H. Chen; Y. Chang

2002-03-01T23:59:59.000Z

198

Optimizing Extender Code for NCSX Analyses  

SciTech Connect

Extender is a parallel C++ code for calculating the magnetic field in the vacuum region of a stellarator. The code was optimized for speed and augmented with tools to maintain a specialized NetCDF database. Two parallel algorithms were examined. An even-block work-distribution scheme was comparable in performance to a master-slave scheme. Large speedup factors were achieved by representing the plasma surface with a spline rather than Fourier series. The accuracy of this representation and the resulting calculations relied on the density of the spline mesh. The Fortran 90 module db access was written to make it easy to store Extender output in a manageable database. New or updated data can be added to existing databases. A generalized PBS job script handles the generation of a database from scratch

M. Richman, S. Ethier, and N. Pomphrey

2008-01-22T23:59:59.000Z

199

Department Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Department Codes Department Codes Code Organization BO Bioscience Department BU Business Development & Analysis Office DI Business Operations NC Center for Functional Nanomaterials CO Chemistry Department AD Collider Accelerator Department PA Community, Education, Government and Public Affairs CC Computational Science Center PM Condensed Matter Physics and Materials Science Department CI Counterintelligence AE Department of Energy DC Directorate - Basic Energy Sciences DK Directorate - CEGPA DE Directorate - Deputy Director for Operations DO Directorate - Director's Office DH Directorate - Environment, Safety and Health DF Directorate - Facilities and Operations DA Directorate - Global and Regional Solutions DB Directorate - Nuclear and Particle Physics DL Directorate - Photon Sciences

200

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

input elements may be autocompleted even if the site specifies that autocomplete be disabled CVE-2012-0680. A remote user can create specially crafted HTML that, when loaded by...

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will...

202

Recent Enhancements to the MARS15 Code  

E-Print Network (OSTI)

The MARS code is under continuous development and has recently undergone substantial improvements that further increase its reliability and predictive power in numerous shielding, accelerator, detector and space applications. The major developments and new features of the MARS15 (2004) version described in this paper concern an extended list of elementary particles and arbitrary heavy ions and their interaction cross-sections, inclusive and exclusive nuclear event generators, module for modelling particle electromagnetic interactions, enhanced geometry and histograming options, improved MAD-MARS Beam Line Builder, enhanced Graphical-User Interface, and an MPI-based parallelization of the code.

N. V. Mokhov; K. K. Gudima; C. C. James; M. A. Kostin; S. G. Mashnik; E. Ng; J. -F. Ostiguy; I. L. Rakhno; A. J. Sierk; S. I. Striganov

2004-04-29T23:59:59.000Z

203

A scalable, fast and multichannel arbitrary waveform generator  

E-Print Network (OSTI)

This article reports on development of a multichannel arbitrary waveform generator (MAWG), which simultaneously generates arbitrary voltage waveforms on 24 independent channels with a dynamic update rate of up to 25 Msps. A real-time execution of a single waveform and/or sequence of multiple waveforms in succession, with a user programmable arbitrary sequence order is provided under the control of a stand-alone sequencer circuit implemented using an FPGA. The device is operated using an internal clock and can be synced to other devices by means of the TTL pulses. The device can be used for output voltages in the range of up to +-9 V with a drift rate below +-10 uV/min and a maximum deviation less than +- 300 uVpp over a period of two hours.

Baig, Muhammad Tanveer; Wiese, Andreas; Heidbrink, Stefan; Ziolkowski, Michael; Wunderlich, Christof

2013-01-01T23:59:59.000Z

204

A scalable, fast and multichannel arbitrary waveform generator  

E-Print Network (OSTI)

This article reports on development of a multichannel arbitrary waveform generator (MAWG), which simultaneously generates arbitrary voltage waveforms on 24 independent channels with a dynamic update rate of up to 25 Msps. A real-time execution of a single waveform and/or sequence of multiple waveforms in succession, with a user programmable arbitrary sequence order is provided under the control of a stand-alone sequencer circuit implemented using an FPGA. The device is operated using an internal clock and can be synced to other devices by means of the TTL pulses. The device can be used for output voltages in the range of up to +-9 V with a drift rate below +-10 uV/min and a maximum deviation less than +-300 uVpp over a period of two hours.

Muhammad Tanveer Baig; Michael Johanning; Andreas Wiese; Stefan Heidbrink; Michael Ziolkowski; Christof Wunderlich

2013-07-22T23:59:59.000Z

205

Teleportation of arbitrary $n$-qudit state with multipartite entanglement  

E-Print Network (OSTI)

We propose a protocol ${\\cal D}_n$ for faithfully teleporting an arbitrary $n$-qudit state with the tensor product state (TPS) of $n$ generalized Bell states (GBSs) as the quantum channel. We also put forward explicit protocol ${\\cal D}'_n$ and ${\\cal D}''_n$ for faithfully teleporting an arbitrary $n$-qudit state with two classes of $2n$-qudit GESs as the quantum channel, where the GESs are a kind of genuine entangled states we construct and can not be reducible to the TPS of $n$ GBSs.

Zhan-jun Zhang

2006-11-30T23:59:59.000Z

206

Directional lapped transforms for image coding  

E-Print Network (OSTI)

AbstractIn this paper, we present the design of directional lapped transforms for image coding. A lapped transform, which can be implemented by a prefilter followed by a discrete cosine transform (DCT), can be factorized into elementary operators. The corresponding directional lapped transform is generated by applying each elementary operator along a given direction. The proposed directional lapped transforms are not only nonredundant and perfectly reconstructed, but they can also provide a basis along an arbitrary direction. These properties, along with the advantages of lapped transforms, make the proposed transforms appealing for image coding. A block-based directional transform scheme is also presented and integrated into HD Phtoto, one of the state-of-the-art image coding systems, to verify the effectiveness of the proposed transforms. Index TermsDirectional transform, image coding, lapped transform.

Jizheng Xu; Feng Wu; Senior Member; Jie Liang; Wenjun Zhang

2008-01-01T23:59:59.000Z

207

Dictionary Approximation For Matching Pursuit Video Coding  

E-Print Network (OSTI)

Previously, we demonstrated an efficient video codec based on overcomplete signal decomposition using matching pursuits. Dictionary design is an important issue for this system, and others have shown alternate dictionaries which lead to either coding efficiency improvements or reduced encoder complexity. In this work, we introduce for the first time a design methodology which incorporates both coding efficiency and complexity in a systematic way. The key to our new method is an algorithm which takes an arbitrary 2-D dictionary and generates approximations of the dictionary which have fast 2-stage implementations. By varying the quality of the approximation, we can explore a systematic tradeoff between the coding efficiency and complexity of the matching pursuit video encoder. As a practical result, we show cases where complexity is reduced by a factor of 500 to 1000 in exchange for small coding efficiency losses of around 0.1 dB PSNR. 1. INTRODUCTION Most video codecs in use today ar...

Ralph Neff; Avideh Zakhor

2000-01-01T23:59:59.000Z

208

Traveling wave current drive theory for an arbitrary m-polar configuration  

Science Conference Proceedings (OSTI)

An extension of the formalism employed to describe current drive in magnetized plasmas by means of traveling magnetic fields (or double-helix configuration) is presented. In all previous theoretical studies, only driving fields with dipolar topology have been employed and the figure of merit of the current drive mechanism has never been analyzed in terms of the dissipation in the power feeding circuit. In this paper, we show how to express the model equations in terms of the current amplitude in the coils, for an arbitrary number of equally spaced coils wound around the plasma column. We present a brief review of the existing theory and a theoretical formulation, valid for an arbitrary m-polar helical symmetry, which removes the above mentioned complications and limitations. In the limit of straight coils, our magnetic field expression agrees exactly with well-established results of the literature for rotating magnetic field current drive. Finally, we present initial numerical results from a recently developed code which consistently compares the steady driven nonlinear Hall currents and steady fields, corresponding to different configurations in terms of the Ohmic dissipation in the helical coils and discuss future perspectives.

Duarte, V. N. [Instituto de Fisica, Universidade de Sao Paulo, 05508-090 Sao Paulo-SP (Brazil); Clemente, R. A. [Instituto de Fisica Gleb Wataghin, Universidade Estadual de Campinas, 13083-859 Campinas-SP (Brazil); Farengo, R. [Centro Atomico Bariloche and Instituto Balseiro, S. C. de Bariloche (8400), RN (Argentina)

2013-03-15T23:59:59.000Z

209

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will access deleted memory (while JavaScript is disabled) and potentially execute arbitrary code on the target system CVE-2011-2373. A...

210

HiggsBounds: Confronting Arbitrary Higgs Sectors with Exclusion Bounds from LEP and the Tevatron  

E-Print Network (OSTI)

HiggsBounds is a computer code that tests theoretical predictions of models with arbitrary Higgs sectors against the exclusion bounds obtained from the Higgs searches at LEP and the Tevatron. The included experimental information comprises exclusion bounds at 95% C.L. on topological cross sections. In order to determine which search topology has the highest exclusion power, the program also includes, for each topology, information from the experiments on the expected exclusion bound, which would have been observed in case of a pure background distribution. Using the predictions of the desired model provided by the user as input, HiggsBounds determines the most sensitive channel and tests whether the considered parameter point is excluded at the 95% C.L. HiggsBounds is available as a Fortran 77 and Fortran 90 code. The code can be invoked as a command line version, a subroutine version and an online version. Examples of exclusion bounds obtained with HiggsBounds are discussed for the Standard Model, for a model with a fourth generation of quarks and leptons and for the Minimal Supersymmetric Standard Model with and without CP-violation. The experimental information on the exclusion bounds currently implemented in HiggsBounds will be updated as new results from the Higgs searches become available.

Philip Bechtle; Oliver Brein; Sven Heinemeyer; Georg Weiglein; Karina E. Williams

2008-11-25T23:59:59.000Z

211

3D hybrid simulation code using curvilinear coordinates  

Science Conference Proceedings (OSTI)

A new simulation code using the hybrid approximation for modeling extraterrestrial plasma processes is described, which can be used in an arbitrary three-dimensional, ordered, hexahedral grid. Maxwell's equations are transformed using common tensor analysis ... Keywords: 3D, curvilinear, hybrid, plasma, simulation

T. Bagdonat; U. Motschmann

2002-12-01T23:59:59.000Z

212

Entanglement Cost for Sequences of Arbitrary Quantum States  

E-Print Network (OSTI)

The entanglement cost of arbitrary sequences of bipartite states is shown to be expressible as the minimization of a conditional spectral entropy rate over sequences of separable extensions of the states in the sequence. The expression is shown to reduce to the regularized entanglement of formation when the n-th state in the sequence consists of n copies of a single bipartite state.

Garry Bowen; Nilanjana Datta

2007-04-16T23:59:59.000Z

213

A preconditioned method for rotating flows at arbitrary mach number  

Science Conference Proceedings (OSTI)

An improved preconditioning is proposed for viscous flow computations in rotating and nonrotating frames at arbitrary Mach numbers. The key to the current method is the use of both free stream Mach number and rotating Mach number to construct a preconditioning ...

Chunhua Sheng

2011-01-01T23:59:59.000Z

214

Quantum Mechanics of Successive Measurements with Arbitrary Meter Coupling  

E-Print Network (OSTI)

We study successive measurements of two observables using von Neumann's measurement model. The two-pointer correlation for arbitrary coupling strength allows retrieving the initial system state. We recover Luders rule, the Wigner formula and the Kirkwood-Dirac distribution in the appropriate limits of the coupling strength.

Lars M. Johansen; Pier A. Mello

2009-01-21T23:59:59.000Z

215

Arbitrary blade section design based on viscous considerations. Background information  

SciTech Connect

Background information is presented on an arbitrary blade section design method which is outlined in a joint paper. This information concerns the assumptions, the development, and the predictive capabilities of the viscous flow calculation tool used in the design procedure. General properties of laminar and turbulent, unseparated or separated compressible shear layers, necessary for the blade optimization procedure, are discussed.

Bouras, B.; Karagiannis, F.; Leoutsakos, G.; Giannakoglou, K.C.; Papailiou, K.D. [National Technical Univ. of Athens (Greece). Thermal Turbomachinery Lab.

1996-06-01T23:59:59.000Z

216

Evolution of the Tracking Code PLACET  

E-Print Network (OSTI)

The tracking code PLACET simulates beam transport and orbit corrections in linear accelerators. It incorporates single- and multi-bunch effects, static and dynamic imperfections. A major restructuring of its core has resulted in an improvement in its modularity, with some immediate advantages: its tracking core, which is one of the fastest available for this kind of simulations, is now interfaced toward three different scripting languages to further expand its simulation capabilities: Tcl/Tk, Octave, and Python. These three languages provide access to a vast and diverse library of scientific tools, mechanisms for parallel computing, and access to Java interfaces for control systems. Also, several new functionalities have been added to the PLACET core itself: parallel tracking to exploit modern multicore CPUs and clusters of computers, the possibility to track through the interaction region in presence of external magnetic fields (detector solenoid) and higher order imperfections in magnets. PLACET is currentl...

Latina, A; Schulte, D; Snuverink, J

2013-01-01T23:59:59.000Z

217

The Infrastructure of a Global Field of Arbitrary Unit Rank  

E-Print Network (OSTI)

In the past, the infrastructure of a number or (global) function field has been used for computation of units. In the case of a one-dimensional infrastructure, i.e. in the case of unit rank one, one has a binary operation which is similar to multiplication, called a giant step, which was introduced by D. Shanks. In this paper, we show a general way to interpret infrastructure in the case of arbitrary unit rank, which gives a giant step. Moreover, we relate the infrastructure and the giant step to the arithmetic in the divisor class group. Finally, we give explicit algorithms in the function field case for computing, and show how the baby step-giant step method for unit computation generalizes to the case of arbitrary unit rank.

Fontein, Felix

2008-01-01T23:59:59.000Z

218

Security of quantum key distribution with arbitrary individual imperfections  

E-Print Network (OSTI)

We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

ystein Mary; Lars Lydersen; Johannes Skaar

2009-03-20T23:59:59.000Z

219

Green Building Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Green Building Codes Green Building Codes Green building codes go beyond minimum code requirements, raising the bar for energy efficiency. They can serve as a proving ground for future standards, and incorporate elements beyond the scope of the model energy codes, such as water and resource efficiency. As regional and national green building codes and programs become more available, they provide jurisdictions with another tool for guiding construction and development in an overall less impactful, more sustainable manner. ICC ASHRAE Beyond Codes International Green Construction Code (IgCC) The International Code Council's (ICC's) International Green Construction code (IgCC) is an overlay code, meaning it is written in a manner to be used with all the other ICC codes. The IgCC contains provisions for site

220

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

The involvement of the primate frontal cortex-basal ganglia system in arbitrary visuomotor association learning  

E-Print Network (OSTI)

It is the goal of this thesis to examine the frontal cortex-basal ganglia system during arbitrary visuomotor association learning, the forming of arbitrary links between visual stimuli and motor responses (e.g. red means ...

Machon, Michelle S

2009-01-01T23:59:59.000Z

222

Residential Code Development | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Residential Code Development Subscribe to updates To receive news and updates about code development activities subscribe to the BECP Mailing List. The model residential building...

223

Residential Code Methodology | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Site Map...

224

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

225

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

226

Validation of IVA Computer Code for Flow Boiling Stability Analysis  

SciTech Connect

IVA is a computer code for modeling of transient multiphase, multi-component, non-equilibrium flows in arbitrary geometry including flow boiling in 3D nuclear reactors. This work presents part of the verification procedure of the code. We analyze the stability of flow boiling in natural circulation loop. Experimental results collected on the AREVA/FANP KATHY loop regarding frequencies, mass flows and decay ratio of the oscillations are used for comparison. The comparison demonstrates the capability of the code to successfully simulate such class of processes. (author)

Ivanov Kolev, Nikolay [Framatome-ANP, PO Box 3220, D-91058, Erlangen (Germany)

2006-07-01T23:59:59.000Z

227

DOE Code:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

we1rbox installatiOn we1rbox installatiOn ____:....;...=.~;;....:..;=-+- DOE Code: - - !- Project Lead: Wes R1esland NEPA COMPLIANCE SURVEY J 3-24-10 1 Date: Project Information 1. Project Overview What are tne enwonmental mpacts? Contractor~~ _ _ _ _ ] 11 The purpose of this project is to prepare a pad for a 90 ton crane to get 1nto positiOn and ng up so we can 1 set our new weir box into position We will widen the existing road around 20 feet at the north end and taper our fill to about5 feet at the south end for a total of about 200 feeL and budd a near level pad for them tong up the crane on We will use the d1rt from the hill irnrnedJateiy north of the work to oe done 2. 3 4 What*s the legal location? What IS the durabon of the prOJed?

228

JLIFE: THE JEFFERSON LAB INTERACTIVE FRONT END FOR THE OPTICAL PROPAGATION CODE  

SciTech Connect

We present details on a graphical interface for the open source software program Optical Propagation Code, or OPC. This interface, written in Java, allows a user with no knowledge of OPC to create an optical system, with lenses, mirrors, apertures, etc. and the appropriate drifts between them. The Java code creates the appropriate Perl script that serves as the input for OPC. The mode profile is then output at each optical element. The display can be either an intensity profile along the x axis, or as an isometric 3D plot which can be tilted and rotated. These profiles can be saved. Examples of the input and output will be presented.

Watson, Anne M. [JLAB; Shinn, Michelle D. [JLAB

2013-08-01T23:59:59.000Z

229

Arbitrary surface flank milling of fan, compressor, and impeller blades  

SciTech Connect

It is generally conceived that a blade surface is flank millable if it can be closely approximated by a ruled surface; otherwise the slow machining process of point milling has to be employed. However, the authors have now demonstrated that the ruled surface criterion for flank milling is neither necessary nor sufficient. Furthermore, many complex arbitrary surfaces typical of the blades in fans, axial compressors, and centrifugal impellers in aviation gas turbines are actually closely flank millable and can be rendered exactly flank millable with one or more passes per surface often without sacrificing, indeed usually with gain, in performance.

