Powered by Deep Web Technologies
Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

2

V-044: IBM Informix Buffer Overflow in Processing SQL Statements...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High DISCUSSION: IBM Informix is vulnerable to a buffer overflow caused by improper handling of unspecified SQL statements. A remote attacker with valid authentication...

3

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

82: Symantec Endpoint Protection Manager Buffer Overflow 82: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

4

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Symantec Endpoint Protection Manager Buffer Overflow 2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Symantec Endpoint Protection Manager PLATFORM: The vulnerability is reported in versions 12.1.x prior to 12.1 RU3 ABSTRACT: Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec Adivsory SYM13-005 CVE-2013-1612 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within secars.dll and can be exploited to cause a buffer overflow via the web-based management

5

V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Apache XML Security XPointer Expressions Processing Buffer 8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June 28, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache XML Security PLATFORM: vulnerability is reported in versions prior to 1.7.2 ABSTRACT: The vulnerability addresses the possibility of a heap overflow condition REFERENCE LINKS: Secunia Advisory SA53959 Apache Advisory CVE-2013-2210 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error within the XML Signature Reference processing code and can be exploited to cause a heap-based buffer overflow via a specially crafted document containing malformed XPointer expressions. IMPACT: Successful exploitation may allow execution of arbitrary code

6

U-114: IBM Personal Communications WS File Processing Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: IBM Personal Communications WS File Processing Buffer 14: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability March 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM Personal Communications, which can be exploited by malicious people to compromise a user's system. PLATFORM: versions 5.9.0 through 5.9.7 and 6.0.0 through 6.0.3. ABSTRACT: A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications. reference LINKS: Vendor Advisory Secunia Advisory 48185 CVE-2012-0201 IMPACT ASSESSMENT: High Discussion:

7

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: OpenSC Smart Card Serial Number Multiple Buffer Overflow 7: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities January 4, 2011 - 5:52pm Addthis PROBLEM: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities PLATFORM: Vulnerable Platform: OpenSC 0.11.13 ABSTRACT: OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. reference LINKS: SecurityFocus - OpenSC Smart Card Serial CVE-2010-4523 OpenSC: Three stack-based buffer overflows CVE-2010-4523 - Three stack-based buffer overflows

8

U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Pidgin 'mxit_show_message()' Function Stack-Based Buffer 7: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow Vulnerability U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow Vulnerability July 9, 2012 - 7:00am Addthis PROBLEM: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow Vulnerability. PLATFORM: Versions prior to Pidgin 2.10.5 vulnerable. ABSTRACT: Pidgin is prone to a stack-based buffer-overflow vulnerability REFERENCE LINKS: The Vendor's Advisory Bugtraq ID: 54322 CVE-2012-3374 IMPACT ASSESSMENT: Medium Discussion: Incorrect handing of inline images in incoming instant messages can cause a buffer overflow and in some cases can be exploited to execute arbitrary code. Impact: Successful exploits of the buffer-overflow issue may lead to the execution of arbitrary code in the context of the application or to denial-of-service

9

U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer 207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow Vulnerability U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow Vulnerability July 9, 2012 - 7:00am Addthis PROBLEM: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow Vulnerability. PLATFORM: Versions prior to Pidgin 2.10.5 vulnerable. ABSTRACT: Pidgin is prone to a stack-based buffer-overflow vulnerability REFERENCE LINKS: The Vendor's Advisory Bugtraq ID: 54322 CVE-2012-3374 IMPACT ASSESSMENT: Medium Discussion: Incorrect handing of inline images in incoming instant messages can cause a buffer overflow and in some cases can be exploited to execute arbitrary code. Impact: Successful exploits of the buffer-overflow issue may lead to the execution of arbitrary code in the context of the application or to denial-of-service

10

V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: RealPlayer MP4 Processing Buffer Overflow Vulnerability 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when processing MP4 files and can be exploited to cause a heap-based buffer overflow via a specially crafted MP4 file. IMPACT: Successful exploitation may allow execution of arbitrary code. SOLUTION: Update to version 16.0.1.18. Addthis Related Articles U-042: Mac RealPlayer Multiple Vulnerabilities V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

11

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

12

ARMORY: An automatic security testing tool for buffer overflow defect detection  

Science Conference Proceedings (OSTI)

Program Buffer Overflow Defects (PBODs) are the stepping stones of Buffer Overflow Attacks (BOAs), which are one of the most dangerous security threats to the Internet. In this paper, we propose a kernel-based security testing tool, named ARMORY, for ...

Li-Han Chen, Fu-Hau Hsu, Yanling Hwang, Mu-Chun Su, Wei-Shinn Ku, Chi-Hsuan Chang

2013-10-01T23:59:59.000Z

13

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root 6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am Addthis PROBLEM: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges. PLATFORM: Linux kernel ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1026395 CVE-2011-4330 IMPACT ASSESSMENT: Medium Discussion: When a specially crafted Hierarchical File System (HFS) file system is mounted, a local user can to trigger a buffer overflow and execute arbitrary code on the target system with root privileges. The vulnerability resides in the hfs_mac2asc() function. Impact: A local user can obtain root privileges on the target system.

14

V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain 3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges February 18, 2013 - 12:53am Addthis PROBLEM: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges PLATFORM: Symantec PGP Desktop 10.2.x,10.1.x,10.0.x Symantec Encryption Desktop 10.3.0 ABSTRACT: Two vulnerabilities were reported in Symantec PGP Desktop. REFERENCE LINKS: Symantec Security Advisory SYM13-001 Bugtraq ID: 57170 SecurityTracker Alert ID: 1028145 CVE-2012-4351 CVE-2012-4352 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger an integer overflow in 'pgpwded.sys' to execute arbitrary code on the target system [CVE-2012-4351]. On Windows XP and Windows Sever 2003, a local user can trigger a buffer

15

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

16

U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference 8: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges March 19, 2012 - 7:00am Addthis PROBLEM: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges PLATFORM: ESX 4.0, 4.1; ESXi 4.0, 4.1, 5.0 ABSTRACT: A vulnerability was reported in VMware ESX. A local user can obtain elevated privileges on the target system. reference LINKS: Secunia Advisory SA48378 SecurityTracker Alert ID: 1026818 CVE-2010-0405 IMPACT ASSESSMENT: Medium Discussion: A local user on a guest operating system can trigger a buffer overflow or null pointer dereference in the display drivers to execute arbitrary code

17

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

18

V-009: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09: Adobe Shockwave Player Buffer Overflows and Array Error Lets 09: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code V-009: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code October 24, 2012 - 6:00am Addthis PROBLEM: Adobe Shockwave Player Buffer Overflows and Array Error Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Shockwave Player 11.6.7.637 and earlier versions for Windows and Macintosh ABSTRACT: Several vulnerabilities were reported in Adobe Shockwave. REFERENCE LINKS: Adobe Security bulletin SecurityTracker Alert ID: 1027692 CVE-2012-4172 CVE-2012-4173 CVE-2012-4174 CVE-2012-4175 CVE-2012-4176 CVE-2012-5273 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on

19

V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Novell iPrint Client Unspecified Buffer Overflow 8: Novell iPrint Client Unspecified Buffer Overflow Vulnerability V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability May 3, 2013 - 6:00am Addthis PROBLEM: Novell iPrint Client Unspecified Buffer Overflow Vulnerability PLATFORM: Novell iPrint Client 5.x ABSTRACT: A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system REFERENCE LINKS: Secunia Advisory SA53261 Novell KB 7012344 Novell KB 7008708 CVE-2013-1091 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an unspecified error and can be exploited to cause a stack-based buffer overflow. IMPACT: Successful exploitation may allow execution of arbitrary code SOLUTION: Vendor recommendation is to update to Version 5.90

20

T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: BMC PATROL Agent Service Daemon stack-based buffer overflow 6: BMC PATROL Agent Service Daemon stack-based buffer overflow T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow February 14, 2011 - 7:07am Addthis PROBLEM: BMC PATROL Agent Service Daemon stack-based buffer overflow PLATFORM: BMC Performance Affected software versions: BMC Performance Analysis for Servers 7.4.00 - 7.5.10 BMC Performance Analyzer for Servers 7.4.00 - 7.5.10 BMC Performance Assurance for Servers 7.4.00 - 7.5.10 BMC Performance Assurance for Virtual Servers 7.4.00 - 7.5.10 ABSTRACT: Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Stack-based buffer overflow in oninit in IBM Informix 9: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution February 17, 2011 - 7:00am Addthis PROBLEM: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution. PLATFORM: IBM Informix Dynamic Server (IDS) 11.50 ABSTRACT: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement. reference LINKS: Security Database - Reference - CVE-2011-1033 CVE Details - Reference - CVE-2011-1033

22

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

23

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP StorageWorks File Migration Agent Buffer Overflows Let 6: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability. 1. (ZDI-12-127) The specific flaw exists within the HsmCfgSvc.exe service

24

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability.

25

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

26

V-060: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: VLC Media Player Buffer Overflow in HTML Subtitle Parser 0: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code V-060: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code January 2, 2013 - 1:00am Addthis PROBLEM: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code PLATFORM: VLC Media Player 2.0.4, possibly earlier versions ABSTRACT: Some vulnerabilities have been reported in VLC Media Player REFERENCE LINKS: SecurityTracker Alert ID: 1027929 Secunia Advisory SA51692 IMPACT ASSESSMENT: Medium DISCUSSION: Some vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to errors when parsing HTML subtitles in

27

V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IntegraXor ActiveX Control Buffer Overflow Vulnerability 6: IntegraXor ActiveX Control Buffer Overflow Vulnerability V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability February 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in IntegraXor PLATFORM: Integraxor Versions prior to 4.x ABSTRACT: The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. REFERENCE LINKS: Secunia Advisory SA52073 CVE-2012-4700 US-CERT Advisory IMPACT ASSESSMENT: High DISCUSSION: Successfully exploiting this vulnerability could lead to a DoS for the application or could allow an attacker to execute arbitrary code. IMPACT: Successful exploitation may allow execution of arbitrary code. SOLUTION: Update to version 4.00 build 4280.0 Addthis Related Articles

28

V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: FreeType BDF Glyph Processing Buffer Overflow Vulnerability 6: FreeType BDF Glyph Processing Buffer Overflow Vulnerability V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability December 27, 2012 - 6:00am Addthis PROBLEM: FreeType BDF Glyph Processing Buffer Overflow Vulnerability PLATFORM: Version(s): prior to 2.4.11 ABSTRACT: Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027921 CVE-2012-5668 CVE-2012-5669 CVE-2012-5670 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted font file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user or application. A null pointer dereference can be triggered in bdf_free_font()

29

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Buffer Overflows and Memory Corruption 8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code November 7, 2012 - 6:00am Addthis PROBLEM: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.4.402.287 and prior for Windows and OS X; 11.2.202.243 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-24 SecurityTracker Alert ID: 1027730 CVE-2012-5274 CVE-2012-5275 CVE-2012-5276 CVE-2012-5277 CVE-2012-5278 CVE-2012-5279 CVE-2012-5280 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Adobe Flash Player. A remote user

30

V-060: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: VLC Media Player Buffer Overflow in HTML Subtitle Parser 0: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code V-060: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code January 2, 2013 - 1:00am Addthis PROBLEM: VLC Media Player Buffer Overflow in HTML Subtitle Parser Lets Remote Users Execute Arbitrary Code PLATFORM: VLC Media Player 2.0.4, possibly earlier versions ABSTRACT: Some vulnerabilities have been reported in VLC Media Player REFERENCE LINKS: SecurityTracker Alert ID: 1027929 Secunia Advisory SA51692 IMPACT ASSESSMENT: Medium DISCUSSION: Some vulnerabilities have been reported in VLC Media Player, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to errors when parsing HTML subtitles in

31

T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

664: Apache Santuario Buffer Overflow Lets Remote Users Deny 664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service July 8, 2011 - 12:32pm Addthis PROBLEM: A vulnerability was reported in Apache Santuario. A remote user can cause denial of service conditions. PLATFORM: Prior to 1.6.1 - Apache Santuario XML Security for C++ library versions prior to V1.6.1 ABSTRACT: A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker. reference LINKS: SecurityTracker Alert ID: 1025755 Bugzilla: 719698: CVE-2011-2516 xml-security-c The Apache Software Foundation - CVE-2011-2516

32

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

33

V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Kingsoft Writer 2012 WPS Font Names Buffer Overflow 19: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability August 16, 2013 - 5:52am Addthis PROBLEM: Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system. PLATFORM: Kingsoft Office 2012, Kingsoft Weirwe 2012 8.x ABSTRACT: The vulnerability is confirmed in the following products and versions: * Kingsoft Writer 2012 version 8.1.0.3030. * Kingsoft Writer 2012 bundled in Kingsoft Office 2012 version 8.1.0.3385. REFERENCE LINKS: Secunia Advisory SA53266 CVE-2013-3934 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to a boundary error in when handling font names and can be exploited to cause a stack-based buffer overflow via a

34

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Attachmate Reflection Buffer Overflow in FTP Client Lets 3: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code November 22, 2011 - 8:00am Addthis PROBLEM: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code. PLATFORM: 14.1.1173 and prior versions The following product versions are affected: Reflection for HP version 14.x Reflection for UNIX and OpenVMS version 14.x Reflection for ReGIS Graphics version 14.x Reflection for IBM version 14.x Reflection X version 14.x ABSTRACT: A remote server can execute arbitrary code on the connected target system. reference LINKS: Security Updates and Reflection Attachmate Support Lifecycle Attachmate Downloads

35

T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local 583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information March 18, 2011 - 5:15pm Addthis PROBLEM: A vulnerability was reported in the Linux Kernel. A local user can obtain information from kernel memory. PLATFORM: Version(s): 2.4.x, 2.6.x ABSTRACT: A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space. reference LINKS: http://www.securitytracker.com/id/1025225 CVE-2011-1163 http://www.kernel.org/ IMPACT ASSESSMENT: Moderate Discussion: A local user can create a storage device with specially crafted OSF

36

T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: Avaya Aura Application Server Buffer Overflow in 95: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code August 17, 2011 - 3:23pm Addthis PROBLEM: A vulnerability was reported in Avaya Aura Application Server (Nortel Media Application Server). PLATFORM: Avaya Aura Application Server 5300 version(s): 1.0, 2.0 ABSTRACT: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code. reference LINKS: Avaya Advisory: 100146108 Security Tracker Alert ID: 1025942 IMPACT ASSESSMENT: Medium Discussion: A flaw was found in one of the Media Application Server listening processes. If a remote attacker was able to successfully establish a

37

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

38

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Attachmate Reflection Buffer Overflow in FTP Client Lets 3: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code November 22, 2011 - 8:00am Addthis PROBLEM: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code. PLATFORM: 14.1.1173 and prior versions The following product versions are affected: Reflection for HP version 14.x Reflection for UNIX and OpenVMS version 14.x Reflection for ReGIS Graphics version 14.x Reflection for IBM version 14.x Reflection X version 14.x ABSTRACT: A remote server can execute arbitrary code on the connected target system. reference LINKS: Security Updates and Reflection Attachmate Support Lifecycle Attachmate Downloads

39

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

40

V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

8: RealPlayer Buffer Overflow and Memory Corruption Error Let 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028953 RealNetworks Security Bulletin CVE-2013-4973 CVE-2013-4974 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted RMP file that, when loaded by the target user, will trigger a stack overflow and execute arbitrary code on the target system. A remote user can create a specially crafted RealMedia file that, when

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Linux Kernel "iscsi_add_notunderstood_response()" Buffer 9: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow Vulnerability V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow Vulnerability June 3, 2013 - 12:01am Addthis PROBLEM: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow Vulnerability PLATFORM: Linux Kernel 3.0.x Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.9.x ABSTRACT: A vulnerability has been reported in Linux Kernel. REFERENCE LINKS: Secunia Advisory SA53670 Red Hat Bugzilla - Bug 968036 CVE-2013-2850 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a boundary error within the "iscsi_add_notunderstood_response()" function (drivers/target/iscsi/iscsi_target_parameters.c) when parsing keys and can

42

U-115: Novell GroupWise Client Address Book Processing Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Novell GroupWise Client Address Book Processing Buffer 5: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability March 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in in Novell GroupWise Client. PLATFORM: versions 8.0 through 8.02 HP3. ABSTRACT: The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address. reference LINKS: Vendor Advisory Secunia Advisory 48199 CVE-2011-4189 IMPACT ASSESSMENT: High Discussion: The GroupWise 8 Client for Windows is vulnerable to an exploit where a malformed address book could cause heap memory corruption, which could lead to remote code execution under the privilege of the user that opened the

43

U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Net4Switch ipswcom ActiveX Control Buffer Overflow 8: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability February 22, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Net4Switch ipswcom ActiveX Control, which can be exploited by malicious people to compromise a user's system. PLATFORM: Net4Switch ipswcom ActiveX Control 1.x ABSTRACT: The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string. reference LINKS: Vendor Advisory Secunia Advisroy 48125 No CVE references. IMPACT ASSESSMENT: High Discussion: The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

44

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: IBM Rational ClearQuest ActiveX Control Buffer Overflow 54: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability April 24, 2012 - 7:00am Addthis PROBLEM: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability PLATFORM: Versions 7.1.1 through 7.1.2.5, 8.0, and 8.0.0.1. ABSTRACT: A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. reference links: SecurityTracker Alert ID: 1026958 Secunia Advisory SA48933 CVE-2012-0708 IMPACT ASSESSMENT: High Discussion: The vulnerability is caused due to a function prototype mismatch in the "RegisterSchemaRepoFromFileByDbSet()" function in the IBM Rational ClearQuest ActiveX control (cqole.dll). This can be exploited to cause a

45

Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures  

Science Conference Proceedings (OSTI)

Security enforcement inlined into user threads often delays the protected programs; inlined resource reclamation may interrupt program execution and defer resource release. We propose software cruising, a novel technique that migrates security ... Keywords: buffer overflow, concurrency, lock-free, multicore, non-blocking algorithms, program monitor, software cruising

Qiang Zeng; Dinghao Wu; Peng Liu

2011-06-01T23:59:59.000Z

46

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: IBM Rational ClearQuest ActiveX Control Buffer Overflow 54: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability April 24, 2012 - 7:00am Addthis PROBLEM: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability PLATFORM: Versions 7.1.1 through 7.1.2.5, 8.0, and 8.0.0.1. ABSTRACT: A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. reference links: SecurityTracker Alert ID: 1026958 Secunia Advisory SA48933 CVE-2012-0708 IMPACT ASSESSMENT: High Discussion: The vulnerability is caused due to a function prototype mismatch in the "RegisterSchemaRepoFromFileByDbSet()" function in the IBM Rational ClearQuest ActiveX control (cqole.dll). This can be exploited to cause a

47

T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code July 5, 2011 - 7:06am Addthis PROBLEM: A vulnerability was reported in OpenSSH. A remote user can execute arbitrary code on the target system. PLATFORM: FreeBSD releases greater than 5.2.1 : 3.5p1 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: SecurityTracker Alert ID: 1025739 Open SSH Security Update IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted username value to trigger a buffer overflow in the pam_thread() function and execute arbitrary code on

48

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution  

Energy.gov (U.S. Department of Energy (DOE))

Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

49

U-216: HP StorageWorks File Migration Agent Buffer Overflows...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

not properly validate the size of the root path specified and proceeds to copy the string into a fixed-length buffer on the stack. This can be exploited to execute arbitrary...

50

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Network LDAP Authentication Bug Lets Remote Users Bypass Authentication V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let...

51

Nuclear reactor overflow line  

DOE Patents (OSTI)

The overflow line for the reactor vessel of a liquid-metal-cooled nuclear reactor includes means for establishing and maintaining a continuous bleed flow of coolant amounting to 5 to 10% of the total coolant flow through the overflow line to prevent thermal shock to the overflow line when the reactor is restarted following a trip. Preferably a tube is disposed concentrically just inside the overflow line extending from a point just inside the reactor vessel to an overflow tank and a suction line is provided opening into the body of liquid metal in the reactor vessel and into the annulus between the overflow line and the inner tube.

Severson, Wayne J. (Pittsburgh, PA)

1976-01-01T23:59:59.000Z

52

U-115: Novell GroupWise Client Address Book Processing Buffer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Other Agencies You are here Home U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability U-115: Novell GroupWise Client Address Book...

53

Overflow and losses in a network queue with a self-similar input  

Science Conference Proceedings (OSTI)

This paper considers a discrete time queuing system that models a communication network multiplexer which is fed by a self-similar packet traffic. The model has a finite buffer of size h, a number of servers with unit service ... Keywords: buffer overflow, communications networks, long-range dependence, self-similarity

Boris Tsybakov; Nicolas D. Georganas

2000-01-01T23:59:59.000Z

54

T-588: HP Virtual SAN Appliance Stack Overflow | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-588: HP Virtual SAN Appliance Stack Overflow T-588: HP Virtual SAN Appliance Stack Overflow T-588: HP Virtual SAN Appliance Stack Overflow March 25, 2011 - 5:05pm Addthis PROBLEM: HP Virtual SAN Appliance Stack Overflow in 'hydra.exe' Lets Remote Users Execute Arbitrary Code. PLATFORM: HP StorageWorks P4000 Virtual SAN Appliance Software ABSTRACT: A vulnerability has been reported in HP StorageWorks P4000 Virtual SAN Appliance Software, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Secunia advisory 34782 SecurityTracker Alert ID: 1025249 ZDI-11-111 Bugtraq ID: 47005 IMPACT ASSESSMENT: High Discussion: Hewlett-Packard Virtual SAN Appliance is prone to a remote buffer-overflow vulnerability. Attackers may exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in

55

V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PuTTY SSH Handshake Integer Overflow Vulnerabilities 3: PuTTY SSH Handshake Integer Overflow Vulnerabilities V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities August 7, 2013 - 6:00am Addthis PROBLEM: SEARCH-LAB has reported some vulnerabilities in PuTTY PLATFORM: PuTTY 0.x ABSTRACT: The vulnerabilities can be exploited by malicious people to potentially compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54354 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3520 CVE-2013-4206 CVE-2013-4207 CVE-2013-4208 CVE-2013-4852 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerabilities are caused due to some integer overflow errors when handling the SSH handshake and can be exploited to cause heap-based buffer overflows via a negative handshake message length. IMPACT: Successful exploitation of may allow execution of arbitrary code

56

T-548: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe 48: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow T-548: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow February 2, 2011 - 7:15am Addthis PROBLEM: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow. PLATFORM: Novell Zenworks Handheld Management 7 ABSTRACT: Novell ZENworks Handheld Management (ZHM) is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the ZfHIPCnd.exe Access Point process. By sending a specially-crafted request to TCP port 2400, a remote attacker could overflow a buffer and execute arbitrary code on the system with SYSTEM privileges or cause the application to crash. reference LINKS: TippingPoint: Zero Day Initiative Redhat - CVE-2010-0742 Novell ZENworks - CVE-2010-0742

57

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

58

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

59

T-695: Avaya Aura Application Server Buffer Overflow in 'cstore...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to 1.0.2 (MCP11.0.0.02011-01-07-1526 with MAS QFE patch: QFE-platform-6.0.244-0001.zip), or upgrade to MAS 2.0 with Patch Bundle 10 or later. Avaya strongly recommends that...

60

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for HP version 14.x Reflection for UNIX and OpenVMS version 14.x Reflection for ReGIS Graphics version 14.x Reflection for IBM version 14.x Reflection X version 14.x ABSTRACT: A...

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Novell ZENworks Configuration Management novell-tftp.exe 2: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow February 22, 2011 - 7:00am Addthis PROBLEM: Novell ZENworks Buffer Overflow in TFTPD. PLATFORM: Novell ZENworks Configuration Management 10.x, Novell ZENworks Configuration Management 11.x ABSTRACT: A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

62

Cyclogenesis in the Denmark Strait Overflow Plume  

Science Conference Proceedings (OSTI)

A densely spaced hydrographic survey of the northern Irminger Basin together with satellite-tracked near-surface drifters confirm the intense mesoscale variability within and above the Denmark Strait overflow. In particular, the drifters show ...

Johann H. Jungclaus; Janko Hauser; Rolf H. Käse

2001-11-01T23:59:59.000Z

63

Marginal Sea Overflows and the Upper Ocean Interaction  

Science Conference Proceedings (OSTI)

Marginal sea overflows and the overlying upper ocean are coupled in the vertical by two distinct mechanisms—by an interfacial mass flux from the upper ocean to the overflow layer that accompanies entrainment and by a divergent eddy flux ...

Shinichiro Kida; Jiayan Yang; James F. Price

2009-02-01T23:59:59.000Z

64

V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability 3: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability April 1, 2013 - 1:26am Addthis PROBLEM: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability PLATFORM: VMware ESX Server 4.x VMware ESXi 4.x VMware ESXi 5.x ABSTRACT: A vulnerability has been reported in VMware ESX and ESXi REFERENCE LINKS: VMware ESXi security update Secunia Advisory SA52844 CVE-2012-5134 IMPACT ASSESSMENT: High DISCUSSION: The ESXi userworld libxml2 library has been updated to resolve a security issue IMPACT: VMware ESX and ESXi can be exploited by malicious people to compromise a vulnerable system SOLUTION: The vendor has issued a fix, VMware ESXi 5.0, Patch Release ESXi500-201303001 (2044373) Addthis Related Articles U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets

65

The Upper-Oceanic Response to Overflows: A Mechanism for the Azores Current  

Science Conference Proceedings (OSTI)

The oceanic response to overflows is explored using a two-layer isopycnal model. Overflows enter the open ocean as dense gravity currents that flow along and down the continental slope. While descending the slope, overflows typically double their ...

Shinichiro Kida; James F. Price; Jiayan Yang

2008-04-01T23:59:59.000Z

66

V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Informix Genero libpng Integer Overflow Vulnerability 4: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT ASSESSMENT: Medium DISCUSSION: The libpng library used by IBM Informix Genero contains an integer overflow vulnerability. If you use IBM Informix Genero to handle PNG (Portable Network Graphics) image files and an attacker causes your IBM Informix Genero program to open or display a malicious PNG file, your IBM Informix

67

Generalized Conditions for Hydraulic Criticality of Oceanic Overflows  

Science Conference Proceedings (OSTI)

Two methods for assessing the hydraulic criticality of an observed or modeled overflow are discussed. The methods are valid for single-layer deep flows with arbitrary potential vorticity and cross section. The first method is based on a purely ...