Wu, C.Y. [Pratt and Whitney Canada Incorporated, Longueuil, Quebec, (Canada). Design Engineering

1995-07-01T23:59:59.000Z

230

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

691 - 27700 of 31,917 results. 691 - 27700 of 31,917 results. Article T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). http://energy.gov/cio/articles/t-590-hp-diagnostics-input-validation-hole-permits-cross-site-scripting-attacks Article T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. http://energy.gov/cio/articles/t-539-adobe-acrobat-reader-and-flash-player-arbitrary-code-execution-vulnerability

231

Codes 101 | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101 Codes 101 This course covers basic knowledge of energy codes and standards, the development processes of each, historical timelines, adoption, implementation, and enforcement of energy codes and standards, and voluntary energy efficiency programs. Most sections have links that provide additional details on that section's topic as well as additional resources for more information. Begin Learning! Estimated Length: 1-2 hours CEUs Offered: 1.0 AIA/CES LU (HSW); .10 CEUs towards ICC renewal certification. Course Type: Self-paced, online Building Type: Commercial Residential Focus: Adoption Code Development Compliance Code Version: ASHRAE Standard 90.1 International Energy Conservation Code (IECC) Model Energy Code (MEC) Target Audience: Advocate Architect/Designer Builder

232

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

233

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

234

Hydrogen recycle modeling in transport codes  

DOE Green Energy (OSTI)

The hydrogen recycling models now used in Tokamak transport codes are reviewed and the method by which realistic recycling models are being added is discussed. Present models use arbitrary recycle coefficients and therefore do not model the actual recycling processes at the wall. A model for the hydrogen concentration in the wall serves two purposes: (1) it allows a better understanding of the density behavior in present gas puff, pellet, and neutral beam heating experiments; and (2) it allows one to extrapolate to long pulse devices such as EBT, ISX-C and reactors where the walls are observed or expected to saturate. Several wall models are presently being studied for inclusion in transport codes.

Howe, H.C.

1979-01-01T23:59:59.000Z

235

A Flexible SDDS-Compliant Code  

NLE Websites -- All DOE Office Websites (Extended Search)

and display tools. These tools can be used to- gether with scripting languages like Tcl to compose cus- tomized postprocessing commands. This permits, for ex- ample, users of...

236

Evolution of star clusters in arbitrary tidal fields  

E-Print Network (OSTI)

We present a novel and flexible tensor approach to computing the effect of a time-dependent tidal field acting on a stellar system. The tidal forces are recovered from the tensor by polynomial interpolation in time. The method has been implemented in a direct-summation stellar dynamics integrator (NBODY6) and test-proved through a set of reference calculations: heating, dissolution time and structural evolution of model star clusters are all recovered accurately. The tensor method is applicable to arbitrary configurations, including the important situation where the background potential is a strong function of time. This opens up new perspectives in stellar population studies reaching to the formation epoch of the host galaxy or galaxy cluster, as well as for star-burst events taking place during the merger of large galaxies. A pilot application to a star cluster in the merging galaxies NGC 4038/39 (the Antennae) is presented.

Renaud, Florent; Boily, Christian

2011-01-01T23:59:59.000Z

237

Hyperscaling violation for scalar black branes in arbitrary dimensions  

E-Print Network (OSTI)

We extend to black branes (BB) in arbitrary dimensions the results of Ref. [1] about hyperscaling violation and phase transition for scalar black 2-branes. We derive the analytic form of the (d+1)-dimensional scalar soliton interpolating between a conformal invariant AdS vacuum in the infrared and a scale covariant metric in the ultraviolet. We show that the thermodynamical system undergoes a phase transition between Schwarzschild-AdS and a scalar-dressed BB. We calculate the critical exponent and the hyperscaling violation parameter in the two phases. We show that our scalar BB solutions generically emerge as compactifications of p-brane solutions of supergravity theories. We also derive the short distance form of the correlators for the scalar operators corresponding to an UV exponential potential supporting our black brane solution. We show that also for negative values of the hyperscaling violation parameter these correlators have a short distance power-law behavior.

Mariano Cadoni; Matteo Serra

2012-09-20T23:59:59.000Z

238

Prediction of turbulence control for arbitrary periodic spanwise wall movement  

E-Print Network (OSTI)

In order to generalize the well-known spanwise-oscillating-wall technique for drag reduction, non-sinusoidal oscillations of a solid wall are considered as a means to alter the skin-friction drag in a turbulent channel flow. A series of Direct Numerical Simulations is conducted to evaluate the control performance of nine different temporal waveforms, in addition to the usual sinusoid, systematically changing the wave amplitude and the period for each waveform. The turbulent average spanwise motion is found to coincide with the laminar Stokes solution that is constructed, for the generic waveform, through harmonic superposition. This allows us to define and compute, for each waveform, a new penetration depth of the Stokes layer which correlates with the amount of turbulent drag reduction, and eventually to predict both turbulent drag reduction and net energy saving rate for arbitrary waveforms. Among the waveforms considered, the maximum net energy saving rate is obtained by the sinusoidal wave at its optimal ...

Cimarelli, Andrea; Hasegawa, Yosuke; De Angelis, Elisabetta; Quadrio, Maurizio

2013-01-01T23:59:59.000Z

239

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents (OSTI)

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

Grossman, M.W.; George, W.A.

1986-12-16T23:59:59.000Z

240

Method of preparing mercury with an arbitrary isotopic distribution  

DOE Patents (OSTI)

This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

Grossman, Mark W. (Belmont, MA); George, William A. (Rockport, MA)

1986-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

WinCuts: Manipulating Arbitrary Window Regions for  

E-Print Network (OSTI)

Each window on our computer desktop provides a view into some information. Although users can currently manipulate multiple windows, we assert that being able to spatially arrange smaller regions of these windows could help users perform certain tasks more efficiently. In this paper, we describe a novel interaction technique that allows users to replicate arbitrary regions of existing windows into independent windows called WinCuts. Each WinCut is a live view of a region of the source window with which users can interact. We also present an extension that allows users to share WinCuts across multiple devices. Next, we classify the set of tasks for which WinCuts may be useful, both in single as well as multiple device scenarios. We present high level implementation details so that other researchers can replicate this work. And finally, we discuss future work that we will pursue in extending these ideas.

More Effective Use; Desney S. Tan; Brian Meyers; Mary Czerwinski

2004-01-01T23:59:59.000Z

242

HiggsSignals: Confronting arbitrary Higgs sectors with measurements at the Tevatron and the LHC  

E-Print Network (OSTI)

HiggsSignals is a Fortran90 computer code that allows to test the compatibility of Higgs sector predictions against Higgs rates and masses measured at the LHC or the Tevatron. Arbitrary models with any number of Higgs bosons can be investigated using a model-independent input scheme based on HiggsBounds. The test is based on the calculation of a chi-squared measure from the predictions and the measured Higgs rates and masses, with the ability of fully taking into account systematics and correlations for the signal rate predictions, luminosity and Higgs mass predictions. It features two complementary methods for the test. First, the peak-centered method, in which each observable is defined by a Higgs signal rate measured at a specific hypothetical Higgs mass, corresponding to a tentative Higgs signal. Second, the mass-centered method, where the test is evaluated by comparing the signal rate measurement to the theory prediction at the Higgs mass predicted by the model. The program allows for the simultaneous us...

Bechtle, Philip; Stl, Oscar; Stefaniak, Tim; Weiglein, Georg

2013-01-01T23:59:59.000Z

243

Quantum error control codes  

E-Print Network (OSTI)

It is conjectured that quantum computers are able to solve certain problems more quickly than any deterministic or probabilistic computer. For instance, Shor's algorithm is able to factor large integers in polynomial time on a quantum computer. A quantum computer exploits the rules of quantum mechanics to speed up computations. However, it is a formidable task to build a quantum computer, since the quantum mechanical systems storing the information unavoidably interact with their environment. Therefore, one has to mitigate the resulting noise and decoherence effects to avoid computational errors. In this dissertation, I study various aspects of quantum error control codes - the key component of fault-tolerant quantum information processing. I present the fundamental theory and necessary background of quantum codes and construct many families of quantum block and convolutional codes over finite fields, in addition to families of subsystem codes. This dissertation is organized into three parts: Quantum Block Codes. After introducing the theory of quantum block codes, I establish conditions when BCH codes are self-orthogonal (or dual-containing) with respect to Euclidean and Hermitian inner products. In particular, I derive two families of nonbinary quantum BCH codes using the stabilizer formalism. I study duadic codes and establish the existence of families of degenerate quantum codes, as well as families of quantum codes derived from projective geometries. Subsystem Codes. Subsystem codes form a new class of quantum codes in which the underlying classical codes do not need to be self-orthogonal. I give an introduction to subsystem codes and present several methods for subsystem code constructions. I derive families of subsystem codes from classical BCH and RS codes and establish a family of optimal MDS subsystem codes. I establish propagation rules of subsystem codes and construct tables of upper and lower bounds on subsystem code parameters. Quantum Convolutional Codes. Quantum convolutional codes are particularly well-suited for communication applications. I develop the theory of quantum convolutional codes and give families of quantum convolutional codes based on RS codes. Furthermore, I establish a bound on the code parameters of quantum convolutional codes - the generalized Singleton bound. I develop a general framework for deriving convolutional codes from block codes and use it to derive families of non-catastrophic quantum convolutional codes from BCH codes. The dissertation concludes with a discussion of some open problems.

Abdelhamid Awad Aly Ahmed, Sala

2008-05-01T23:59:59.000Z

244

State Building Code  

NLE Websites -- All DOE Office Websites (Extended Search)

Adoption Updated: 121708 - 1 - Code Adoption Process Checklist Para-Technical Adoption of Code Effective Date Responsible Chief Policy Analyst Support Staff: Boards Coordinator...

245

Theoretical atomic physics code development at Los Alamos  

SciTech Connect

We have developed a set of computer codes for atomic physics calculations at Los Alamos. These codes can calculate a large variety of data with a minimum of effort on the part of the user. In particular, differential cross sections and electron impact coherence parameters can be readily obtained for arbitrary ions or atoms. Currently, the theory consists of non-relativistic Hartree-Fock structure calculations and non relativistic distorted wave approximation or first order many body theory collisional calculations. 12 refs., 2 figs., 5 tabs.

Clark, R.E.H.; Abdallah, J. Jr.

1989-01-01T23:59:59.000Z

246

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 28280 of 31,917 results. 71 - 28280 of 31,917 results. Article T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. http://energy.gov/cio/articles/t-652-mozilla-thunderbird-bugs-let-remote-users-obtain-cookies-and-execute-arbitrary Article T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. http://energy.gov/cio/articles/t-546-microsoft-mhtml-input-validation-hole-may-permit-cross-site-scripting-attacks

247

ALEGRA -- code validation: Experiments and simulations  

SciTech Connect

In this study, the authors are providing an experimental test bed for validating features of the ALEGRA code over a broad range of strain rates with overlapping diagnostics that encompass the multiple responses. A unique feature of the Arbitrary Lagrangian Eulerian Grid for Research Applications (ALEGRA) code is that it allows simultaneous computational treatment, within one code, of a wide range of strain-rates varying from hydrodynamic to structural conditions. This range encompasses strain rates characteristic of shock-wave propagation (10{sup 7}/s) and those characteristic of structural response (10{sup 2}/s). Most previous code validation experimental studies, however, have been restricted to simulating or investigating a single strain-rate regime. What is new and different in this investigation is that the authors have performed well-instrumented experiments which capture features relevant to both hydrodynamic and structural response in a single experiment. Aluminum was chosen for use in this study because it is a well characterized material--its EOS and constitutive material properties are well defined over a wide range of loading rates. The current experiments span strain rate regimes of over 10{sup 7}/s to less than 10{sup 2}/s in a single experiment. The input conditions are extremely well defined. Velocity interferometers are used to record the high strain-rate response, while low strain rate data were collected using strain gauges.

Chhabildas, L.C.; Konrad, C.H.; Mosher, D.A.; Reinhart, W.D; Duggins, B.D.; Rodeman, R.; Trucano, T.G.; Summers, R.M.; Peery, J.S.

1998-03-16T23:59:59.000Z

248

Optimal quantum source coding with quantum side information at the encoder and decoder  

Science Conference Proceedings (OSTI)

Consider many instances of an arbitrary quadripartite pure state of four quantum systems ABCD. Alice holds the AC part of each state, Bob holds B, while R represents all other parties correlated with ABC. Alice is required to redistribute ... Keywords: quantum information, side information, source coding

Jon T. Yard; Igor Devetak

2009-11-01T23:59:59.000Z

249

Electric field in hard superconductors with arbitrary cross section and general critical current law  

E-Print Network (OSTI)

Electric field in hard superconductors with arbitrary cross section and general critical current field E x during magnetic flux entry in superconductors with arbitrary cross section and general critical current law, has been evaluated by integration along the vortex penetration paths. Nontrivial flux

Majós, Antonio Badía

250

A study on transformation of self-similar processes with arbitrary marginal distributions  

Science Conference Proceedings (OSTI)

Stochastic discrete-event simulation studies of communication networks often require a mechanism to transform self-similar processes with normal marginal distributions into self-similar processes with arbitrary marginal distributions. The problem of ... Keywords: arbitrary marginal distribution, autocorrelation function, inverse cumulative distribution function, self-similar process, stochastic simulation

Hae-Duck J. Jeong; Jong-Suk R. Lee

2006-09-01T23:59:59.000Z

251

Stability of Iterative Decoding of Multi-Edge Type Doubly-Generalized LDPC Codes Over the BEC  

E-Print Network (OSTI)

Using the EXIT chart approach, a necessary and sufficient condition is developed for the local stability of iterative decoding of multi-edge type (MET) doubly-generalized low-density parity-check (D-GLDPC) code ensembles. In such code ensembles, the use of arbitrary linear block codes as component codes is combined with the further design of local Tanner graph connectivity through the use of multiple edge types. The stability condition for these code ensembles is shown to be succinctly described in terms of the value of the spectral radius of an appropriately defined polynomial matrix.

Paolini, Enrico; Chiani, Marco; Fossorier, Marc P C

2011-01-01T23:59:59.000Z

252

Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

253

Active code completion  

Science Conference Proceedings (OSTI)

Code completion menus have replaced standalone API browsers for most developers because they are more tightly integrated into the development workflow. Refinements to the code completion menu that incorporate additional sources of information have similarly ...

Cyrus Omar; YoungSeok Yoon; Thomas D. LaToza; Brad A. Myers

2012-06-01T23:59:59.000Z

254

Model Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

255

INTERNATIONAL CODE COUNCIL  

Science Conference Proceedings (OSTI)

... EE concepts / practices Page 8. IGCC Code Development Timeline ... Board modification) Page 9. IGCC Subject Areas 1. Energy use efficiency- ...

2012-10-14T23:59:59.000Z

256

Locally Testable Cyclic Codes  

Science Conference Proceedings (OSTI)

Cyclic linear codes of block length n over a finite field \\mathbb{F}_qare the linear subspace of \\mathbb{F}_{_q }^n that are invariant under a cyclic shift of their coordinates. A family of codes is good if all the codes in the family have constant rate ...

Lszl Babai; Amir Shpilka; Daniel tefankovic

2003-10-01T23:59:59.000Z

257

Informal Control code logic  

E-Print Network (OSTI)

General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

Bergstra, Jan A

2010-01-01T23:59:59.000Z

258

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2012 20, 2012 U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses A remote user can spoof SMS source addresses. August 17, 2012 U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. August 16, 2012 U-237: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability To exploit this issue, an attacker must entice an unsuspecting user to follow a crafted URI. August 15, 2012 U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code Execution of arbitrary code via network A remote user can cause arbitrary

259

Quantum circuit optimization by topological compaction in the surface code  

E-Print Network (OSTI)

The fragile nature of quantum information limits our ability to construct large quantities of quantum bits suitable for quantum computing. An important goal, therefore, is to minimize the amount of resources required to implement quantum algorithms, many of which are serial in nature and leave large numbers of qubits idle much of the time unless compression techniques are used. Furthermore, quantum error-correcting codes, which are required to reduce the effects of noise, introduce additional resource overhead. We consider a strategy for quantum circuit optimization based on topological deformation in the surface code, one of the best performing and most practical quantum error-correcting codes. Specifically, we examine the problem of minimizing computation time on a two-dimensional qubit lattice of arbitrary, but fixed dimension, and propose two algorithms for doing so.

Adam Paetznick; Austin G. Fowler

2013-04-09T23:59:59.000Z

260

Arizona | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

None Statewide Amendments Additional State Code Information Arizona has no statewide energy code. However, many counties have adopted the IECC 2006 as an energy efficiency code....

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

XSOR codes users manual  

SciTech Connect

This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

Jow, Hong-Nian [Sandia National Labs., Albuquerque, NM (United States); Murfin, W.B. [Technadyne Engineering Consultants, Inc., Albuquerque, NM (United States); Johnson, J.D. [Science Applications International Corp., Albuquerque, NM (United States)

1993-11-01T23:59:59.000Z

262

Code of Conduct  

NLE Websites -- All DOE Office Websites (Extended Search)

Governance » Governance » Ethics, Accountability » Code of Conduct Code of Conduct Helping employees recognize and resolve the ethics and compliance issues that may arise in their daily work. Contact Code of Conduct (505) 667-7506 Code of Conduct LANL is committed to operating in accordance with the highest standards of ethics and compliance and with its core values of service to our nation, ethical conduct and personal accountability, excellence in our work, and mutual respect and teamwork. LANL must demonstrate to customers and the public that the Laboratory is accountable for its actions and that it conducts business in a trustworthy manner. What is LANL's Code of Conduct? Charlie McMillan 1:46 Laboratory Director Charlie McMillan introduces the code LANL's Code of Conduct is designed to help employees recognize and

263

Sustainable Acquisition Coding System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents & Publications Policy...

264

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for z/OS Arbitrary Command 4: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability December 25, 2012 - 12:08am Addthis PROBLEM: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability PLATFORM: IBM HTTP Server for z/OS Version 5.3 ABSTRACT: A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS REFERENCE LINKS: Security vulnerability Reference #:1620945 Xforce: 80684 Secunia Advisory SA51656 CVE-2012-5955 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to compromise a vulnerable

265

Air Flow and Particle Trajectories around Aircraft Fuselages. Part III: Extensions to Particles of Arbitrary Shape  

Science Conference Proceedings (OSTI)

Earlier work that produced generalized rules for obtaining trajectories of water droplets moving around aircraft fuselages has been extended to cover the case for particles of arbitrary shape. The parameters determining the major features of the ...

W. D. King

1985-12-01T23:59:59.000Z

266

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

267

Energy-Efficient, Utility Accrual Real-Time Scheduling Under the Unimodal Arbitrary Arrival Model  

Science Conference Proceedings (OSTI)

We present an energy-efficient real-time scheduling algorithm called EUA*, for the unimodal arbitrary arrival model (or UAM). UAM embodies a "stronger" adversary than most arrival models. The algorithm considers application activities that are subject ...

Haisang Wu; Binoy Ravindran; E. Douglas Jensen

2005-03-01T23:59:59.000Z

268

Fluctuating-surface-current formulation of radiative heat transfer for arbitrary geometries  

E-Print Network (OSTI)

We describe a fluctuating-surface-current formulation of radiative heat transfer, applicable to arbitrary geometries in both the near and far field, that directly exploits efficient and sophisticated techniques from the ...

Rodriguez, Alejandro W.

269

Trace formulas for nonequilibrium Casimir interactions, heat radiation, and heat transfer for arbitrary objects  

E-Print Network (OSTI)

We present a detailed derivation of heat radiation, heat transfer, and (Casimir) interactions for N arbitrary objects in the framework of fluctuational electrodynamics in thermal nonequilibrium. The results can be expressed ...

Bimonte, Giuseppe

270

Complete SE[superscript 3] underwater robot control with arbitrary thruster configurations  

E-Print Network (OSTI)

e present a control algorithm for autonomous underwater robots with modular thruster configuration. The algorithm can handle arbitrary thruster configurations. It maintains the robot's desired attitude while solving for ...

Doniec, Marek Wojciech

271

Time-domain non-Monte Carlo noise simulation for nonlinear dynamic circuits with arbitrary excitations  

Science Conference Proceedings (OSTI)

A new, time-domain, non-Monte Carlo method for computer simulation of electrical noise in nonlinear dynamic circuits with arbitrary excitations is presented. This time-domain noise simulation ...

Alper Demir; Edward W. Y. Liu; Alberto L. Sangiovanni-Vincentelli

1994-11-01T23:59:59.000Z

272

A Statistical Generalization of the Transformed Eulerian-Mean Circulation for an Arbitrary Vertical Coordinate System  

Science Conference Proceedings (OSTI)

A new method is derived for approximating the mean meridional circulation in an arbitrary vertical coordinate system using only the time-mean and zonally averaged meridional velocity, meridional eddy transport, and eddy variance. The method is ...

Olivier Pauluis; Tiffany Shaw; Frdric Lalibert

2011-08-01T23:59:59.000Z

273

On linear combinations of two idempotent matrices over an arbitrary field  

E-Print Network (OSTI)

Given an arbitrary field $\\K$ and non-zero scalars $\\alpha$ and $\\beta$, we give necessary and sufficient conditions for a matrix $A \\in \\Mat_n(\\K)$ to be a linear combination of two idempotents with coefficients $\\alpha$ and $\\beta$. This extends results previously obtained by Hartwig and Putcha in two ways : the field $\\K$ considered here is arbitrary (possibly of characteristic 2), and the case $\\alpha \

Pazzis, Clment de Seguins

2009-01-01T23:59:59.000Z

274

ARCHY (Analysis and Reverse Engineering of Code Using Hierarchy and Yourdon): A tool for Fortran code maintenance and development  

SciTech Connect

Analysis and Reverse Engineering of Code Using Hierarchy and Yourdon (ARCHY) diagrams is a tool for development and maintenance of FORTRAN programs. When FORTRAN source code is read by ARCHY, it automatically creates a database that includes a data dictionary, which lists each variable, its dimensions, type, category (set, referenced, passed), module calling structure, and common block information. The database exists in an ASCII file that can be directly edited or maintained with the ARCHY database editor. The database is used by ARCHY to product structure charts and Yourdon data flow diagrams in PostScript format. ARCHY also transfers database information such as a variable definitions, module descriptions, and technical references to and from module headers. ARCHY contains several utilities for making programs more readable. It can automatically indent the body of loops and conditionals and resequence statement labels. Various language extensions are translated into FORTRAN-77 to increase code portability. ARCHY frames comment statements and groups FORMAT statements at the end of modules. It can alphabetize modules within a program, end-of-line labels can be added, and it can also change executable statements to upper or lower case. ARCHY runs under the VAX-VMS operating system and inputs from VAX-FORTRAN, IBM-FORTRAN, and CRAY FORTRAN sources files.

Aull, J.E.

1990-10-01T23:59:59.000Z

275

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

276

Mechanical code comparator  

DOE Patents (OSTI)

A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

2002-01-01T23:59:59.000Z

277

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

278

Magma benchmark code - CECM  

E-Print Network (OSTI)

Below is the Magma code used to run the benchmarks in Section 5 of the paper " In-place Arithmetic for Univariate Polynomials over an Algebraic Number Field"...

279

11. CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

30030 Amarillo, TX 79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120...

280

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Number of Establishments by Usage of Cogeneration Technologies, 2002; " " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within Cogeneration Technologies;" " Unit:...

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Quantum convolutional stabilizer codes  

E-Print Network (OSTI)

Quantum error correction codes were introduced as a means to protect quantum information from decoherance and operational errors. Based on their approach to error control, error correcting codes can be divided into two different classes: block codes and convolutional codes. There has been significant development towards finding quantum block codes, since they were first discovered in 1995. In contrast, quantum convolutional codes remained mainly uninvestigated. In this thesis, we develop the stabilizer formalism for quantum convolutional codes. We define distance properties of these codes and give a general method for constructing encoding circuits, given a set of generators of the stabilizer of a quantum convolutional stabilizer code, is shown. The resulting encoding circuit enables online encoding of the qubits, i.e., the encoder does not have to wait for the input transmission to end before starting the encoding process. We develop the quantum analogue of the Viterbi algorithm. The quantum Viterbi algorithm (QVA) is a maximum likehood error estimation algorithm, the complexity of which grows linearly with the number of encoded qubits. A variation of the quantum Viterbi algorithm, the Windowed QVA, is also discussed. Using Windowed QVA, we can estimate the most likely error without waiting for the entire received sequence.

Chinthamani, Neelima

2005-05-01T23:59:59.000Z

282

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

9.1 Enclosed Floorspace and Number of Establishment Buildings, 2006;" " Level: National Data; " " Row: NAICS Codes;" " Column: Floorspace and Buildings;" " Unit: Floorspace Square...

283

11. CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

1 PAGE 1 OF2 AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT PAGES 2. AMENDMENT/MODIFICATION NO. I 3. EFFECTIVE DATE M191 See Block 16C 4. REQUISITION/PURCHASE I 5. PROJECT NO. (If applicable) REQ. NO. 6.ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Support Department P.O. Box 5400 Albuquerque, NM 87185-5400 7. ADMINISTERED BY (If other than Item 6) CODE U.S. Department of Energy National Nuclear Security Administration Manager, Pantex Site Office P.O. Box 30030 Amarillo, TX 79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY CODE SA. AMENDMENT OF SOLICITATION NO.

284

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

285

Hydrogen Codes and Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes and Standards Codes and Standards James Ohi National Renewable Energy Laboratory 1617 Cole Blvd. Golden, CO 80401 Background The development and promulgation of codes and standards are essential if hydrogen is to become a significant energy carrier and fuel because codes and standards are critical to establishing a market-receptive environment for commercializing hydrogen-based products and systems. The Hydrogen, Fuel Cells, and Infrastructure Technologies Program of the U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL), with the help of the National Hydrogen Association (NHA) and other key stakeholders, are coordinating a collaborative national effort by government and industry to prepare, review, and promulgate hydrogen codes and standards needed to expedite hydrogen infrastructure development. The

286

Residential Building Code Compliance  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 Residential Building Code Compliance: Recent Findings and Implications Energy use in residential buildings in the U.S. is significant-about 20% of primary energy use. While several approaches reduce energy use such as appliance standards and utility programs, enforcing state building energy codes is one of the most promising. However, one of the challenges is to understand the rate of compliance within the building community. Utility companies typically use these codes as the baseline for providing incentives to builders participating in utility-sponsored residential new construction (RNC) programs. However, because builders may construct homes that fail to meet energy codes, energy use in the actual baseline is higher than would be expected if all buildings complied with the code. Also,

287

T-557: Microsoft Office Excel Office Art Object Parsing Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Office Excel Office Art Object Parsing Remote Code 7: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability February 15, 2011 - 7:00am Addthis PROBLEM: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability. PLATFORM: Microsoft Office Excel ABSTRACT: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. reference LINKS: ZDI-11-041 ZDI Public Disclosure: Microsoft CVE-2011-0979 IMPACT ASSESSMENT: High Discussion: The flaw occurs when parsing a document with a malformed Excel document.

288

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

289

T-643: HP OpenView Storage Data Protector Unspecified Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

643: HP OpenView Storage Data Protector Unspecified Code 643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability June 9, 2011 - 3:45pm Addthis PROBLEM: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability PLATFORM: Versions 6.0, 6.10, and 6.11 running on HP-UX, Solaris, Linux and Windows. ABSTRACT: A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Secunia Advisory SA44884 CVE-2011-1864 SecurityTracker Alert ID: 1025620 HP Document ID: c02712867 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

290

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Telnet code execution vulnerability: FreeBSD and Kerberos 69: Telnet code execution vulnerability: FreeBSD and Kerberos U-069: Telnet code execution vulnerability: FreeBSD and Kerberos December 27, 2011 - 5:18am Addthis PROBLEM: Telnet code execution vulnerability: FreeBSD and Kerberos PLATFORM: Operating System: FreeBSD 7.1, 7.3, 8.0 and 8.1 and Software: Kerberos ABSTRACT: Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. reference LINKS: FreeBSD-SA-11:08.telnetd MITKRB5-SA-2011-008 Secunia Advisory: SA47397 (FreeBSD) Secunia Advisory: SA47348 (Kerberos) SecurityTracker Alert ID: 1026460 CVE-2011-4862 IMPACT ASSESSMENT: High Discussion: When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. The telnet

291

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

292

Report number codes  

SciTech Connect

This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

Nelson, R.N. (ed.)

1985-05-01T23:59:59.000Z

293

Dispersion in a thermal plasma including arbitrary degeneracy and quantum recoil  

Science Conference Proceedings (OSTI)

The longitudinal response function for a thermal electron gas is calculated including two quantum effects exactly, degeneracy, and the quantum recoil. The Fermi-Dirac distribution is expanded in powers of a parameter that is small in the nondegenerate limit and the response function is evaluated in terms of the conventional plasma dispersion function to arbitrary order in this parameter. The infinite sum is performed in terms of polylogarithms in the long-wavelength and quasistatic limits, giving results that apply for arbitrary degeneracy. The results are applied to the dispersion relations for Langmuir waves and to screening, reproducing known results in the nondegenerate and completely degenerate limits, and generalizing them to arbitrary degeneracy.

Melrose, D. B. [School of Physics, University of Sydney, New South Wales 2006 (Australia); Mushtaq, A. [School of Physics, University of Sydney, New South Wales 2006 (Australia); Theoretical Plasma Physics Division, PINSTECH, Nilore, 44000 Islamabad (Pakistan)

2010-11-15T23:59:59.000Z

294

Thermodynamic Model for Fluid-Fluid Interfacial Areas in Porous Media for Arbitrary Drainage-Imbibition Sequences  

SciTech Connect

Fluid/fluid interfacial areas are important in controlling the rate of mass and energy transfer between fluid phases in porous media. We present a modified thermodynamically based model (TBM) to predict fluid/fluid interfacial areas in porous media for arbitrary drainage/imbibition sequences. The TBM explicitly distinguishes between interfacial areas associated with continuous (free) and isolated (entrapped) nonwetting fluids. The model is restricted to two-fluid systems in which (1) no significant conversion of mechanical work into heat occurs, (2) the wetting fluid completely wets the porous mediums solid surfaces, and (3) no changes in interfacial area due to mass transfer between phases occur. We show example calculations for two different drainage/imbibition sequences in two porous media: a highly uniform silica sand and a well-graded silt. The TBMs predictions for interfacial area associated with free nonwetting-fluid are identical to those of a previously published geometry-based model (GBM). However, predictions for interfacial area associated with entrapped nonwetting-fluid are consistently larger in the TBM than in the GBM. Although a comparison of model predictions with experimental data is currently only possible to a limited extent, good general agreement was found for the TBM. As required model parameters are commonly used as inputs for or tracked during multifluid-flow simulations, the modified TBM may be easily incorporated in numerical codes.

Schroth, Martin H.; Oostrom, Mart; Dobson, Richard; Zeyer, Josef

2008-08-01T23:59:59.000Z

295

Codes base on unambiguous products  

Science Conference Proceedings (OSTI)

In this paper, we propose the notion of +-unambiguous product which is expanded from unambiguous product and the definitions of alternative product, alternative code, even alternative code on a pair (X, Y) of languages. Some basic properties of ... Keywords: +-unambiguous product, alt-code, ealt-code, generations of code, independency of conditions

Ho Ngoc Vinh; Vu Thanh Nam; Phan Trung Huy

2010-11-01T23:59:59.000Z

296

FCT Safety, Codes and Standards: DOE Safety, Codes, and Standards...  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Codes, and Standards Activities to someone by E-mail Share FCT Safety, Codes and Standards: DOE Safety, Codes, and Standards Activities on Facebook Tweet about FCT Safety,...

297

Gate fidelity of arbitrary single-qubit gates constrained by conservation laws  

E-Print Network (OSTI)

Recent investigations show that conservation laws limit the accuracy of gate operations in quantum computing. The inevitable error under the angular momentum conservation law has been evaluated so far for the CNOT, Hadamard, and NOT gates for spin 1/2 qubits, while the SWAP gate has no constraint. Here, we extend the above results to general single-qubit gates. We obtain an upper bound of the gate fidelity of arbitrary single-qubit gates implemented under arbitrary conservation laws, determined by the geometry of the conservation law and the gate operation on the Bloch sphere as well as the size of the ancilla.

Tokishiro Karasawa; Julio Gea-Banacloche; Masanao Ozawa

2008-09-18T23:59:59.000Z

298

Residential Codes and Standards | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

houses, which are built in a factory and transported to the home site. ICC ASHRAE International Energy Conservation Code The International Energy Conservation Code...

299

Building Energy Codes in Arizona: Best Practices in Code Support...  

NLE Websites -- All DOE Office Websites (Extended Search)

in Code Support, Compliance, and Enforcement A study funded by the North American Insulation Manufacturers Association to identify "the best practices in energy code support,...

300

APPENDIX A CRUDE STREAM CODES COUNTRY Stream Code Stream Name ...  

U.S. Energy Information Administration (EIA)

Page ?? 6 * A Former Soviet Republic APPENDIX A CRUDE STREAM CODES COUNTRY Stream Code Stream Name Gravity Sulfur Columbia - Continued CO043 Orito ...

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Compiling Codes on Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Compiling Codes Compiling Codes Compiling Codes on Hopper Overview Cray provides a convenient set of wrapper commands that should be used in almost all cases for compiling and linking parallel programs. Invoking the wrappers will automatically link codes with MPI libraries and other Cray system software. All MPI and Cray system include directories are also transparently imported. In addition the wrappers append the compiler's target processor arguments for the hopper compute node processors. NOTE: The intention is that programs are compiled on the login nodes and executed on the compute nodes. Because the compute nodes and login nodes have different operating systems, binaries created for compute nodes may not run on the login node. The wrappers mentioned above guarantee that

302

T ID CODE I  

National Nuclear Security Administration (NNSA)

I 9B. DATED (SEE ITEM 11) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) 10A. MODIFICATION OF CONTRACTIORDER NO. DE-AC52-06NA25396 3. EFFECTIVE DATE See...

303

" Row: NAICS Codes;" " ...  

U.S. Energy Information Administration (EIA) Indexed Site

Only","Other than","and","Any","from Only","Other than","and" "Code(a)","Subsector and Industry","Electricity(b)","Local Utility(c)","Local Utility(d)","Other Sources","Natural...

304

" Row: NAICS Codes;" " ...  

U.S. Energy Information Administration (EIA) Indexed Site

than","and","Any","from Only","Other than","and","Row" "Code(a)","Subsector and Industry","Electricity(b)","Local Utility(c)","Local Utility(d)","Other Sources","Natural...

305

U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName'  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' 2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks March 23, 2012 - 7:42am Addthis PROBLEM: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks PLATFORM: Apache Wicket 1.4.x ABSTRACT: A remote user can conduct cross-site scripting attacks. reference LINKS: Apache Wicket CVE-2012-0047 SecurityTracker Alert ID: 1026839 IMPACT ASSESSMENT: High Discussion: The software does not properly filter HTML code from user-supplied input in the 'wicket:pageMapName' request parameter before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target

306

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit 2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September 6, 2012 - 6:00am Addthis PROBLEM: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: Barracuda Web Filter 5.0.015 is vulnerable; other versions may also be affected. ABSTRACT: Barracuda Web Filter Authentication Module Multiple HTML Injection Vulnerabilities reference LINKS: Barracuda Networks Barracuda Networks Security ID: BNSEC-279/BNYF-5533 SecurityTracker Alert ID: 1027500 Bugtraq ID: 55394 seclists.org IMPACT ASSESSMENT: Medium Discussion: Two scripts not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to

307

Network coding: an instant primer  

Science Conference Proceedings (OSTI)

Network coding is a new research area that may have interesting applications in practical networking systems. With network coding, intermediate nodes may send out packets that are linear combinations of previously received information. There are two ... Keywords: network coding

Christina Fragouli; Jean-Yves Le Boudec; Jrg Widmer

2006-01-01T23:59:59.000Z

308

Connecticut | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

309

Maryland | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

310

Oregon | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

311

Indiana | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

312

California | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

313

Iowa | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

utility company must obtain a written statementcertification from the builder or homeowner attesting to their compliance with the state energy code. Code enforcement is...