Larry Pratt; Karl Helfrich

2005-10-01T23:59:59.000Z

68

Causes of Changes in the Denmark Strait Overflow  

Science Conference Proceedings (OSTI)

The warming Nordic seas potentially tend to decrease the overflow across the Greenland–Iceland–Scotland Ridge (GISR) system. Recent observations by Macrander et al. document a significant drop in the intensity of outflowing Denmark Strait ...

Armin Köhl; Rolf H. Käse; Detlef Stammer; Nuno Serra

2007-06-01T23:59:59.000Z

69

Is the Faroe Bank Channel Overflow Hydraulically Controlled?  

Science Conference Proceedings (OSTI)

The overflow of dense water from the Nordic Seas through the Faroe Bank Channel (FBC) has attributes suggesting hydraulic control—primarily an asymmetry across the sill reminiscent of flow over a dam. However, this aspect has never been confirmed ...

James B. Girton; Lawrence J. Pratt; David A. Sutherland; James F. Price

2006-12-01T23:59:59.000Z

70

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Flaws Let Remote Users Execute Arbitrary Code T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code U-126: Cisco...

71

T-559: Stack-based buffer overflow in oninit in IBM Informix...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

execute arbitrary code on vulnerable installations of IBM Informix Database Server. SQL query execution privileges are required to exploit this vulnerability. The specific flaw...

72

U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string. reference LINKS: Vendor Advisory Secunia Advisroy 48125 No CVE references. IMPACT...

73

BUFFERED WELL FIELD OUTLINES  

U.S. Energy Information Administration (EIA) Indexed Site

OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS The VBA Code below builds oil & gas field boundary outlines (polygons) from buffered wells (points). Input well points layer must be a...

74

Dissipation of Turbulent Kinetic Energy Inferred from Seagliders: An Application to the Eastern Nordic Seas Overflows  

Science Conference Proceedings (OSTI)

Turbulent mixing is an important process controlling the descent rate, water mass modification, and volume transport augmentation due to entrainment in the dense overflows across the Greenland–Scotland Ridge. These overflows, along with entrained ...

Nicholas Beaird; Ilker Fer; Peter Rhines; Charles Eriksen

2012-12-01T23:59:59.000Z

75

Improving Oceanic Overflow Representation in Climate Models: The Gravity Current Entrainment Climate Process Team  

Science Conference Proceedings (OSTI)

Oceanic overflows are bottom-trapped density currents originating in semienclosed basins, such as the Nordic seas, or on continental shelves, such as the Antarctic shelf. Overflows are the source of most of the abyssal waters, and therefore play ...

Sonya Legg; Tal Ezer; Laura Jackson; Bruce Briegleb; Gokhan Danabasoglu; William Large; Wanli Wu; Yeon Chang; Tamay M. Özgökmen; Hartmut Peters; Xiaobiao Xu; Eric P. Chassignet; Arnold L. Gordon; Stephen Griffies; Robert Hallberg; Jim Price; Ulrike Riemenschneider; Jiayan Yang

2009-05-01T23:59:59.000Z

76

BUFFERED WELL FIELD OUTLINES  

U.S. Energy Information Administration (EIA) Indexed Site

OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS The VBA Code below builds oil & gas field boundary outlines (polygons) from buffered wells (points). Input well points layer must be a feature class (FC) with the following attributes: Field_name Buffer distance (can be unique for each well to represent reservoirs with different drainage radii) ...see figure below. Copy the code into a new module. Inputs: In ArcMap, data frame named "Task 1" Well FC as first layer (layer 0). Output: Polygon feature class in same GDB as the well points FC, with one polygon field record (may be multiple polygon rings) per field_name. Overlapping buffers for the same field name are dissolved and unioned (see figure below). Adds an attribute PCTFEDLAND which can be populated using the VBA

77

Mining Local Buffer Data  

Science Conference Proceedings (OSTI)

Web mining employs the techniques of data mining to extract information from the Web for a variety of purposes. The usual sources of data are the log files of WWW or proxy servers. The paper examines the possibility of using the local browser buffer ... Keywords: Behavioural Targeting, Browser Cache, Cacheability, Data Mining, Heaps Law, Internet, Latency, Zipf Law

Andrzej Siemi?ski

2008-06-01T23:59:59.000Z

78

Transport and Dynamics of the Panay Sill Overflow in the Philippine Seas  

Science Conference Proceedings (OSTI)

Observations of stratification and currents between June 2007 and March 2009 reveal a strong overflow between 400- and 570-m depth from the Panay Strait into the Sulu Sea. The overflow water is derived from approximately 400 m deep in the South ...

Zachary D. Tessler; Arnold L. Gordon; Larry J. Pratt; Janet Sprintall

2010-12-01T23:59:59.000Z

79

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users 131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code March 22, 2012 - 3:47am Addthis PROBLEM: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Photoshop CS5 12.x ABSTRACT: Successful exploitation may allow execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026831 Secunia Advisory: SA48457 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted TIFF file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target

80

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

36: Microsoft JScript and VBScript Engine Integer Overflow Lets 36: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code August 15, 2012 - 7:00am Addthis PROBLEM: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 5.8 ABSTRACT: Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target REFERENCE LINKS: technet.microsoft.com/en-us/security/bulletin/ms12-056 http://www.securitytracker.com/id/1027392 CVE-2012-2523 Impact assessment: Medium Discussion: Vulnerability was reported in Microsoft JScript and VBScript. A remote user can cause arbitrary code to be executed on the target user's system. A

82

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

83

Overflow Waters at the Iceland-Faroe Ridge Observed in Multi-Year Seaglider Surveys  

Science Conference Proceedings (OSTI)

This paper presents new observations of the overflow waters downstream of the Faroe Bank Channel (FBC) and the Iceland-Faroe Ridge (IFR). Between 2006 and 2009, over 17,400 hydrographic profiles were collected during quarterly deployments in the ...

N. L. Beaird; P. B. Rhines; C. C. Eriksen

84

Fates and travel times of Denmark Strait Overflow Water in the Irminger Basin  

Science Conference Proceedings (OSTI)

The Denmark Strait Overflow (DSO) supplies about one third of the North Atlantic Deep Water and is critical to the global thermohaline circulation. Knowledge of the pathways of DSO through the Irminger Basin and its transformation there is still ...

Inga Koszalka; Thomas W. N. Haine; Marcello G. Magaldi

85

Descent and Modification of the Overflow Plume in the Denmark Strait  

Science Conference Proceedings (OSTI)

Bulk properties of the Denmark Strait overflow (DSO) plume observed in velocity and hydrography surveys undertaken in 1997 and 1998 are described. Despite the presence of considerable short-term variability, it is found that the pathway and ...

James B. Girton; Thomas B. Sanford

2003-07-01T23:59:59.000Z

86

Oracle Log Buffer Queueing  

SciTech Connect

The purpose of this document is to investigate Oracle database log buffer queuing and its affect on the ability to load data using a specialized data loading system. Experiments were carried out on a Linux system using an Oracle 9.2 database. Previous experiments on a Sun 4800 running Solaris had shown that 100,000 entities per minute was an achievable rate. The question was then asked, can we do this on Linux, and where are the bottlenecks? A secondary question was also lurking, how can the loading be further scaled to handle even higher throughput requirements? Testing was conducted using a Dell PowerEdge 6650 server with four CPUs and a Dell PowerVault 220s RAID array with 14 36GB drives and 128 MB of cache. Oracle Enterprise Edition 9.2.0.4 was used for the database and Red Hat Linux Advanced Server 2.1 was used for the operating system. This document will detail the maximum observed throughputs using the same test suite that was used for the Sun tests. A detailed description of the testing performed along with an analysis of bottlenecks encountered will be made. Issues related to Oracle and Linux will also be detailed and some recommendations based on the findings.

Rivenes, A S

2004-12-08T23:59:59.000Z

87

Electrodialysis operation with buffer solution  

DOE Patents (OSTI)

A new method for improving the efficiency of electrodialysis (ED) cells and stacks, in particular those used in chemical synthesis. The process entails adding a buffer solution to the stack for subsequent depletion in the stack during electrolysis. The buffer solution is regenerated continuously after depletion. This buffer process serves to control the hydrogen ion or hydroxide ion concentration so as to protect the active sites of electrodialysis membranes. The process enables electrodialysis processing options for products that are sensitive to pH changes.

Hryn, John N. (Naperville, IL); Daniels, Edward J. (Orland Park, IL); Krumdick, Greg K. (Crete, IL)

2009-12-15T23:59:59.000Z

88

U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Novell GroupWise Internet Agent "Content-Length" Integer 1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September 17, 2012 - 6:00am Addthis PROBLEM: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability PLATFORM: The vulnerability is confirmed in version 8.0.2 HP3 and reported in version 2012. Other versions may also be affected. ABSTRACT: A vulnerability was reported in Novell GroupWise Internet Agent reference LINKS: Novell SecurityTracker Alert ID: 1027536 Secunia Advisory SA50622 CVE-2012-0271 IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted request with the HTTP 'Content-Length' header value of '-1' to the administration interface via

89

Doped LZO buffer layers for laminated conductors  

DOE Patents (OSTI)

A laminated conductor includes a metallic substrate having a surface, a biaxially textured buffer layer supported by the surface of the substrate, the biaxially textured buffer layer comprising LZO and a dopant for mitigating metal diffusion through the LZO, and a biaxially textured conductor layer supported by the biaxially textured buffer layer.

Paranthaman, Mariappan Parans (Knoxville, TN); Schoop, Urs (Westborough, MA); Goyal, Amit (Knoxville, TN); Thieme, Cornelis Leo Hans (Westborough, MA); Verebelyi, Darren T. (Oxford, MA); Rupich, Martin W. (Framingham, MA)

2010-03-23T23:59:59.000Z

90

Formation of an Azores Current Due to Mediterranean Overflow in a Modeling Study of the North Atlantic  

Science Conference Proceedings (OSTI)

A mechanism for the formation of the Azores Current is proposed. On the basis of observations and model results, it is argued that the primary cause of the Azores Current is the water mass transformation associated with the Mediterranean overflow ...

Yanli Jia

2000-09-01T23:59:59.000Z

91

A Deep-Towed ADCP-CTD Instrument Package Developed for Abyssal Overflow Measurements in the Northeastern Caribbean Sea  

Science Conference Proceedings (OSTI)

A deep-towed instrument package has been developed to study the velocity and tracer signature of abyssal overflows in the northeastern Caribbean. Primary package components include a conductivity-temperature-depth (CTD) instrument and an acoustic ...

David M. Fratantoni; William E. Johns

1996-06-01T23:59:59.000Z

92

Buffered Electrochemical Polishing of Niobium  

SciTech Connect

The standard preparation of superconducting radio-frequency (SRF) cavities made of pure niobium include the removal of a 'damaged' surface layer, by buffered chemical polishing (BCP) or electropolishing (EP), after the cavities are formed. The performance of the cavities is characterized by a sharp degradation of the quality factor when the surface magnetic field exceeds about 90 mT, a phenomenon referred to as 'Q-drop'. In cavities made of polycrystalline fine grain (ASTM 5) niobium, the Q-drop can be significantly reduced by a low-temperature ({approx} 120 C) 'in-situ' baking of the cavity if the chemical treatment was EP rather than BCP. As part of the effort to understand this phenomenon, we investigated the effect of introducing a polarization potential during buffered chemical polishing, creating a process which is between the standard BCP and EP. While preliminary results on the application of this process to Nb cavities have been previously reported, in this contribution we focus on the characterization of this novel electrochemical process by measuring polarization curves, etching rates, surface finish, electrochemical impedance and the effects of temperature and electrolyte composition. In particular, it is shown that the anodic potential of Nb during BCP reduces the etching rate and improves the surface finish.

Gianluigi Ciovati, Hui Tian, Sean Corcoran

2011-03-01T23:59:59.000Z

93

Linked Stack Buffer Management for Shared-Stacks  

Science Conference Proceedings (OSTI)

Severe memory constraint of wireless sensor networks (WSN) causes lots of problems such as irrecoverable stack overflow and out-of-memory failure. These problems motivated to develop efficient memory management schemes for WSNs. A shared-stack is the ...

Boncheol Gu; Junyoung Heo; Yookun Cho; Younghwan Kim

2008-06-01T23:59:59.000Z

94

Buffer management in relational database systems  

Science Conference Proceedings (OSTI)

The hot-set model, characterizing the buffer requirements of relational queries, is presented. This model allows the system to determine the optimal buffer space to be allocated to a query; it can also be used by the query optimizer to derive efficient ...

Giovanni Maria Sacco; Mario Schkolnick

1986-12-01T23:59:59.000Z

95

Specifying memory consistency of write buffer multiprocessors  

Science Conference Proceedings (OSTI)

Write buffering is one of many successful mechanisms that improves the performance and scalability of multiprocessors. However, it leads to more complex memory system behavior, which cannot be described using intuitive consistency models, such as Sequential ... Keywords: Memory consistency framework, alpha, coherence, partial store order, relaxed memory order, sequential consistency, sparc multiprocessors, total store order, write-buffer architectures

Lisa Higham; Lillanne Jackson; Jalal Kawash

2007-02-01T23:59:59.000Z

96

Approximating the buffer allocation problem using epochs  

Science Conference Proceedings (OSTI)

The correctness of applications that perform asynchronous message passing typically relies on the underlying hardware having a sufficient amount of memory (message buffers) to hold all undelivered messages-such applications may deadlock when executed ... Keywords: Buffer allocation, Complexity, Message passing systems, Parallel and distributed programming

Jan Bíkgaard Pedersen; Alex Brodsky; Jeffrey Sampson

2008-09-01T23:59:59.000Z

97

Dynamic buffer management using per-queue thresholds: Research Articles  

Science Conference Proceedings (OSTI)

Shared buffer switches consist of a memory pool completely shared among output ports of a switch. Shared buffer switches achieve low packet loss performance as buffer space is allocated in a flexible manner. However, this type of buffered switches suffers ... Keywords: buffer management, dynamic thresholds, shared memory switch

B. Gazi; Z. Ghassemlooy

2007-05-01T23:59:59.000Z

98

Smart buildings with electric vehicle interconnection as buffer...  

NLE Websites -- All DOE Office Websites (Extended Search)

buildings with electric vehicle interconnection as buffer for local renewables? Title Smart buildings with electric vehicle interconnection as buffer for local renewables?...

99

EPSB (Electronic Partially Shared Buffering): A Buffering Scheme for Asynchronous and Variable Length Optical Routing for the Edge Optical Packet Switch  

Science Conference Proceedings (OSTI)

We propose a new buffering scheme for wavelength division multiplexing (WDM) packet switching: the Electronic Partially Shared Buffering (EPSB) scheme. This buffering scheme incorporates separate buffers (i.e., electronic buffers) for all the outputs ...

Huhnkuk Lim; Chang-Soo Park

2002-01-01T23:59:59.000Z

100

Fast Algorithms for Slew-Constrained Minimum Cost Buffering  

Science Conference Proceedings (OSTI)

As a prevalent constraint, sharp slew rate is often required in circuit design, which causes a huge demand for buffering resources. This problem requires ultrafast buffering techniques to handle large volume of nets while also minimizing buffering cost. ... Keywords: Buffer insertion, NP-complete, input slew, interconnect, slew constraint

Shiyan Hu; C. J. Alpert; Jiang Hu; S. K. Karandikar; Zhuo Li; Weiping Shi; C. N. Sze

2007-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

An efficient net ordering algorithm for buffer insertion  

Science Conference Proceedings (OSTI)

There are efficient algorithms for net-based buffer insertion but they lead to sub-optimal path delays or unnecessarily large number of buffers due to their lack of global view. This can increase power consumption as well as die area. The ordering of ... Keywords: buffer insertion, buffer usage, net ordering

Hamid Reza Kheirabadi; Morteza Saheb Zamani

2007-03-01T23:59:59.000Z

102

On the Effective Capacity of the Dense-Water Reservoir for the Nordic Seas Overflow: Some Effects of Topography and Wind Stress  

Science Conference Proceedings (OSTI)

The overflow of the dense water mass across the Greenland–Scotland Ridge (GSR) from the Nordic Seas drives the Atlantic meridional overturning circulation (AMOC). The Nordic Seas is a large basin with an enormous reservoir capacity. The volume of ...

Jiayan Yang; Lawrence J. Pratt

2013-02-01T23:59:59.000Z

103

The F-Buffer: A Rasterization-Order FIFO Buffer for Multi-Pass Rendering  

E-Print Network (OSTI)

Multi-pass rendering is a common method of virtualizing graphics hardware to overcome limited resources. Most current multi-pass rendering techniques use the RGBA framebuffer to store intermediate results between each pass. This method of storing intermediate results makes it difficult to correctly render partially-transparent surfaces, and reduces the performance of shaders that need to preserve more than one intermediate result between passes. We propose an alternative approach to storing intermediate results that solves these problems. This approach stores intermediate colors (or other values) that are generated by a rendering pass in a FIFO buffer as the values exit the fragment pipeline. On a subsequent pass, the contents of the FIFO buffer are fed into the top of the fragment pipeline. We refer to this FIFO buffer as a fragment-stream buffer (or F-buffer), because this approach has the effect of associating intermediate results with particular rasterization fragments, rather than with an (x,y) location in the framebuffer. Implementing an F-buffer requires some changes to current mainstream graphics architectures, but these changes can be minor. We describe the design space associated with implementing an F-buffer, and compare the F-buffer to recirculating pipeline designs. We implement F-buffers in the Mesa software renderer, and demonstrate our programmable-shading system running on top of this renderer. CR Categories: I.3.1 [Computer Graphics]: Hardware Architecture---Graphics processors; I.3.7 [Computer Graphics]: Three-Dimensional Graphics and Realism---Color, shading, shadowing, and texture 1

William R. Mark; Kekoa Proudfoot

2001-01-01T23:59:59.000Z

104

Implementing Virtual Buffer for Electric Power Grids  

Science Conference Proceedings (OSTI)

The electric power grid is a vital network for every aspect of our life. The lack of buffer between generation and consumption makes the power grid unstable and fragile. While large scale power storage is not technically and economically feasible at ... Keywords: Artificial Intelligence, Dynamic Data Driven, Electric Power Grid

Rong Gao; Lefteri H. Tsoukalas

2007-05-01T23:59:59.000Z

105

Buffer Zones Around Protected Areas: A Brief Literature Review  

E-Print Network (OSTI)

1998). Environmental and social impact report the Bahamasclearly focused on the social impacts of buffer zones and

Martino, Diego

2001-01-01T23:59:59.000Z

106

BPD Conversion in a Thin SiC Buffer Layer  

Science Conference Proceedings (OSTI)

Symposium, Advanced Materials for Power Electronics, Power Conditioning, and Power Conversion. Presentation Title, BPD Conversion in a Thin SiC Buffer ...

107

Method of Rapidly Screening Buffer Layers in Photovoltaics  

ORNL 2010-G0647/jcn UT-B ID 200902275 Method of Rapidly Screening Buffer Layers in Photovoltaics Technology Summary This ORNL invention offers a new method to ...

108

Assessing Forested Riparian Buffer Ecological Integrity Using Lidar Data.  

E-Print Network (OSTI)

??Forested riparian buffers (FRB) provide numerous critical ecosystem services. However, the linear and often narrow spatial configuration of FRBs makes it difficult to identify broadscale… (more)

Wasser, Leah

2012-01-01T23:59:59.000Z

109

Tracking system bugs: why are buffer overruns still around?  

Science Conference Proceedings (OSTI)

A buffer overrun is caused by the limited size of a string variable's allocated space and the unlimited size of the actual string that is stored in the space. In the C programming language, it is the programmer's responsibility to make sure the actual ... Keywords: buffer overrun, c programming, string overwrite

Cherry Keahey Owen

2007-10-01T23:59:59.000Z

110

Current isolating epitaxial buffer layers for high voltage photodiode array  

DOE Patents (OSTI)

An array of photodiodes in series on a common semi-insulating substrate has a non-conductive buffer layer between the photodiodes and the semi-insulating substrate. The buffer layer reduces current injection leakage between the photodiodes of the array and allows optical energy to be converted to high voltage electrical energy.

Morse, Jeffrey D. (Martinez, CA); Cooper, Gregory A. (Pleasant Hill, CA)

2002-01-01T23:59:59.000Z

111

Closed form solutions to simultaneous buffer insertion/sizing and wire sizing  

Science Conference Proceedings (OSTI)

In this paper, we consider the delay minimization problem of an interconnect wire by simultaneously considering buffer insertion, buffer sizing and wire sizing. We consider three cases, namely using no buffer (i.e., wire sizing alone), using a given ... Keywords: buffer insertion, buffer sizing, closed form solution, interconnect optimization, wire sizing

Chris Chu; D. F. Wong

2001-07-01T23:59:59.000Z

112

High-speed buffer management for 40 Gb/s-based photonic packet switches  

Science Conference Proceedings (OSTI)

We develop a method of high-speed buffer management for output-buffered photonic packet switches. The use of optical fiber delay lines is a promising solution to constructing optical buffers. The buffer manager determines packet delays in the fiber delay ... Keywords: buffer management, parallel processing, photonic packet switching, pipeline processing, variable-length optical packet

Hiroaki Harai; Masayuki Murata

2006-02-01T23:59:59.000Z

113

Gilliam County Riparian Buffers; 2003-2004 Annual Reports.  

DOE Green Energy (OSTI)

Interest appears to be at an all-time high for riparian conservation programs in Gilliam County. With the recently added Herbaceous Buffer and the already established CREP program interest is booming. However, more and more people are turning towards the herbaceous buffer because of expense. The riparian forest buffer is becoming too expensive. Even with the excellent cost share and incentives landowners are having trouble with Farm Service Agency's payment limitation. Because of this payment limitation landowners are not receiving their full rental and incentive payments, usually in year one. This has cooled the installation of riparian forest buffers and peaked interest in the CP-29 (Herbaceous Buffer for Wildlife). Either way, riparian lands are being enhanced and water quality is being improved. Year three should be very similar to the accomplishments of year 2. There has already been several projects proposed that may or may not be approved during year 3. I am currently working on three projects that are all over 2.5 miles long on each side and total anywhere from 60 to 250 acres in size. Along with these three projects there at least seven small projects being proposed. Four of those projects are riparian forest buffers and the remaining are herbaceous buffers.

Coiner, Josh (Gilliam Soil and Water Conservation District, Condon, OR)

2004-06-01T23:59:59.000Z

114

Wasco Riparian Buffer Project, Annual Report 2003-2004.  

DOE Green Energy (OSTI)

This project implements riparian buffer systems in the Mid-Columbia, addressing limiting factors identified in the Deschutes River Sub-basin Summary, March 2, 2001. This project is providing the technical planning support needed to implement at least 20 riparian buffer system contracts on approximately 800 acres covering an estimated 36 miles of anadromous fish streams. During this second year of implementation, 17 buffer contracts were established on 173,462 ft. of stream (25.9 miles). Acreage included in the buffers totaled 891.6 acres. Average buffer width was 112 ft. on each side of the stream. Cumulative totals through the first two project years are 26 buffers on 36.6 stream miles covering 1,283.6 acres. Actual implementation costs, lease payments, and maintenance costs will be borne by existing USDA programs: Conservation Reserve (CRP) and Conservation Reserve Enhancement Programs (CREP). The lease period of each contract may vary from 10 to 15 years. During this year, the average lease period was 14.9 years. The total value of contracts established this year is $1,421,268 compared with $55,504 in BPA contract costs to provide the technical support needed to get the contracts implemented. Cumulative contract value for the first two years is $1,919,451 compared to $103,329 cost to BPA. This project provides technical staffing to conduct assessments and develop conservation plans required for riparian buffer systems to help keep pace with a growing backlog of potential buffer projects. This project meets a critical need in the lower Deschutes and lower John Day River basins and complements the Riparian Buffer project approved for Fifteenmile watershed, Project No. 2001-021-00 begun in fiscal year 2001. This project supports RPA 150 and 153 as required under the Federal Hydropower System biological opinion and benefits the mid-Columbia ESU of steelhead.

Graves, Ron

2003-07-01T23:59:59.000Z

115

Enhanced adhesion for LIGA microfabrication by using a buffer layer  

DOE Patents (OSTI)

The present invention is an improvement on the LIGA microfabrication process wherein a buffer layer is applied to the upper or working surface of a substrate prior to the placement of a resist onto the surface of the substrate. The buffer layer is made from an inert low-Z material (low atomic weight), a material that absorbs secondary X-rays emissions from the substrate that are generated from the substrate upon exposure to a primary X-rays source. Suitable materials for the buffer layer include polyamides and polyimide. The preferred polyimide is synthesized from pyromellitic anhydride and oxydianiline (PMDA-ODA).

Bajikar, Sateesh S.; DeCarlo, Francesco; Song, Joshua J.

1998-05-22T23:59:59.000Z

116

SMOOTH OIL & GAS FIELD OUTLINES MADE FROM BUFFERED WELLS  

U.S. Energy Information Administration (EIA) Indexed Site

The VBA code provided at the bottom of this document is an updated version The VBA code provided at the bottom of this document is an updated version (from ArcGIS 9.0 to ArcGIS 9.2) of the polygon smoothing algorithm described below. A bug that occurred when multiple wells had the same location was also fixed. SMOOTH OIL & GAS FIELD OUTLINE POLYGONS MADE FROM BUFFERED WELLS Why smooth buffered field outlines? See the issues in the figure below: [pic] The smoothing application provided as VBA code below does the following: Adds area to the concave portions; doesn't add area to convex portions to maintain buffer spacing Fills in non-field "islands" smaller than buffer size Joins separate polygon rings with a "bridge" if sufficiently close Minimizes increase in total field area Methodology: creates trapezoids between neighboring wells within an oil/gas

117

THE ROLE OF BUFFER GASES IN OPTOAOOUSTIC SPECTROSCOPY  

E-Print Network (OSTI)

and isotopic effects, heat capacity, thermal conductivity,and Ca p v p v are the heat capacities of the buffer and ab-function of: absorbed, the heat capacity of the mixture, 2)

Thomas III, L.J.