314

A model for stratified gas-liquid turbulent flow in ducts of arbitrary cross-section  

E-Print Network (OSTI)

93 A model for stratified gas-liquid turbulent flow in ducts of arbitrary cross-section J. M the pressure gradient and the liquid fraction in two-phase gas- liquid fully developed stratified flow.60 Nomenclature. - TWO-PHASE VARIABLES. Definition densities statistical average (gas, liquid) mass average phase

Paris-Sud XI, Université de

315

Hardware generation of arbitrary random number distributions from uniform distributions via the inversion method  

Science Conference Proceedings (OSTI)

We present an automated methodology for producing hardware-based random number generator (RNG) designs for arbitrary distributions using the inverse cumulative distribution function (ICDF). The ICDF is evaluated via piecewise polynomial approximation ... Keywords: Chebyshev approximation and theory, algorithms implemented in hardware, automatic synthesis, computer arithmetic, elementary function approximation, error analysis, gate arrays, piecewise polynomial approximation

Ray C. C. Cheung; Dong-U Lee; Wayne Luk; John D. Villasenor

2007-08-01T23:59:59.000Z

316

One-step hybrid remapping algorithm for multi-material arbitrary Lagrangian-Eulerian methods  

Science Conference Proceedings (OSTI)

In this paper, a new flux-based one-step hybrid remapping method for multi-material arbitrary Lagrangian-Eulerian (ALE) approach is introduced. In the vicinity of material interfaces, the swept region is intersected with pure material polygons in the ... Keywords: Conservative interpolations, Flux-based hybrid remap, Multi-material ALE, Swept regions

Milan Kucharik; Mikhail Shashkov

2012-04-01T23:59:59.000Z

317

Numerical Regularized Moment Method of Arbitrary Order for Boltzmann-BGK Equation  

Science Conference Proceedings (OSTI)

We introduce a numerical method for solving Grad's moment equations or regularized moment equations for an arbitrary order of moments. In our algorithm, we do not explicitly need the moment equations. Instead, we directly start from the Boltzmann equation ... Keywords: Boltzmann-BGK equation, Grad's moment method, regularized moment-equations

Zhenning Cai; Ruo Li

2010-08-01T23:59:59.000Z

318

Single-Scan NMR Spectroscopy at Arbitrary Dimensions Yoav Shrot and Lucio Frydman*  

E-Print Network (OSTI)

Single-Scan NMR Spectroscopy at Arbitrary Dimensions Yoav Shrot and Lucio Frydman* Contribution resonance (NMR) provides one of the foremost analytical tools available to elucidate the structure a parametric incrementation of their values throughout independent experiments. Two-dimensional (2D) NMR

Frydman, Lucio

319

Reduced-dissipation remapping of velocity in staggered arbitrary Lagrangian-Eulerian methods  

Science Conference Proceedings (OSTI)

Remapping is an essential part of most Arbitrary Lagrangian-Eulerian (ALE) methods. In this paper, we focus on the part of the remapping algorithm that performs the interpolation of the fluid velocity field from the Lagrangian to the rezoned computational ... Keywords: Conservative interpolations, Flux-based remap, Staggered discretization, Velocity remap

David Bailey; Markus Berndt; Milan Kucharik; Mikhail Shashkov

2010-04-01T23:59:59.000Z

320

Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary  

Science Conference Proceedings (OSTI)

In this paper, we re-visit the problem of unconditionally secure message transmission (USMT) from a sender S to a receiver R, who are part of a distributed synchronous network, modeled as an arbitrary directed graph. Some ... Keywords: error probability, information theoretic security, mixed adversary

Kannan Srinathan; Arpita Patra; Ashish Choudhary; C. Pandu Rangan

2009-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Maine | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Maine Maine Last updated on 2013-11-04 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 Amendments / Additional State Code Information As of September 28, 2011, municipalities over 4,000 in population were required to enforce the new code if they had a building code in place by August 2008. Municipalities under 4,000 are not required to enforce it unless they wish to do so and have the following options: 1. Adopt and enforce the Maine Uniform Building and Energy Code 2. Adopt and enforce the Maine Uniform Building Code (the building code without energy) 3. Adopt and enforce the Maine Uniform Energy Code (energy code only) 4. Have no code Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Maine (BECP Report, Sept. 2009)

322

Product Service Codes @ Headquarters | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Product Service Codes @ Headquarters Product Service Codes @ Headquarters A listing of Product Service Codes used at Headquarters Procurement Services Produce Service Codes @...

323

Additive semisimple multivariable codes over F4  

Science Conference Proceedings (OSTI)

The structure of additive multivariable codes over Keywords: 11T61, 13M10, 81P70, 94B99, Abelian codes, Additive multivariable codes, Duality, Quantum codes

E. Martnez-Moro; A. Piera-Nicols; I. F. Ra

2013-11-01T23:59:59.000Z

324

Code Tables | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The Obligation Code table shows the valid country of obligation codes. Type of Inventory ChangeUse Code The type of inventory changeuse code (UC) identifies the category...

325

A geometrically-conservative, synchronized, flux-corrected remap for arbitrary Lagrangian-Eulerian computations with nodal finite elements  

Science Conference Proceedings (OSTI)

This article describes a conservative synchronized remap algorithm applicable to arbitrary Lagrangian-Eulerian computations with nodal finite elements. In the proposed approach, ideas derived from flux-corrected transport (FCT) methods are extended to ... Keywords: Arbitrary Lagrangian-Eulerian methods, Compatible discretizations, Geometric conservation law, Meteorological flows, Nodal finite element method, Remap, Shock hydrodynamics

A. LPez Ortega; G. Scovazzi

2011-07-01T23:59:59.000Z

326

NAICS Codes Description:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes Codes Description: Filters: Date Signed only show values between '10/01/2006' and '09/30/2007', Contracting Agency ID show only ('8900'), Contracting Office ID show only ('00001') Contracting Agency ID: 8900, Contracting Office ID: 00001 NAICS Code NAICS Description Actions Action Obligation 541519 OTHER COMPUTER RELATED SERVICES 251 $164,546,671 541611 ADMINISTRATIVE MANAGEMENT AND GENERAL MANAGEMENT CONSULTING SERVICES 236 $52,396,806 514210 DATA PROCESSING SERVICES 195 $28,941,727 531210 OFFICES OF REAL ESTATE AGENTS AND BROKERS 190 $6,460,652 541330 ENGINEERING SERVICES 165 $33,006,079 163 $11,515,387 541690 OTHER SCIENTIFIC AND TECHNICAL CONSULTING SERVICES 92 $40,527,088 531390 OTHER ACTIVITIES RELATED TO REAL ESTATE 79 -$659,654 337214 OFFICE FURNITURE (EXCEPT WOOD) MANUFACTURING 78 $1,651,732

327

U-099: MySQL Unspecified Code Execution Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: MySQL Unspecified Code Execution Vulnerability 099: MySQL Unspecified Code Execution Vulnerability U-099: MySQL Unspecified Code Execution Vulnerability February 9, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in MySQL, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: MySQL 5.x ABSTRACT: Successful exploitation allows execution of arbitrary code. Reference LINKS: Secunia Advisory SA47894 No CVE references currently available. IMPACT ASSESSMENT: Medium Discussion: The vulnerability is reported in version 5.5.20. Other versions may also be affected. The exploit has been tested with mysql-5.5.20-debian6.0-i686.deb on Debian 6.0. Impact: System access from local network Solution: An effective workaround cannot currently be provided due to limited vulnerability details.

328

T-729: Mozilla Code Installation Through Holding Down Enter | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Mozilla Code Installation Through Holding Down Enter 9: Mozilla Code Installation Through Holding Down Enter T-729: Mozilla Code Installation Through Holding Down Enter September 29, 2011 - 8:30am Addthis PROBLEM: Mozilla Code Installation Through Holding Down Enter. PLATFORM: Versions prior to the following are vulnerable: Firefox 7.0 Firefox 3.6.23 Thunderbird 7.0 SeaMonkey 2.4 ABSTRACT: Attackers can exploit this issue by enticing an unsuspecting victim into viewing and interacting with a malicious Web page. An attacker may be able to exploit this issue to bypass a confirmation dialog and install an arbitrary add-on. This may aid in further attacks. reference LINKS: Mozilla Foundation Security Advisory 2011-40 Firefox Security Advisories CVE-2011-2372 CVE-2011-3001 IMPACT ASSESSMENT: High Discussion: If a user holds down the Enter key--as part of a game or test, perhaps--a

329

LDPC codes from Singer cycles  

Science Conference Proceedings (OSTI)

The main goal of coding theory is to devise efficient systems to exploit the full capacity of a communication channel, thus achieving an arbitrarily small error probability. Low Density Parity Check (LDPC) codes are a family of block codes-characterised ... Keywords: LDPC Codes, Projective spaces, Singer cycles

Luca Giuzzi; Angelo Sonnino

2009-04-01T23:59:59.000Z

330

Thermodynamics Software/Codes - TMS  

Science Conference Proceedings (OSTI)

FORUMS > THERMODYNAMICS SOFTWARE/CODES, Replies, Views, Originator ... Thermodynamic calculations in multicomponent systems, 0, 1887, Cathy...

331

Washington | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Washington Washington Last updated on 2013-11-05 Current News The Washington State Building Code Council recently completed deliberations on adoption and amendment of the 2012 codes. This includes adoption of the 2012 IECC with state amendments. The new codes became effective July 1, 2013. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information WA 2012 Nonresidential Codes Approved Compliance Tools Nonresidential Energy Code Compliance Tools Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2010 Effective Date 07/01/2013 Adoption Date 02/01/2013 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes Washington DOE Determination Letter, May 31, 2013 Washington State Certification of Commercial and Residential Building Energy Codes

332

Alabama | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Adoption » Status of State Energy Code Adoption Adoption » Status of State Energy Code Adoption Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Alabama Last updated on 2013-05-31 Current News The Alabama Energy and Residential Codes Board adopted the 2009 International Energy Conservation Code (IECC) for Commercial Buildings and the 2009 International Residential Code (IRC) for Residential Construction. The new codes will become effective on October 1, 2012. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information N/A Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in Alabama (BECP Report, Sept. 2009)

333

The Woodland Carbon Code  

E-Print Network (OSTI)

The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

334

Coded modulation in the block-fading channel: coding theorems and code construction  

Science Conference Proceedings (OSTI)

We consider coded modulation schemes for the block-fading channel. In the setting where a codeword spans a finite number N of fading degrees of freedom, we show that coded modulations of rate R bit per complex dimension, over a finite signal set ??C ... Keywords: Block-fading channels, bit-interleaved coded modulation, concatenated codes, distance spectrum, diversity, iterative decoding, maximum distance-separable (MDS) codes, maximum-likelihood (ML) decoding, outage probability

A. Guillen i Fabregas; G. Caire

2006-01-01T23:59:59.000Z

335

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

336

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

337

Nebraska | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Nebraska Nebraska Last updated on 2013-11-04 Current News Nebraska Legislature adopted the 2009 IECC/ASHRAE 90.1-2007. The code became effective August 27, 2011. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Cities and counties may adopt codes that differ from the Nebraska Energy Code; however, state law requires the adopted code to be equivalent to the Nebraska Energy Code. For existing buildings, only those renovations that will cost more than 50 percent of the replacement cost of the building must comply with the code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Nebraska (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

338

Summary | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Summary The impact of energy codes on our future is apparent. From environmental and resource conservation to national security, energy concerns, and our economic challenges, energy codes will continue to be a key component of a sound public policy. For further information on building energy code adoption, compliance, and enforcement, review the ACE toolkits Adoption Compliance Enforcement Popular Links ACE Learning Series ACE Overview Top 10 Reasons for Energy Codes Development of Energy Codes Adoption of Energy Codes Compliance with Energy Codes Enforcement of Energy Codes Going Beyond Code Summary Acronyms and Abbreviations Toolkit Definitions Adoption Toolkit Compliance Toolkit Enforcement Toolkit Contacts Web Site Policies U.S. Department of Energy USA.gov Last Updated: Thursday, January 31, 2013 - 15:19

339

Florida | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Florida Florida Last updated on 2013-11-18 Current News The triennial code change process is currently underway. Florida expects to be equivalent to ASHRAE 90.1-10 and IECC 2012 by early 2014. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information N/A Approved Compliance Tools Can use State specific EnergyGauge Summit FlaCom State Specific Research Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/15/2012 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Florida DOE Determination Letter, May 31, 2013 Florida State Certification of Commercial Building Codes Current Code State Specific Amendments / Additional State Code Information Florida Building Code

340

Coded modulation with Low Density Parity Check codes  

E-Print Network (OSTI)

This thesis proposes the design of Low Density Parity Check (LDPC) codes for cases where coded modulation is used. We design these codes by extending the idea of Density Evolution (DE) that has been introduced as a powerful tool to analyze LDPC codes. We first discuss methods by which we can design these codes for higher order constellations like 8 Phase Shift Keying (PSK) and 16 Quadrature Amplitude Modulation (QAM). We present simulation results that are within 0.22 dB and 0.4 dB within the constrained capacity of 8 PSK and 16 QAM constellations respectively in an Additive White Gaussian Noise (AWGN) channel. In the second part, we investigate serial concatenation of LDPC codes and minimum shift keying (MSK) with iterative decoding. We show that the design of LDPC codes is crucially dependent on the realization of the MSK modulator. For MSK modulators with non-recursive continuous phase encoders (CPEs), optimal codes for BPSK are optimal whereas for MSK modulators with recursive CPEs the BPSK codes are not optimal. We show that for non-recursive CPEs, iterative demodulation and decoding is not required even though the CPE has memory. However, iterative demodulation is essential for recursive CPEs. For recursive CPEs, we design LDPC codes using density evolution and differential evolution by looking at the graph structure of the CPE and considering message passing between both these codes. The resulting codes provide significantly improved performance over the existing codes.

Narayanaswami, Ravi

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Laser ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refi  

NLE Websites -- All DOE Office Websites (Extended Search)

ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refinement ray tracing in a parallel arbitrary Lagrangian-Eulerian adaptive mesh refinement hydrocode This article has been downloaded from IOPscience. Please scroll down to see the full text article. 2010 J. Phys.: Conf. Ser. 244 032022 (http://iopscience.iop.org/1742-6596/244/3/032022) Download details: IP Address: 50.136.219.251 The article was downloaded on 18/04/2013 at 01:39 Please note that terms and conditions apply. View the table of contents for this issue, or go to the journal homepage for more Home Search Collections Journals About Contact us My IOPscience Laser Ray Tracing in a Parallel Arbitrary Lagrangian-Eulerian Adaptive Mesh Refinement Hydrocode N D Masters 1 , T B Kaiser 1 , R W Anderson 1 , D C Eder 1 , A C Fisher 1 , A E Koniges 2 1 Lawrence Livermore National Laboratory, Livermore, CA U.S.A. 2 National

342

Generating Minimally Coupled Einstein-Scalar Field Solutions from Vacuum Solutions with Arbitrary Cosmological Constant  

E-Print Network (OSTI)

This paper generalizes two previously known techniques for generating minimally coupled Einstein-scalar field solutions in 4 dimensions; the Buchdahl and Fonarev transformations. By applying this solution generation technique, minimally coupled Einstein-scalar field solutions can be generated from vacuum solutions with arbitrary cosmological constant in arbitrary dimension. The only requirement to a seed solution is that it posesses a hypersurface-orthogonal Killing vector field. The generalization that allows us to use seed solutions with arbitrary cosmological constant uncovers a new class of Einstein-scalar field solutions that has previously not been studied. We apply the new solution transformation to the (A)dS4 vacuum solution. Transforming the resulting Einstein-scalar field solution to the conformal frame, a two-parameter family of spatially finite, expanding and accelerating cosmological solutions are found that are conformally isometric to the Einstein static universe RxS^3. We study null geodesics and find that for any observer, the solution has a cosmological horizon at an angular distance of pi/2 away from the observer. We find that a subset of these solutions can be naturally interpreted as expanding cosmologies in which a scalar black hole is formed at late times. The conformally coupled scalar field satisfies the weak energy condition as long as the energy density is positive, while the strong energy condition is generally violated.

Kjell Tangen

2007-05-30T23:59:59.000Z

343

Erasure Techniques in MRD codes  

E-Print Network (OSTI)

This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

2012-05-03T23:59:59.000Z

344

Compliance with Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance with Energy Codes Compliance with Energy Codes Energy code compliance must be achieved to realize the considerable benefits inherent in energy codes. BECP supports successful compliance by making no-cost compliance tools, REScheck(tm) and COMcheck(tm), and other resources widely available to everyone. BECP has also developed several resources to help states uniformly assess the rate of compliance with their energy codes for residential and commercial buildings. It is important to note that regardless of the level of enforcement, as a law the building owner/developer is ultimately responsible to comply with the energy code. Compliance will be increased if the adopting agency prepares the building construction community to comply with the energy code and provides resources to code officials to enforce it.

345

Building Energy Codes 101: An Introduction | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101: An Introduction Codes 101: An Introduction In order to provide a basic introduction to the varied and complex issues associated with building energy codes, the U.S. Department of Energy's Building Energy Codes Program, with valued assistance from the International Codes Council and ASHRAE, has prepared Building Energy Codes 101: An Introduction. This guide is designed to speak to a broad audience with an interest in building energy efficiency, including state energy officials, architects, engineers, designers, and members of the public. Publication Date: Wednesday, February 17, 2010 BECP_Building Energy Codes 101_February2010_v00.pdf Document Details Last Name: Britt Initials: M Affiliation: PNNL Document Number: PNNL-70586 Focus: Adoption Code Development Compliance Building Type:

346

Building Energy Codes Resource Guide: Code Officials Edition  

NLE Websites -- All DOE Office Websites (Extended Search)

in it FOR ME? DOE's Building Energy Codes Program (www.energycodes.gov) and ICC (www.iccsafe.org) offer many resources for commercial code of cials. Examples in this section...