2011-01-01T23:59:59.000Z

118

Alternatives to the gradient in optimal transfer line buffer allocation  

E-Print Network (OSTI)

This thesis describes several directions to replace the gradient in James Schor's gradient algorithm to solve the dual problem. The alternative directions are: the variance and standard deviation of buffer levels, the ...

Tanizar, Ketty, 1978-

2004-01-01T23:59:59.000Z

119

Buffer-Gas Cooled Bose-Einstein Condensate  

E-Print Network (OSTI)

We report the creation of a Bose-Einstein condensate using buffer-gas cooling, the first realization of Bose-Einstein condensation using a broadly general method which relies neither on laser cooling nor unique atom-surface ...

Ketterle, Wolfgang

120

Usefulness of local buffer data for WWW objects prefetching  

Science Conference Proceedings (OSTI)

The sole aim of the prefetching of WWW objects is to shorten the Time To Display (TTD) of web pages. The paper indicates that user oriented prefetching has a great potential. The paper discuses the pros and cons of exploiting the browser buffer ... Keywords: WWW objects, browser cache, data mining, internet, latency, link text diversity, local buffer data, object prefetching, time to display, web pages, web usage

Andrzej Sieminski

2008-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Effects of buffer thickness on ATW blanket performance.  

DOE Green Energy (OSTI)

This paper presents preliminary results of target and buffer design studies for liquid metal cooled accelerator transmutation of waste (ATW) systems, aimed at maximizing the source importance while simultaneously reducing the irradiation damage to fuel. Using 840 MWt liquid metal cooled ATW designs, the effects of buffer thickness on the blanket performance have been studied. Varying the buffer thickness for a given blanket configuration, system performance parameters have been estimated by a series of calculations using the MCNPX and REBUS-3 codes. The effects of source importance variation are studied by investigating the low-energy (< 20 MeV) neutron source distribution and the equilibrium cycle blanket performance parameters such as fuel inventory, discharge burnup, burnup reactivity loss, and peak fast fluence. For investigating irradiation damage to fuel, the displacements per atom (dpa), hydrogen production, and helium production rates are evaluated at the buffer and blanket interface where the peak fast fluence occurs. Results for the liquid-metal-cooled designs show that the damage rates and the source importance increase monotonically as the buffer thickness decreases. Based on a compromise between the competing objectives of increasing the source importance and reducing the damage rates, a buffer thickness of around 20 cm appears to be reasonable. Investigation of the impact of the proton beam energy on the target and buffer design shows that for a given blanket power level, a lower beam energy (0.6 GeV versus 1 GeV) results in a higher irradiation damage to the beam window. This trend occurs because of the increase in the beam intensity required to maintain the power level.

Yang, W. S.; Mercatali, L.; Taiwo, T. A.; Hill, R. N.

2001-08-10T23:59:59.000Z

122

Fifteenmile Creek Riparian Buffers Project, Annual Report 2002-2003.  

DOE Green Energy (OSTI)

This project implements riparian buffer systems in the Mid-Columbia, addressing limiting factors identified in the Fifteenmile Subbasin Summary, June 30, 2000. The project is providing the technical planning support needed to implement at least 36 riparian buffer system contracts on approximately 872 acres covering an estimated 40 miles of anadromous fish streams over a three year period. During this second year of the project, 11 buffer contracts were implemented on 10.9 miles of stream. Buffer widths averaged 132 ft. on each side of the stream. Implementation included prescribed plantings, fencing, and related practices. Actual implementation costs, lease payments, and maintenance costs are borne by existing USDA programs: Conservation Reserve and Conservation Reserve Enhancement Programs. The lease period of each contract may vary between 10 to 15 years. During this year the average was 14.6 years. The total value of contracts established this year is $666,121 compared with $71,115 in Bonneville Power Administration (BPA) contract costs to provide the technical support needed to get the contracts implemented. This project provides technical staffing to conduct assessments and develop plans to help keep pace with the growing backlog of potential riparian buffer projects. Word of mouth from satisfied customers has brought in many new sign-ups during the year. In addition, specific outreach efforts targeting the orchard areas of the county began to bear fruit with orchardists sign-ups as the project year ended. Progress this second year of project includes only work accomplished in the Fifteenmile subbasin. A similar but separate effort to implement buffers in the Columbia Plateau Province was initiated during the year under project number 2002-019-00. This project supports RPA 150 and 153 as required under the Federal Hydropower System biological opinion.

Graves, Ron

2004-02-01T23:59:59.000Z

123

Note: Does The Graphemic Buffer Play A Role In Reading?  

E-Print Network (OSTI)

this paper, we investigate the read ing performance of a patient previously reported as hav ing an impairment at the level of the graphem ic buffer (Kay & Hanley , 1994). Desp ite his spelling problems, this patient is good at read ing fam iliar words, at reading nonwords, and at written lexical decision. This pattern of performance is d iscussed w ith respect to Caramazza, Capasso, and Miceli's (1996) recent claim that damage to the graphem ic buffer leads to a problem in reading that w ill be obvious especially when the patient is asked to read nonwords

J. Richard Hanley; Janice Kay

1998-01-01T23:59:59.000Z

124

Improving energy efficiency of buffer cache in virtual machines  

Science Conference Proceedings (OSTI)

Main memory contributes a large fraction of energy consumption in powerful servers running virtualization software to support concurrent virtual machines (VMs). Furthermore, data-intensive applications executing inside virtual machines increase the demand ... Keywords: Buffer Cache,Virtual Machine,Energy Management

Lei Ye; Chris Gniady

2012-06-01T23:59:59.000Z

125

Buffered coscheduling for parallel programming and enhanced fault tolerance  

DOE Patents (OSTI)

A computer implemented method schedules processor jobs on a network of parallel machine processors or distributed system processors. Control information communications generated by each process performed by each processor during a defined time interval is accumulated in buffers, where adjacent time intervals are separated by strobe intervals for a global exchange of control information. A global exchange of the control information communications at the end of each defined time interval is performed during an intervening strobe interval so that each processor is informed by all of the other processors of the number of incoming jobs to be received by each processor in a subsequent time interval. The buffered coscheduling method of this invention also enhances the fault tolerance of a network of parallel machine processors or distributed system processors

Petrini, Fabrizio (Los Alamos, NM); Feng, Wu-chun (Los Alamos, NM)

2006-01-31T23:59:59.000Z

126

Smart buildings with electric vehicle interconnection as buffer for local renewables?  

E-Print Network (OSTI)

Smart buildings with electric vehicle interconnection as buffer for local renewables? Michael, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement and partly by NEC Laboratories America Inc. Smart buildings with electric vehicle interconnection as buffer

127

Simultaneous Driver Sizing and Buffer Insertion Using a Delay Penalty Estimation Technique  

E-Print Network (OSTI)

and K. O. Jeppson, "CMOS circuit speed and buffer optimization," IEEE Trans. Computer-Aided Design, CAD

Chu, Chris C.-N.

128

Large deviation properties of constant rate data streams sharing a buffer with variable rate cross traffic  

Science Conference Proceedings (OSTI)

We consider a constant rate data stream which shares a buffer with a variable rate data stream. A first come first serve service discipline is applied at the buffer. After service at the first buffer the variable rate traffic leaves the system, whereas ... Keywords: 68M20, 90B15, Markov-modulated fluid sources, fluid model, large buffer asymptotics, many sources asymptotics, on-off sources, primary 60F10, queueing network, secondary 60K25

Kurt Majewski

2008-10-01T23:59:59.000Z

129

Wheeler County Riparian Buffers; 2002-2003 Annual Report.  

DOE Green Energy (OSTI)

Problems Encountered During Contract Year--Wheeler County residents are mostly non participants when it comes to Farm Services programs. Results of the counties non participation is the rental rates are the lowest in the state. There is a government fear factor as well as an obvious distance limitation. The FSA office is nearly 150 mile roundtrip from two of the counties urban areas. I find myself not only selling the CREP-Riparian Buffer but also selling Farm Services in general. Training has been very limited. NRCS is obviously not designed around training and certification. They are an on-the-job training organization. It has caused a hesitation in my outreach program and a great deal of frustration. I feel my confidence will strengthen with the follow through of the current projects. The most evident problem has come to light as of late. The program is too expensive to implement. The planting is too intensive for a 12''-18'' rainfall area. I provide the potential landowner a spread sheet with the bonuses, the costs, and the final outcome. No matter the situation, CREP or CCRP, the landowner always balks at the cost. The program assumes the landowner has the capital to make the initial investment. For example, project No.2 is going to be a minimum width buffer. It is approximately 3,000 ft long and 5.5 acres. The buffer for tree planting and fencing alone will result in a cost of nearly $13,000. With the water developments it nears $23,000. That is nearly 10% of a 250 mother-cow operating budget. Project No.1, the tree planting estimate is $45,000. This alone is nearly 25% of the same type of budget. I would greatly appreciate any help in finding a third party willing to put money to work covering the initial costs of the program, expecting reimbursement from Farm Services Agency. I believe this could create a powerful tool in buffering streams in Wheeler County. Outlook for Contract Year 2--I have been in this position now for 6 months. I am beginning to feel a much more confident in the buffer program. As my confidence improves I will move forward rapidly in contacting. With increased contacting I will find participating landowners. I am positive the landowner involved in my first project will be doing another after the first is complete.

Potter, Judy; Homer, Will (Wheeler County Soil and Water Conservation District, John Day, OR)

2004-02-01T23:59:59.000Z

130

Buffer sizing for minimum energy-delay product by using an approximating polynomial  

Science Conference Proceedings (OSTI)

This paper first presents an accurate and efficient method of estimating the short circuit energy dissipation and the output transition time of CMOS buffers. Next, the paper describes a sizing method for tapered buffer chains. It is shown that the first-order ... Keywords: buffer sizing, polynomial approximation, short circuit energy

Chang Woo Kang; Soroush Abbaspour; Massoud Pedram

2003-04-01T23:59:59.000Z

131

Numerical methods for analysis of multiflow queuing systems with virtual partition of a common buffer  

Science Conference Proceedings (OSTI)

A new approach is proposed to studying queuing systems with request-specific channels and a common finite buffer for requests of different types. For sharing the common buffer, a virtual partitioning strategy is used. Explicit formulas for blocking probabilities ... Keywords: algorithm of calculation, buffer partition, optimization, queuing system

L. A. Ponomarenko; A. Z. Melikov; M. I. Fattakhova

2005-01-01T23:59:59.000Z

132

Design issues in low-voltage high-speed current-mode logic buffers  

Science Conference Proceedings (OSTI)

A current-mode logic (CML) buffer is based on a simple differential circuit. This paper investigates important problems involved in the design of a CML buffer as well as a chain of tapered CML buffers. A new design procedure to systematically design ... Keywords: VLSI, current-mode logic, high-speed, integrated circuit, noise

Payam Heydari

2003-04-01T23:59:59.000Z

133

A latency-aware scheduling algorithm for all-optical packet switching networks with FDL buffers  

Science Conference Proceedings (OSTI)

Optical buffers implemented by fiber delay lines (FDLs) have a volatile nature due to signal loss and noise accumulation. Packets suffer from excessive recirculation through FDLs, and they may be dropped eventually in their routing paths. Because of ... Keywords: Fiber delay line buffers, Multi-hop packet scheduling, Optical buffering, Optical packet switching, Stochastic analysis

Kuan-Hung Chou; Woei Lin

2011-02-01T23:59:59.000Z

134

Optimal Policy of a Server System with Replication Buffering Relay Method  

Science Conference Proceedings (OSTI)

Recently, a replication buffering relay method has been used for a server system. The replication buffering relay method replicates data synchronously and enables a fast system migration when a disaster has occurred in the main site. We have already ... Keywords: server system, disaster recovery, replication buffering relay method, cost effectiveness

Mitsutaka Kimura; Mitsuhiro Imaizumi; Toshio Nakagawa

2012-11-01T23:59:59.000Z

135

Markov decision models for the optimal maintenance of a production unit with an upstream buffer  

Science Conference Proceedings (OSTI)

We consider a manufacturing system in which a buffer has been placed between the input generator and the production unit. The input generator supplies at a constant rate the buffer with the raw material, which is pulled by the production unit. The pull-rate ... Keywords: Control-limit policies, Dynamic programming, Maintenance, Production, Upstream buffer

A. Pavitsos; E. G. Kyriakidis

2009-06-01T23:59:59.000Z

136

Advance in Vertical Buffered Electropolishing on Niobium for Particle Accelerators*  

Science Conference Proceedings (OSTI)

Niobium (Nb) is the most popular material that has been employed for making superconducting radio frequency (SRF) cavities to be used in various particle accelerators over the last couple of decades. One of the most important steps in fabricating Nb SRF cavities is the final chemical removal of 150 {mu}m of Nb from the inner surfaces of the SRF cavities. This is usually done by either buffered chemical polishing (BCP) or electropolishing (EP). Recently a new Nb surface treatment technique called buffered electropolishing (BEP) has been developed at Jefferson Lab. It has been demonstrated that BEP can produce the smoothest surface finish on Nb ever reported in the literature while realizing a Nb removal rate as high as 10 {mu}m/min that is more than 25 and 5 times quicker than those of EP and BCP(112) respectively. In this contribution, recent advance in optimizing and understanding BEP treatment technique is reviewed. Latest results from RF measurements on BEP treated Nb single cell cavities by our unique vertical polishing system will be reported.

A.T. Wu, S. Jin, J.D. Mammosser, C.E. Reece, R.A. Rimmer,L. Lin, X.Y. Lu, K. Zhao

2011-09-01T23:59:59.000Z

137

Buffer layers on rolled nickel or copper as superconductor substrates  

SciTech Connect

Buffer layer architectures are epitaxially deposited on biaxially-textured rolled substrates of nickel and/or copper and their alloys for high current conductors, and more particularly buffer layer architectures such as Y.sub.2 O.sub.3 /Ni, YSZ/Y.sub.2 O.sub.3 /Ni, Yb.sub.2 O.sub.3 /Ni, Yb.sub.2 O.sub.3 /Y.sub.2 O.sub.3 /Ni, Yb.sub.2 O.sub.3 /CeO.sub.2 /Ni, RE.sub.2 O.sub.3 /Ni (RE=Rare Earth), and Yb.sub.2 O.sub.3 /YSZ/CeO.sub.2 /Ni, Y.sub.2 O.sub.3 /Cu, YSZ/Y.sub.2 O.sub.3 /Cu, Yb.sub.2 O.sub.3 /Cu, Yb.sub.2 O.sub.3 /Y.sub.2 O.sub.3 /Cu, Yb.sub.2 O.sub.3 /CeO.sub.2 /Cu, RE.sub.2 O.sub.3 /Cu, and Yb.sub.2 O.sub.3 /YSZ/CeO.sub.2 /Cu. Deposition methods include physical vapor deposition techniques which include electron-beam evaporation, rf magnetron sputtering, pulsed laser deposition, thermal evaporation, and solution precursor approach, which includes chemical vapor deposition, combustion CVD, metal-organic decomposition, sol-gel processing, and plasma spray.

Paranthaman, Mariappan (Knoxville, TN); Lee, Dominic F. (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); Goyal, Amit (Knoxville, TN)

2000-01-01T23:59:59.000Z

138

Wheeler County Riparian Buffers; 2004-2005 Annual Report.  

DOE Green Energy (OSTI)

Number of Contacts Made--Over 44 landowner contacts were made regarding CREP potential. Out of those 44 contacts, 15 resulted in on-site visits to the property to discuss available options. Articles were published in the Wheeler SWCD annual report and newsletter totaling a distribution of 1,200. Two informational displays were viewed by approximately 500 people: one at the Wheeler SWCD Annual Meeting and the second at the Wheeler County Fair. Number of Contracts Negotiated and Signed--3 CREP contracts in Wheeler County were signed within this contract period. They included landowners on Stephenson Creek, Bear Creek and Lost Valley Creek. The project done on Lost Valley Creek was handled by the Gilliam Co. Riparian Buffer Specialist filling in during the Wheeler position being vacated. Work was also started and is proceeding on another four contracts. Problems Encountered During Contract Year: (1) Riparian Buffer position vacated in October 2004 and District had difficulty filling the position. This set the district back in some of the delineated goals. Existing district staff is now up-to-speed on training, etc. and District is confident of achieving outlined goals. (2) Issues involving qualification of irrigated rates and how to process irrigated acres through CREP. (3) Issues involving clarification of eligibility as it relates to financial status of landowner; and (4) Landowner comfort in signing up for federal programs.

Greer, Sue (Wheeler County Soil and Water Conservation District, John Day, OR)

2006-01-01T23:59:59.000Z

139

Wheeler County Riparian Buffers; 2003-2004 Annual Report.  

DOE Green Energy (OSTI)

Number of Contacts Made--I have contacted 35 landowners in Wheeler County. Of the 35 contacts 12 have resulted in meeting on their property to discuss available options. Included an article in the Annual Report and Wheeler SWCD newsletter mailed to 550 landowners. Contacts are primarily through networking with others here in the office as well as working closely with the NRCS office. Number of Contracts Negotiated--This Project has produced five riparian buffers within the past contract year. Each has greater meaning to the landowner than simply a buffer. In most cases the buffer is providing the landowner with improved grazing management and/or more reliable water source for livestock. Landowners also feel the enhanced wildlife habitat is a bonus to the program. Other Accomplishments--I took part in the John Day Subbasin Planning process and was able to offer assistance into the inventory items related to Wheeler County. I was often the only local representative able to attend the meetings. I assisted the Wheeler SWCD in writing a successful OWEB grant to remove 110 acres of junipers for watershed restoration, range rehabilitation, and economic development. One partner in the project is a manufacturer that uses juniper as their primary construction material. The goal is to create a pilot project that may grow into a self sustaining industry within the county. I also assisted in writing a small grant to improve water usage in the Muddy Creek watershed. I assisted with the Pine Creek Conservation Area ''Twilight Tour'' as well as the Wheeler SWCD ''Annual Meeting and Dinner''. Both events were successful in getting information out about our riparian buffer program. Facilitate office training and utilization of advanced GIS technology and mapping. Problems Encountered During Contract Year--The NRCS Cultural Resources Review process has ground to a halt. It is takes 6 months to get initial results from the Portland offices. Nearly all requests require site surveys that delay the process even further. The Farm Services Agency is not user friendly when it comes to the CREP program. The program has not been designed to fit everyone along a steelhead stream. Crop/Field designations often negate or complicate CREP eligibility along qualifying streams. I spend a great deal of time mediating between FSA and the landowner. I have lost one interested landowner specifically to the fears related to the Oregon Department of State Lands ''Navigability'' study. Outlook for Contract Year 3--I am currently working on a project area that will encompass nearly six miles of steelhead habitat. It is located in the critical Bridge Creek watershed. Another is nearly three miles in the Mountain Creek Watershed. Both projects will take great steps in improving fish habitat. Both are on Steelhead streams. Further out I am working with two landowners for projects in the Butte Creek watershed that will be highly visible and will likely gain the attention of many more landowners. Like all previous projects, there is a great deal of work in future projects in massaging the landowner into feeling comfortable with the riparian buffer program. The potential to do great things with this program is huge in Wheeler County. Continuing outreach and education efforts will help the process.

Homer, Will (Wheeler County Soil and Water Conservation District, John Day, OR)

2006-01-01T23:59:59.000Z

140

Design and implementation of a supercomputer frame buffer system  

SciTech Connect

A 512 by 512 pixel by 8 bits per pixel frame buffer has been designed, constructed, and installed on a 48 Mbit/s I/O channel of a Cray X-MP 4/16 supercomputer. This project was undertaken to test whether such a system would be useful and, if so, how it would be used. Supporting software provides the ability to convert vector graphics description files into raster format, to show raster movies interactively, and to show vector files by real-time conversion from vector to raster formats. We have shown that real-time animations in an interactive supercomputer environment are feasible and useful with this system. 6 refs., 3 figs.

Fowler, J.D. Jr.; McGowen, M.

1988-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Pulsed extraction of ionization from helium buffer gas  

E-Print Network (OSTI)

The migration of intense ionization created in helium buffer gas under the influence of applied electric fields is considered. First the chemical evolution of the ionization created by fast heavy-ion beams is described. Straight forward estimates of the lifetimes for charge exchange indicate a clear suppression of charge exchange during ion migration in low pressure helium. Then self-consistent calculations of the migration of the ions in the electric field of a gas-filled cell at the National Superconducting Cyclotron Laboratory (NSCL) using a Particle-In-Cell computer code are presented. The results of the calculations are compared to measurements of the extracted ion current caused by beam pulses injected into the NSCL gas cell.

D. J. Morrissey; G. Bollen; M. Facina; S. Schwarz

2008-08-13T23:59:59.000Z

142

Superconducting composite with multilayer patterns and multiple buffer layers  

DOE Patents (OSTI)

An article of manufacture is described including a substrate, a patterned interlayer of a material selected from the group consisting of magnesium oxide, barium-titanium oxide or barium-zirconium oxide, the patterned interlayer material overcoated with a secondary interlayer material of yttria-stabilized zirconia or magnesium-aluminum oxide, upon the surface of the substrate whereby an intermediate article with an exposed surface of both the overcoated patterned interlayer and the substrate is formed, a coating of a buffer layer selected from the group consisting of cerium oxide, yttrium oxide, curium oxide, dysprosium oxide, erbium oxide, europium oxide, iron oxide, gadolinium oxide, holmium oxide, indium oxide, lanthanum oxide, manganese oxide, lutetium oxide, neodymium oxide, praseodymium oxide, plutonium oxide, samarium oxide, terbium oxide, thallium oxide, thulium oxide, yttrium oxide and ytterbium oxide over the entire exposed surface of the intermediate article, and, a ceramic superconductor. 5 figures.

Wu, X.D.; Muenchausen, R.E.

1993-10-12T23:59:59.000Z

143

Doped Y.sub.2O.sub.3 buffer layers for laminated conductors  

SciTech Connect

A laminated conductor includes a metallic substrate having a surface, a biaxially textured buffer layer supported by the surface of the metallic substrate, the biaxially textured buffer layer comprising Y.sub.2O.sub.3 and a dopant for blocking cation diffusion through the Y.sub.2O.sub.3, and a biaxially textured conductor layer supported by the biaxially textured buffer layer.

Paranthaman, Mariappan Parans (Knoxville, TN); Schoop, Urs (Westborough, MA); Goyal, Amit (Knoxville, TN); Thieme, Cornelis Leo Hans (Westborough, MA); Verebelyi, Darren T. (Oxford, MA); Rupich, Martin W. (Framingham, MA)

2007-08-21T23:59:59.000Z

144

Effect of buffer structures on AlGaN/GaN high electron mobility transistor reliability  

Science Conference Proceedings (OSTI)

AlGaN/GaN high electron mobility transistors (HEMTs) with three different types of buffer layers, including a GaN/AlGaN composite layer, or 1 or 2 lm GaN thick layers, were fabricated and their reliability compared. The HEMTs with the thick GaN buffer layer showed the lowest critical voltage (Vcri) during off-state drain step-stress, but this was increased by around 50% and 100% for devices with the composite AlGaN/GaN buffer layers or thinner GaN buffers, respectively. The Voff - state for HEMTs with thin GaN and composite buffers were 100 V, however, this degraded to 50 60V for devices with thick GaN buffers due to the difference in peak electric field near the gate edge. A similar trend was observed in the isolation breakdown voltage measurements, with the highest Viso achieved based on thin GaN or composite buffer designs (600 700 V), while a much smaller Viso of 200V was measured on HEMTs with the thick GaN buffer layers. These results demonstrate the strong influence of buffer structure and defect density on AlGaN/GaN HEMT performance and reliability.

Liu, L. [University of Florida, Gainesville; Xi, Y. Y. [University of Florida, Gainesville; Ren, F. [University of Florida; Pearton, S. J. [University of Florida; Laboutin, O. [Kopin Corporation, Taunton, MA; Cao, Yu [Kopin Corporation, Taunton, MA; Johnson, Wayne J. [Kopin Corporation, Taunton, MA; Kravchenko, Ivan I [ORNL

2012-01-01T23:59:59.000Z

145

Simulating the Effect of Reducing the Non-point Source Pollution by Buffer Zone with SWMM  

Science Conference Proceedings (OSTI)

Buffer was lately found efficient in reducing and storing non-point source pollution to improve the water quality of both surface runoff and drain outflows. While the importance of reducing the non-point source pollution is gaining recognition in contemporary ... Keywords: SWMM, buffer zone, ecological barriers, non-point source pollution

Li Bo, Shao Dong-guo, Song Min, Liu Yu-long

2013-01-01T23:59:59.000Z

146

Simultaneous driver sizing and buffer insertion using a delay penalty estimation technique  

Science Conference Proceedings (OSTI)

To achieve timing closure in a placed design, buffer insertion and driver sizing are two of the most effective transforms that can be applied. Since the driver sizing solution and the buffer insertion solution affect each other, sub-optimal solutions ...

Charles Alpert; Chris Chu; Gopal Gandham; Miloš Hrki?; Jiang Hu; Chandramouli Kashyap; Stephen Quay

2002-04-01T23:59:59.000Z

147

DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle  

Science Conference Proceedings (OSTI)

In this paper, we present a buffer management scheme called Dynamic Resource Allocation (DRA) that provides TCP traffic control guarantees to VCs carrying multiple dynamic discard thresholds (Multiple Dynamic Thresholds-MDT) over a wireless CDMA ATM ... Keywords: Buffer management, CDMA, Dynamic resource management, Large deviation principle, QoS, Wireless ATM

M. S. Obaidat; C. Ben Ahmed; N. Boudriga

2003-05-01T23:59:59.000Z

148

Properties and performance modelling of finite buffer M/G/1/K networks  

Science Conference Proceedings (OSTI)

Finite buffer, single-server queueing systems and networks are difficult to analyze since the length of time a customer spends in the system does not follow the Markovian property. A two-moment approximation schema is developed for the probability distribution ... Keywords: Finite buffers, Queueing networks

J. MacGregor Smith

2011-04-01T23:59:59.000Z

149

HitME: low power Hit MEmory buffer for embedded systems  

Science Conference Proceedings (OSTI)

In this paper, we present a novel HitME (Hit-MEmory) buffer to reduce the energy consumption of memory hierarchy in embedded processors. The HitME buffer is a small direct-mapped cache memory that is added as additional memory into existing cache memory ...

Andhi Janapsatya; Sri Parameswaran; Aleksandar Ignjatovi?

2009-01-01T23:59:59.000Z

150

Buffer-gas-assisted polarization spectroscopy of 6Li Nozomi Ohtsubo,* Takatoshi Aoki, and Yoshio Torii  

E-Print Network (OSTI)

gas on the polarization spec- trum, and find that the amplitude of the dispersion signal not resolved. Each dispersion signal displayed different behavior as we introduced an Ar buffer gas) with increasing the pressure of the Ar buffer gas. Note that the slope of the dispersion signal at the cooling

Torii, Yoshio

151

SOLARCAP: Super Capacitor Buffering of Solar Energy for Self-Sustainable Field Systems  

E-Print Network (OSTI)

SOLARCAP: Super Capacitor Buffering of Solar Energy for Self-Sustainable Field Systems Amal Fahad of the conventional battery-based energy storage, this paper argues that the super capacitor buffering of solar energy (e.g., solar cells) and energy storage. Conventional rechargeable battery-based energy storage has

Shen, Kai

152

Surface Science Prospectives Weakly bound buffer layers: A versatile template for metallic nano-clusters  

E-Print Network (OSTI)

Surface Science Prospectives Weakly bound buffer layers: A versatile template for metallic nano layers Metallic nano-crystals Film patterning Laser ablation a b s t r a c t Buffer layers composed controlled growth of nano-clusters and for patterning of thin metallic films. Metallic nano-crystals can

Asscher, Micha

153

Superconducting composite with multilayer patterns and multiple buffer layers  

DOE Patents (OSTI)

An article of manufacture including a substrate, a patterned interlayer of a material selected from the group consisting of magnesium oxide, barium-titanium oxide or barium-zirconium oxide, the patterned interlayer material overcoated with a secondary interlayer material of yttria-stabilized zirconia or magnesium-aluminum oxide, upon the surface of the substrate whereby an intermediate article with an exposed surface of both the overcoated patterned interlayer and the substrate is formed, a coating of a buffer layer selected from the group consisting of cerium oxide, yttrium oxide, curium oxide, dysprosium oxide, erbium oxide, europium oxide, iron oxide, gadolinium oxide, holmium oxide, indium oxide, lanthanum oxide, manganese oxide, lutetium oxide, neodymium oxide, praseodymium oxide, plutonium oxide, samarium oxide, terbium oxide, thallium oxide, thulium oxide, yttrium oxide and ytterbium oxide over the entire exposed surface of the intermediate article, and, a ceramic superco n FIELD OF THE INVENTION The present invention relates to the field of superconducting articles having two distinct regions of superconductive material with differing in-plane orientations whereby the conductivity across the boundary between the two regions can be tailored. This invention is the result of a contract with the Department of Energy (Contract No. W-7405-ENG-36).

Wu, Xin D. (Greenbelt, MD); Muenchausen, Ross E. (Espanola, NM)

1993-01-01T23:59:59.000Z

154

Method of deforming a biaxially textured buffer layer on a textured metallic substrate and articles therefrom  

DOE Patents (OSTI)

The present invention provides methods and biaxially textured articles having a deformed epitaxial layer formed therefrom for use with high temperature superconductors, photovoltaic, ferroelectric, or optical devices. A buffer layer is epitaxially deposited onto biaxially-textured substrates and then mechanically deformed. The deformation process minimizes or eliminates grooves, or other irregularities, formed on the buffer layer while maintaining the biaxial texture of the buffer layer. Advantageously, the biaxial texture of the buffer layer is not altered during subsequent heat treatments of the deformed buffer. The present invention provides mechanical densification procedures which can be incorporated into the processing of superconducting films through the powder deposit or precursor approaches without incurring unfavorable high-angle grain boundaries.

Lee, Dominic F. (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); Goyal, Amit (Knoxville, TN)

2000-01-01T23:59:59.000Z

155

Acid buffering a high pH soil for zinc diffusion  

SciTech Connect

The effective use of an aqueous buffer solution of acetic acid and sodium acetate (1.0 M HOAc/1.4 M NaOAc, pH = 4.8) to lower the pH of a sand-attapulgite clay mixture from 9.4 to 4.8 is demonstrated. Soil buffering is necessary to prevent precipitation of Zn{sup 2+} as Zn(OH){sub 2(s)} during zinc diffusion tests. The choice of the acetic acid/sodium acetate buffer solution is based on results of batch-type tests and permeation tests performed to evaluate the soil-mixture pH lowering and buffering capacity of dilute solutions of HNO{sub 3} (a strong acid), 0.057 M HOAc (a weak acid), potassium hydrogen phthalate (a pH {approximately} 4 buffer), and the 1.0 M HOAc/1.4 MNaOAc buffer solution. Measured values of effective diffusion coefficients D* for zinc on unconfined, compacted test specimens of the buffered soil mixture ranged from 0.54 {times} 10{sup {minus}6} cm{sup 2}/s to 6.5 {times} 10{sup {minus}6} cm{sup 2}/s. This range of D*-values is within the range of D*-values reported for most reactive inorganic solutes in saturated clay soils and at the lower end of the range of D*-values for zinc in saturated clay soils.

Shackelford, C.D.; Cotten, T.E.; Rohal, K.M.; Strauss, S.H. [Colorado State Univ., Fort Collins, CO (United States)

1997-03-01T23:59:59.000Z

156

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer...

157

DiscPOP: Power-aware buffer management for disk accesses  

Science Conference Proceedings (OSTI)

Much research has been conducted on energy efficient cache buffer management for disk based storage systems. Some of them use greedy prefetching technique to artificially increase disk idle intervals if there are a large number of known future requests. ... Keywords: greedy partition, DiscPOP, power-aware buffer management, disk accesses, disk based storage systems, greedy prefetching, I/O access pattern, application pattern, CPU-bound application, energy conservation, efficient prefetching scheme, disk power consumption, performance guarantee, disk reliability, disk characteristic based power-optimal prefetching, energy-efficient cache buffer management, disk I/O system, optimization problem, integer linear programming, divide-and-conquer based offline algorithm

Xiongzi Ge; Dan Feng; David H. C. Du

2011-07-01T23:59:59.000Z

158

MgO buffer layers on rolled nickel or copper as superconductor substrates  

SciTech Connect

Buffer layer architectures are epitaxially deposited on biaxially-textured rolled-Ni and/or Cu substrates for high current conductors, and more particularly buffer layer architectures such as MgO/Ag/Pt/Ni, MgO/Ag/Pd/Ni, MgO/Ag/Ni, MgO/Ag/Pd/Cu, MgO/Ag/Pt/Cu, and MgO/Ag/Cu. Techniques used to deposit these buffer layers include electron beam evaporation, thermal evaporation, rf magnetron sputtering, pulsed laser deposition, metal-organic chemical vapor deposition (MOCVD), combustion CVD, and spray pyrolysis.

Paranthaman, Mariappan (Knoxville, TN); Goyal, Amit (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); List, III, Frederic A. (Andersonville, TN)

2001-01-01T23:59:59.000Z

159

Method for making MgO buffer layers on rolled nickel or copper as superconductor substrates  

SciTech Connect

Buffer layer architectures are epitaxially deposited on biaxially-textured rolled-Ni and/or Cu substrates for high current conductors, and more particularly buffer layer architectures such as MgO/Ag/Pt/Ni, MgO/Ag/Pd/Ni, MgO/Ag/Ni, MgO/Ag/Pd/Cu, MgO/Ag/Pt/Cu, and MgO/Ag/Cu. Techniques used to deposit these buffer layers include electron beam evaporation, thermal evaporation, rf magnetron sputtering, pulsed laser deposition, metal-organic chemical vapor deposition (MOCVD), combustion CVD, and spray pyrolysis.

Paranthaman, Mariappan (Knoxville, TN); Goyal, Amit (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); List, III, Frederic A. (Andersonville, TN)

2002-01-01T23:59:59.000Z

160

Buffer-gas-induced absorption resonances in Rb vapor RID B-9041-2008  

E-Print Network (OSTI)

We observe transformation of the electromagnetically induced transparency (EIT) resonance into an absorption resonance in a Lambda interaction configuration in a cell filled with Rb-87 and a buffer gas. This transformation occurs as one-photon detuning of the coupling fields is varied from the atomic transition. No such absorption resonance is found in the absence of a buffer gas. The width of the absorption resonance is several times smaller than the width of the EIT resonance, and the changes of absorption near these resonances are about the same. Similar absorption resonances are detected in the Hanle configuration in a buffered cell.

Mikhailov, E. E.; Novikova, I.; Rostovtsev, Y. V.; Welch, George R.

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Evaluating the effectiveness of vegetated buffers to remove nutrients, pathogens, and sediment transported in runoff from grazed, irrigated pastures  

E-Print Network (OSTI)

in reducing the pollution from land application areas.pollution abatement in response to installing buffers on crop land.

Tate, Kenneth W; van Kessel, Chris; Atwill, Edward R.; Dahlgren, Randy A

2004-01-01T23:59:59.000Z

162

A Compact Charge-Based Propagation Delay Model for Submicronic CMOS Buffers  

Science Conference Proceedings (OSTI)

We provide an accurate analytical expression for the propagation delay and the output transition time of submicron CMOS buffers that takes into account the short-circuit current, the input-output coupling capacitance, and the carrier velocity saturation ...

José Luis Rossello; Jaume Segura

2002-09-01T23:59:59.000Z

163

Closed Form Solution to Simultaneous Buffer Insertion/Sizing and Wire Sizing  

E-Print Network (OSTI)

in the tapered buffer structure) that minimizes de- lay should be the constant e. Hedenstierna and Jeppson [1987. In Proceedings of the IEEE International Conference on Computer-Aided Design. HEDENSTIERNA, N., AND JEPPSON, K. O

Chu, Chris C.-N.

164

Gilliam County Riparian Buffers; 2002-2003 Annual Report.  

DOE Green Energy (OSTI)

There are only two problems that have been encountered during the contract year. The first problem has to do with eligibility. To be eligible for CREP you must own land adjacent to stream that has been delineated an anadromous fish stream. The problem is there are areas in Gilliam County that are designated anadromous fish streams that probably don't deserve that delineation and then there are streams that are not listed that probably do deserve that delineation. This has affected a few proposed projects. For instance, there is a project area on a stream that is delineated on the eligibility map, but the particular reach we are working with does not show up on the map. ODFW then receives an eligibility sheet from FSA or the SWCD technician. On this particular area it says steelhead distribution is downstream .5 miles. FSA won't consider this area eligible for CREP, thus the landowner must enroll in CCRP, which doesn't quite have the incentives as CREP. We are working to improve the maps. A meeting has been scheduled to discuss some particular areas and possibly re-draw the eligibility map. The other problem has to do with the amount of cost share for off-stream watering facilities. Many landowners who wish to install spring developments and other off-stream watering facilities run into a problem with cost-share limits within the CREP guidelines. When a landowner wants to enroll all of his/her stream and exclude livestock from the creek entirely they are having to pay some out of pocket expenses to get enough water to sufficiently support their livestock without using the creek. There has been one landowner who decided not to enroll because of this technicality. The problems encountered are problems that occur within the parameters of the program. These problems may or may not be changed. Otherwise, interest in the programs has been excellent and will only get better. The number of contracts that were estimated to be negotiated in the three-year term may be a bit excessive. In counties such as Gilliam, most tracts of land are large parcels. If multiple project areas occur in the same tract then you have one contract per tract. This reduces your total number in a lot of cases. In year 1 there were 6 contracts negotiated and approved in the CREP program. Prior to the contract there were a total of 9. The program started in 1998. The numbers will only increase in year 2. Year two should be a drastic improvement over year one. There has already been several projects proposed that may or may not be approved during year 2. There are 367.4 acres of land that has been proposed in either CREP or CCRP, which would include 30.94 miles of stream buffered on both sides.

Coiner, Josh (Gilliam Soil and Water Conservation District, Condon, OR)

2003-05-01T23:59:59.000Z

165

Poly(vinyl alcohol)-based buffering membranes for isoelectric trapping separations  

E-Print Network (OSTI)

Isoelectric trapping (IET) in multicompartment electrolyzers (MCE) has been widely used for the electrophoretic separation of ampholytic compounds such as proteins. In IET, the separation occurs in the buffering membranes that form a step-wise pH gradient in the MCE. Typically, buffering membranes have been made by copolymerizing acrylamide with Immobiline compounds, which are acidic and basic acylamido buffers. One major problem, however, is that these buffering membranes are not stable when exposed to high concentrations of acid and base due to hydrolysis of the amide bonds. Poly(vinyl alcohol)-based, or PVA-based, membranes were made as an alternative to the polyacrylamide-based membranes since they provide more hydrolytic and mechanical stability. Four mid-pH, PVA-based buffering membranes that contain single ampholytes were synthesized. These buffering membranes were used to trap small molecular weight pI markers for up to three hours, and were also used in desalting experiments to remove strong electrolytes from a solution of ampholytes. Additionally, the membranes were used in IET experiments to separate mixtures of pI markers, and to fractionate the major proteins in chicken egg white. The membranes did not show any degradation when stored in 3 M NaOH for up to 6 months and were shown to tolerate current densities as high as 16 mA/cm2. In addition, six series of PVA-based membranes, whose pH values can be tuned over the 3 < pH < 10 range, were synthesized by covalently binding aminodicarboxylic acids, and monoamines or diamines to the PVA matrix. These tunable buffering membranes were used in trapping experiments to trap ampholytes for up to three hours, and in desalting experiments to remove strong electrolytes from a solution of ampholytes. These tunable buffering membranes were also used in IET experiments to separate proteins, some with pI values that differ by only 0.1 pH unit. The tunable buffering membranes did not show any signs of degradation when exposed to 3 M NaOH for up to 3 months, and could be used in IET experiments with current densities as high as 20 mA/cm2. These tunable buffering membranes are expected to broaden the application areas of isoelectric trapping separations.

Craver, Helen C.

2007-05-01T23:59:59.000Z

166

Runtime Detection of Heapbased Overflows  

E-Print Network (OSTI)

protection Figure 5: HTTP client throughput. Package glibc glibc + heap prot. OSDB 6,015 6,070 (+ 0 of deploying our heap protection system uses packages that install a protected glibc image alongside with the privileges of the victim process. This paper presents a technique that protects the heap management

Kruegel, Christopher

167

Broadening of the spectral lines of a buffer gas and target substance in laser ablation  

SciTech Connect

The broadening of discrete spectral lines from the plasma produced in the laser ablation of metal targets in a broad pressure range (10{sup 2} - 10{sup 7} Pa) of the ambient gas (Ar, He, H{sub 2}) was studied experimentally. The behaviour of spectral line broadening for the buffer gases was found to be significantly different from that for the atoms and ions of the target material. In comparison with target atoms, the atoms of buffer gases radiate from denser plasma layers, and their spectral line profiles are complex in shape. (interaction of laser radiation with matter. laser plasma)

Kask, Nikolai E; Michurin, Sergei V [D.V. Skobel'tsyn Institute of Nuclear Physics, M.V. Lomonosov Moscow State University, Moscow (Russian Federation)

2012-11-30T23:59:59.000Z

168

Preparation of CIGS-based solar cells using a buffered electrodeposition bath  

DOE Patents (OSTI)

A photovoltaic cell exhibiting an overall conversion efficiency of at least 9.0% is prepared from a copper-indium-gallium-diselenide thin film. The thin film is prepared by simultaneously electroplating copper, indium, gallium, and selenium onto a substrate using a buffered electro-deposition bath. The electrodeposition is followed by adding indium to adjust the final stoichiometry of the thin film.

Bhattacharya, Raghu Nath (Littleton, CO)

2007-11-20T23:59:59.000Z

169

Thrifty BTB: A comprehensive solution for dynamic power reduction in branch target buffers  

Science Conference Proceedings (OSTI)

We propose Thrifty BTB, a mechanism to reduce the dynamic power dissipated by the BTB. We studied two mechanisms that reduce dynamic power dissipation. The first one is a serial-BTB configuration. The second mechanism is the filter-BTB, a combination ... Keywords: Branch prediction, Branch target buffer, Dynamic power, Microarchitecture

Roger Kahn; Shlomo Weiss

2008-11-01T23:59:59.000Z

170

Optimal wire sizing and buffer insertion for low power and a generalized delay model  

Science Conference Proceedings (OSTI)

We present efficient, optimal algorithms for timing optimization by discrete wire sizing and buffer insertion. Our algorithms are able to minimize dynamic power dissipation subject to given timing constraints. In addition, we compute the complete power-delay ... Keywords: Timing Optization, Elmore Delay, Dynamic Power Dissipation, Dynamic Programming, Signal Slew

John Lillis; Chung-Kuan Cheng; Ting-Ting Y. Lin

1995-12-01T23:59:59.000Z

171

Designing a Residential Hybrid Electrical Energy Storage System Based on the Energy Buffering Strategy  

E-Print Network (OSTI)

the electricity price is low and supply energy for usage when the electricity price is high [6], and thereby energy buffering. Figure 3 shows the structure of a typical grid-connected HEES system. Without loss the proposed energy management system is targeting residential usage, we must limit its overall form factor

Pedram, Massoud

172

An adaptive write buffer management scheme for flash-based SSDs  

Science Conference Proceedings (OSTI)

Solid State Drives (SSD's) have shown promise to be a candidate to replace traditional hard disk drives. The benefits of SSD's over HDD's include better durability, higher performance, and lower power consumption, but due to certain physical characteristics ... Keywords: NAND flash memory, SSD, flash-aware cache, write buffer

Guanying Wu; Xubin He; Ben Eckart

2012-02-01T23:59:59.000Z

173

Improving fairness among TCP flows by stateless buffer control with early drop maximum  

Science Conference Proceedings (OSTI)

Transmission control protocol (TCP) has been recognized as the most important transport-layer protocol for the Internet. It is distinguished by its reliable transmission, flow control, and congestion control. However, the issue of fair bandwidth-sharing ... Keywords: Long-lived flow, Max-min fairness, Short-lived flow, Stateless buffer management, TCP congestion control

Hsu-Sheng Tsai; Wei Kuang Lai

2008-10-01T23:59:59.000Z

174

Buffering Effect and Its Related Ocean Dynamics in the Indonesian Throughflow Region  

Science Conference Proceedings (OSTI)

Analysis of results from a high-resolution general circulation model confirms the existence of a “buffering” effect in the Indo-Australian Basin in which the upper ocean receives an excess of water from February to June and releases it during the ...

Tangdong Qu; Yan Du; Julian P. McCreary Jr.; Gary Meyers; Toshio Yamagata

2008-02-01T23:59:59.000Z

175

Ge integration on Si via rare earth oxide buffers: From MBE to CVD (Invited Paper)  

Science Conference Proceedings (OSTI)

Single crystalline rare earth oxide heterostructures are flexible buffer systems to achieve the monolithic integration of Ge thin film structures on Si. The development of engineered oxide systems suitable for mass-production compatible CVD processes ... Keywords: Engineered Si wafers, Ge integration, Heteroepitaxy, Rare earth oxides, X-ray diffraction

T. Schroeder; A. Giussani; H. -J. Muessig; G. Weidner; I. Costina; Ch. Wenger; M. Lukosius; P. Storck; P. Zaumseil

2009-07-01T23:59:59.000Z

176

BOFAR: buffer occupancy factor based adaptive router for mesh NoCs  

Science Conference Proceedings (OSTI)

If the route computation operation in an adaptive router returns more than one output channels, the selection strategy chooses one from them based on the congestion metric used. The effectiveness of a selection strategy depends on what metric is used ... Keywords: adaptive routers, buffer occupancy, network-on-chip

John Jose; J. Shiva Shankar; K. V. Mahathi; Damarla Kranthi Kumar; Madhu Mutyam

2011-12-01T23:59:59.000Z

177

SEPARATION OF PROTEINS BY ION EXCHANGE AND MEMBRANE CHROMATOGRAPHY: BUFFER COMPOSITION, INTERFERING IMPURITIES AND FOULING CONSIDERATIONS  

E-Print Network (OSTI)

Efficient separation of target protein from impurities is crucial in bioseparation for large scale production and purity of the target protein. Two separation process approaches were considered in this study. The first approach focused on identifying major impurity and optimization of solution properties for target protein purification. The second approach consisted of designing an adsorbent that interacted specifically with the target molecule. The first study included modification of protein solution properties (pH, ionic strength, buffer ions) in order to maximize lysozyme purification by a strong cation exchange resin. The interaction of phytic acid, a major impurity, present in transgenic rice extracts, that contributes to decreased lysozyme adsorption capacity on SP Sepharose was evaluated. The target protein was lysozyme, which is used in a purified form as a baby formula additive to reduce gastrointestinal tract infections. At constant ionic strength, lysozyme in pH 4.5 acetate buffer had a higher binding capacity and stronger binding strength than at pH 6.0. Lysozyme in sodium phosphate buffer of pH 6.0 exhibited lower adsorption capacity than in pH 6 Tris buffer. Binding capacity and strength were significantly affected by phytic acid in all studies buffers. The second study consisted of surface modification of microfiltration membranes for protein purification and separation and reduces fouling. This study describes adsorption and fouling of chemically modified microfiltration membranes with bovine serum albumin (BSA) and immunoglobulin G (IgG). Least fouling resulted with polyethylene glycol (PEG) membranes when BSA protein was used. Amine-functionalized membranes showed specific interaction with BSA. There was multi-layer deposition of IgG on amine-functionalized membrane. G3 membrane synthesized to selectively bind IgG seemed a noble option to separate IgG from a protein mixture.

Imam, Tahmina

2009-05-01T23:59:59.000Z

178

Movement and Injury Rates for Three Life Stages of Spring Chinook Salmon Oncorhynchus Tshawytscha : A Comparison of Submerged Orifices and an Overflow Weir for Fish Bypass in a Modular Rotary Drum Fish Screen : Annual Report 1995.  

DOE Green Energy (OSTI)

The Pacific Northwest National Laboratory (PNNL) evaluated the effectiveness of 6-in. and 2-in. submerged orifices, and an overflow weir for fish bypass at a rotary drum fish screening facility. A modular drum screen built by the Washington Department of Fish and Wildlife (WDFW) was installed at PNNL`s Aquatic Ecology research laboratory in Richland, Washington. Fry, subyearlings, and smolts of spring chinook salmon (Oncorhynchus tshawyacha) were introduced into the test system, and their movement and injury rates were monitored. A total of 33 tests (100 fish per test) that lasted from 24 to 48 hr were completed from 1994 through 1995. Passage rate depended on both fish size and bypass configuration. For fry/fingerling spring chinook salmon, there was no difference in passage rate through the three bypass configurations (2-in. orifice, 6-in. orifice, or overflow weir). Subyearlings moved sooner when the 6-in. orifice was used, with more than 50% exiting through the fish bypass in the first 8 hr. Smolts exited quickly and preferred the 6-in. orifice, with over 90% of the smolts exiting through the bypass in less than 2 hr. Passage was slightly slower when a weir was used, with 90% of the smolts exiting in about 4 hr. When the 2-in. orifice was used in the bypass, 90% of the smolts did not exit until after 8 hr. In addition, about 7% of the smolts failed to migrate from the forebay within 24 hr, indicating that smolts were significantly delayed when the 2-in. orifice was used. Few significant injuries were detected for any of the life stages. However, light descaling occurred on about 15% of chinook salmon smolts passing through the 2-in. orifice. Although a single passage through the orifice did not appear to cause significant scale loss or other damage, passing through several screening facilities with 2-in. orifices could cause cumulative injuries.

Abernethy, C. Scott; Neitzel, Duane A.; Mavros, William V.

1996-03-01T23:59:59.000Z

179

Improving the performance of the organic thin-film transistors with thin insulating lithium fluoride buffer layer  

Science Conference Proceedings (OSTI)

The pentacene-based organic thin-film transistors (OTFTs) with a thin insulating lithium fluoride (LiF) buffer layer between the pentacene and source/drain electrodes were fabricated. Compared with conventional OTFTs, the introduction of the buffer layer ... Keywords: OTFT, Organic thin-film transistor, Pentacene

Wei Hu; Yi Zhao; Jingying Hou; Chunsheng Ma; Shiyong Liu

2007-04-01T23:59:59.000Z

180

Short communication: Design tool for estimation of buffer requirement for enhanced reductive dechlorination of chlorinated solvents in groundwater  

Science Conference Proceedings (OSTI)

To assist in the design of enhanced reductive dechlorination systems for in situ remediation of chlorinated solvent source zones, the software BUCHLORAC (BUffering of deCHLORination ACidity) was developed to predict the amount of buffer required to maintain ... Keywords: Alkalinity, BUCHLORAC, Bicarbonate, Contaminated aquifer, DNAPL, Dechlorination, Dehalogenation, PCE, PHREEQC, Remediation, TCE

Clare Robinson; D. A. Barry

2009-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Evaluation of the Effective Moisture Penetration Depth Model for Estimating Moisture Buffering in Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

Evaluation of the Effective Evaluation of the Effective Moisture Penetration Depth Model for Estimating Moisture Buffering in Buildings J. Woods, J. Winkler, and D. Christensen National Renewable Energy Laboratory Technical Report NREL/TP-5500-57441 January 2013 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency & Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. National Renewable Energy Laboratory 15013 Denver West Parkway Golden, Colorado 80401 303-275-3000 * www.nrel.gov Contract No. DE-AC36-08GO28308 Moisture Penetration Depth Model for Estimating Moisture Buffering in Buildings J. Woods, J. Winkler, and D. Christensen National Renewable Energy Laboratory Prepared under Task No. BE12.0201

182

Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding  

Science Conference Proceedings (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

2010-12-16T23:59:59.000Z

183

CdS/CdTe Thin-Film Solar Cell with a Zinc Stannate Buffer Layer  

DOE Green Energy (OSTI)

This paper describes an improved CdS/CdTe polycrystalline thin-film solar-cell device structure that integrates a zinc stannate (Zn2SnO4 or ZTO) buffer layer between the transparent conductive oxide (TCO) layer and the CdS window layer. Zinc stannate films have a high bandgap, high transmittance, low absorptance, and low surface roughness. In addition, these films are chemically stable and exhibit higher resistivities that are roughly matched to that of the CdS window layer in the device structure. Preliminary device results have demonstrated that by integrating a ZTO buffer layer in both SnO2-based and Cd2SnO4 (CTO)-based CdS/CdTe devices, performance and reproducibility can be significantly enhanced

Wu, X.; Sheldon, P.; Mahathongdy, Y.; Ribelin, R.; Mason, A.; Moutinho, H. R.; Coutts, T. J.