347

Methane Hydrates Code Comparison  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Comparison Code Comparison Set-up for Problem 7 (Long-term simulations for Mt Elbert and PBU L- Pad "Like" Deposits) As discussed in the phone conference held on 11/9/2007, it is proposed that Problem 7 be made up of three separate cases: Problem 7a will look at a deposit similar to the Mt Elbert site. Problem 7b will be based on the PBU L-Pad site, and Problem 7c will be a down-dip version of the L-Pad site. In all three cases, a standard set of parameters will be used based on those found in Problem 6 (the history matches to the MDT data). The parameters chosen were consensus values based on the experiences of the various groups in attempting to match the MDT data for the C2 formation at Mount Elbert. Given below are the detailed descriptions of the three problems and the proposed

348

Status of MARS Code  

SciTech Connect

Status and recent developments of the MARS 14 Monte Carlo code system for simulation of hadronic and electromagnetic cascades in shielding, accelerator and detector components in the energy range from a fraction of an electronvolt up to 100 TeV are described. these include physics models both in strong and electromagnetic interaction sectors, variance reduction techniques, residual dose, geometry, tracking, histograming. MAD-MARS Beam Line Build and Graphical-User Interface.

N.V. Mokhov

2003-04-09T23:59:59.000Z

349

MELCOR computer code manuals  

Science Conference Proceedings (OSTI)

MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

1995-03-01T23:59:59.000Z

350

Michigan | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Michigan Michigan Last updated on 2013-06-03 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 with Amendments Amendments / Additional State Code Information 2009 Commercial MI Uniform Energy Code Rules Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Michigan (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/09/2011 Adoption Date 11/08/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Michigan DOE Determination Letter, May 31, 2013 Current Code 2009 IECC with Amendments Amendments / Additional State Code Information 2009 Residential MI Uniform Energy Code Rules Approved Compliance Tools Can use REScheck

351

Georgia | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Georgia Georgia Last updated on 2013-07-18 Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information GA Amendments Approved Compliance Tools Can use COMcheck Must choose ASHRAE 90.1-2007 as code option. State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Georgia (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 01/01/2011 Adoption Date 11/03/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Georgia State Certification of Commercial and Residential Building Codes Extension Request Current Code 2009 IECC with Amendments Amendments / Additional State Code Information GA Amendments Approved Compliance Tools Can use REScheck

352

Minnesota | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Minnesota Minnesota Last updated on 2013-06-03 Current News The 2009 editions of the International Residential Code (IRC), International Building Code (IBC), and International Fire Code (IFC) will be published soon and the Construction Codes and Licensing Division and the State Fire Marshal Division have been discussing this adoption. Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2004 with Amendments Amendments / Additional State Code Information Commercial Energy Code Approved Compliance Tools Compliance forms can be downloaded from ASHRAE State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Minnesota (BECP Report, Sept. 2009) Approximate Energy Efficiency Less energy efficient than ASHRAE 90.1-2004 Effective Date 06/01/2009

353

News | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

News News A variety of resources and news from BECP, states, and other news sources are available for anyone interested in learning more about building energy codes. This includes newsletters, articles, links and more. To receive BECP News and other updates from the Building Energy Codes Program via email, join our mailing list. Featured Codes News DOE Activities and Methodology for Assessing Compliance With Building Energy Codes RFI Mayors Urge Cities to Strengthen Energy Code AZ Legislature Preserves Local Control of Building Energy Efficiency Codes Washington State Home Builders Lead the Nation in Energy Code Compliance Mississippi Invests in Future Growth With Adoption of Best-in-Class Energy Efficiency Legislation Energy 2030 Report Calls for Stricter Energy Building Codes

354

Nevada Energy Code for Buildings  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

355

Matlab-Kinect Interface Code  

E-Print Network (OSTI)

This .zip file contains code and installation instructions for acquiring 3d arm movements in Matlab using the Microsoft Kinect 3d camera. The provided code has been validated in 32-bit and 64-bit Matlab with 32-bit and ...

Kowalski, Kevin

2012-06-01T23:59:59.000Z

356

Code Completion From Abbreviated Input  

E-Print Network (OSTI)

Abbreviation Completion is a novel technique to improve the efficiency of code-writing by supporting code completion of multiple keywords based on non-predefined abbreviated input - a different approach from conventional ...

Miller, Robert C.

357

Quantum codes on Hurwitz surfaces  

E-Print Network (OSTI)

Ever since the birth of the first quantum error correcting code, many error correcting techniques and formalism has been constructed so far. Among those, generating a quantum code on a locally planar geometry have lead to ...

Kim, Isaac H. (Isaac Hyun)

2007-01-01T23:59:59.000Z

358

2009 Solar Decathlon Building Code  

NLE Websites -- All DOE Office Websites (Extended Search)

BUILDING CODE Last Updated: September 29, 2008 2009 Solar Decathlon Building Code i September 29, 2008 Contents Section 1. Introduction ............................................................................................................................................................. 1 Section 2. Adopted Codes ........................................................................................................................................................ 1 Section 3. Building Planning and Construction .............................................................................................................. 1 3-1. Fire Protection and Prevention ................................................................................................................................. 1

359

Coded output support vector machine  

Science Conference Proceedings (OSTI)

The authors propose a coded output support vector machine (COSVM) by introducing the idea of information coding to solve multi-class classification problems for large-scale datasets. The COSVM is built based on the support vector regression (SVR) machine ... Keywords: coded output, multi-class classification, number system, parallel implementation, support vector machine (SVM)

Tao Ye; Xuefeng Zhu

2012-07-01T23:59:59.000Z

360

Code for Hydrogen Hydrogen Pipeline  

E-Print Network (OSTI)

#12;2 Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop Augusta, Georgia August development · Charge from BPTCS to B31 Standards Committee for Hydrogen Piping/Pipeline code development · B31.12 Status & Structure · Hydrogen Pipeline issues · Research Needs · Where Do We Go From Here? #12;4 Code

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

A Direct Algorithm for Convective Adjustment of the Vertical Temperature Profile for an Arbitrary Critical Lapse Rate  

Science Conference Proceedings (OSTI)

An efficient direct algorithm of convective adjustment for an arbitrary critical value of the vertical temperature lapse rate ? is proposed. The algorithm provides an exact and unique solution of a standard convective adjustment problem for ...

R. A. Akmaev

1991-10-01T23:59:59.000Z

362

PostScript LETTER  

E-Print Network (OSTI)

disclosure prior to bronchoscopydBianchi et al We are grateful to Dr Bianchi and colleagues for their interest in our study. 1 They argue that knowledge of local and even personal bronchoscopic practice and performance is necessary to determine the level of risk to the patient from the procedure and hence the degree of information that must be provided. 2 This is certainly true if there is reason to believe that the risks in an institution or for an individual differ significantly from the normdin either direction. A database, such as that used in the Sheffield Teaching Hospitals, for recording complications following bronchoscopy is a valuable resource for auditing outcomes and quality assurance. However, one must be cautious when interpreting the absence of a serious complication in any given series. Hanley and Lippman-Hand, in a now-classic paper, described the rule of three for such series: if none of n patients showed the event of interest, we can be 95 % confident that the chance of this event is at most 3/n. 3 For example, the Sheffield data showing no death with 1261 fibreoptic bronchoscopies translate into a 95 % confidence limit ranging from zero to an upper limit of 1 death in 420 procedures (Clinicians may find the other implication of using CIdthat occurrence of an uncommon complication is not of itself an evidence of poor performanced more comforting). The absence of an uncommon complication in a personal or an institutional series will not of itself help the clinician strike the difficult balance between providing too much and too little risk information.

Authors Response risk

2011-01-01T23:59:59.000Z

363

PostScript - CECM  

E-Print Network (OSTI)

basis for the vanishing ideal of any nite set of points in an a ne space under ...... Particularly, the question of the conditioning of our solution may be of interest.

364

PostScript - CECM  

E-Print Network (OSTI)

sixth-order contributions to the energy which were computed with. Maple. ...... order as in alternative applications of perturbation theory. Because the matrix.

365

PostScript - CECM  

E-Print Network (OSTI)

In doing this we gain one order of magnitude in efficiency. In the example below, which is over GF(4),. you can see four primes of degree one in y namely, ?.

366

PostScript - CECM  

E-Print Network (OSTI)

Artificial Intelligence LNAI Vol. 1930), in which the definition of K(z) differs from ours by a sign change. The unwinding number allows us to recover the ''lost''...

367

Development | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Printable Version Printable Version Development Commercial Residential Adoption Compliance Regulations Resource Center Development The U.S. Department of Energy (DOE) supports and participates in the model building energy code development processes administered by the ASHRAE and the International Code Council (ICC). DOE activities include developing and submitting code change proposals, conducting analysis of building energy efficiency and cost savings, and formulating underlying evaluation methodologies. Through participation in model energy code development for both commercial and residential buildings, DOE strives to make cost-effective, energy efficient upgrades to current model codes. DOE also establishes energy efficiency standards for federal buildings and manufactured housing. Further information on this process is defined under

368

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

369

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

370

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 29, 2011 July 29, 2011 T-679: VMware Security Advisory - VMSA-2011-0010 The DHCP client daemon, dhclient, does not properly sanatize certain options in DHCP server replies. An attacker could send a specially crafted DHCP server reply, that is saved on the client system and evaluated by a process that assumes the option is trusted. This could lead to arbitrary code execution with the privileges of the evaluating process July 21, 2011 T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 20, 2011 T-672: Oracle Critical Patch Update Advisory - July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends

371

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 28580 of 31,917 results. 71 - 28580 of 31,917 results. Article T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. http://energy.gov/cio/articles/t-701-citrix-access-gateway-enterprise-edition-input-validation-flaw-logon-portal Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article IRS Announces New Tribal Economic Development Bond Allocation Guidance Treasury and the IRS published new guidance today allocating Tribal

372

Northern Mariana Islands | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

No Code Change Process Legislative Code Change Cycle None Timeline of Cycle None Adoption Process The Building Safety Code was developed through legislative action. The rules and...

373

Ohio | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Ohio Ohio Last updated on 2013-10-21 Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Ohio's commercial code is the 2009 IECC with a direct reference to ASHRAE 90.1-07. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Ohio (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 11/01/2011 Adoption Date 03/07/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Ohio DOE Determination Letter, May 31, 2013 Ohio State Certification of Commercila and Residential Building Energy Codes Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Effective January 1, 2013 the residential code in Ohio is based on Chapter 11 of the 2009 IRC. It includes the 2009 IECC and state-specific alternative compliance paths. The 2013 Residential Code of Ohio (RCO) contains amendments to allow compliance to be demonstrated in three ways: (1) 2009 IECC; or (2) RCO Sections 1101 through 1104; or RCO Section 1105 ("The Ohio Homebuilder's Association Alternative Energy Code Option").

374

Pennsylvania | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Pennsylvania Pennsylvania Last updated on 2013-11-05 Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Pennsylvania's current code is the 2009 IECC with reference to ASHRAE 90.1-2007. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Pennsylvania (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 12/31/2009 Adoption Date 12/10/2009 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Pennsylvania DOE Determination Letter, May 31, 2013 Pennsylvania State Certification of Commercial and Residential Building Energy Codes Current Code 2009 IECC Amendments / Additional State Code Information Pennsylvania's current residential code is the 2009 IECC, 2009 IRC, Chapter 11, and/or PA-Alt. Adherence to Pennsylvania's Alternative Residential Energy Provisions 2009 is an acceptable means of demonstrating compliance with the energy conservation code requirements of the Uniform Construction Code.

375

Wyoming | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Wyoming Wyoming Last updated on 2013-06-03 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information The International Conference of Building Officials (ICBO) Uniform Building Code, which is based on the 1989 Model Energy Code (MEC), may be adopted and enforced by local jurisdictions. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE Standard 90.1-2007 for Commercial Buildings in the State of Wyoming (BECP Report, Sept. 2009) Approximate Energy Efficiency Less energy efficient than 2003 IECC Effective Date 08/13/2008 Code Enforcement Voluntary DOE Determination ASHRAE Standard 90.1-2007: No ASHRAE Standard 90.1-2010: No Wyoming DOE Determination Letter, May 31, 2013 Current Code None Statewide

376

Kentucky | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Kentucky Kentucky Last updated on 2013-08-02 Current News Kentucky moves forward with the 2009 IECC by reference in their updated 2007 Kentucky Building Code. 2009 IECC is effective 3/6/2011 with mandatory compliance beginning 6/1/2011. Kentucky residential code was also updated to the 2009 IECC. The code is effective 7/1/2012 with an enforcement date of 10/1/2012. Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Amendments are contained in the latest update to the 2007 Kentucky Building Code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Kentucky (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

377

Longitudinal permeability of collisional plasmas under arbitrary degree of degeneration of electron gas  

E-Print Network (OSTI)

Electric conductivity and dielectric permeability of the non-degenerate electronic gas for the collisional plasmas under arbitrary degree of degeneration of electron gas is found. The kinetic equation of Wigner - Vlasov - Boltzmann with collision integral in relaxation form BGK (Bhatnagar, Gross and Krook) in coordinate space is used. Dielectric permeability with using of the relaxation equation in the momentum space has been received by Mermin. Comparison with Mermin's formula has been realized. It is shown, that in the limit when Planck's constant tends to zero expression for dielectric permeability passes in the classical.

A. V. Latyshev; A. A. Yushkanov

2010-03-04T23:59:59.000Z

378

Circular Rydberg states of atomic hydrogen in an arbitrary magnetic field  

E-Print Network (OSTI)

We report a theoretical scheme using a B-spline basis set to improve the poor computational accuracy of circular Rydberg states of hydrogen atoms in the intermediate magnetic field. This scheme can produce high accuracy energy levels and valid for an arbitrary magnetic field. Energy levels of hydrogen are presented for circular Rydberg states with azimuthal quantum numbers $|m|$ = 10 - 70 as a function of magnetic field strengths ranging from zero to 2.35 $\\times$ 10$^9$ T. The variation of spatial distributions of electron probability densities with magnetic field strengths is discussed and competition between Coulomb and magnetic interactions is illustrated.

Zhao, L B; Du, M L

2011-01-01T23:59:59.000Z

379

Lower bound on concurrence and distillation for arbitrary-dimensional bipartite quantum states  

Science Conference Proceedings (OSTI)

We present a lower bound of concurrence for arbitrary-dimensional bipartite quantum states. This lower bound may be used to improve all the known lower bounds of concurrence. Moreover, the lower bound gives rise to an operational sufficient criterion of distillability of quantum entanglement. The significance of our result is illustrated by quantitative evaluation of entanglement for entangled states that fail to be identified by the usual concurrence estimation method and by showing the distillability of mixed states that cannot be recognized by other distillability criteria.

Zhao, Ming-Jing; Li-Jost, Xianqing [Max Planck Institute for Mathematics in the Sciences, D-04103 Leipzig (Germany); Zhu, Xue-Na [Department of Mathematics, School of Science, South China University of Technology, Guangzhou 510640 (China); Fei, Shao-Ming [Max Planck Institute for Mathematics in the Sciences, D-04103 Leipzig (Germany); School of Mathematical Sciences, Capital Normal University, Beijing 100048 (China)

2011-12-15T23:59:59.000Z

380

Lower Bound of Concurrence and Distillation for Arbitrary Dimensional Bipartite Quantum States  

E-Print Network (OSTI)

We present a lower bound of concurrence for arbitrary dimensional bipartite quantum states. This lower bound may be used to improve all the known lower bounds of concurrence. Moreover, the lower bound gives rise to an operational sufficient criterion of distillability of quantum entanglement. The significance of our result is illustrated by quantitative evaluation of entanglement for entangled states that fail to be identified by the usual concurrence estimation method, and by showing the distillability of mixed states that can not be recognized by other distillability criteria.

Ming-Jing Zhao; Xue-Na Zhu; Shao-Ming Fei; Xianqing Li-Jost

2011-12-23T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1280 of 29,416 results. 71 - 1280 of 29,416 results. Article V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code http://energy.gov/cio/articles/v-012-mozilla-firefox-windowlocation-bugs-permit-cross-site-scripting-attacks-and-may Article Agencies Decide to Dig Up Contaminated Soil at Hanford Site- Federal and state agencies determine cleanup plans for four areas near central Hanford RICHLAND, Wash. -The Department of Energy (DOE) and the U.S. Environmental Protection Agency (EPA), in coordination with the Washington Department of Ecology, have made plans for remediating contaminated soil at

382

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 9520 of 28,905 results. 11 - 9520 of 28,905 results. Article V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code http://energy.gov/cio/articles/v-012-mozilla-firefox-windowlocation-bugs-permit-cross-site-scripting-attacks-and-may Download Letter: Transition of Closure Sites from the Office of Environmental Management to other DOE Organizations From: Deputy Secretary of Energy, Kyle E. McSlarrow (DS-1) To: Todd Martin, Chair, Hanford Advisory Board http://energy.gov/em/downloads/letter-transition-closure-sites-office-environmental-management-other Rebate Georgia Hazardous Site Response Act (Georgia)

383

Building Energy Codes News | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Codes News Building Energy Codes News News Category: National Policy DOE Activities and Methodology for Assessing Compliance With Building Energy Codes RFI Posted: Tuesday, August 6, 2013 On August 6, DOE published an RFI on its methodology for assessing code compliance into the Federal Register. Based on feedback received from the individual state compliance pilot studies in 2011-2012, the RFI seeks input on DOE's methodology and fundamental assumptions from the general public. Read the full article... Source: U.S. Department of Energy Building Energy Codes Program Energy 2030 Report Calls for Stricter Energy Building Codes Posted: Tuesday, February 12, 2013 The Alliance Commission on National Energy Efficiency Policy aims to double US energy productivity by 2030, and one of its many ways to achieve that

384

Top 10 Reasons for Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Top 10 Reasons for Energy Codes Top 10 Reasons for Energy Codes The projected energy savings attributable to energy codes translates into an estimated cumulative savings of 800 million metric tons of carbon dioxide by 2030-that's equivalent to removing 145 million vehicles from our nation's roadways. Here are the top 10 reasons for adopting and implementing energy codes. Today's global energy, economic, and environmental challenges necessitate a U.S. strategy identifying a suite of energy-efficiency-related initiatives that is implemented by the building industry and relevant stakeholders. Energy codes are a core component of that strategy and, in addition, have an impact on other strategies to improve our built environment. Energy Codes... SAVE money and help reduce needless consumption of energy to heat,

385

T-623: HP Business Availability Center Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Business Availability Center Input Validation Hole 3: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks May 16, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in HP Business Availability Center. A remote user can conduct cross-site scripting attacks. PLATFORM: HP Business Availability Center software 8.06 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: SecurityTracker Alert ID:1025535 HP Knowledge Base CVE-2011-1856 Secunia ID: SA44569 HP Document ID:c02823184 | ESB-2011.0525 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed by the

386

Jacobian code generated by source transformation and vertex elimination is as efficient as hand coding  

E-Print Network (OSTI)

Jacobian code generated by source transformation and vertex elimination is as efficient as hand coding

Forth, S A; Pryce, J D; Reid, J K

2002-01-01T23:59:59.000Z

387

Commercial Codes and Standards | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

(or non-residential) buildings, in the context of building energy codes and standards, are all buildings other than low-rise residential buildings, including multi-family...