1998-10-28T23:59:59.000Z

184

An ultra-thin buffer layer for Ge epitaxial layers on Si  

SciTech Connect

Using an Fe{sub 3}Si insertion layer, we study epitaxial growth of Ge layers on a Si substrate by a low-temperature molecular beam epitaxy technique. When we insert only a 10-nm-thick Fe{sub 3}Si layer in between Si and Ge, epitaxial Ge layers can be obtained on Si. The detailed structural characterizations reveal that a large lattice mismatch of {approx}4% is completely relaxed in the Fe{sub 3}Si layer. This means that the Fe{sub 3}Si layers can become ultra-thin buffer layers for Ge on Si. This method will give a way to realize a universal buffer layer for Ge, GaAs, and related devices on a Si platform.

Kawano, M.; Yamada, S.; Tanikawa, K.; Miyao, M.; Hamaya, K. [Department of Electronics, Kyushu University, 744 Motooka, Fukuoka 819-0395 (Japan)] [Department of Electronics, Kyushu University, 744 Motooka, Fukuoka 819-0395 (Japan); Sawano, K. [Advanced Research Laboratories, Tokyo City University, 8-15-1 Todoroki, Tokyo 158-0082 (Japan)] [Advanced Research Laboratories, Tokyo City University, 8-15-1 Todoroki, Tokyo 158-0082 (Japan)

2013-03-25T23:59:59.000Z

185

ZnS/Zn(O,OH)S-based buffer layer deposition for solar cells  

DOE Patents (OSTI)

The invention provides CBD ZnS/Zn(O,OH)S and spray deposited ZnS/Zn(O,OH)S buffer layers prepared from a solution of zinc salt, thiourea and ammonium hydroxide dissolved in a non-aqueous/aqueous solvent mixture or in 100% non-aqueous solvent. Non-aqueous solvents useful in the invention include methanol, isopropanol and triethyl-amine. One-step deposition procedures are described for CIS, CIGS and other solar cell devices.

Bhattacharya, Raghu N. (Littleton, CO)

2009-11-03T23:59:59.000Z

186

Photovoltaic devices comprising zinc stannate buffer layer and method for making  

DOE Patents (OSTI)

A photovoltaic device has a buffer layer zinc stannate Zn.sub.2 SnO.sub.4 disposed between the semiconductor junction structure and the transparent conducting oxide (TCO) layer to prevent formation of localized junctions with the TCO through a thin window semiconductor layer, to prevent shunting through etched grain boundaries of semiconductors, and to relieve stresses and improve adhesion between these layers.

Wu, Xuanzhi (Golden, CO); Sheldon, Peter (Lakewood, CO); Coutts, Timothy J. (Lakewood, CO)

2001-01-01T23:59:59.000Z

187

High speed, very large (8 megabyte) first in/first out buffer memory (FIFO)  

DOE Patents (OSTI)

A fast FIFO (First In First Out) memory buffer capable of storing data at rates of 100 megabytes per second. The invention includes a data packer which concatenates small bit data words into large bit data words, a memory array having individual data storage addresses adapted to store the large bit data words, a data unpacker into which large bit data words from the array can be read and reconstructed into small bit data words, and a controller to control and keep track of the individual data storage addresses in the memory array into which data from the packer is being written and data to the unpacker is being read.

Baumbaugh, Alan E. (Batavia, IL); Knickerbocker, Kelly L. (Aurora, IL)

1989-01-01T23:59:59.000Z

188

Buffer layers on metal surfaces having biaxial texture as superconductor substrates  

SciTech Connect

Buffer layer architectures are epitaxially deposited on biaxially-textured rolled substrates of nickel and/or copper and their alloys for high current conductors, and more particularly buffer layer architectures such as Y.sub.2 O.sub.3 /Ni, YSZ/Y.sub.2 O.sub.3 /Ni, RE.sub.2 O.sub.3 /Ni, (RE=Rare Earth), RE.sub.2 O.sub.3 /Y.sub.2 O.sub.3 /Ni, RE.sub.2 O.sub.3 /CeO.sub.2 /Ni, and RE.sub.2 O.sub.3 /YSZ/CeO.sub.2 /Ni, Y.sub.2 O.sub.3 /Cu, YSZ/Y.sub.2 O.sub.3 /Cu, RE.sub.2 O.sub.3 /Cu, RE.sub.2 O.sub.3 /Y.sub.2 O.sub.3 /Cu, RE.sub.2 O.sub.3 /CeO.sub.2 /Cu, and RE.sub.2 O.sub.3 /YSZ/CeO.sub.2 /Cu. Deposition methods include physical vapor deposition techniques which include electron-beam evaporation, rf magnetron sputtering, pulsed laser deposition, thermal evaporation, and solution precursor approaches, which include chemical vapor deposition, combustion CVD, metal-organic decomposition, sol-gel processing, and plasma spray.

Paranthaman, Mariappan (Knoxville, TN); Lee, Dominic F. (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); Goyal, Amit (Knoxville, TN)

2000-01-01T23:59:59.000Z

189

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

buffer overflow. http:energy.govcioarticlesu-152-openssl-asn1d2ireadbio-der-format-data-processing-vulnerability Page EA-1886: Big Sky Regional Carbon Sequestration...

190

Next generation input-output data format for HEP using Google's protocol buffers  

E-Print Network (OSTI)

We propose a data format for Monte Carlo (MC) events, or any structural data, including experimental data, in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the so-called ProMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in ProMC files can be written, read and manipulated in a number of programming languages, such C++, Java and Python.

S. V. Chekanov

2013-06-27T23:59:59.000Z

191

AlGaAsSb buffer/barrier on GaAs substrate for InAs channel devices with high electron mobility and practical reliability  

Science Conference Proceedings (OSTI)

Keywords: AlGaAsSb, Hall elements, InAs, Sb, buffer/barriers, deep quantum well, field effect transistors, reliability

S. Miya; S. Muramatsu; N. Kuze; K. Nagase; T. Iwabuchi; A. Ichii; M. Ozaki; I. Shibasaki

1996-03-01T23:59:59.000Z

192

Schedule and Cost Buffer Sizing How to account for the bias between project performance and your model.  

E-Print Network (OSTI)

Schedule and Cost Buffer Sizing How to account for the bias between project performance and your model. Bias in project performance causes schedule and cost to over-run baseline estimates (your model). Bias is the one-sided tendency of actual schedule or cost to over-run the model. The PMBOK Guide ™ and supporting literature recommend estimating the variability for all project time and cost estimates, and sizing appropriate schedule or cost buffers (also known as contingency or management reserve) using Monte-Carlo analysis or PERT. Critical Chain Project Management (CCPM) uses a similar approach to size buffers (the Square Root of the Sum of the Squares, or SSQ method). These techniques pool the variance from individual task estimates. Statistical pooling of variance does not account for sources of bias 1 in the estimates; i.e., systematic reasons that the estimates may be high or low. This paper describes a number of sources of bias in performance of projects to schedule and cost estimates, and provides recommendations to size buffers that ensure your projects come in under your baseline schedule and budget.

Chain Ccpm; Larry Leach

2002-01-01T23:59:59.000Z

193

Enhanced fatigue and aging resistance using reactive powders in the optical fiber buffer coating V. V. Rondinella  

E-Print Network (OSTI)

Enhanced fatigue and aging resistance using reactive powders in the optical fiber buffer coating V causes a dramatic improvement in the fatigue and aging resistance both in aqueous and in constant for the surface roughening that causes the fatigue knee and strength degradation during zero-stress aging

Matthewson, M. John

194

Effects of low-temperature buffer-layer thickness and growth temperature on the SEE sensitivity of GaAs HIGFET circuits  

Science Conference Proceedings (OSTI)

Heavy-ion Single Event Effects (SEE) test results reveal the role of growth temperature and buffer layer thickness in the use of a low-temperature grown GaAs (LT GaAs) buffer layer for suppressing SEE sensitivity in GaAs HIGFET circuits.

Weatherford, T.R.; Fouts, D.J. [Naval Postgraduate School, Monterey, CA (United States); Marshall, P.W. [Naval Research Lab., Washington, DC (United States)]|[SFA, Inc., Largo, MD (United States); Marshall, C.J. [Naval Research Lab., Washington, DC (United States); Mathes, B.; LaMacchia, M. [Motorola Government Systems, Scottsdale, AZ (United States)

1997-12-01T23:59:59.000Z

195

Expanded rock blast modeling capabilities of DMC{_}BLAST, including buffer blasting  

SciTech Connect

A discrete element computer program named DMC{_}BLAST (Distinct Motion Code) has been under development since 1987 for modeling rock blasting. This program employs explicit time integration and uses spherical or cylindrical elements that are represented as circles in 2-D. DMC{_}BLAST calculations compare favorably with data from actual bench blasts. The blast modeling capabilities of DMC{_}BLAST have been expanded to include independently dipping geologic layers, top surface, bottom surface and pit floor. The pit can also now be defined using coordinates based on the toe of the bench. A method for modeling decked explosives has been developed which allows accurate treatment of the inert materials (stemming) in the explosive column and approximate treatment of different explosives in the same blasthole. A DMC{_}BLAST user can specify decking through a specific geologic layer with either inert material or a different explosive. Another new feature of DMC{_}BLAST is specification of an uplift angle which is the angle between the normal to the blasthole and a vector defining the direction of explosive loading on particles adjacent to the blasthole. A buffer (choke) blast capability has been added for situations where previously blasted material is adjacent to the free face of the bench preventing any significant lateral motion during the blast.

Preece, D.S. [Sandia National Labs., Albuquerque, NM (United States); Tidman, J.P.; Chung, S.H. [ICI Explosives (Canada)

1996-12-31T23:59:59.000Z

196

CAST search for sub-eV mass solar axions with 3He buffer gas  

E-Print Network (OSTI)

The CERN Axion Solar Telescope (CAST) has extended its search for solar axions by using 3He as a buffer gas. At T=1.8 K this allows for larger pressure settings and hence sensitivity to higher axion masses than our previous measurements with 4He. With about 1 h of data taking at each of 252 different pressure settings we have scanned the axion mass range 0.39 eV < m_a < 0.64 eV. From the absence of excess X-rays when the magnet was pointing to the Sun we set a typical upper limit on the axion-photon coupling of g_ag < 2.3 x 10^{-10} GeV^{-1} at 95% CL, the exact value depending on the pressure setting. KSVZ axions are excluded at the upper end of our mass range, the first time ever for any solar axion search. In future we will extend our search to m_a < 1.15 eV, comfortably overlapping with cosmological hot dark matter bounds.

M. Arik; S. Aune; K. Barth; A. Belov; S. Borghi; H. Bräuninger; G. Cantatore; J. M. Carmona; S. A. Cetin; J. I. Collar; T. Dafni; M. Davenport; C. Eleftheriadis; N. Elias; C. Ezer; G. Fanourakis; E. Ferrer-Ribas; P. Friedrich; J. Galán; J. A. García; A. Gardikiotis; E. N. Gazis; T. Geralis; I. Giomataris; S. Gninenko; H. Gómez; E. Gruber; T. Guthörl; R. Hartmann; F. Haug; M. D. Hasinoff; D. H. H. Hoffmann; F. J. Iguaz; I. G. Irastorza; J. Jacoby; K. Jakov?i?; M. Karuza; K. Königsmann; R. Kotthaus; M. Kr?mar; M. Kuster; B. Laki?; J. M. Laurent; A. Liolios; A. Ljubi?i?; V. Lozza; G. Lutz; G. Luzón; J. Morales; T. Niinikoski; A. Nordt; T. Papaevangelou; M. J. Pivovaroff; G. Raffelt; T. Rashba; H. Riege; A. Rodríguez; M. Rosu; J. Ruz; I. Savvidis; P. S. Silva; S. K. Solanki; L. Stewart; A. Tomás; M. Tsagri; K. van Bibber; T. Vafeiadis; J. Villar; J. K. Vogel; S. C. Yildiz; K. Zioutas

2011-06-20T23:59:59.000Z

197

Augmenting Counterexample-Guided Abstraction Refinement with Proof Templates  

Science Conference Proceedings (OSTI)

Existing software model checkers based on predicate abstraction and refinement typically perform poorly at verifying the absence of buffer overflows, with analyses depending on the sizes of the arrays checked. We observe that many of these analyses can ... Keywords: safety verification, counterexample-guided abstraction refinement, proof templates, software model checkers, predicate abstraction, buffer overflows verification, array traversal idioms, PtYasm, Verisec suite

T. E. Hart; K. Ku; A. Gurfinkel; M. Chechik; D. Lie

2008-09-01T23:59:59.000Z

198

--No Title--  

NLE Websites -- All DOE Office Websites (Extended Search)

Confinement Ventilation Systems) with the following titles: 1) BC Off-Gas Exhaust Standby Fan Autostart, 2) E-Wing Supply and Exhaust Interlocks, 3) BC Tertiary Exhaust...

199

--No Title--  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ventilation Systems) with the following titles: 1) BC Off-Gas Exhaust Standby Fan Autostart, 2) E-Wing Supply and Exhaust Interlocks, 3) BC Tertiary Exhaust Interlocks...

200

Transmission Electron Microscope Study on Electrodeposited Gd2O3 and Gd2Zr2O7 Buffer Layers forYBa2Cu307-..delta.. Superconductors  

SciTech Connect

We have investigated the microstructures of electrodeposited Gd{sub 2}O{sub 3} (GO) and Gd{sub 2}Zr{sub 2}O{sub 7} (GZO) buffer layers for YBa{sub 2}Cu{sub 3}O{sub 7-{delta}} (YBCO) superconductors with conventional transmission electron microscopy (TEM). A high density of nanoscale voids was present in the GZO buffer layers. No voids were observed in GO buffer layers grown on GZO. YBCO superconductor grown on the GO/GZO buffer layer structure produced a critical current density (J{sub c}) of 3.3 x 10{sup 6} A/cm{sup 2} at 77 K in zero field.

Zhao, W.; Norman, A.; Phok, S.; Bhattacharya, R.

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

High quality metamorphic graded buffers with lattice-constants intermediate to GaAs an InP for device applications  

E-Print Network (OSTI)

We have investigated the use of a continuous, linear grading scheme for compositionally-graded metamorphic InxGal-As buffers on GaAs, which can be used as virtual substrates for optical emitters operating at wavelengths > ...

Lee, Kenneth Eng Kian

2009-01-01T23:59:59.000Z

202

An Assessment of Ore Waste and Dilution Resulting From Buffer/Choke Blasting in Surface Gold Mines  

SciTech Connect

A discrete element computer program named DMC{underscore}BLAST (Distinct Motion Code) has been under development since 1987 for modeling rock blasting (Preece {ampersand} Taylor, 1989). This program employs explicit time integration and uses spherical or cylindrical elements that are represented as circles in two dimensions (2-D). DMC{underscore}BLAST calculations compare favorably with data from actual bench blasts (Preece et al, 1993). Buffer Choke blasting is commonly used in surface gold mines to break the rock and dilate it sufficiently for ease of digging, with the assumption of insignificant horizontal movement. The blast designs usually call for relatively shallow holes benches ({lt} 11 m) with small blastholes (approx. 165 mm), small burdens and spacings ({lt}5 m), often with 50% or more of the hole stemmed. Control of blast-induced horizontal movement is desired because the ore is assayed in place from the blasthole drill cuttings and digging polygons of ore and waste are laid out before the blast. Horizontal movement at the ore waste boundary can result in dilution of the ore or loss of ore with the waste. The discrete element computer program DMC{underscore}BLAST has been employed to study spatial variation of horizontal rock motion during buffer choke blasting. Patterns of rock motion can be recognized from the discrete element simulations that would be difficult or impossible to recognize in the field (Preece, Tidman and Chung, 1997). Techniques have been developed to calculate ore waste and dilution from the horizontal movement predicted by DMC{underscore}BLAST. Four DMC{underscore}BLAST simulations of buffer blasting have been performed. The blasts are identical except that the burden and spacing are systematically varied which also changes the powder factor. Predictions of ore waste or dilution are made for each burden in the blast, assuming no horizontal movement, to illustrate the spatial variation observed.

Preece, D.S. [Sandia National Labs., Albuquerque, NM (United States); Chung, S.H.; Tidman, J.P. [ICI Explosives (Canada)

1997-12-31T23:59:59.000Z

203

Kinetics and Mechanism of Hydroxyapatite Crystal Dissolution inWeak Acid Buffers Using the Rotating Disk Method  

E-Print Network (OSTI)

The dissolution rates of synthetic hydroxyapatite pellets under sink conditions were measured using the rotating disk method. The experimental data were analyzed by means of a physical model that yielded an ionic activity product of KHAP=aOCa2+ a6 PO43- a2011. = 1 X 10-124.5+1.0 that was found to govern the dissolution reaction. Also, a surface resistance factor of k ' equal to about 174 sec/cm was deduced from the data. A physical model for describing the dissolution rate behavior of human dental enamel and of hydroxyapatite in weak acid buffers under sink conditions was introduced by Higuchi and his collaborators.1-3 The model assumed that a hydroxyapatite phase governs the driving force of the dissolution and that the dissolution was essentially diffusion controlled in a diffusion layer adjacent to the enamel surface. The mathematical development also included the consideration of simultaneous diffusion and equilibriums of all species in the system. This early model enjoyed notable success.1-3 It was able to generally account for the effects of buffer types (pKa), buffer concentration, pH, and common ions (calcium and phosphate). Furthermore, an extension of this model showed that the influence of solution fluoride on the dissolution rate may be explained by assuming that a surface exchange of OH- by F- occurs rapidly during dissolution.4 For several reasons, it has been apparent that a more critical study of this model would be necessary. First, the value of KHAP This investigation was supported by USPHS Service

Maw-sheng Wu; William Higuchi; Jeffrey L. Fox; Michael Friedman

1975-01-01T23:59:59.000Z

204

Heavy ion SEU immunity of a GaAs complementary HIGFET circuit fabricated on a low temperature grown buffer layer  

SciTech Connect

The authors compare dynamic SEU characteristics of GaAs complementary HIGFET devices fabricated on conventional semi-insulating substrates versus low temperature grown GaAs (LT GaAs) buffer layers. Heavy ion test results on shift register and flip-flop devices from the same process lot demonstrate that the LT GaAs layer provides immunity from upsets, even at an LET value of 90 MeV {center_dot} cm{sup 2}/mg. This result is also consistent with pulsed laser measurements performed on the same flip-flop circuits used in the ion test.

Marshall, P.W.; Weatherford, T.; Carts, M. [Naval Research Lab., Washington, DC (United States)]|[SFA, Inc., Landover, MD (United States); Dale, C.J.; McMorrow, D. [Naval Research Lab., Washington, DC (United States); Peczalski, A.; Baier, S.; Nohava, J.; Skogen, J. [Honeywell Systems and Research Center, Bloomington, MN (United States)

1995-12-01T23:59:59.000Z

205

Development of Production PVD-AIN Buffer Layer System and Processes to Reduce Epitaxy Costs and Increase LED Efficiency  

SciTech Connect

The DOE has set aggressive goals for solid state lighting (SSL) adoption, which require manufacturing and quality improvements for virtually all process steps leading to an LED luminaire product. The goals pertinent to this proposed project are to reduce the cost and improve the quality of the epitaxial growth processes used to build LED structures. The objectives outlined in this proposal focus on achieving cost reduction and performance improvements over state-of-the-art, using technologies that are low in cost and amenable to high efficiency manufacturing. The objectives of the outlined proposal focus on cost reductions in epitaxial growth by reducing epitaxy layer thickness and hetero-epitaxial strain, and by enabling the use of larger, less expensive silicon substrates and would be accomplished through the introduction of a high productivity reactive sputtering system and an effective sputtered aluminum-nitride (AlN) buffer/nucleation layer process. Success of the proposed project could enable efficient adoption of GaN on-silicon (GaN/Si) epitaxial technology on 150mm silicon substrates. The reduction in epitaxy cost per cm{sup 2} using 150mm GaN-on-Si technology derives from (1) a reduction in cost of ownership and increase in throughput for the buffer deposition process via the elimination of MOCVD buffer layers and other throughput and CoO enhancements, (2) improvement in brightness through reductions in defect density, (3) reduction in substrate cost through the replacement of sapphire with silicon, and (4) reduction in non-ESD yield loss through reductions in wafer bow and temperature variation. The adoption of 150mm GaN/Si processing will also facilitate significant cost reductions in subsequent wafer fabrication manufacturing costs. There were three phases to this project. These three phases overlap in order to aggressively facilitate a commercially available production GaN/Si capability. In Phase I of the project, the repeatability of the performance was analyzed and improvements implemented to the Veeco PVD-AlN prototype system to establish a specification and baseline PVD-AlN films on sapphire and in parallel the evaluation of PVD AlN on silicon substrates began. In Phase II of the project a Beta tool based on a scaled-up process module capable of depositing uniform films on batches of 4”or 6” diameter substrates in a production worthy operation was developed and qualified. In Phase III, the means to increase the throughput of the PVD-AlN system was evaluated and focused primarily on minimizing the impact of the substrate heating and cooling times that dominated the overall cycle time.

Cerio, Frank

2013-09-14T23:59:59.000Z

206

Molecular beam epitaxy growth of PbSe on Si (211) using a ZnTe buffer layer  

Science Conference Proceedings (OSTI)

The authors report the results of successful growth of single crystalline PbSe on Si (211) substrates with ZnTe as a buffer layer by molecular beam epitaxy. Single crystalline PbSe with (511) orientation was achieved on ZnTe/Si (211), as evidenced by RHEED patterns indicative of 2 dimensional (2D) growth, x ray diffraction rocking curves with a full width at half maximum as low as 153 arc sec and mobility as large as 1.1x10{sup 4}cm{sup 2}V{sup -1}s{sup -1} at 77 K. Cross hatch patterns were found on the PbSe(511) surface in Nomarski filtered microscope images suggesting the presence of a surface thermal strain relaxation mechanism, which was confirmed by Fourier transformed high resolution transmission electron microscope images.

Wang, X. J.; Chang, Y.; Hou, Y. B.; Becker, C. R.; Kodama, R.; Aqariden, F.; Sivananthan, S. [Microphysics Laboratory, Physics Department, University of Illinois at Chicago, Illinois 60607 (United States); Microphysics Laboratory, Physics Department, University of Illinois at Chicago, Illinois 60607 and Physics Department and Quantum Functional Semiconductor Research Center, Dongguk University 3-26, Seoul 100-715 (Korea, Republic of); Microphysics Laboratory, Physics Department, University of Illinois at Chicago, Illinois 60607 (United States); EPIR Technologies, Bolingbrook, Illinois 60440 (United States); Microphysics Laboratory, Physics Department, University of Illinois at Chicago, Illinois 60607 and EPIR Technologies, Bolingbrook, Illinois 60440 (United States)

2011-09-15T23:59:59.000Z

207

Demonstration of High Current Density YBCO Coated Conductors on RE2O3-Buffered Ni Substrates with Two New Alternative Architectures  

Science Conference Proceedings (OSTI)

In continuation of our effort to develop single buffer layer architectures for YBCO (YBa2Cu3O7-g) coated tape conductors, we have studied RE2O3 (RE = Y, and rare earths) as candidate materials. Three types of crystal structures including the preferred cubic phase are known for the rare earth oxides. High quality simple cubic RE2O3 buffer layers were grown epitaxiahy on {100} textured Ni substrates using both reactive evaporation and sol-gel processing. Detailed X-ray studies have shown that the Y2O3, Eu2O3, Gd2O3, and Yb2O3 were grown with a single epitaxial orientation. SEM micrographs indicated that both e-beam and sol-gel grown films were dense, continuous and crack free. High Jc YBCO films were grown on RE2O3-buffered Ni substrates with sputtered cap layers. Two new alternative buffer layer architectures were developed. A high Jc of 1.8 MA/cm2 at 77 K and self-field was obtained on YBCO films with a layer sequence of YBCO (pulsed laser deposition)/Yb2O3 (sputtered)/Y2O3 (e-beam)/Ni. Also, a high Jc of over 1 MA/cm2 at 77 K and self-field was obtained on YBCO films with a layer sequence of YBCO (ex-situ BaF2 process)/CeO2 (sputtered)YSZ sputtered)/RE2O3 (sol-gel or e-beam)Ni. The performance of sol-gel grown buffers approached the quality of e-beam grown buffers.

Beach, D.B.; Chirayil, T.G.; Christen, D.K.; Cui, X.; Feenstra, R.; Goyal, A.; Kroeger, D.M.; Lee, D.F.; Martin, P.M.; Mathis, J.E.; Morrell, J.S.; Norton, D.P.; Paranthaman, M.; Specht, E.D.; Verebelyi, D.T.

1999-07-12T23:59:59.000Z

208

Raman scattering of polycrystalline 3C-SiC film deposited on AlN buffer layer by using CVD with HMDS  

Science Conference Proceedings (OSTI)

This paper presents the Raman scattering characteristics of poly (polycrystalline) 3C-SiC thin films deposited on AlN buffer layer by atmospheric pressure chemical vapor deposition (APCVD) using hexamethyldisilane (MHDS) and carrier gases (Ar+H"2). The ... Keywords: AlN, HMDS, Poly 3C-SiC, Raman scattering

Gwiy-Sang Chung; Kang-San Kim

2008-12-01T23:59:59.000Z

209

Study of high quality indium nitride films grown on Si(100) substrate by RF-MOMBE with GZO and AlN buffer layers  

Science Conference Proceedings (OSTI)

Wurtzite structure InN films were prepared on Si(100) substrates using radio-frequency metal-organic molecular beam epitaxy (RF-MOMBE) system. Ga-doped ZnO (GZO) and Amorphous AlN (a-AlN) film were used as buffer layers for InN films growth. Structural, ...

Wei-Chun Chen, Shou-Yi Kuo

2012-01-01T23:59:59.000Z

210

Electrodeposited Gd2Zr2O7 and Gd2O3 Buffer Layers for YBa2Cu3O7-..delta.. Superconductors  

SciTech Connect

Non-vacuum electrodeposition (ED) was used to prepare a biaxially textured Gd{sub 2}Zr{sub 2}O{sub 7} (GZO) and GZO/Gd{sub 2}O{sub 3} (GO) buffer layer on a Ni-W substrate. The YBa{sub 2}Cu{sub 3}O{sub 7-{delta}} (YBCO) superconductor was deposited by pulsed-laser deposition (PLD) on a simplified ED-GZO and ED-GZO/ED-GO buffer layer. The buffer layers and YBCO superconductor were characterized by X-ray diffraction (including {theta}/2{theta}, pole figure, omega scans, and phi scans) and atomic force microscopy. Full-width at half maximum values of the omega ({omega}) and phi ({phi}) scans of the electrodeposited GZO and GZO/GO layer were better than those of the Ni-W base substrate. At 77 K and a self-magnetic field, the critical current density of PLD YBCO on the electrodeposited-based buffer layer was 3.3 x 10{sup 6} A/cm{sup 2}, using the field criterion of 1 {micro}V/cm.

Bhattacharya, R. N.; Phok, S.

2007-01-01T23:59:59.000Z

211

Effect of AlN buffer layer properties on the morphology and polarity of GaN nanowires grown by molecular beam epitaxy  

SciTech Connect

Low-temperature AlN buffer layers grown via plasma-assisted molecular beam epitaxy on Si (111) were found to significantly affect the subsequent growth morphology of GaN nanowires. The AlN buffer layers exhibited nanowire-like columnar protrusions, with their size, shape, and tilt determined by the AlN V/III flux ratio. GaN nanowires were frequently observed to adopt the structural characteristics of the underlying AlN columns, including the size and the degree of tilt. Piezoresponse force microscopy and polarity-sensitive etching indicate that the AlN films and the protruding columns have a mixed crystallographic polarity. Convergent beam electron diffraction indicates that GaN nanowires are Ga-polar, suggesting that Al-polar columns are nanowire nucleation sites for Ga-polar nanowires. GaN nanowires of low density could be grown on AlN buffers that were predominantly N-polar with isolated Al-polar columns, indicating a high growth rate for Ga-polar nanowires and suppressed growth of N-polar nanowires under typical growth conditions. AlN buffer layers grown under slightly N-rich conditions (V/III flux ratio = 1.0 to 1.3) were found to provide a favorable growth surface for low-density, coalescence-free nanowires.

Brubaker, Matt D. [Physical Measurement Laboratory, National Institute of Standards and Technology, Boulder, Colorado 80305 (United States); Department of Mechanical Engineering, University of Colorado, Boulder, Colorado 80309 (United States); DARPA Center for Integrated Micro/Nano-Electromechanical Transducers (iMINT), University of Colorado, Boulder, Colorado 80309 (United States); Levin, Igor; Davydov, Albert V. [Material Measurement Laboratory, National Institute of Standards and Technology, Gaithersburg, Maryland 20899 (United States); Rourke, Devin M.; Sanford, Norman A.; Bertness, Kris A. [Physical Measurement Laboratory, National Institute of Standards and Technology, Boulder, Colorado 80305 (United States); Bright, Victor M. [Department of Mechanical Engineering, University of Colorado, Boulder, Colorado 80309 (United States); DARPA Center for Integrated Micro/Nano-Electromechanical Transducers (iMINT), University of Colorado, Boulder, Colorado 80309 (United States)

2011-09-01T23:59:59.000Z

212

Tuning the interfacial hole injection barrier between p-type organic materials and Co using a MoO{sub 3} buffer layer  

SciTech Connect

We demonstrate that the interfacial hole injection barrier {Delta}{sub h} between p-type organic materials (i.e., CuPc and pentacene) and Co substrate can be tuned by the insertion of a MoO{sub 3} buffer layer. Using ultraviolet photoemission spectroscopy, it was found that the introduction of MoO{sub 3} buffer layer effectively reduces the hole injection barrier from 0.8 eV to 0.4 eV for the CuPc/Co interface, and from 1.0 eV to 0.4 eV for the pentacene/Co interface, respectively. In addition, by varying the thickness of the buffer, the tuning effect of {Delta}{sub h} is shown to be independent of the thickness of MoO{sub 3} interlayer at both CuPc/Co and pentacene/Co interfaces. This Fermi level pinning effect can be explained by the integer charge-transfer model. Therefore, the MoO{sub 3} buffer layer has the potential to be applied in p-type organic spin valve devices to improve the device performance via reducing the interfacial hole injection barrier.

Wang Yuzhan; Wee, Andrew T. S. [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542 (Singapore); Cao Liang [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542 (Singapore); National Synchrotron Radiation Laboratory, School of Nuclear Science and Technology, University of Science and Technology of China, Hefei, Anhui 230029 (China); Qi Dongchen [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542 (Singapore); Institute of Materials Research and Engineering (IMRE), 3 Research Link, Singapore 117602 (Singapore); Chen Wei [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542 (Singapore); Department of Chemistry, National University of Singapore, 3 Science Drive 3, Singapore 117543 (Singapore); Gao Xingyu [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542 (Singapore); Shanghai Institute of Applied Physics, Chinese Academy of Sciences, P. O. Box 800-204, Shanghai 201800 (China)

2012-08-01T23:59:59.000Z

213

Growth and Properties of (001)-oriented Pb(Zr?.??Ti?.??)O?/LaNiO? Films on Si(001) Substrates with TiN Buffer Layers  

E-Print Network (OSTI)

Pulsed laser deposition has been used to grow Pb(Zr?.??Ti?.??)O? (PZT)/LaNiO? (LNO) heterostructures with restricted crystallographic orientations on bare Si(001) and SiO?-coated Si(001) substrates, using TiN buffer layers. ...

Zhu, Tie-Jun

214

Epitaxial strontium titanate films grown by atomic layer deposition on SrTiO{sub 3}-buffered Si(001) substrates  

SciTech Connect

Epitaxial strontium titanate (STO) films have been grown by atomic layer deposition (ALD) on Si(001) substrates with a thin STO buffer layer grown by molecular beam epitaxy (MBE). Four unit cells of STO grown by MBE serve as the surface template for ALD growth. The STO films grown by ALD are crystalline as-deposited with minimal, if any, amorphous SiO{sub x} layer at the STO-Si interface. The growth of STO was achieved using bis(triisopropylcyclopentadienyl)-strontium, titanium tetraisopropoxide, and water as the coreactants at a substrate temperature of 250 Degree-Sign C. In situ x-ray photoelectron spectroscopy (XPS) analysis revealed that the ALD process did not induce additional Si-O bonding at the STO-Si interface. Postdeposition XPS analysis also revealed sporadic carbon incorporation in the as-deposited films. However, annealing at a temperature of 250 Degree-Sign C for 30 min in moderate to high vacuum (10{sup -6}-10{sup -9} Torr) removed the carbon species. Higher annealing temperatures (>275 Degree-Sign C) gave rise to a small increase in Si-O bonding, as indicated by XPS, but no reduced Ti species were observed. X-ray diffraction revealed that the as-deposited STO films were c-axis oriented and fully crystalline. A rocking curve around the STO(002) reflection gave a full width at half maximum of 0.30 Degree-Sign {+-} 0.06 Degree-Sign for film thicknesses ranging from 5 to 25 nm. Cross-sectional transmission electron microscopy revealed that the STO films were continuous with conformal growth to the substrate and smooth interfaces between the ALD- and MBE-grown STO. Overall, the results indicate that thick, crystalline STO can be grown on Si(001) substrates by ALD with minimal formation of an amorphous SiO{sub x} layer using a four-unit-cell STO buffer layer grown by MBE to serve as the surface template.

McDaniel, Martin D.; Posadas, Agham; Ngo, Thong Q.; Dhamdhere, Ajit; Smith, David J.; Demkov, Alexander A.; Ekerdt, John G. [Department of Chemical Engineering, University of Texas at Austin, 1 University Station C0400, Austin, Texas 78712 (United States); Department of Physics, University of Texas at Austin, 1 University Station C1600, Austin, Texas 78712 (United States); Department of Chemical Engineering, University of Texas at Austin, 1 University Station C0400, Austin, Texas 78712 (United States); Department of Physics, Arizona State University, Tempe, Arizona 85287-1504 (United States); Department of Physics, University of Texas at Austin, 1 University Station C1600, Austin, Texas 78712 (United States); Department of Chemical Engineering, University of Texas at Austin, 1 University Station C0400, Austin, Texas 78712 (United States)

2013-01-15T23:59:59.000Z

215

PBD: packet buffer DVFs  

Science Conference Proceedings (OSTI)

The internet is rapidly becoming a major consumer of electricity with measurable economic and environmental impact. DVFS is employed in processors for balancing performance and power consumption. We apply DVFS to network controllers to reduce unnecessary ... Keywords: dvfs, low power, network controller

Eyal Itzhak Nave; Ran Ginosar

2013-05-01T23:59:59.000Z

216

Combining In-Situ Buffer-Layer-Assisted-Growth with Scanning Probe Microscopy for Formation and Study of Supported Model Catalysts  

NLE Websites -- All DOE Office Websites (Extended Search)

STM images showing the morphology of BaO film (7 ML-left and STM images showing the morphology of BaO film (7 ML-left and 80 ML-right) formed by the direct evaporation of the BaO. EMSL Research and Capability Development Proposals Combining In Situ Buffer-Layer-Assisted-Growth with Scanning Probe Microscopy for Formation and Study of Supported Model Catalysts Project start date: Spring 2008 EMSL Lead Investigator: Igor Lyubinetsky Microscopy Group, EMSL, PNNL Co-investigators: Yingge Du Spectroscopy and Diffraction Group, EMSL, PNNL Wayne Goodman Department of Chemistry, Texas A&M University, College Station, Texas The objective of the project is to implement in situ advanced buffer-layer-assisted growth (BLAG) technique by combining EMSL's ultra-high vacuum scanning probe microscopy (UHV SPM) and

217

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

fia-12-0023-matter-thomas-r-thielen Article U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability The vulnerability is caused due to an error...

218

Transparent run-time defense against stack smashing attacks  

Science Conference Proceedings (OSTI)

The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing ...

Arash Baratloo; Navjot Singh; Timothy Tsai

2000-06-01T23:59:59.000Z

219

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service V-065: Adobe Flash Player Buffer Overflow...

220

Securing software : an evaluation of static source code analyzers  

E-Print Network (OSTI)

This thesis evaluated five static analysis tools--Polyspace C Verifier, ARCHER, BOON, Splint, and UNO--using 14 code examples that illustrated actual buffer overflow vulnerabilities found in various versions of Sendmail, ...

Zitser, Misha, 1979-

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

adobe-flash-player-buffer-overflows-and-memory-corruption-errors-let-remote-users Event Nano-High: Lawrence Berkeley National Laboratory Lecture on Bad Sugars Nano-High, a program...

222

Reduction of Crosshatch Roughness and Threading Dislocation Density in Metamorphic GaInP Buffers and GaInAs Solar Cells  

Science Conference Proceedings (OSTI)

Surface crosshatch roughness typically develops during the growth of lattice-mismatched compositionally graded buffers and can limit misfit dislocation glide. In this study, the crosshatch roughness during growth of a compressive GaInP/GaAs graded buffer is reduced by increasing the phosphine partial pressure throughout the metamorphic growth. Changes in the average misfit dislocation length are qualitatively determined by characterizing the threading defect density and residual strain. The decrease of crosshatch roughness leads to an increase in the average misfit dislocation glide length, indicating that the surface roughness is limiting dislocation glide. Growth rate is also analyzed as a method to reduce surface crosshatch roughness and increase glide length, but has a more complicated relationship with glide kinetics. Using knowledge gained from these experiments, high quality inverted GaInAs 1 eV solar cells are grown on a GaInP compositionally graded buffer with reduced roughness and threading dislocation density. The open circuit voltage is only 0.38 V lower than the bandgap potential at a short circuit current density of 15 mA/cm{sup 2}, suggesting that there is very little loss due to the lattice mismatch.

France, R. M.; Geisz, J. F.; Steiner, M. A.; To, B.; Romero, M. J.; Olavarria, W. J.; King, R. R.

2012-05-15T23:59:59.000Z

223

Elimination of charge-enhancement effects in GaAs FETs with a low-temperature grown GaAs buffer layer  

Science Conference Proceedings (OSTI)

The use of low temperature grown GaAs (LT GaAs) buffer layer in GaAs FETs is shown via computer simulation and experimental measurement to reduce ion-induced charge collection by two to three orders of magnitude. This reduction in collected charge is associated with the efficient reduction of charge-enhancement mechanisms in the FETs. Error rate calculations indicate that the soft error rate of LT GaAs integrated circuits will be reduced by several orders of magnitude when compared to conventional FET-based GaAs ICs.

McMorrow, D.; Weatherford, T.R.; Curtice, W.R.; Knudson, A.R.; Buchner, S.; Melinger, J.S.; Tran, L.H.; Campbell, A.B. [Naval Research Lab., Washington, DC (United States)

1995-12-01T23:59:59.000Z

224

Molecular beam epitaxy growth of high quality p-doped SnS van der Waals epitaxy on a graphene buffer layer  

Science Conference Proceedings (OSTI)

We report on the systematic investigation of optoelectronic properties of tin (IV) sulfide (SnS) van der Waals epitaxies (vdWEs) grown by molecular beam epitaxy (MBE) technique. Energy band simulation using commercial CASTEP code indicates that SnS has an indirect bandgap of size 0.982 eV. Furthermore, our simulation shows that elemental Cu can be used as a p-type dopant for the material. Growth of high quality SnS thin films is accomplished by MBE technique using graphene as the buffer layer. We observed significant reduction in the rocking curve FWHM over the existing published values. Crystallite size in the range of 2-3 {mu}m is observed which is also significantly better than the existing results. Measurement of the absorption coefficient, {alpha}, is performed using a Hitachi U-4100 Spectrophotometer system which demonstrate large values of {alpha} of the order of 10{sup 4} cm{sup -1}. Sharp cutoff in the values of {alpha}, as a function of energy, is observed for the films grown using a graphene buffer layer indicating low concentration of localized states in the bandgap. Cu-doping is achieved by co-evaporation technique. It is demonstrated that the hole concentration of the films can be controlled between 10{sup 16} cm{sup -3} and 5 x 10{sup 17}cm{sup -3} by varying the temperature of the Cu K-cell. Hole mobility as high as 81 cm{sup 2}V{sup -1}s{sup -1} is observed for SnS films on graphene/GaAs(100) substrates. The improvements in the physical properties of the films are attributed to the unique layered structure and chemically saturated bonds at the surface for both SnS and the graphene buffer layer. Consequently, the interaction between the SnS thin films and the graphene buffer layer is dominated by van der Waals force and structural defects at the interface, such as dangling bonds or dislocations, are substantially reduced.

Wang, W.; Leung, K. K.; Fong, W. K.; Wang, S. F.; Surya, C. [Department of Electronic and Information Engineering and Photonics Research Centre, Hong Kong Polytechnic University (Hong Kong); Hui, Y. Y.; Lau, S. P. [Department of Applied Physics, Hong Kong Polytechnic University (Hong Kong); Chen, Z.; Shi, L. J.; Cao, C. B. [Research Center of Materials Science, Beijing Institute of Technology, Beijing 100081 (China)

2012-05-01T23:59:59.000Z

225

Comments on “Is the Faroe Bank Channel Overflow Hydraulically Controlled?”  

Science Conference Proceedings (OSTI)

In a recent paper Girton et al., due to what appears to be a misunderstanding, stated that a critical-flow analysis of the deep-water transport through the Faroe Bank Channel had been undertaken by Lake et al. on the basis of rotating hydraulic ...

Linda Enmar; Karin Borenäs; Iréne Lake; Peter Lundberg

2009-06-01T23:59:59.000Z

226

Enhancement of the absorption of CO{sub 2} in alkaline buffers by organic solutes: Relation with degree of dissociation and molecular OH density  

SciTech Connect

Absorption of CO{sub 2} in a wetted-wall column by 0.5 M Na{sub 2}CO{sub 3}/0.5 M NaHCO{sub 3} buffer with and without various concentrations of saccharose, fructose, glucose, formaldehyde, glycerin, methanol, or ethanol was measured under conditions in which the reaction of CO{sub 2} was of pseudo-first-order. For the purposes of comparison, experiments were also carried out with arsenite in both buffer and pure water. For all of these solutes, the absorption enhancement factor increased with solute concentration. Rate constants k{sub c} for the overall reaction were obtained by fitting Danckwerts` expression for absorption to the experimental data, and correlation of k{sub c} with solute concentration then afforded rate constants k{sub cat} for the catalyzed reactions. For each solute, an empirical correlation was found between the absorption enhancement factor and Hatta numbers calculated from the rate constant for the uncatalyzed reaction and from k = k{sub cat}[cat]. The notion that the enhancement of absorption by acid-base reaction is facilitated by dipole-dipole interaction between the solutes and CO{sub 2} is supported by an empirical correlation relating k{sub cat} to the degree of dissociation of the solute and the density of OH groups in the solute molecule.

Vazquez, G.; Chenlo, F.; Pereira, G. [Univ. of Santiago de Compostela (Spain). Dept. of Chemical Engineering

1997-06-01T23:59:59.000Z

227

2.8 {mu}m emission from type-I quantum wells grown on InAs{sub x}P{sub 1-x}/InP metamorphic graded buffers  

Science Conference Proceedings (OSTI)

We report 2.8 {mu}m emission from compressively strained type-I quantum wells (QWs) grown on InP-based metamorphic InAs{sub x}P{sub 1-x} step-graded buffers. High quality metamorphic graded buffers showed smooth surface morphology and low threading dislocation densities of approximately 2.5 Multiplication-Sign 10{sup 6} cm{sup -2}. High-resolution x-ray diffraction scans showed strong satellites from multiple quantum wells grown on metamorphic buffers, and cross-sectional transmission electron microscopy revealed smooth and coherent quantum well interfaces. Room-temperature photoluminescence emission at 2.8 {mu}m with a narrow linewidth ({approx}50 meV) shows the promise of metamorphic growth for mid-infrared laser diodes on InP.

Jung, Daehwan; Song, Yuncheng; Larry Lee, Minjoo [Department of Electrical Engineering, Yale University, New Haven, Connecticut 06520 (United States); Yu Lan; Wasserman, Daniel [Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, Urbana, Illinois 61801 (United States)

2012-12-17T23:59:59.000Z

228

Using DISE to protect return addresses from attack  

Science Conference Proceedings (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input---overwrite ...

Marc L. Corliss; E. Christopher Lewis; Amir Roth

2005-03-01T23:59:59.000Z

229

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583) May 18, 2011 T-625: Opera Frameset Handling Memory Corruption Vulnerability The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

230

Buffer layers for coated conductors  

DOE Patents (OSTI)

A composite structure is provided including a base substrate, an IBAD oriented material upon the base substrate, and a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material. Additionally, an article is provided including a base substrate, an IBAD oriented material upon the base substrate, a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material, and a thick film upon the cubic metal oxide material. Finally, a superconducting article is provided including a base substrate, an IBAD oriented material upon the base substrate, a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material, and an yttrium barium copper oxide material upon the cubic metal oxide material.

Stan, Liliana (Los Alamos, NM); Jia, Quanxi (Los Alamos, NM); Foltyn, Stephen R. (Los Alamos, NM)

2011-08-23T23:59:59.000Z

231

Peak shaving through resource buffering  

E-Print Network (OSTI)

Abstract. We introduce and solve a new problem inspired by energy pricing schemes in which a client is billed for peak usage. At each timeslot the system meets an energy demand through a combination of a new request, an unreliable amount of free source energy (e.g. solar or wind power), and previously received energy. The added piece of infrastructure is the battery, which can store surplus energy for future use. More generally, the demands could represent required amounts of energy, water, or any other tenable resource which can be obtained in advance and held until needed. In a feasible solution, each demand must be supplied on time, through a combination of newly requested energy, energy withdrawn from the battery, and free source. The goal is to minimize the maximum request. In the online version of this problem, the algorithm must determine each request without knowledge of future demands or free source availability, with the goal of maximizing the amount by which the peak is reduced. We give efficient optimal algorithms for the offline problem, with and without a bounded battery. We also show how to find the optimal offline battery size, given the requirement that the final battery level equals the initial battery level. Finally, we give efficient Hn-competitive algorithms assuming the peak effective demand is revealed in advance, and provide matching lower bounds. 1

Amotz Bar-noy; Matthew P. Johnson; Ou Liu

2007-01-01T23:59:59.000Z

232

A nitrilo-tri-acetic-acid/acetic acid route for the deposition of epitaxial cerium oxide films as high temperature superconductor buffer layers  

SciTech Connect

A water based cerium oxide precursor solution using nitrilo-tri-acetic-acid (NTA) and acetic acid as complexing agents is described in detail. This precursor solution is used for the deposition of epitaxial CeO{sub 2} layers on Ni-5at%W substrates by dip-coating. The influence of the complexation behavior on the formation of transparent, homogeneous solutions and gels has been studied. It is found that ethylenediamine plays an important role in the gelification. The growth conditions for cerium oxide films were Ar-5% gas processing atmosphere, a solution concentration level of 0.25 M, a dwell time of 60 min at 900 {sup o}C and 5-30 min at 1050 {sup o}C. X-ray diffraction (XRD), scanning electron microscope (SEM), atomic force microscopy (AFM), pole figures and spectroscopic ellipsometry were used to characterize the CeO{sub 2} films with different thicknesses. Attenuated total reflection-Fourier transform infrared (ATR-FTIR) was used to determine the carbon residue level in the surface of the cerium oxide film, which was found to be lower than 0.01%. Textured films with a thickness of 50 nm were obtained. - Graphical abstract: Study of the complexation and hydrolysis behavior of Ce{sup 4+} ions in the presence of nitrilo-tri-acetic acid and the subsequent development of an aqueous chemical solution deposition route suited for the processing of textured CeO{sub 2} buffer layers on Ni-W tapes.

Thuy, T.T.; Lommens, P.; Narayanan, V.; Van de Velde, N.; De Buysser, K.; Herman, G.G.; Cloet, V. [Department of Inorganic and Physical Chemistry, Ghent University, Krijgslaan 281 - S3, 9000 Gent (Belgium); Van Driessche, I., E-mail: Isabel.Vandriessche@UGent.b [Department of Inorganic and Physical Chemistry, Ghent University, Krijgslaan 281 - S3, 9000 Gent (Belgium)

2010-09-15T23:59:59.000Z

233

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2012 2, 2012 U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address. February 22, 2012 U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string. February 16, 2012 U-105:Oracle Java SE Critical Patch Update Advisory Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

234

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

235

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

236

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

237

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2012 5, 2012 U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system March 2, 2012 U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address. March 1, 2012 U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability A vulnerability in WorkStation files (.ws) by IBM Personal Communications

238

"An evaluation of phase separated, self-assembled LaMnO3-MgO nanocomposite films directly on IBAD-MgO as buffer layers for flux pinning enhancements in YBa2YCu3O7-& coated conductors"  

SciTech Connect

Technological applications of high temperature superconductors (HTS) require high critical current density, Jc, under operation at high magnetic field strengths. This requires effective flux pinning by introducing artificial defects through creative processing. In this work, we evaluated the feasibility of mixed-phase LaMnO3:MgO (LMO:MgO) films as a potential cap buffer layer for the epitaxial growth and enhanced performance of YBa2Cu3O7-d (YBCO) films. Such composite films were sputter deposited directly on IBAD-MgO templates (with no additional homo-epitaxial MgO layer) and revealed the formation of two phase-separated, but at the same time vertically aligned, self-assembled composite nanostructures that extend throughout the entire thickness of the film. The YBCO coatings deposited on these nanostructured cap layers showed correlated c-axis pinning and improved in-field Jc performance compared to those of YBCO films fabricated on standard LMO buffers. Microstructural characterization revealed additional extended disorder in the YBCO matrix. The present results demonstrate the feasibility of novel and potentially practical approaches in the pursuit of more efficient, economical, and high performance superconducting devices.

Polat, Ozgur [ORNL; Aytug, Tolga [ORNL; Paranthaman, Mariappan Parans [ORNL; Leonard, Keith J [ORNL; Lupini, Andrew R [ORNL; Pennycook, Stephen J [ORNL; Meyer III, Harry M [ORNL; Kim, Kyunghoon [ORNL; Qiu, Xiaofeng [ORNL; Cook, Sylvester W [ORNL; Thompson, James R [ORNL; Christen, David K [ORNL; Goyal, Amit [ORNL; Selvamanickam, V. [SuperPower Incorporated, Schenectady, New York; Xiong, X. [SuperPower Incorporated, Schenectady, New York

2010-01-01T23:59:59.000Z

239

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - 27530 of 31,917 results. 21 - 27530 of 31,917 results. Download Enforcement Letter, Intennech, Inc.- March 26, 2010 Enforcement Letter issued to Intermech, Inc. related to Installation and Inspection of Anchor Bolts and Pipe Supports at the DUF6 Conversion Buildings at the Portsmouth and Paducah Gaseous Diffusion Plants http://energy.gov/hss/downloads/enforcement-letter-intennech-inc-march-26-2010 Article V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability The vulnerability addresses the possibility of a heap overflow condition http://energy.gov/cio/articles/v-188-apache-xml-security-xpointer-expressions-processing-buffer-overflow-vulnerability Download AUDIT REPORT: OAS-L-03-03 Follow-Up Audit on the Department's Managment of Field Contractor Employees

240

Implementation of the memory-safe full ANSI-C compiler  

Science Conference Proceedings (OSTI)

This paper describes a completely memory-safe compiler for C language programs that is fully compatible with the ANSI C specification. Programs written in C often suffer from nasty errors due to dangling pointers and buffer overflow. Such errors in Internet ... Keywords: c language, memory safety

Yutaka Oiwa

2009-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Using semantic templates to study vulnerabilities recorded in large software repositories  

Science Conference Proceedings (OSTI)

Software repositories are rich sources of information about vulnerabilities that occur during a product's lifecycle. Although available, such information is scattered across numerous databases. Furthermore, in large software repositories, a single vulnerability ... Keywords: CVE, CWE, buffer overflow, fix patterns, ontology, semantic template, software repository, vulnerability

Yan Wu; Robin A. Gandhi; Harvey Siy

2010-05-01T23:59:59.000Z

242

SoftBound: highly compatible and complete spatial memory safety for c  

Science Conference Proceedings (OSTI)

The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary pointer arithmetic, conflation of pointers and arrays, and programmer-visible ... Keywords: buffer overflows, c, spatial memory safety

Santosh Nagarakatte; Jianzhou Zhao; Milo M.K. Martin; Steve Zdancewic

2009-06-01T23:59:59.000Z

243

Numerical stability of mass transfer driven by Roche lobe overflow in close binaries  

E-Print Network (OSTI)

Numerical computation of the time evolution of the mass transfer rate in a close binary can be and, in particular, has been a computational challenge. Using a simple physical model to calculate the mass transfer rate, we show that for a simple explicit iteration scheme the mass transfer rate is numerically unstable unless the time steps are sufficiently small. In general, more sophisticated explicit algorithms do not provide any significant improvement since this instability is a direct result of time discretization. For a typical binary evolution, computation of the mass transfer rate as a smooth function of time limits the maximum tolerable time step and thereby sets the minimum total computational effort required for an evolutionary computation. By methods of ``Controlling Chaos'' it can be shown that a specific implicit iteration scheme, based on Newton's method, is the most promising solution for the problem.