388

Network Coded Transmission of Fountain Codes over Cooperative Relay Networks  

E-Print Network (OSTI)

In this paper, a transmission strategy of fountain codes over cooperative relay networks is proposed. When more than one relay nodes are available, we apply network coding to fountain-coded packets. By doing this, partial information is made available to the destination node about the upcoming message block. It is therefore able to reduce the required number of transmissions over erasure channels, hence increasing the effective throughput. Its application to wireless channels with Rayleigh fading and AWGN noise is also analysed, whereby the role of analogue network coding and optimal weight selection is demonstrated.

Kurniawan, E; Yen, K; Chong, K F E

2010-01-01T23:59:59.000Z

389

About Building Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

buildings account for approximately 41% of all energy consumption and 72% of electricity usage. Building energy codes increase energy efficiency in buildings, resulting in...

390

Building Energy Code Resource Guide: Code Officials Edition ...  

NLE Websites -- All DOE Office Websites (Extended Search)

includes practical plan review and inspection resources, including the U.S. Department of Energy Building Energy Codes Program's REScheck(tm) and COMcheck(tm) quick reference...

391

Nucleation kinetics of vapor bubbles in a liquid with arbitrary viscosity  

E-Print Network (OSTI)

The theory of vapor bubbles nucleation in single-component liquids developed in [J. Phys. Chem. B 116, 9445 (2012)] for the case of high viscosity (the (V,/rho,T)- theory) is extended to the case of arbitrary viscosity. For this purpose, Langevin's approach in the theory of Brownian motion, or Kramers' model of chemical reactions, is employed. The obtained expression for the bubbles nucleation rate is valid for arbitrary relations between the kinetic parameters controlling the nucleation process: viscosity, inertia of a liquid, the rate of evaporation into a bubble and the rate of heat exchange between the bubble and ambient liquid. So, the presented theory together with the (V,/rho,T)- theory gives a complete description of the vapor-bubbles nucleation kinetics in one-component liquids. Limiting cases with respect to the mentioned parameters are considered, in particular, the low viscosity limit. It is shown that the low- and high-viscosity nucleation rates differ from each other qualitatively and quantitatively. The possibility of application of the theory to cavitation in superfluid helium-4 is discussed.

Nikolay V. Alekseechkin

2013-02-21T23:59:59.000Z

392

Homogenization for Periodic Heterogeneous Materials with Arbitrary Position-Dependent Material Properties  

SciTech Connect

We present a rigorous homogenization approach for efficient computation of a class of physical problems in a one-dimensional periodic heterogeneous material. This material is represented by a spatially periodic array of unit cells with a length of e. More specifically, the method is applied to the diffusion, heat conduction, and wave propagation problems. Heterogeneous materials can have arbitrary position-dependent continuous or discontinuous materials properties (for example heat conductivity) within the unit cell. The final effective model includes both effective properties at the leading order and high-order contributions due to the microscopic heterogeneity. A dimensionless heterogeneity parameter is defined to represent high-order contributions, shown to be in the range of [-1/12, 0], and has a universal expression for all three problems. Both effective properties and heterogeneity parameter are independent of e, the microscopic scale of heterogeneity. The homogenized solution describing macroscopic variations can be obtained from the effective model. Solution with sub-unit-cell accuracy can be constructed based on the homogenized solution and its spatial derivatives. The paper represents a general approach to obtain the effective model for arbitrary periodic heterogeneous materials with position-dependent properties.

Xu Zhi-Jie

2012-08-01T23:59:59.000Z

393

Trace formulae for non-equilibrium Casimir interactions, heat radiation and heat transfer for arbitrary objects  

E-Print Network (OSTI)

We present a detailed derivation of heat radiation, heat transfer and (Casimir) interactions for N arbitrary objects in the framework of fluctuational electrodynamics in thermal non-equilibrium. The results can be expressed as basis-independent trace formulae in terms of the scattering operators of the individual objects. We prove that heat radiation of a single object is positive, and that heat transfer (for two arbitrary passive objects) is from the hotter to a colder body. The heat transferred is also symmetric, exactly reversed if the two temperatures are exchanged. Introducing partial wave-expansions, we transform the results for radiation, transfer and forces into traces of matrices that can be evaluated in any basis, analogous to the equilibrium Casimir force. The method is illustrated by (re)deriving the heat radiation of a plate, a sphere and a cylinder. We analyze the radiation of a sphere for different materials, emphasizing that a simplification often employed for metallic nano-spheres is typically invalid. We derive asymptotic formulae for heat transfer and non-equilibrium interactions for the cases of a sphere in front a plate and for two spheres, extending previous results. As an example, we show that a hot nano-sphere can levitate above a plate with the repulsive non-equilibrium force overcoming gravity -- an effect that is not due to radiation pressure.

Matthias Krger; Giuseppe Bimonte; Thorsten Emig; Mehran Kardar

2012-07-02T23:59:59.000Z

394

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Eligibility Commercial Residential Savings For Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial...

395

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Code Building Energy Code Eligibility Commercial Residential Savings For Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling...

396

Delaware | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Delaware Last updated on 2013-08-02 Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Agriculture structures are excluded. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Delaware (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2010 Adoption Date 07/29/2009 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Delaware DOE Determination Letter, May 31, 2013 Delaware State Certification of Commercial and Residential Building Energy Codes

397

Arkansas | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Arkansas Arkansas Last updated on 2013-12-10 Current News ASHRAE 90.1-2007 became the effective commercial code in Arkansas on January 1, 2013. Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 with Amendments Amendments / Additional State Code Information Arkansas Supplements and Amendments Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Arkansas Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 01/01/2013 Adoption Date 01/13/2012 Code Enforcement Mandatory DOE Determination ASHRAE Standard 90.1-2007: Yes ASHRAE Standard 90.1-2010: No Energy cost savings for Arkansas resulting from the state updating its commercial and residential building energy codes in accordance with federal law are significant, estimated to be on the order of nearly $100 million annually by 2030.

398

Task 1: Hydrate Code release, Maintenance and Support  

NLE Websites -- All DOE Office Websites (Extended Search)

resulting from a series of cruises to the Santa Barbara and Santa Monica Basins and the Gulf of Mexico, and to the development, submission and publication of manu- scripts...

399

SEAMOPT - Stirling engine optimization code  

SciTech Connect

Experience is described with use of a fast-running Stirling engine optimization code developed at Argonne intended for public release. Stirling engine modeling is provided by the SEAM1 thermodynamic code. An interface was written to combine SEAM1 with a general optimization code and assess maximum component stress levels. Thus full engine thermodynamic and structural simulation is done during the optimization process. Several examples of the use of this code to optimize the GPU-3 engine are described. In one case efficiency was improved by over 25%.

Heames, T.J.; Daley, J.G.

1984-01-01T23:59:59.000Z

400

Utah | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

compliance with the energy code requirements. The Division of Facilities Construction Management is responsible for enforcement for all state-owned or -funded buildings....

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

CQ - Code selection through query.  

E-Print Network (OSTI)

??This thesis proposes a query language for code selection. It is designed to work on virtual machine based languages and is intended to be used (more)

ZENZARO, SIMONE

2010-01-01T23:59:59.000Z

402

DANTSYS: A diffusion accelerated neutral particle transport code system  

SciTech Connect

The DANTSYS code package includes the following transport codes: ONEDANT, TWODANT, TWODANT/GQ, TWOHEX, and THREEDANT. The DANTSYS code package is a modular computer program package designed to solve the time-independent, multigroup discrete ordinates form of the boltzmann transport equation in several different geometries. The modular construction of the package separates the input processing, the transport equation solving, and the post processing (or edit) functions into distinct code modules: the Input Module, one or more Solver Modules, and the Edit Module, respectively. The Input and Edit Modules are very general in nature and are common to all the Solver Modules. The ONEDANT Solver Module contains a one-dimensional (slab, cylinder, and sphere), time-independent transport equation solver using the standard diamond-differencing method for space/angle discretization. Also included in the package are solver Modules named TWODANT, TWODANT/GQ, THREEDANT, and TWOHEX. The TWODANT Solver Module solves the time-independent two-dimensional transport equation using the diamond-differencing method for space/angle discretization. The authors have also introduced an adaptive weighted diamond differencing (AWDD) method for the spatial and angular discretization into TWODANT as an option. The TWOHEX Solver Module solves the time-independent two-dimensional transport equation on an equilateral triangle spatial mesh. The THREEDANT Solver Module solves the time independent, three-dimensional transport equation for XYZ and RZ{Theta} symmetries using both diamond differencing with set-to-zero fixup and the AWDD method. The TWODANT/GQ Solver Module solves the 2-D transport equation in XY and RZ symmetries using a spatial mesh of arbitrary quadrilaterals. The spatial differencing method is based upon the diamond differencing method with set-to-zero fixup with changes to accommodate the generalized spatial meshing.

Alcouffe, R.E.; Baker, R.S.; Brinkley, F.W.; Marr, D.R.; O`Dell, R.D.; Walters, W.F.

1995-06-01T23:59:59.000Z

403

ITS Version 6 : the integrated TIGER series of coupled electron/photon Monte Carlo transport codes.  

Science Conference Proceedings (OSTI)

ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of lineartime-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with an input scheme based on order-independent descriptive keywords that makes maximum use of defaults and internal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 6, the latest version of ITS, contains (1) improvements to the ITS 5.0 codes, and (2) conversion to Fortran 90. The general user friendliness of the software has been enhanced through memory allocation to reduce the need for users to modify and recompile the code.

Franke, Brian Claude; Kensek, Ronald Patrick; Laub, Thomas William

2008-04-01T23:59:59.000Z

404

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31087, R 408.31088, R 408.31089, and R 408.31090 of the Michigan Administrative Code are amended and R 408.31087a is added to the code as follows: PART 10a MICHIGAN UNIFORM ENERGY CODE R 408.31087 Applicable code. Rule 1087. Rules governing the energy efficiency for the design and construction of buildings and structures, not including residential buildings, shall be those contained in the international energy conservation code, 2009 edition, section 501.1 and the ASHRAE

405

Louisiana | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Louisiana Louisiana Last updated on 2013-08-02 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 Amendments / Additional State Code Information N/A Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Louisiana (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 07/20/2011 Adoption Date 07/20/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Louisiana DOE Determination Letter, May 31, 2013 Louisiana State Certification of Commercial and Residential Building Energy Codes Current Code 2006 IRC Amendments / Additional State Code Information Louisiana's current residential code is the 2006 IRC with direct reference to the 2006 IECC. All AC duct insulation is R6 instead of R8 and to include Section R301.2.1.1 of the 2003 edition of the IRC in lieu of Section R301.2.1.1 of the 2006 edition.

406

Signal compression by subband coding  

Science Conference Proceedings (OSTI)

This is a survey/tutorial paper on data compression using the technique of subband coding. This is widely used in practice, for example, in the MPEG audio coder. A subband coder has two main components: a filter bank that decomposes the source into components, ... Keywords: Compression, Filter banks, Subband coding

Bruce Francis; Soura Dasgupta

1999-12-01T23:59:59.000Z

407

S-duality as Fourier transform for arbitrary $?_1,?_2$  

E-Print Network (OSTI)

The AGT relations reduce S-duality to the modular transformations of conformal blocks. It was recently conjectured that for the four-point conformal block the modular transform up to the non-perturbative contributions can be written in form of the ordinary Fourier transform when $\\beta\\equiv-\\epsilon_1/\\epsilon_2=1$. Here we extend this conjecture to general values of $\\epsilon_1,\\epsilon_2$. Namely, we argue that for a properly normalized four-point conformal block the S-duality is perturbatively given by the Fourier transform for arbitrary values of the deformation parameters $\\epsilon_1,\\epsilon_2$. The conjecture is based on explicit perturbative computations in the first few orders of the string coupling constant $g^2\\equiv-\\epsilon_1\\epsilon_2$ and hypermultiplet masses.

N. Nemkov

2013-07-02T23:59:59.000Z

408

Device For Determining Therophysical Properties Of A Multi-Component Gas At Arbitrary Temperature And Pressure  

DOE Patents (OSTI)

A computer product for determining thermodynamic properties of a natural gas hydrocarbon, when the speed of sound in the gas is known at an arbitrary temperature and pressure. Thus, the known parameters are the sound speed, temperature, pressure, and concentrations of any dilute components of the gas. The method uses a set of reference gases and their calculated density and speed of sound values to estimate the density of the subject gas. Additional calculations can be made to estimate the molecular weight of the subject gas, which can then be used as the basis for mass flow calculations, to determine the speed of sound at standard pressure and temperature, and to determine various thermophysical characteristics of the gas.

Morrow, Thomas B. (San Antonio, TX); Behring, II, Kendricks A. (Gilbert, AZ)

2005-02-01T23:59:59.000Z

409

An Implementation of Triangular B-Spline Surfaces over Arbitrary Triangulations  

E-Print Network (OSTI)

. A new multivariate B-spline scheme based on blending functions and control vertices has recently been developed by Dahmen, Micchelli, and Seidel [4]. This surface scheme allows to model piecewise polynomial surfaces of degree k over arbitrary triangulations, such that the resulting surfaces are C k\\Gamma1 -continuous everywhere. The scheme exhibits both affine invariance and the convex hull property, and the control points can be used to manipulate the shape of the surface locally. Any piecewise polynomial can be represented by the new scheme [16]. This paper illustrates some of the algorithms underlying the new scheme by means of examples from a first test implementation [6]. Keywords: Blossoming, B-patch, B-spline surface, blending functions, control points, simplex splines, polar forms. 1 Introduction This paper does not present any new theoretical results. Instead, we try to illustrate the new triangular B-spline scheme [4, 16] by means of examples from a first test impleme...

Philip Fong; Hans-peter Seidel

1993-01-01T23:59:59.000Z

410

Nonlinear oscillations and waves in an arbitrary mass ratio cold plasma  

Science Conference Proceedings (OSTI)

It is well known that nonlinear standing oscillations in an arbitrary mass ratio cold plasma always phase mix away. However, there exist nonlinear electron-ion traveling wave solutions, which do not exhibit phase mixing because they have zero ponderomotive force. The existence of these waves has been demonstrated using a perturbation method. Moreover, it is shown that cold plasma BGK waves [Albritton et al., Nucl. Fusion 15, 1199 (1975)] phase mix away if ions are allowed to move and the scaling of phase mixing is found to be different from earlier work [Sengupta et al., Phys. Rev. Lett. 82, 1867 (1999)]. Phase mixing of these waves has been further verified in 1-D particle in cell simulation.

Verma, Prabal Singh [Institute for Plasma Research, Bhat, Gandhinagar 382 428 (India)

2011-12-15T23:59:59.000Z

411

Casimir-Lifshitz force out of thermal equilibrium and heat transfer between arbitrary bodies  

E-Print Network (OSTI)

We study the Casimir-Lifshitz force and the radiative heat transfer occurring between two arbitrary bodies, each one held at a given temperature, surrounded by environmental radiation at a third temperature. The system, in stationary configuration out of thermal equilibrium, is characterized by a force and a heat transfer depending on the three temperatures, and explicitly expressed in terms of the scattering operators of each body. We find a closed-form analytic expression valid for bodies of any geometry and dielectric properties. As an example, the force between two parallel slabs of finite thickness is calculated, showing the importance of the environmental temperature as well as the occurrence of a repulsive interaction. An analytic expression is also provided for the force acting on an atom in front of a slab. Our predictions can be relevant for experimental and technological purposes.

Riccardo Messina; Mauro Antezza

2010-12-23T23:59:59.000Z

412

Black hole remnant of black hole-neutron star coalescing binaries with arbitrary black hole spin  

E-Print Network (OSTI)

A model for determining the dimensionless spin parameter and mass of the black hole remnant of black hole-neutron star mergers with arbitrary initial black hole spin angular momentum, binary mass ratio, and neutron star mass and cold equation of state is formulated. Tests against numerical-relativity results are carried out, showing that both the dimensionless spin parameter and the final mass are accurately reproduced. For the first time, the behaviour of both quantities and of the l = 2, m = 2, n = 0 quasinormal mode frequency is inspected throughout the parameter space. Predictions of this frequency may be exploited to guide gravitational wave modelling and detection efforts, and to extract physical information from detected gravitational wave signals that would help us break degeneracies between binary black hole and black hole-neutron star systems, improve our understanding of compact binary formation, and constrain the neutron star equation of state.

Francesco Pannarale

2013-11-22T23:59:59.000Z

413

ITS version 5.0 : the integrated TIGER series of coupled electron/photon Monte Carlo transport codes.  

Science Conference Proceedings (OSTI)

ITS is a powerful and user-friendly software package permitting state of the art Monte Carlo solution of linear time-independent couple electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with an input scheme based on order-independent descriptive keywords that makes maximum use of defaults and internal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 5.0, the latest version of ITS, contains (1) improvements to the ITS 3.0 continuous-energy codes, (2)multigroup codes with adjoint transport capabilities, and (3) parallel implementations of all ITS codes. Moreover the general user friendliness of the software has been enhanced through increased internal error checking and improved code portability.