A. Buening; H. Ritter

2005-10-05T23:59:59.000Z

244

The Relative Importance of Northern Overflow and Subpolar Deep Convection for the North Atlantic Thermohaline Circulation  

Science Conference Proceedings (OSTI)

The relative importance of the formation of different North Atlantic Deep Water masses on the meridional overturning is examined with a non-eddy-resolving version of the CME model. In contrast to a frequently held belief, convective deep-water ...

Ralf Döscher; René Redler

1997-09-01T23:59:59.000Z

245

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted by the target...

246

Energy Efficient Buffer Cache Replacement Jianhui Yue  

E-Print Network (OSTI)

back to the active state. The transition from a lower power state to a higher one re- quires some significantly increases the en- ergy saving opportunities through DAM overlapping and power state transition replacement algorithms only aim to optimize cache hit rates and do not consider the power status of memory

Zhu, Yifeng

247

Argonne TDC: Electrodialysis Operation With Buffer Solution  

Argonne has won the Federal Laboratory Consortium Award for Excellence in Technology Transfer for an improved process used to make agricultural products.

248

CMOS Circuit Speed and Buffer Optimization  

Science Conference Proceedings (OSTI)

An improved timing model for CMOS combinational logic is presented. The model is based on an analytical solution for the CMOS inverter output response to an input ramp. This model yields a better understanding of the switching behavior of the CMOS inverter ...

N. Hedenstierna; K. O. Jeppson

2006-11-01T23:59:59.000Z

249

Researchers Demonstrate Novel 'Quantum Data Buffering' ...  

Science Conference Proceedings (OSTI)

... to control the data flow inside a yet-to-be-built quantum computer that theoretically could solve problems unreachable by the best conventional ...

2011-04-07T23:59:59.000Z

250

The F-buffer: a rasterization-order FIFO buffer for multi-pass rendering  

Science Conference Proceedings (OSTI)

Multi-pass rendering is a common method of virtualizing graphics hardware to overcome limited resources. Most current multi-pass rendering techniques use the RGBA framebuffer to store intermediate results between each pass. This method of storing intermediate ...

William R. Mark; Kekoa Proudfoot

2001-08-01T23:59:59.000Z

251

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 1, 2011 March 1, 2011 T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. February 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 25, 2011 T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow

252

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

253

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. February 14, 2011 T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote

254

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 30, 2011 March 30, 2011 T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. March 18, 2011 T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space. March 17, 2011 T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability Novell Access Manager Java Double Literal Denial of Service Vulnerability. March 16, 2011 T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections

255

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

256

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2013 8, 2013 V-087: Adobe Flash Player Two Vulnerabilities Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system. February 7, 2013 V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. February 6, 2013 V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks A vulnerability was reported in Cisco Unity Express. February 5, 2013 V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks Several vulnerabilities were reported in RSA Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities

257

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 18, 2011 T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device. February 17, 2011 T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via

258

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11, 2011 11, 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. July 8, 2011 T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker. July 7, 2011

259

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61 - 1970 of 28,905 results. 61 - 1970 of 28,905 results. Article U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications. http://energy.gov/cio/articles/u-114-ibm-personal-communications-ws-file-processing-buffer-overflow-vulnerability Article U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. http://energy.gov/cio/articles/u-075-apache-struts-bug-lets-remote-users-overwrite-files-and-execute-arbitrary-code

260

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. January 4, 2011 T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 8, 2011 T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. August 5, 2011 T-685: Cisco Warranty CD May Load Malware From a Remote Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. August 3, 2011 T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. August 2, 2011 T-682:Double free vulnerability in MapServer MapServer developers have discovered flaws in the OGC filter support in

262

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61 - 1070 of 28,560 results. 61 - 1070 of 28,560 results. Article DOE Makes Filing with NRC in Support OF Authority to Withdraw Yucca Application DOE today urged the NRC to conclude that DOE has the legal authority to withdraw the pending Yucca Mountain license application. DOE argued that the NRC should review and reverse the contrary... http://energy.gov/gc/articles/doe-makes-filing-nrc-support-authority-withdraw-yucca-application Article U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications. http://energy.gov/cio/articles/u-114-ibm-personal-communications-ws-file-processing-buffer-overflow-vulnerability

263

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 - 12040 of 26,764 results. 31 - 12040 of 26,764 results. Download Electricity Advisory Committee (EAC) 2012-2013 Membership Roster: December 20, 2012 2012-2013 Membership roster for the Electricity Advisory Committee as of December 20, 2012. http://energy.gov/oe/downloads/electricity-advisory-committee-eac-2012-2013-membership-roster-december-20-2012 Download CX-009914: Categorical Exclusion Determination Plug & Play Solar Photovoltaic for American Homes CX(s) Applied: A9, B3.6 Date: 01/28/2013 Location(s): Massachusetts, Vermont Offices(s): Golden Field Office http://energy.gov/nepa/downloads/cx-009914-categorical-exclusion-determination Article V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer http://energy.gov/cio/articles/v-114-realplayer-mp4-processing-buffer-overflow-vulnerability

264

Realization of MIMO Linear Discrete-Time Systems with Minimum L2-Sensitivity and No Overflow Oscillations  

E-Print Network (OSTI)

Oscillations Takao Hinamoto Graduate School of Engineering Hiroshima University Higashi-Hiroshima 739-8527, Japan Email: hinamoto@hiroshima-u.ac.jp Osemekhian I. Omoifo Graduate School of Engineering Hiroshima University Higashi-Hiroshima 739-8527, Japan Email: osei@hiroshima-u.ac.jp Wu-Sheng Lu Dept. of Elec

Lu, Wu-Sheng

265

U-172: OpenOffice.org Two Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: OpenOffice.org Two Vulnerabilities 72: OpenOffice.org Two Vulnerabilities U-172: OpenOffice.org Two Vulnerabilities May 18, 2012 - 7:00am Addthis PROBLEM: OpenOffice.org Two Vulnerabilities PLATFORM: OpenOffice.org 3.3, Other versions may also be affected. ABSTRACT: Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system. Reference LINKS: Secunia Advisory SA46992 CVE-2012-1149 CVE-2012-2149 IMPACT ASSESSMENT: High Discussion: 1) An integer overflow error in the vclmi.dll module when allocating memory for an embedded image object can be exploited to cause a heap-based buffer overflow e.g. via a specially crafted JPEG object within a DOC file. 2) An error within libwpd when parsing Wordperfect documents can be exploited to overwrite arbitrary memory via a specially crafted Wordperfect

266

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS June 28, 2013 V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability The vulnerability addresses the possibility of a heap overflow condition June 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 19, 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 Multiple vulnerabilities were reported in Oracle Java. June 14, 2013 V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and

267

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

268

Quantification of the Effects of Organic and Carbonate Buffers on  

E-Print Network (OSTI)

) (>SO)2POOH + 2H2O 1.6 log K>SOPO4 3- >SOH + H3PO4 0 ) >SOPO3 2- + 2H+ + H2O -0.1 log K>SOCOO- >SOH + H

Sverjensky, Dimitri A.

269

Blast overpressure relief using air vacated buffer medium  

E-Print Network (OSTI)

Blast waves generated by intense explosions cause damage to structures and human injury. In this thesis, a strategy is investigated for relief of blast overpressure resulting from explosions in air. The strategy is based ...

Avasarala, Srikanti Rupa

2009-01-01T23:59:59.000Z

270

FIRST-YEAR COMPOSITION HANDBOOKS: BUFFERING THE WINDS OF CHANGE.  

E-Print Network (OSTI)

??This dissertation discusses composition history treatments and the scant amount of scholarly research devoted solely to composition textbooks, though scholars such as Robin Varnum and… (more)

Harris, Christopher Sean

2006-01-01T23:59:59.000Z

271

Buffer Gas Cooling: A Tool for Trapping Neutral Atoms  

NLE Websites -- All DOE Office Websites (Extended Search)

Buildings Cool Roofs and Heat Islands Demand Response Energy Efficiency Program and Market Trends High Technology and Industrial Buildings Lighting Systems Residential Buildings...

272

Gilliam County Riparian Buffers 2007-2008 Annual Report.  

DOE Green Energy (OSTI)

During the contract year beginning July 1, 2007 and ending June 30, 2008, the CREP technician contacted 15 new landowners regarding an interest in either the CREP or the Continuous CRP programs. Most landowners requested a second meeting and most sites were visited to discuss possibilities of enrolling in a USDA riparian program. This year, a considerable amount of time was spent providing technical assistance to prior contracts as the practices are implemented. More time is being spent in planning site preparation so that NRCS and FSAs increasing concerns over plant survival are satisfied. A continued concern that the rate paid to the landowner for maintenance is not enough. Controlling competing vegetation is a major factor in increasing plant survival. Increasing costs in the methods used to control unwanted plants has made it difficult for contract holders to perform these methods as effectively as they would like. The projects that have continued maintenance are considerably more successful.

None

2008-11-04T23:59:59.000Z

273

Buffer memory optimization for video codec application modeled in Simulink  

Science Conference Proceedings (OSTI)

Reduction of the on-chip memory size is a key issue in video codec system design. Because video codec applications involve complex algorithms that are both data-intensive and control-dependent, memory optimization based on global and precise analysis ... Keywords: Simulink, memory size reduction, video codec application

Sang-Il Han; Xavier Guerin; Soo-Ik Chae; Ahmed A. Jerraya

2006-07-01T23:59:59.000Z

274

Buffers between grazing sheep and leafy crops augment food safety  

E-Print Network (OSTI)

sheep and the edge of a food crop was adequate to preventgrazing sheep and leafy crops augment food safety Thedomestic animals and the crop edge is adequate to minimize

Hoar, Bruce R; Atwill, Edward R; Carlton, Lesa; Celis, Jorge; Carabez, Jennifer; Nguyen, Tran

2013-01-01T23:59:59.000Z

275

Dynamic Control and Optimization of Buffer Size in Wireless Networks  

E-Print Network (OSTI)

Telecommunications System (UMTS) SMS network that achieves better utilization of high bandwidth packet networks versatility, including text, im- ages, audio and video, between mobile devices and from applications infrastructure. This paper investigates the approach of [4] as it applies to such wireless networks. It focuses

Panayiotou, Christos

276

Efficacy of Vegetated Buffer Strips for Retaining Cryptosporidium parvum  

E-Print Network (OSTI)

of Cryptosporidium parvum in sandy porous media (soils andwith grass, filled with a sandy loam soil, spiked with 200 gwith grass, filled with a sandy loam soil, spiked with 200 g

Tate, Kenneth W; Das Gracas C Pereira, Maria; Atwill, Edward R

2004-01-01T23:59:59.000Z

277

Membrane Filtration and Ozonation of Poultry Chiller Overflow Water: Study of Membrane Treatment To Reduce Water Use and Ozonation for Sanitation at a Poultry Processing Plant in California  

Science Conference Proceedings (OSTI)

Poultry processing plants use large volume of water and the cost of obtaining and disposal of water is increasing rapidly. HACCP quality control procedures introduced recently have increased the water and compounded the situation. Chlorine is widely used in sanitation of poultry operations. Chlorine generates several byproducts that are proven to be harmful from food safety and environmental points of view. The search for alternatives to chlorine in poultry operations, particularly in the chiller, is of ...

1999-12-01T23:59:59.000Z

278

Smoothing and Modeling of Video Transmission Rates over a QoS Network with Limited Bandwidth Connections  

E-Print Network (OSTI)

Transmission of video over a limited bandwidth network is challenging due to the natural variability of video, and link characteristics. Video smoothing techniques can be used to facilitate more effective transmission and to preserve better quality. In this paper we develop a semi-optimal video smoothing approach to manage the transmission of MPEG-4 and H.264 video while mapping it to be more suitable for a QoS based network. The proposed technique utilizes a smoothing buffer with pre-defined thresholds to smooth the transmission rates while assuming minimal information about the video to be transmitted. The results obtained showed a significant improvements in transmission rate variability while guaranteeing no buffer overflows or underflows. In addition, a queuing model is developed for the used smoothing algorithm for H.264 video streams with optimized encoding and packetization, utilizing the available H.264 macroblock ordering option.

Shuaib, Khaled; Zhang, Liren

2011-01-01T23:59:59.000Z

279

Using DISE to Protect Return Addresses from Attack  

E-Print Network (OSTI)

Stack-smashing by buffer overflow is a common tactic used by viruses and worms to crash or hijack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can---by supplying a specially-crafted and unexpectedly long input--- overwrite a stored return address and trigger the execution of code of her choosing. In this paper, we propose to protect code from this common form of attack using dynamic instruction stream editing (DISE), a previously proposed hardware mechanism that implements binary rewriting in a transparent, efficient, and convenient way by rewriting the dynamic instruction stream rather than the static executable. Simply, we define productions (rewriting rules) that instrument program calls and returns to maintain and verify a "shadow" stack of return addresses in a protected region of memory. When invalid return addresses are detected, the application is terminated.

Marc Corliss Christopher; E Christopher; Lewis Amir Roth

2004-01-01T23:59:59.000Z

280

NETL F 451.1/1-1, Categorical Exclusion Designation Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NA TBD FE OIOSOD 2012 4262012 - 12312012 Benjamin May (COR) NETL: Morgantown, WV Building 8 Compressor Aftercooler Rupture Disc Overflow Piping Project Overflow piping and...

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

282

Efficient scaling for complex division  

Science Conference Proceedings (OSTI)

We develop a simple method for scaling to avoid overflow and harmful underflow in complex division. The method guarantees that no overflow will occur unless at least one component of the quotient must overflow, otherwise the normwise error in the computed ... Keywords: Complex division, overflow, underflow

Douglas M. Priest

2004-12-01T23:59:59.000Z

283

Quantum wells on indium gallium arsenic compositionally graded buffers realized by molecular beam epitaxy  

E-Print Network (OSTI)

For a long time, there has been a desire to extend the emission wavelength of GaAs-based quantum well lasers, with the aim of eventually replacing InP with GaAs as the substrate of choice for communication applications. ...

Choy, Henry Kwong Hin, 1974-

2005-01-01T23:59:59.000Z

284

A single-phase photovoltaic inverter topology with a series-connected power buffer  

E-Print Network (OSTI)

Module integrated converters (MICs) have been under rapid development for single-phase grid-tied photovoltaic applications. The capacitive energy storage implementation for the double-line-frequency power variation represents ...

Pierquet, Brandon J.

285

An analytical model for input-buffered optical packet switches with reconfiguration overhead  

Science Conference Proceedings (OSTI)

The overhead associated with reconfiguring a switch fabric in optical packet switches is an important issue in relation to the packet transmission time and can adversely affect switch performance. The reconfiguration overhead increases the mean waiting ... Keywords: Batch arrival, Discrete-time system, Optical communication, Stochastic analysis, Stochastic decomposition

Kuan-Hung Chou; Woei Lin

2011-12-01T23:59:59.000Z

286

An event buffer flooding attack in DNP3 controlled SCADA systems  

Science Conference Proceedings (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized ...

Dong Jin; David M. Nicol; Guanhua Yan

2011-12-01T23:59:59.000Z

287

Coping with buffer delay change due to power and ground noise  

Science Conference Proceedings (OSTI)

Variation of power and ground levels affect VLSI circuit performance. Trends in device technology and in packaging have necessitated a revision in conventional delay models. In particular, simple scalable models are needed to predict delays in the presence ... Keywords: common mode noise, differential mode noise, incremental delay change, power and ground noise

Lauren Hui Chen; Malgorzata Marek-Sadowska; Forrest Brewer

2002-06-01T23:59:59.000Z

288

BATTERY-POWERED, ELECTRIC-DRIVE VEHICLES PROVIDING BUFFER STORAGE FOR PV CAPACITY VALUE  

E-Print Network (OSTI)

installed over 1.5 MW of rooftop PV [2]. These systems generate value primarily through the energy produced and the intermittent nature of the solar resource create challenges to realizing the capacity value of PV installations

Perez, Richard R.

289

M4, Semipolar AlGaN Buffers for Deep Ultraviolet Diode Lasers  

Science Conference Proceedings (OSTI)

On-axis reciprocal space mapping of the graded AlGaN showed tilt at each interface associated ..... New Concepts and Materials for Solar Power Conversion

290

Smart buildings with electric vehicle interconnection as buffer for local renewables?  

DOE Green Energy (OSTI)

Some conclusions from this presentation are: (1) EV Charging/discharging pattern mainly depends on the objective of the building (cost versus CO{sub 2}); (2) performed optimization runs show that stationary batteries are more attractive than mobile storage when putting more focus on CO{sub 2} emissions because stationary storage is available 24 hours a day for energy management - it's more effective; (3) stationary storage will be charged by PV, mobile only marginally; and (4) results will depend on the considered region and tariff. Final research work will show the results for 138 different buildings in nine different climate zones and three major utility service territories.

Stadler, Michael; Cardoso, Goncalo; DeForest, Nicholas; Donadee, Jon; Gomez, Tomaz; Lai, Judy; Marnay, Chris; Megel, Olivier; Mendes, Goncalo; Siddiqui, Afzal

2011-05-01T23:59:59.000Z

291

Smart buildings with electric vehicle interconnection as buffer for local renewables?  

E-Print Network (OSTI)

Energy Technologies Division Building / tariffs electricityOptions, Tariffs, and Building Analyzed Environmental Energyenergy management more effective stationary storage will be charged by PV, mobile only marginally results will depend on the considered region and tariff

Stadler, Michael

2012-01-01T23:59:59.000Z

292

Smart buildings with electric vehicle interconnection as buffer for local renewables?  

E-Print Network (OSTI)

SVOW), http://der.lbl.gov/microgrids-lbnl/current-project-to commercial building microgrids,“ 2nd European Conference2009, Special Issue on Microgrids and Energy Management,

Stadler, Michael

2012-01-01T23:59:59.000Z

293

Flexible Compiler-Managed L0 Buffers for Clustered VLIW Processors  

Science Conference Proceedings (OSTI)

Wire delays are a major concern for current and forthcoming processors.One approach to attack this problem is to divide the processorinto semi-independent units referred to as clusters. Acluster usually consists of a local register file and a subset ...

Enric Gibert; Jesús Sánchez; Antonio González

2003-12-01T23:59:59.000Z

294

Improving virtualization in the presence of software managed translation lookaside buffers  

Science Conference Proceedings (OSTI)

Virtualization has become an important technology that is used across many platforms, particularly servers, to increase utilization, multi-tenancy and security. Virtualization introduces additional overhead that often relates to memory management, interrupt ...

Xiaotao Chang, Hubertus Franke, Yi Ge, Tao Liu, Kun Wang, Jimi Xenidis, Fei Chen, Yu Zhang

2013-06-01T23:59:59.000Z

295

Fabrication of InGaP LEDs on a graded buffer substrate  

E-Print Network (OSTI)

Introduction: Computer display panels create a vast color palette by combining color from three light emitting diodes (LEDs), each producing red, green, or blue light. The light from these three LEDs is chosen so that the ...

Martínez, Josué F

2007-01-01T23:59:59.000Z

296

Nanoparticulate FeS as an Effective Redox Buffer to Prevent Uraninite...  

NLE Websites -- All DOE Office Websites (Extended Search)

(UO2) Oxidation Saturday, August 31, 2013 Uranium (U) is one of the most prevalent radionuclide contaminants in soils and groundwater across the world as a result of nuclear fuel...

297

S-graded Metamorphic Buffer Layers for Lattice Mismatched Si1 ...  

Science Conference Proceedings (OSTI)

Synthesis and Characterization of Plasma Polymerized Thin Films Deposited from Benzene and Hexamethyldisiloxane Using (PECVD) Method · Synthesis and ...

298

East Boston buffer : a transferable urban framework for adapting to sea rise  

E-Print Network (OSTI)

Urban vulnerability to climate change is constantly increasing. Many coastal cities will need to begin sea rise mitigation efforts soon, and now is a critical time for architects to intervene in this process with good ...

Jenkins, Carolyn (Carolyn Hiller)

2013-01-01T23:59:59.000Z

299

Smart buildings with electric vehicle interconnection as buffer for local renewables?  

E-Print Network (OSTI)

offices, and hotels Environmental Energy TechnologiesEnergy Resources and Demand Response under Uncertainty,” IAEE’s Rio 2010 International Conference, 6-9 June 2010, InterContinental Rio Hotel –

Stadler, Michael

2012-01-01T23:59:59.000Z

300

An intelligent buffer management approach for GFR services in IP/ATM internetworks  

Science Conference Proceedings (OSTI)

In ATM networks, the Guaranteed Frame Rate (GFR) service has been proposed to accommodate non-real-time traffic with packet size not exceeding a maximum length, such as TCP/IP based traffic. The GFR service not only guarantees a minimum throughput at ... Keywords: FIFO scheduling, Guaranteed frame rate, TCP/IP, Virtual push-out

Pi-Chung Wang; Chia-Tai Chan; Yaw-Chung Chen

2000-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Method for making MgO buffer layers on rolled nickel or copper ...  

Biomass and Biofuels; Building Energy Efficiency; Electricity Transmission; Energy Analysis; Energy Storage; Geothermal; ... (MOCVD), combustion CVD, ...

302

Evaluation of the Effective Moisture Penetration Depth Model for Estimating Moisture Buffering in Buildings  

SciTech Connect

This study examines the effective moisture penetration depth (EMPD) model, and its suitability for building simulations. The EMPD model is a compromise between the simple, inaccurate effective capacitance approach and the complex, yet accurate, finite-difference approach. Two formulations of the EMPD model were examined, including the model used in the EnergyPlus building simulation software. An error in the EMPD model we uncovered was fixed with the release of EnergyPlus version 7.2, and the EMPD model in earlier versions of EnergyPlus should not be used.

Woods, J.; Winkler, J.; Christensen, D.

2013-01-01T23:59:59.000Z

303

TCP receive buffer aware wireless multimedia streaming: an energy efficient approach  

Science Conference Proceedings (OSTI)

Shaping constant bit rate traffic into bursts has been proposed earlier for UDP-based multimedia streaming to save Wi-Fi communication energy of mobile devices. The relationship between the burst size and energy consumption of wireless interfaces is ...

Mohammad Ashraful Hoque; Matti Siekkinen; Jukka K. Nurminen

2013-02-01T23:59:59.000Z

304

Cascode buffer for monolithic voltage conversion operating at high input supply voltages  

E-Print Network (OSTI)

A high-to-low switching DC-DC converter that operates at input supply voltages up to two times as high as the maximum voltage permitted in a nanometer CMOS technology is proposed in this paper. The circuit technique is based on a cascode bridge that maintains the steady-state voltage differences among the terminals of all of the transistors within a range imposed by a specific fabrication technology. The proposed circuit technique permits the full integration of active and passive devices of a switching DC-DC converter with a high voltage conversion ratio in a standard low voltage CMOS process. An efficiency of 87.8 % is achieved for 3.6 volts to 0.9 volts conversion assuming

Volkan Kursun; Gerhard Schrom; Vivek K. De; Eby G. Friedman; Siva G. Narendra

2005-01-01T23:59:59.000Z

305

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

306

T-639: Debian update for libxml2 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Debian update for libxml2 39: Debian update for libxml2 T-639: Debian update for libxml2 June 7, 2011 - 3:35pm Addthis PROBLEM: libxml2 is vulnerable to buffer overflows, which allowed a crafted XML input file to potentially execute arbitrary code. PLATFORM: Package: libxml2 version 2.7.8. Other versions may also be affected ABSTRACT: Libxml2 XPath Nodeset Processing Vulnerability reference LINKS: Secunia Advisory: SA44817 Secunia Advisory: SA44711 DSA 2255-1 Vulnerability Report: Debian GNU/Linux 6.0 Download Package libxml2 Other Packages Related to libxml2 IMPACT ASSESSMENT: High Discussion: Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

307

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 13, 2012 September 13, 2012 U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code RSA BSAFE SSL-C Multiple Vulnerabilities September 12, 2012 U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code A remote user can cause arbitrary code to be executed on the target user's system. September 11, 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12,

308

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 22, 2013 March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services March 21, 2013 V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple iOS March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 18, 2013 V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code

309

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2012 1, 2012 U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. April 30, 2012 U-158: HP NonStop Server Java Multiple Vulnerabilities Multiple vulnerabilities have been reported in HP NonStop Server April 24, 2012 U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. April 20, 2012 U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability The vulnerability is caused due to a type casting error in the

310

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 19, 2013 March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 15, 2013 V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. March 14, 2013 V-111: Multiple vulnerabilities have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. March 11, 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 Microsoft Security Bulletin Advance Notification for March 2013. Microsoft

311

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 24, 2011 February 24, 2011 T-564: Vulnerabilities in Citrix Licensing administration components The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console. February 23, 2011 T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. February 22, 2011 T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow A vulnerability has been reported in Novell ZENworks Configuration

312

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2013 January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 10, 2013 V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat January 9, 2013 V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code Security updates available for Adobe Flash Player January 8, 2013 V-064: Microsoft Security Bulletin Advance Notification for January 2013 Microsoft Security Bulletin Advance Notification for January 2013 . Microsoft has posted 2 Critical Bulletins and 5 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of

313

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on March

314

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2012 19, 2012 U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in HP StorageWorks File Migration Agent. July 18, 2012 U-215: Oracle Critical Patch Update Advisory - July 2012 Critical Patch Updates are the primary means of releasing security fixes for Oracle products to customers with valid support contracts. They are released on the Tuesday closest to the 17th day of January, April, July and October. July 17, 2012 U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). July 16, 2012 U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

315

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2012 28, 2012 V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. December 27, 2012 V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. December 26, 2012 V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service A vulnerability was reported in Firefly Media Server December 25, 2012 V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM

316

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9, 2011 9, 2011 U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges A vulnerability was reported in the Linux Kernel. December 8, 2011 U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. December 7, 2011 U-054: Security Advisory for Adobe Reader and Acrobat This U3D memory corruption vulnerability (CVE-2011-2462) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that the vulnerability is being actively exploited in the wild in limited, targeted attacks against Adobe Reader 9.x on Windows. Adobe Reader X Protected Mode and Acrobat X Protected View

317

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 14, 2012 V-047: IBM Lotus Foundation Multiple Cross Site Scripting Two vulnerabilities have been reported in IBM Lotus Foundations. December 13, 2012 V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. December 12, 2012 V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions A vulnerability was reported in Adobe ColdFusion. December 11, 2012 V-044: IBM Informix Buffer Overflow in Processing SQL Statements Lets Remote Authenticated Users Execute Arbitrary Code A vulnerability was reported in IBM Informix. December 10, 2012 V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities Two vulnerabilities have been reported in Locale::Maketext module for Perl

318

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 23, 2011 November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 17, 2011 U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges A local user can obtain elevated privileges on the target system.. November 16, 2011 U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code A remote server can cause the target connected client to crash. November 9, 2011 U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated

319

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

320

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 28, 2013 February 28, 2013 V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges A vulnerability was reported in McAfee VirusScan Enterprise. February 26, 2013 V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability A vulnerability has been reported in multiple Honeywell products. February 25, 2013 V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service A vulnerability was reported in the Linux Kernel. February 19, 2013 V-094: IBM Multiple Products Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in multiple IBM products. February 18, 2013 V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges Two vulnerabilities were reported in Symantec PGP Desktop.