Franke, Brian Claude; Kensek, Ronald Patrick; Laub, Thomas William

2004-06-01T23:59:59.000Z

414

Massachusetts | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Massachusetts Massachusetts Last updated on 2013-11-04 Current News The BBRS voted to adopt the 2012 IECC and ASHRAE 90.1-2010 on July 9, 2013. They will be phased in over an extended concurrency period, and is expected to become the sole effective baseline energy code on July 1, 2014. Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information 13.0 Energy Conservation- 2009 IECC Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Massachusetts (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2010 Adoption Date 01/01/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes

415

Virginia | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Virginia Virginia Last updated on 2013-11-05 Current News BHCD/DHCD workgroups are currently meeting over the next 12+ months for the 2012 USBC/IECC regulatory process, with an anticipated effective date in early 2014. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Virginia's current code is the 2009 IECC with reference to ASHRAE 90.1-2007. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Virginia (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 03/01/2011 Adoption Date 07/26/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Virginia DOE Determination Letter, May 31, 2013

416

Tennessee | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Tennessee Tennessee Last updated on 2013-08-02 Commercial Residential Code Change Current Code 2006 IECC Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Tennessee (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2006 IECC Effective Date 07/01/2011 Adoption Date 06/02/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Tennessee DOE Determination Letter, May 31, 2013 Tennessee State Certification of Commercial and Residential Building Energy Codes Current Code 2006 IECC Approved Compliance Tools Can use REScheck State Specific Research Impacts of the 2009 IECC for Residential Buildings in the State of Tennessee (BECP Report, Sept. 2009)

417

ALOHA Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ALOHA Code ALOHA Code ALOHA Code Central Registry Toolbox Code Version(s): V5.2.3 Code Owner: National Oceanic and Atmospheric Administration (NOAA) Description: The Arial Locations of Hazardous Atmospheres (ALOHA) is atmospheric dispersion model maintained by the Hazardous Materials Division of National Oceanic and Atmospheric Administration (NOAA). ALOHA is one of three separate, integrated software applications in the Computer-Aided Management of Emergency Operations (CAMEO) suite. While the other two software applications: Cameo is primarily a database application and Marplot is the mapping application. ALOHA is used primarily for the evaluations of the consequences of atmospheric releases of chemical species. In addition to safety analysis applications in the Department of Energy (DOE) Complex, ALOHA is applied

418

Alaska | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Printable Version Development Adoption Compliance Regulations Resource Center Alaska Last updated on 2013-12-10 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information N/A Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Alaska (BECP Report, Sept. 2009) Approximate Energy Efficiency Effective Date Code Enforcement DOE Determination ASHRAE Standard 90.1-2007: No ASHRAE Standard 90.1-2010: No Energy cost savings for Alaska resulting from the state updating its commercial and residential building energy codes in accordance with federal law are significant, estimated to be on the order of nearly $50 million annually by 2030. Alaska DOE Determination Letter, May 31, 2013

419

GENII Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GENII Code GENII Code GENII Code GENII is a second generation of environmental dosimetry computer code compiled in the Hanford Environmental Dosimetry System (Generation II). GENII provides a state-of-the-art, technically peer-reviewed, documented set of programs for calculating radiation dose and risk from radio nuclides released into the environment. The GENII System includes capabilities for calculating radiation doses following postulated chronic and acute releases. Version 2.10 is currently being evaluated for inclusion in the Central Registry. For more information on GENII to: http://radiologicalsciences.pnl.gov/resources/hardware.asp The GENII code-specific guidance report has been issued identifying applicable regimes in accident analysis, default inputs, and special

420

Viewpoint: the energy code tempest  

SciTech Connect

In 1973, the organization of state building code officials asked the National Bureau of Standards for guidelines on energy conservation to be incorporated into state building codes. Prescriptive codes on the proper approach became quite controversial. One group advocated a prescriptive type of code under which all building components influencing energy consumption would be individually specified. A second group favored an overall energy consumption budget for buildings expressed in Btu/sq ft of floor area/yr. Then it was conceded that different buildings required different specifications. This article illustrates some specific examples of why building codes to conserve energy must permit a trade-off between the various components of a building. (MCW)

Ashley, J.M.

1975-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2011 , 2011 T-547: Microsoft Windows Human Interface Device (HID) Vulnerability Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. January 31, 2011 T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. January 28, 2011 T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code A vulnerability was reported in RealPlayer. A remote user can cause

422

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

423

Business Models for Code Compliance | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance Compliance Site Map Printable Version Development Adoption Compliance Basics Compliance Evaluation Software & Web Tools Regulations Resource Center Business Models for Code Compliance The U.S. Department of Energy is coordinating strategies and activities with companies, individuals, and government entities to demonstrate, quantify, and monetize energy code compliance and coordinate deployment at the local, state, and regional levels. Consumer Assurance through Code Compliance Energy efficiency measures in the buildings sector, if properly realized and captured, provide a tremendous opportunity to reduce energy consumption and expenditures. Yet currently there is a lack of assurance that buildings as designed realize the levels of energy efficiency established in the

424

Adaptive rate coding using convolutional codes for asynchronous code division multiple access communications over slowly fading channels  

Science Conference Proceedings (OSTI)

This paper presents a method of code rate adaptation using punctured convolutional codes for direct sequence spread spectrum communication systems over slowly fading channels. A blind channel estimation technique is used to estimate the nature of the ... Keywords: Adaptive rate coding, Asynchronous code division multiple access communication systems, Punctured convolutional codes, Rayleigh/Rician fading channels

Vidhyacharan Bhaskar; Laurie L. Joiner

2005-05-01T23:59:59.000Z

425

Building Technologies Office: Advancing Building Energy Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Codes Building Energy Codes Printable Version Share this resource Send a link to Building Technologies Office: Advancing Building Energy Codes to someone by E-mail Share Building Technologies Office: Advancing Building Energy Codes on Facebook Tweet about Building Technologies Office: Advancing Building Energy Codes on Twitter Bookmark Building Technologies Office: Advancing Building Energy Codes on Google Bookmark Building Technologies Office: Advancing Building Energy Codes on Delicious Rank Building Technologies Office: Advancing Building Energy Codes on Digg Find More places to share Building Technologies Office: Advancing Building Energy Codes on AddThis.com... Popular Links Success Stories Previous Next Lighten Energy Loads with System Design. Warming Up to Pump Heat.

426

Building Energy Code | Open Energy Information  

Open Energy Info (EERE)

Code Code Jump to: navigation, search Building energy codes adopted by states (and some local governments) require commercial and/or residential construction to adhere to certain energy standards. While some governmental bodies have developed their own building energy codes, many use existing codes, such as the International Energy Conservation Code (IECC), developed and published by the International Code Council (ICC); or ASHRAE 90.1, developed by the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE). A few local building energy codes require certain commercial facilities to meet green building standards. [1] Building Energy Code Incentives CSV (rows 1 - 85) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

427

About Building Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance Compliance Regulations Resource Center About Building Energy Codes U.S. Energy Consumption by Sector (2011) Source: U.S. Energy Information Administration, Annual Energy Review According to the U.S. Energy Information Administration's Electric Power Annual, U.S. residential and commercial buildings account for approximately 41% of all energy consumption and 72% of electricity usage. Building energy codes increase energy efficiency in buildings, resulting in significant cost savings in both the private and public sectors of the U.S. economy. Efficient buildings reduce power demand and have less of an environmental impact. The Purpose of Building Energy Codes Energy codes and standards set minimum efficiency requirements for new and renovated buildings, assuring reductions in energy use and emissions over

428

Code Booster: Award-winning research on code optimization explores...  

NLE Websites -- All DOE Office Websites (Extended Search)

make a popular scientific analysis code run smoothly on different types of multicore computers. >> Read the full article (off-site link) About NERSC and Berkeley Lab The National...

429

Development of Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Development of Energy Codes Both the IECC and ASHRAE Standard 90.1 are maintained and updated in open public forums. The openness and transparency of these processes is critical to...

430

Surface code implementation of block code state distillation  

E-Print Network (OSTI)

State distillation is the process of taking a number of imperfect copies of a particular quantum state and producing fewer better copies. Until recently, the lowest overhead method of distilling states |A>=(|0>+e^{i\\pi/4}|1>)/\\sqrt{2} produced a single improved |A> state given 15 input copies. New block code state distillation methods can produce k improved |A> states given 3k+8 input copies, potentially significantly reducing the overhead associated with state distillation. We construct an explicit surface code implementation of block code state distillation and quantitatively compare the overhead of this approach to the old. We find that, using the best available techniques, for parameters of practical interest, block code state distillation does not always lead to lower overhead, and, when it does, the overhead reduction is typically less than a factor of three.

Austin G. Fowler; Simon J. Devitt; Cody Jones

2013-01-29T23:59:59.000Z

431

Building Energy Codes Survey Tool  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes Program Codes Program Building Energy Codes Survey Tool The following surveys are available: No available surveys Please contact ( webmaster@energycode.pnl.gov ) for further assistance. English Albanian Arabic Basque Belarusian Bosnian Bulgarian Catalan Chinese (Simplified) Chinese (Traditional; Hong Kong) Chinese (Traditional; Taiwan) Croatian Czech Danish Dutch Dutch Informal English Estonian Finnish French Galician German German informal Greek Hebrew Hindi Hungarian Icelandic Indonesian Irish Italian Italian (formal) Japanese Korean Latvian Lithuanian Macedonian Malay Maltese Norwegian (Bokmal) Norwegian (Nynorsk) Persian Polish Portuguese Portuguese (Brazilian) Punjabi Romanian Russian Serbian Sinhala Slovak Slovenian Spanish Spanish (Mexico) Swedish Thai Turkish Urdu Vietnamese Welsh

432

BUILDING TECHNOLOGIES PROGRAM CODE NOTES  

NLE Websites -- All DOE Office Websites (Extended Search)

Residential Fan Efficiency Residential Fan Efficiency 2012 IECC Over the past several code cycles, mechanical ventilation requirements have been added to ensure adequate outside air is provided for ventilation whenever residences are occupied. These ventilation requirements can be found in the International Residential Code for homes and the International Mechanical Code for dwelling units in multifamily buildings. As a result of the new ventilation requirements, fans designated for whole-house ventilation will have many more operating hours than bathroom or kitchen exhaust fans that are temporarily operated to remove local humidity or odors. Earlier ventilation practices relied on infiltration or operable windows as the primary source of ventilation air. Homes and

433

State building energy codes status  

Science Conference Proceedings (OSTI)

This document contains the State Building Energy Codes Status prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy under Contract DE-AC06-76RL01830 and dated September 1996. The U.S. Department of Energy`s Office of Codes and Standards has developed this document to provide an information resource for individuals interested in energy efficiency of buildings and the relevant building energy codes in each state and U.S. territory. This is considered to be an evolving document and will be updated twice a year. In addition, special state updates will be issued as warranted.

NONE

1996-09-01T23:59:59.000Z

434

Infrared absorption of trans-1-chloromethylallyl and trans-1-methylallyl radicals produced in photochemical reactions of trans-1,3-butadiene and C Script-Small-L {sub 2} in solid para-hydrogen  

SciTech Connect

The reactions of chlorine and hydrogen atoms with trans-1,3-butadiene in solid para-hydrogen (p-H{sub 2}) were investigated with infrared (IR) absorption spectra. When a p-H{sub 2} matrix containing C Script-Small-L {sub 2} and trans-1,3-butadiene was irradiated with ultraviolet light at 365 nm, intense lines at 650.3, 809.0, 962.2, 1240.6 cm{sup -1}, and several weaker ones due to the trans-1-chloromethylallyl radical, Bullet (CH{sub 2}CHCH)CH{sub 2}C Script-Small-L , appeared. Observed wavenumbers and relative intensities agree with the anharmonic vibrational wavenumbers and IR intensities predicted with the B3PW91/6-311++g(2d, 2p) method. That the C Script-Small-L atom adds primarily to the terminal carbon atom of trans-1,3-butadiene is in agreement with the path of minimum energy predicted theoretically, but in contrast to the reaction of C Script-Small-L + propene in solid p-H{sub 2}[J. Amicangelo and Y.-P. Lee, J. Phys. Chem. Lett. 1, 2956 (2010)] in which the addition of C Script-Small-L to the central C atom is favored, likely through steric effects in a p-H{sub 2} matrix. A second set of lines, intense at 781.6, 957.9, 1433.6, 2968.8, 3023.5, 3107.3 cm{sup -1}, were observed when the UV-irradiated C Script-Small-L {sub 2}/trans-1,3-butadiene/p-H{sub 2} matrix was further irradiated with IR light from a SiC source. These lines are assigned to the trans-1-methylallyl radical, Bullet (CH{sub 2}CHCH)CH{sub 3}, produced from reaction of 1,3-butadiene with a H atom resulted from the reaction of C Script-Small-L atoms with solid p-H{sub 2} exposed to IR radiation.

Bahou, Mohammed; Wu, Jen-Yu; Tanaka, Keiichi [Department of Applied Chemistry and Institute of Molecular Science, National Chiao Tung University, 1001 Ta-Hsueh Rd., Hsinchu 30010, Taiwan (China); Lee, Yuan-Pern [Department of Applied Chemistry and Institute of Molecular Science, National Chiao Tung University, 1001 Ta-Hsueh Rd., Hsinchu 30010, Taiwan (China); Institute of Atomic and Molecular Sciences, Academia Sinica, Taipei 10617, Taiwan (China)

2012-08-28T23:59:59.000Z

435

MOCUM: A two-dimensional method of characteristics code based on unstructured meshing for general geometries  

Science Conference Proceedings (OSTI)

A transport theory code MOCUM based on the Method of Characteristics (MOC) as the flux solver with an advanced general geometry processor is developed for two-dimensional lattice and full core neutronics modeling. The core structure is represented by Constructive Solid Geometry (CSG) that uses Boolean operations to build complex geometries from simple polygons. Arbitrary-precision arithmetic is also used in the process of building CSG objects to eliminate the round-off error from the commonly used double precision numbers. Then, the constructed core frame will be decomposed and refined into a conforming Delaunay triangulation to ensure the quality of the meshes. The MOC solver kernel is fully paralleled using OpenMP and the developed numerical code is validated by several benchmarks representing various core geometries. For the cases modeled, the maximum percentage error for multiplication factor and the pin power compared to reference values are 0.1% and 0.7% respectively. (authors)

Yang, X.; Satvat, N. [School of Nuclear Engineering, Purdue Univ., 400 Central Dr, West Lafayette, IN 47907 (United States)

2012-07-01T23:59:59.000Z

436

Comparison of ALICE-II code predictions with SRI complex vessel experiments  

Science Conference Proceedings (OSTI)

Several complex vessel experiments on 1/20-scale models of the Clinch River Breeder Reactor Project (CRBR) were performed by SRI International to help evaluate the containment structural integrity subjected to HCDAs. Among these experiments SM-3 is a simple model which consists of a radial shield, core barrel, upper internal structure (UIS), and a primary vessel. Tests SM-4 and SM-5 are more complex models than SM-3. This paper presents comparisons of the ALICE-II code (Arbitrary Lagrangian Implicit-explicit Continuous Fluid Eulerian containment code - second version) with experiments SM-3 through SM-5. Two calculations are performed with ALICE-II on each of these three experiments, using both the pressure-time histories (p-t) and the pressure-volume relationships (p-v) as input to describe the energy source. Pressure profiles, dynamic strains, and vessel deformations are used as the basis of the comparison.

Ku, J.L.; Wang, C.Y.; Zeuch, W.R.

1983-01-01T23:59:59.000Z

437

Matrix elements of one-body and two-body operators between arbitrary HFB multi-quasiparticle states  

E-Print Network (OSTI)

We present new formulae for the matrix elements of one-body and two-body physical operators in compact forms, which are applicable to arbitrary Hartree-Fock-Bogoliubov wave functions, including those for multi-quasiparticle excitations. The test calculations show that our formulae may substantially accelerate the process of symmetry restoration when applied to the heavy nuclear system.

Qing-Li Hu; Zao-Chun Gao; Y. S. Chen

2013-07-26T23:59:59.000Z

438

Kansas | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Kansas Kansas Last updated on 2013-06-03 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information The State has adopted the 2006 IECC as the applicable EE standard for commercial and industrial buildings in Kansas (KSA 66-1227). The same law also states that "the state corporation commission has no authority to adopt or enforce energy efficiency standards for residential, commercial, or industrial structures." Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Kansas (BECP Report, Sept. 2009) Effective Date 04/10/2007 Code Enforcement Voluntary DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Kansas DOE Determination Letter, May 31, 2013

439

Texas | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Texas Texas Last updated on 2013-12-10 Current News Cities in Texas are beginning to move their energy codes forward. The city of Cedar Park adopted the 2012 IECC, effective October 1, 2012. Amarillo has also adopted the 2012 IECC, although with some weakining provisions. In addition, the Houston City Council recently voted to require all new residential construction to be 10% higher than the 2009 IECC. Commercial Residential Code Change Current Code 2009 IECC Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Texas (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 04/01/2011 Adoption Date 06/04/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes

440

Vermont | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Vermont Vermont Last updated on 2013-06-03 Current News The Vermont Commercial Building Energy Standards (CBES) became effective January 3, 2012. The CBES incorporates elements of the 2012 IECC. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information 2011 Vermont Commercial Building Energy Standards (CBES) are based on the 2009 IECC. Commercial Building Energy Standards Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Vermont (BECP Report, Sept. 2009) Approximate Energy Efficiency More energy efficient than 2009 IECC Effective Date 01/03/2012 Adoption Date 10/03/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Appliance Standards and Building Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Manager Presentation Appliance Standards and Building Codes John Cymbalsky U.S Department of Energy - Building Technologies Office john.cymbalsky@ee.doe.gov 202.287.1692 2...

442

Illinois | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Illinois Illinois Last updated on 2013-11-04 Current News Senate Bill 3724, signed by the Governor on August 17, 2012, amends the effective date of the 2012 IECC to January 1, 2013. Administrative Rules to adopt the 2012 IECC with amendments were approved by the Joint Committee on Administrative Rules on December 11, 2012. Commercial Residential Code Change Current Code 2012 IECC with Amendments Amendments / Additional State Code Information N/A Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE Standard 90.1-2007 for Commercial Buildings in the State of Illinois (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2012 IECC Effective Date 01/01/2013 Adoption Date 12/11/2012 Code Enforcement Mandatory DOE Determination ASHRAE Standard 90.1-2007: No

443

Nevada | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Nevada Nevada Last updated on 2013-06-27 Current News On November 10, 2011, The Nevada State office of Energy adopted the 2009 IECC with an effective date of July 1, 2012. Jurisdictions in southern Nevada adopted the 2009 IECC effective July 5, 2011. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information The commercial code in Nevada effective July 1, 2012 is the 2009 IECC with reference to 90.1-2007. Jurisdictions in southern Nevada adopted the 2009 IECC Effective July 5, 2011. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Nevada (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2012

444

Idaho | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Idaho Idaho Last updated on 2013-06-03 Current News As of January 1, 2011, all jurisdictions are required to comply with the 2009 IECC. Commercial Residential Code Change Current Code 2009 IECC Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Idaho (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 01/01/2011 Adoption Date 06/08/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Idaho DOE Determination Letter, May 31, 2013 Current Code 2009 IECC Approved Compliance Tools Can use REScheck State Specific Research Impacts of the 2009 IECC for Residential Buildings in the State of Idaho (BECP Report, Sept. 2009)

445

II.CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

1 1 II.CONTRACT ID CODE ~AGE 1 of AMENDMENT OF SOLICITATIONIMODIFICATION OF CONTRACT PAGES AC 5. PROJECT NO. (If applicable) 3. EFFECTNE DATE 2. AMENDMENTfMODIFICA TION NO. 4. REQUISITIONIPURCHASE REQ. NO. See Block 16c. NOPR 7. ADMINISTERED BY (If other than Item 6) CODE 05008 6. ISSUED BY CODE 05008 U.S. Department of Energy National Nuclear Security Administration U.S. Department of Energy National Nuclear Security Administration P.O. Box 2050 Oak Ridge, TN 37831 P.O. Box 2050 Oak Ridge, TN 37831 9A. AMENDMENT OF SOLICITATION NO. 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Y-12, LLC P.O. Box 2009 MS 8014 9B. DATED (SEE ITEM 11) Oak Ridge, TN 37831-8014 lOA. MODIFICATION OF CONTRACT/ORDER NO.

446

Montana Coal Mining Code (Montana)  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Labor and Industry is authorized to adopt rules pertaining to safety standards for all coal mines in the state. The Code requires coal mine operators to make an accurate map or...

447

Optimization of the CMDFT Code  

SciTech Connect

This report outlines the optimization of the CMDFT code by Xiaoguang Zhang during June-July 2006. The overall improvement in speed is nearly 40%. Possible further optimizatins are also discussed.

Zhang, Xiaoguang [ORNL; Kent, P. R. C. [University of Tennessee, Knoxville (UTK)

2011-09-01T23:59:59.000Z

448

Hawaii | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

at least as energy efficient as the statewide code. State Specific Research Impacts of ASHRAE.1-2007 for Commercial Buildings in the State of Hawaii (BECP Report, Sept. 2009)...

449

Mississippi | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes Energy cost savings for Mississippi resulting from the state updating its commercial and...

450

Colorado | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Energy cost savings for Colorado resulting from the state updating its commercial and...

451

CAT: an interactive graphics code  

SciTech Connect

CAT is an interactive graphics code available on the Cray machine. In addition to plotting, it can manipulate data in many ways, including performing arithmetic operations, rearranging data, and interpolating.

Holian, K.S.

1985-05-01T23:59:59.000Z

452

Free Energy Code Online Discussion  

E-Print Network (OSTI)

Free Energy Code Online Discussion for Building Department Personnel Join us for this FREE 90: Online - Log-in will be sent with your registration confirmation Cost: Free Questions? Contact Wendy

453

Appliance Standards and Building Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Manager Presentation Program Manager Presentation Appliance Standards and Building Codes John Cymbalsky U.S Department of Energy - Building Technologies Office john.cymbalsky@ee.doe.gov 202.287.1692 2 | Building Technologies Office eere.energy.gov Appliance Standards and Building Codes Program Goals Appliance Standards Program Goals Provide cost-effective energy savings through national appliance and equipment standards: Issue 23 final rules by end of FY2015 Deliver at least 1 qBtu of savings annually by

454

FCT Safety, Codes and Standards: Basics  

NLE Websites -- All DOE Office Websites (Extended Search)

by E-mail Share FCT Safety, Codes and Standards: Basics on Facebook Tweet about FCT Safety, Codes and Standards: Basics on Twitter Bookmark FCT Safety, Codes and Standards: Basics...

455

Regularized Robust Coding for Face Recognition  

E-Print Network (OSTI)

Recently the sparse representation based classification (SRC) has been proposed for robust face recognition (FR). In SRC, the testing image is coded as a sparse linear combination of the training samples, and the representation fidelity is measured by the l2-norm or l1-norm of the coding residual. Such a sparse coding model assumes that the coding residual follows Gaussian or Laplacian distribution, which may not be effective enough to describe the coding residual in practical FR systems. Meanwhile, the sparsity constraint on the coding coefficients makes SRC's computational cost very high. In this paper, we propose a new face coding model, namely regularized robust coding (RRC), which could robustly regress a given signal with regularized regression coefficients. By assuming that the coding residual and the coding coefficient are respectively independent and identically distributed, the RRC seeks for a maximum a posterior solution of the coding problem. An iteratively reweighted regularized robust coding (IR...

Meng, Yang; Jian, Yang; Zhang, David

2012-01-01T23:59:59.000Z

456

Clean Cities: Clean Cities QR Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

QR Codes to someone by E-mail Share Clean Cities: Clean Cities QR Codes on Facebook Tweet about Clean Cities: Clean Cities QR Codes on Twitter Bookmark Clean Cities: Clean Cities...

457

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

458

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

459

Guam - Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guam - Building Energy Code Guam - Building Energy Code Guam - Building Energy Code < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Program Info Program Type Building Energy Code Provider Department of Public Works NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by the legislature before it is official. This entry and information will be updated accordingly. Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the

460

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

required the Department of Commerce (DOC) to create codes for energy conservation in public buildings and places of employment and to review that code. In conducting the review,...

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

COMcheck201 | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

International Energy Conservation Code (IECC) Software: COMcheck Target Audience: ArchitectDesigner Builder Code Official Contractor Engineer State Official Contacts Web Site...

462

COMcheck Basics | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

International Energy Conservation Code (IECC) Software: COMcheck Target Audience: ArchitectDesigner Builder Code Official Contractor Engineer State Official Contacts Web Site...

463

REScheck Basics | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

International Energy Conservation Code (IECC) Software: REScheck Target Audience: ArchitectDesigner Builder Code Official Contractor Engineer State Official Contacts Web Site...

464

Area Takeoffs | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Conservation Code (IECC) Document type: Technical Articles Target Audience: ArchitectDesigner Builder Code Official Contractor Engineer Contacts Web Site Policies U.S....

465

COMcheck for Oregon | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

International Energy Conservation Code (IECC) Software: COMcheck Target Audience: ArchitectDesigner Builder Code Official Contractor Engineer State Official Contacts Web Site...

466

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Eligibility Low-Income Residential Residential Savings For Heating & Cooling Home Weatherization Construction Commercial Weatherization...

467

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Massachusetts Program Type Building Energy Code ''Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes...

468

Chemistry and Material Sciences Codes at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemistry and Material Sciences Codes Chemistry and Material Sciences Codes at NERSC April 6, 2011 & ast edited: 2012-02-24 15:12:59...

469

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Safeguards System Action Codes Table Action codes *U.S.: **IAEA: A - Shipper's original data A B - Receiver's data accepting shipper's weights without measurement W C - Shipper's...

470

NETL: Methane Hydrates - Hydrate Model Code Comparison  

NLE Websites -- All DOE Office Websites (Extended Search)

Reservoir Simulator Code Comparison Study An International Effort to Compare Methane Hydrate Reservoir Simulators Code Comparison Logo The National Energy Technology Laboratory...

471

New Mexico | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

& Offices Consumer Information Building Energy Codes Search Search Search Help Building Energy Codes Program Home News Events About DOE EERE BTO BECP Adoption ...

472

Building Energy Code (Connecticut) | Open Energy Information  

Open Energy Info (EERE)

modified on September 28, 2012. Rules Regulations Policies Program Place Connecticut Name Building Energy Code Incentive Type Building Energy Code Applicable Sector Commercial,...

473

EVOLUTION OF CODES IN THE USA  

Science Conference Proceedings (OSTI)

... code the City of Phoenix, Arizona and the ... code is over, with the market having chosen ... have upon commercial interests and markets, standards for ...

2013-02-22T23:59:59.000Z

474

Basement Insulation Techniques | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Basement Insulation Techniques Residential basement insulation levels should be selected in accordance with the International Energy Conservation Code, or the local energy code. Be...

475

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Residential  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31059, R 408.31060, R 408.31061, R 408.31062, R 408.31063, R 408.31064, R 408.31065, R 408.31066, R 408.31069, and R 408.31070, of the Michigan Administrative Code are amended, and R 408.31060a, R 408.31060b, R 408.31060c, R 408.31060d, R 408.31060e, and R 408.31063a are added to the Code as follows: PART 10 MICHIGAN UNIFORM ENERGY CODE R 408.31059 Applicable code. Rule 1059. The provisions of the international energy conservation code, 2009 edition, except for sections 102.1.1, 107.2 to 107.5, 301.2, 301.3, 402.3.2, 501.1, to 506.6.2 and Tables

476

Factorization of Darboux transformations of arbitrary order for 2D Schroedinger type operators  

E-Print Network (OSTI)

We prove the conjecture formulated by Darboux that every Darboux transformation of arbitrary order d for a second-order differential operator on the plane can be factorized into elementary Darboux transformations of order 1. Our proof is constructive. Previously, we established the same result for the Darboux transformations of order 2; we used invariantization and regularized moving frames for pseudogroups of Olver--Pohjanpelto. In the present paper, we use a different, more algebraic, method. We study the algebraic structure and relations for the mappings involved. In the 1D case, a proof of the analogous statement about factorization of the Darboux transformations for Schroedinger operators had been obtained, in four steps, by Veselov and Shabat, and Bagrov--Samsonov. In that case the factorization is not unique and the relations between different factorizations can be described in terms of Yang--Baxter maps (Adler and Veselov). Any analogs of that for the 2D case studied in this paper, remain an open question.

Ekaterina Shemyakova

2013-04-26T23:59:59.000Z

477

Arbitrary tip orientation in STM simulations: 3D WKB theory and application to W(110)  

E-Print Network (OSTI)

We extend the orbital-dependent electron tunneling model implemented within the three-dimensional (3D) Wentzel-Kramers-Brillouin (WKB) atom-superposition approach for simulating scanning tunneling microscopy (STM) by including arbitrary tip orientations. The orientation of the tip is characterized by a local coordinate system centered on the tip apex atom obtained by a rotation with respect to the sample coordinate system. The rotation is described by the Euler angles. Applying our method, we highlight the role of the real-space shape of the electron orbitals involved in the tunneling, and analyze the convergence and the orbital contributions of the tunneling current above the W(110) surface depending on the orientation of a model tungsten tip. We also simulate STM images at constant-current condition, and find that their quality depends very much on the tip orientation. Some orientations result in protrusions on the images that do not occur above W atoms. The presence of such apparent atom positions makes it...

Mndi, Gbor; Palots, Krisztin

2013-01-01T23:59:59.000Z

478

Engineering of arbitrary U(N) transformations by quantum Householder reflections  

E-Print Network (OSTI)

We propose a simple physical implementation of the quantum Householder reflection (QHR) M(v)=I-2|v>N degenerate states (forming a qunit) coupled simultaneously to an ancillary (excited) state by N resonant or nearly resonant pulsed external fields. We also introduce the generalized QHR M(v;k)=I+(exp{ik}-1)|v>N-pod system when the fields are appropriately detuned from resonance with the excited state. We use these two operators as building blocks in constructing arbitrary preselected unitary transformations. We show that the most general U(N) transformation can be factorized (and thereby produced) by either N-1 standard QHRs and an N-dimensional phase gate, or N-1 generalized QHRs and a one-dimensional phase gate. Viewed mathematically, these QHR factorizations provide parametrizations of the U(N) group. As an example, we propose a recipe for constructing the quantum Fourier transform (QFT) by at most N interaction steps. For example, QFT requires a single QHR for N=2, and only two QHRs for N=3 and 4.

P. A. Ivanov; E. S. Kyoseva; N. V. Vitanov

2007-08-21T23:59:59.000Z

479

Technical Report: Toward a Scalable Algorithm to Compute High-Dimensional Integrals of Arbitrary Functions  

Science Conference Proceedings (OSTI)

Neutron experiments at the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory (ORNL) frequently generate large amounts of data (on the order of 106-1012 data points). Hence, traditional data analysis tools run on a single CPU take too long to be practical and scientists are unable to efficiently analyze all data generated by experiments. Our goal is to develop a scalable algorithm to efficiently compute high-dimensional integrals of arbitrary functions. This algorithm can then be used to integrate the four-dimensional integrals that arise as part of modeling intensity from the experiments at the SNS. Here, three different one-dimensional numerical integration solvers from the GNU Scientific Library were modified and implemented to solve four-dimensional integrals. The results of these solvers on a final integrand provided by scientists at the SNS can be compared to the results of other methods, such as quasi-Monte Carlo methods, computing the same integral. A parallelized version of the most efficient method can allow scientists the opportunity to more effectively analyze all experimental data.

Snyder, Abigail C. [University of Pittsburgh; Jiao, Yu [ORNL

2010-10-01T23:59:59.000Z

480

Photonic band gaps in one-dimensional magnetized plasma photonic crystals with arbitrary magnetic declination  

Science Conference Proceedings (OSTI)

In this paper, the properties of photonic band gaps and dispersion relations of one-dimensional magnetized plasma photonic crystals composed of dielectric and magnetized plasma layers with arbitrary magnetic declination are theoretically investigated for TM polarized wave based on transfer matrix method. As TM wave propagates in one-dimensional magnetized plasma photonic crystals, the electromagnetic wave can be divided into two modes due to the influence of Lorentz force. The equations for effective dielectric functions of such two modes are theoretically deduced, and the transfer matrix equation and dispersion relations for TM wave are calculated. The influences of relative dielectric constant, plasma collision frequency, incidence angle, plasma filling factor, the angle between external magnetic field and +z axis, external magnetic field and plasma frequency on transmission, and dispersion relation are investigated, respectively, and some corresponding physical explanations are also given. From the numerical results, it has been shown that plasma collision frequency cannot change the locations of photonic band gaps for both modes, and also does not affect the reflection and transmission magnitudes. The characteristics of photonic band gaps for both modes can be obviously tuned by relative dielectric constant, incidence angle, plasma filling factor, the angle between external magnetic field and +z axis, external magnetic field and plasma frequency, respectively. These results would provide theoretical instructions for designing filters, microcavities, and fibers, etc.

Zhang Haifeng [College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016 (China); Nanjing Artillery Academy, Nanjing 211132 (China); Liu Shaobin [College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016 (China); State Key Laboratory of Millimeter Waves of Southeast University, Nanjing Jiangsu 210096 (China); Kong Xiangkun [College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016 (China)

2012-12-15T23:59:59.000Z

Note: This page contains sample records for the topic "arbitrary scripting code" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Graphical Quantum Error-Correcting Codes  

E-Print Network (OSTI)

We introduce a purely graph-theoretical object, namely the coding clique, to construct quantum errorcorrecting codes. Almost all quantum codes constructed so far are stabilizer (additive) codes and the construction of nonadditive codes, which are potentially more efficient, is not as well understood as that of stabilizer codes. Our graphical approach provides a unified and classical way to construct both stabilizer and nonadditive codes. In particular we have explicitly constructed the optimal ((10,24,3)) code and a family of 1-error detecting nonadditive codes with the highest encoding rate so far. In the case of stabilizer codes a thorough search becomes tangible and we have classified all the extremal stabilizer codes up to 8 qubits.

Sixia Yu; Qing Chen; C. H. Oh

2007-09-12T23:59:59.000Z

482

FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and  

NLE Websites -- All DOE Office Websites (Extended Search)

Current Approaches Current Approaches to Safety, Codes and Standards to someone by E-mail Share FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Facebook Tweet about FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Twitter Bookmark FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Google Bookmark FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Delicious Rank FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on Digg Find More places to share FCT Safety, Codes and Standards: Current Approaches to Safety, Codes and Standards on AddThis.com... Home Basics Current Approaches to Safety, Codes & Standards

483

Contacts | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts Contacts Provide feedback, ask questions, or formally request assistance: Website Contact Report broken links and suggest content and/or updates to information on this website. Please use the Online Help Desk for questions or issues with the compliance software tools. Online Help Desk Submit questions regarding energy codes, compliance, REScheck(tm), COMcheck(tm), or other BECP tools to a building energy codes expert. Technical Assistance Request Submit a formal, state or local jurisdiction-level request for technical assistance. Program Contacts U.S. Department of Energy (DOE) contacts for the Building Energy Codes Program (BECP). Federal (DOE) Contact Program Area Jeremy Williams, Project Manager Adoption Compliance Compliance Tools- REScheck& COMcheck Technical Assistance

484

Wisconsin | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Wisconsin Wisconsin Last updated on 2013-07-18 Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information SPS Chapter 363 specifically addresses amendments to the 2009 IECC. For example, if there is reference to SPS 363.0503, then the SPS 363 references only those amendments associated with the 2009 IECC (as based on language adopted in SPS 361.05), and 0503 indicates that section 503 of the 2009 IECC is being amended. WI Amendments as addressed by SPS 361.05 Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Wisconsin (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 09/01/2011 Adoption Date 07/01/2011

485

ASME Code Efforts Supporting HTGRs  

SciTech Connect

In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

D.K. Morton

2012-09-01T23:59:59.000Z

486

ASME Code Efforts Supporting HTGRs  

SciTech Connect

In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

D.K. Morton

2011-09-01T23:59:59.000Z

487

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Building Energy Code < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Bioenergy Solar Lighting Windows, Doors, & Skylights Alternative Fuel Vehicles Hydrogen & Fuel Cells Heating Buying & Making Electricity Water Water Heating Wind Program Info State Connecticut Program Type Building Energy Code Provider Connecticut Office of Policy and Management ''Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the [http://www.energycodes.gov/states/

488

Building Energy Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Code Building Energy Code Building Energy Code < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design &