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

322

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2013 1, 2013 V-059: MoinMoin Multiple Vulnerabilities Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. December 31, 2012 V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. December 27, 2012 V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system. December 25, 2012

323

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2012 26, 2012 U-156: Red Hat update for JBoss Enterprise Portal Platform Update for JBoss Enterprise Portal Platform April 25, 2012 U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. April 24, 2012 U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system. April 23, 2012 U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service Two vulnerabilities were reported in EMC Data Protection Advisor. A remote

324

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS November 7, 2012 V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

325

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

326

U-003:RPM Package Manager security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03:RPM Package Manager security update 03:RPM Package Manager security update U-003:RPM Package Manager security update October 4, 2011 - 1:30pm Addthis PROBLEM: A vulnerability was reported in RPM Package Manager. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 4.9.1.1 and prior versions. ABSTRACT: RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: RPM Package Manager Advisory RHSA-2011:1349-1 SecurityTracker Alert ID: 1026134 CVE-2011-3378 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted RPM package that, when queried or installed by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code

327

V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Google Picasa BMP and TIFF Images Processing Vulnerabilities 6: Google Picasa BMP and TIFF Images Processing Vulnerabilities V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities March 21, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been discovered in Google Picasa PLATFORM: Google Picasa Version 3.9.0 build 136.09 for Windows/3.9.14.34 for Mac ABSTRACT: Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system. REFERENCE LINKS: Secunia Advisory SA51652 Picasa Release Notes IMPACT ASSESSMENT: High DISCUSSION: 1) A sign extension error when processing the color table of a BMP image can be exploited to cause a heap-based buffer overflow via a BMP image with a specially crafted "biBitCount" field. 2) The application bundles a vulnerable version of LibTIFF.

328

V-102: SUSE update for flash-player | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SUSE update for flash-player 2: SUSE update for flash-player V-102: SUSE update for flash-player March 1, 2013 - 6:00am Addthis PROBLEM: SUSE has issued an update for flash-player. PLATFORM: openSUSE 12.1 ABSTRACT: This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52416 openSUSE Adobe Security Bulletin APSB13-08 CVE-2013-0504 CVE-2013-0643 CVE-2013-0648 IMPACT ASSESSMENT: High DISCUSSION: This update resolves: 1. Permissions issue with the Flash Player Firefox sandbox. 2. Vulnerability in the ExternalInterface ActionScript feature, which can be exploited to execute malicious code. 3. Buffer overflow vulnerability in a Flash Player broker service, which can be used to execute malicious code.

329

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-127: Microsoft Security Bulletin MS12-020 - Critical Vulnerabilities in Remote Desktop Could Allow Remote Code Execution March 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability

330

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

331

Three-Dimensional Turbulent Bottom Density Currents from a High-Order Nonhydrostatic Spectral Element Model  

Science Conference Proceedings (OSTI)

Overflows are bottom gravity currents that supply dense water masses generated in high-latitude and marginal seas into the general circulation. Oceanic observations have revealed that mixing of overflows with ambient water masses takes place over ...

Tamay M. Özgökmen; Paul F. Fischer; Jinqiao Duan; Traian Iliescu

2004-09-01T23:59:59.000Z

332

U-077: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

overflow in libxml. CVE-2011-3919. A remote user can trigger a stack overflow in glyph handling.CVE-2011-3922. Impact: A remote user can create HTML that, when loaded by the...

333

CX-005502: Categorical Exclusion Determination | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

502: Categorical Exclusion Determination 502: Categorical Exclusion Determination CX-005502: Categorical Exclusion Determination Implement Savannah River National Laboratory Defense Nuclear Facilities Safety Board 2004-2 Gap Closure Activity CX(s) Applied: B2.3 Date: 02/24/2011 Location(s): Aiken, South Carolina Office(s): Environmental Management, Savannah River Operations Office Over the next four years, implement cost funded facility modifications associated with Defense Nuclear Facilities Safety Board Recommendation 2004-2 (Active Confinement Ventilation Systems) with the following titles: 1) B/C Off-Gas Exhaust Standby Fan Autostart, 2) E-Wing Supply and Exhaust Interlocks, 3) B/C Tertiary Exhaust Interlocks and 4) B/C CHEX HEPA Filter Blanks. DOCUMENT(S) AVAILABLE FOR DOWNLOAD CX-005502.pdf

334

V-211: IBM iNotes Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability

335

Weakly bound buffer layer as a template for metallic nano-clusters growth and film laser-patterning  

E-Print Network (OSTI)

OF A FRACKING FIRESTORMBY TIM LUCAS 4 dukenvironment #12;dukenvironment 2 COVER STORY 4 IN THE MIDST OF A FRACKING FIRESTORM Nicholas Researchers Lay Groundwork to Better Understand the Environmental Effects Abundance of Krill in Ice-Free Waters May be `Bad News' in Long Run 14 PERSONALLY SPEAKING: Fracking

Asscher, Micha

336

Comparative Study of Zn(O,S) Buffer Layers and CIGS Solar Cells Fabricated by CBD, ALD, and Sputtering: Preprint  

DOE Green Energy (OSTI)

Zn(O,S) thin films were deposited by chemical bath deposition (CBD), atomic layer deposition, and sputtering. Composition of the films and band gap were measured and found to follow the trends described in the literature. CBD Zn(O,S) parameters were optimized and resulted in an 18.5% efficiency cell that did not require post annealing, light soaking, or an undoped ZnO layer. Promising results were obtained with sputtering. A 13% efficiency cell was obtained for a Zn(O,S) emitter layer deposited with 0.5%O2. With further optimization of process parameters and an analysis of the loss mechanisms, it should be possible to increase the efficiency.

Ramanathan, K.; Mann, J.; Glynn, S.; Christensen, S.; Pankow, J.; Li, J.; Scharf, J.; Mansfield, L. M.; Contreras, M. A.; Noufi, R.

2012-06-01T23:59:59.000Z

337

Electrochemical concentration cell (ECC) ozonesonde pump efficiency measurements and tests on the sensitivity to ozone of buffered and  

E-Print Network (OSTI)

Electrochemical concentration cell (ECC) ozonesonde pump efficiency measurements and tests of new, direct measurements of the ozonesonde pump flow rate efficiency made in an environmental chamber using an oil bubble flowmeter developed at National Oceanic and Atmospheric Administration

Vömel, Holger

338

Enhancing the efficiency of SnS solar cells via band-offset engineering with a zinc oxysulfide buffer layer  

E-Print Network (OSTI)

S absorber layers without breaking vacuum. Indium tin oxide (ITO) (200 nm) was deposited at room temperature at the National Renewable Energy Laboratory (NREL), exhibiting an improved cell performance of Jsc ¼ 19.4mA/cm2 by vapor deposition of p-type tin(II) sulfide, SnS, and n-type zinc oxysulfide, Zn(O,S), using a device

Gordon, Roy

339

The Effects of Variations in Buffer Gas Mixing Ratios on Commercial Carbon Dioxide Cavity Ring-Down Spectroscopy Sensors  

Science Conference Proceedings (OSTI)

Primary gas standards, gas chromatography, and frequency-stabilized cavity ring-down spectroscopy measurements have been used to assess the effect of variations in the argon mixing ratio on the CO2 mixing ratios reported by commercial cavity ring-...

D. A. Long; L. Gameson; G.-W. Truong; K. Bielska; A. Cygan; J. T. Hodges; J. R. Whetstone; R. D. van Zee

340

Development of a Regional Climate Model for U.S. Midwest Applications. Part I: Sensitivity to Buffer Zone Treatment  

Science Conference Proceedings (OSTI)

A regional climate model (RCM) is being developed for U.S. Midwest applications on the basis of the newly released Pennsylvania State University–NCAR Fifth-Generation Mesoscale Model (MM5), version 3.3. This study determines the optimal RCM ...

Xin-Zhong Liang; Kenneth E. Kunkel; Arthur N. Samel

2001-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Analysis and minimization of power-transmission loss in locally daisy-chained systems by local energy buffering  

Science Conference Proceedings (OSTI)

Power-transmission loss can be a severe problem for low-power embedded systems organized in a daisy-chain topology. The loss can be so high that it can result in failure to power the load in the first place. The first contribution of this article is ... Keywords: Power distribution, daisy-chaining, embedded systems, energy storage, power management, sensors

Sehwan Kim; Pai H. Chou

2013-07-01T23:59:59.000Z

342

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated, and Buffered Indices  

E-Print Network (OSTI)

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated structures. This could happen if you want the students in your database class to implement some basic index structures such as the B+-tree and the linear hashing. Alternatively, you may want your Ph.D. students

Zhang, Donghui

343

Quality of service analysis for hybrid-ARQ  

E-Print Network (OSTI)

Data intensive applications, requiring reliability and strict delay constraints, have emerged recently and they necessitate a different approach to analyzing system performance. In my work, I establish a framework that relates physical channel parameters to the queueing performance for a single-user wireless system. I then seek to assess the potential benefits of multirate techniques, such as hybrid-ARQ (Automatic Repeat reQuest), in the context of delay-sensitive communications. Present methods of analysis in an information theoretic paradigm define capacity assuming that long codewords can be used to take advantage of the ergodic properties of the fading wireless channel. This definition provides only a limited characterization of the channel in the light of delay constraints. The assumption of independent and identically distributed channel realizations tends to over-estimate the system performance by not considering the inherent time correlation. A finite-state continuous time Markov channel model that I formulate enables me to partition the instantaneous data-rate received at the destination into a finite number of states, representing layers in a hybrid-ARQ scheme. The correlation of channel has been incorporated through level crossing rates as transition rates in the Markov model. The large deviation principle governing the buffer overflow of the Markov model, is very sensitive to channel memory, is tractable, and gives a good estimate of the system performance. Metrics such as effective capacity and probability of buffer overflow, that are obtained through large deviations have been related to the wireless physical layer parameters through the model. Using the above metrics under QoS constraints, I establish the quantitative performance advantage of using hybrid-ARQ over traditional systems. I conduct this inquiry by restricting attention to the case where the expected transmit power is fixed at the transmitter. The results show that hybrid-ARQ helps us in obtaining higher effective capacity, but it is very difficult to support delay sensitive communication over wireless channel in the absence of channel knowledge and dynamic power allocation strategies.

Gunaseelan, Nirmal K.

2008-05-01T23:59:59.000Z

344

U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing 2: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability April 20, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in OpenSSL PLATFORM: OpenSSL 0.x OpenSSL 1.x ABSTRACT: The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow. reference LINKS: Vendor Advisory Secunia Advisory 48847 CVE-2012-2110 IMPACT ASSESSMENT: High Discussion: A potentially exploitable vulnerability has been discovered in the OpenSSL function asn1_d2i_read_bio. Any application which uses BIO or FILE based functions to read untrusted

345

A Novel Cyber-Insurance for Internet Security  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

Pal, Ranjan; Psounis, Konstantinos

2011-01-01T23:59:59.000Z

346

Leak Pruning  

E-Print Network (OSTI)

Managed languages improve programmer productivity with type safety and garbage collection, which eliminate memory errors such as dangling pointers, double frees, and buffer overflows. However, programs may still leak memory if programmers forget to eliminate the last reference to an object that will not be used again. Leaks slow programs by increasing collector workload and frequency. Growing leaks crash programs. Instead of crashing, leak pruning extends program availability by predicting and reclaiming leaked objects at run time. Whereas garbage collection over-approximates live objects using reachability, leak pruning predicts dead objects and reclaims them based on how stale they are and the size of stale data structures. Leak pruning preserves semantics because it waits for heap exhaustion before reclaiming objects and then poisons references to objects it reclaims. If the program later tries to access these objects, the virtual machine (VM) throws an internal error. We implement leak pruning in a Java VM, show its overhead is low, and evaluate it on 10 leaking programs. Leak pruning does not help two programs, executes four substantial programs 1.6-35X longer, and executes four programs, including two leaks in Eclipse, for at least 24 hours. In the worst case, leak pruning defers fatal errors. In the best case, programs with unbounded memory requirements execute indefinitely and correctly in bounded memory with consistent throughput.

Michael D. Bond; Kathryn S. McKinley

2009-01-01T23:59:59.000Z

347

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Download CX-008279: Categorical Exclusion Determination Building 8 Compressor Aftercooler Rupture Disc Overflow Piping Project CX(s) Applied: B1.3, B1.15 Date:...

348

CX-008202: Categorical Exclusion Determination | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CX-008202: Categorical Exclusion Determination Renewable Energy Ground Mounted Photovoltaic Grid System Overflow CX(s) Applied: B5.16 Date: 03292012 Location(s): Other...

349

Accidental Gas Emission From Shallow Pressurized Aquifers At...  

Open Energy Info (EERE)

suggested that Alban Hills (Rome) is a quiescent and not an extinct volcano, as it produced Holocene eruptions and several lahars until Roman times by water overflow from...

350

Toward sustainable stormwater management : overcoming barriers to green infrastructure  

E-Print Network (OSTI)

With their high concentrations of impervious surface, urban areas generate stormwater runoff that overwhelms existing infrastructure causing flooding, sewer overflows, water pollution, and habitat degradation. Under pressure ...

Hammitt, Sarah A. (Sarah Ann)

2010-01-01T23:59:59.000Z

351

Banks, Teresa E -(tbanks) From: Information Security Office on behalf of SIPC  

E-Print Network (OSTI)

an overly long WebGL shader program. (CVE-2011-2988) A heap overflow issue affects the ANGLE library, which

Holliday, Vance T.

352

Ye et al. VOL. 3, NO. 8/AUGUST 2011/J. OPT. COMMUN. NETW. A59 Buffering and Flow Control in Optical  

E-Print Network (OSTI)

Switches for High Performance Computing Xiaohui Ye, Roberto Proietti, Yawei Yin, S. J. B. Yoo power consumption in high performance computing applications has sparked an interest in optical switches. In this paper, high performance computing refers to both traditional scientific computing and emerging warehouse

Kolner, Brian H.

353

Structural and optical studies of GaN pn-junction with AlN buffer layer grown on Si (111) by RF plasma enhanced MBE  

Science Conference Proceedings (OSTI)

GaN pn-junction grown on silicon substrates have been the focus in a number of recent reports and further effort is still necessary to improve its crystalline quality for practical applications. GaN has the high n-type background carrier concentration resulting from native defects commonly thought to be nitrogen vacancies. In this work, we present the growth of pn-junction of GaN on Si (111) substrate using RF plasma-enhanced molecular beam epitaxy (MBE). Both of the layers show uniformity with an average thickness of 0.709 {mu}m and 0.095 {mu}m for GaN and AlN layers, respectively. The XRD spectra indicate that no sign of cubic phase of GaN are found, so it is confirmed that the sample possessed hexagonal structure. It was found that all the allowed Raman optical phonon modes of GaN, i.e. the E2 (low), E1 (high) and A1 (LO) are clearly visible.

Yusoff, Mohd Zaki Mohd; Hassan, Zainuriah; Woei, Chin Che; Hassan, Haslan Abu; Abdullah, Mat Johar [Nano-Optoelectronics Research and Technology Laboratory School of Physics, Universiti Sains Malaysia, 11800 Penang, Malaysia and Department of Applied Sciences Universiti Teknologi MARA (UiTM) 13500 Permatang Pauh, Penang (Malaysia); Department of Applied Sciences Universiti Teknologi MARA (UiTM) 13500 Permatang Pauh, Penang (Malaysia)

2012-06-29T23:59:59.000Z

354

Evolution of AlN buffer layers on Silicon and the effect on the property of the expitaxial GaN film  

E-Print Network (OSTI)

The morphology evolution of high-temperature grown AlN nucleation layers on (111) silicon has been studied using atomic force microscopy (AFM). The structure and morphology of subsequently grown GaN film were characterized ...

Zang, Keyan

355

SUPPRESSION OF ANTIPHASE DISORDER IN GaAs GROWN ON RELAXED GeSi BUFFERS BY METAL-ORGANIC CHEMICAL VAPOR DEPOSITION  

E-Print Network (OSTI)

sublattices, the zinc-blende crystal structure possesses lower symmetry than the diamond cubic structure of wrong nearest-neighbor bonds, they are electrically active defects responsible for scattering and non of antiphase disorder requires control of the substrate surface structure prior to GaAs growth. The usage

356

Mostly digital ADCs for highly-scaled CMOS processes  

E-Print Network (OSTI)

block, (c) overflow logic truth table, (d) example overloadORC, labeled b[n-1]. A truth table is shown in Figure 17(c)b) Overflow Logic Truth Table: If a[n] > 7 & b[n-1] < 0, If

Taylor, Gerard E.

2011-01-01T23:59:59.000Z

357

CX-008279: Categorical Exclusion Determination | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Exclusion Determination CX-008279: Categorical Exclusion Determination Building 8 Compressor Aftercooler Rupture Disc Overflow Piping Project CX(s) Applied: B1.3, B1.15 Date:...

358

Valve for controlling solids flow  

DOE Patents (OSTI)

A valve for controlling the flow of solids comprises a vessel having an overflow point, an inlet line for discharging solids into the vessel positioned within the vessel such that the inlet line's discharge point is lower than the vessel's overflow point, and apparatus for introducing a fluidizing fluid into the vessel. The fluidizing fluid fluidizes the solids within the vessel so that they overflow at the vessel's overflow point. For the removal of nuclear waste product the vessel may be placed within a sealed container having a bottom connected transport line for transporting the solids to storage or other sites. The rate of solids flow is controlled by the flow rate of the fluidizing fluid and by V-notch weirs of different sizes spaced about the top of the vessel.

Staiger, M. Daniel (Idaho Falls, ID)

1985-01-01T23:59:59.000Z

359

Generation, Use, Disposal, and Management Options for CCA-Treated Wood  

E-Print Network (OSTI)

. Disturbed soil areas should use compost-amended soils and should otherwise be constructed to minimize soil, overflow parking areas, etc. Disturbed soil areas should use compost-amended soils and should otherwise

Florida, University of

360

POLLUTANT ASSOCIATIONS WITH PARTICULATES  

E-Print Network (OSTI)

Hydrocarbon SPLITT Split-Flow Thin-Cell STORET STORage and RETrieval database. NURP National Urban Runoff CSO Combined Sewer Overflow USEPA United States Environmental Protection Agency ORP Ortho

Pitt, Robert E.

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Stochastic Consequence Analysis for Waste Leaks  

SciTech Connect

This analysis evaluates the radiological consequences of potential Hanford Tank Farm waste transfer leaks. These include ex-tank leaks into structures, underneath the soil, and exposed to the atmosphere. It also includes potential misroutes, tank overflow

HEY, B.E.

2000-05-31T23:59:59.000Z

362

Plan B: A Buffered Memory Model for Java Delphine Demange2 Vincent Laporte2,1 Lei Zhao1 Suresh Jagannathan1 David Pichardie3,1 Jan Vitek1  

E-Print Network (OSTI)

the behavior of multithreaded programs in a portable, hardware agnostic, way. While experts have an intuitive to a specific hardware family, namely x86 multiprocessors. Although the BMM restricts the reorderings compilers to eliminate the conditional and hoist the assignments above the store to r1, thus making such an execution

Jagannathan, Suresh

363

Natural Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

and can provide a critical buffer between the built environment and the effects of climate change. Coastal vegetation can sometimes buffer storm surges; agricultural cover...

364

MARINE ECOLOGY PROGRESS SERIES Mar Ecol Prog Ser  

E-Print Network (OSTI)

predicts that leaves buffer macroenviron- mental variation, so that egg microenvironments are in fact

Dieckmann, Ulf

365

 

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Install bypass on makeup well water supply to cooling tower 285-11H per M-MT-H-07595. The location of the work is outdoors in the vicinity of, and Install bypass on makeup well water supply to cooling tower 285-11H per M-MT-H-07595. The location of the work is outdoors in the vicinity of, and adjacent to the 285-H basin and the 285-11H tower. This modification will not change the chemical or physical parameters of the water entering the 285-11H basin, nor will it change the ultimate destination of flush water or basin overflow. The only consequential change will be the chemical characteristics of the 285-H overflow. Due to the new bypass entering the western end of 285-11H, the makeup water will be mixed better than before, resulting in a pH near 7 by the time it overflows the south end of 285-H. The result will be greater pH stability of this water as it overflows to the H-12 Outfall.

366

 

NLE Websites -- All DOE Office Websites (Extended Search)

Install bypass on makeup well water supply to cooling tower 285-11H per M-MT-H-07595. The location of the work is outdoors in the vicinity of, and Install bypass on makeup well water supply to cooling tower 285-11H per M-MT-H-07595. The location of the work is outdoors in the vicinity of, and adjacent to the 285-H basin and the 285-11H tower. This modification will not change the chemical or physical parameters of the water entering the 285-11H basin, nor will it change the ultimate destination of flush water or basin overflow. The only consequential change will be the chemical characteristics of the 285-H overflow. Due to the new bypass entering the western end of 285-11H, the makeup water will be mixed better than before, resulting in a pH near 7 by the time it overflows the south end of 285-H. The result will be greater pH stability of this water as it overflows to the H-12 Outfall.

367

Neural-optimal control algorithm for real-time regulation of in-line storage in combined sewer systems  

Science Conference Proceedings (OSTI)

Attempts at implementing real-time control systems as a cost-effective means of minimizing the pollution impacts of untreated combined sewer overflows have largely been unsustained due to the complexity of the real-time control problem. Optimal real-time ... Keywords: Artificial intelligence, Combined sewers, Hydraulic sewer models, Neural networks, Optimal control, Real-time control, Urban stormwater management

Suseno Darsono; John W. Labadie

2007-09-01T23:59:59.000Z

368

December 18, 2007 INTELLIGENT FIRE ALARM SYSTEM  

E-Print Network (OSTI)

with a capacity of 110 gallons or less. o Emergency spill or overflow containment UST system that is expeditiously permits may also contain site- specific requirements and references to other applicable NFPA codes and/or standards. Examples of commonly cited NFPA requirements include: o Availability of emergency shut-off valves

369

Instructions for use Energy Crisis as Global Problem  

E-Print Network (OSTI)

endowed with coal, and about the year 1600 the British were mining places accessible to open-pit mining engine. Coal mines were overflowing with water, and pumps were needed to remove it. With the invention, new constraints began appearing. Coal mines required much human labor. As all the coal near

Tachizawa, Kazuya

370

Debris and Future Space Activities  

E-Print Network (OSTI)

Debris and Future Space Activities Prof. Joel R. Primack Physics Department University eleven year cycle, it heats the upper atmosphere and makes it expand so that debris and spacecraft in low which overflows occasionally and washes only the lowest hillsides clear of debris. Debris in orbit

California at Santa Cruz, University of

371

Aquatic Supplement Hood River Subbasin  

E-Print Network (OSTI)

crystal springs 4 Crystal Sp WD bypass reach to overflow? ? 4 dog river 3 City of TD none 3 no infoAppendix B Aquatic Supplement Contents Hood River Subbasin Tables and Figures: Table 1. Current estimated peak summer withdrawals from the Hood River Table 2. Historic lake stocking and fish introductions

372

De energierevolutie: de grootste uitdaging ooit  

E-Print Network (OSTI)

of uranium metal, alloy or chemical compound (including natural uranium), or of plutonium metal, alloy of the marshland (from overflowing ponds containing plutonium from the neighbouring AWE site 13 property was damaged from the plutonium intermingling with the topsoil. It was clear

Technische Universiteit Delft

373

pour obtenir le grade de Docteur de l'Universit Paris-Est  

E-Print Network (OSTI)

various hierarchical levels, technicians specializing in crops, biogas, co-operative officials cases, 3 are farms with a biogas digester, and 2 with pits that regu- larly overflow. This kind of farm the exclu- sive use of all the effluents produced on a State farm of 200 sows, which produces biogas

Paris-Sud XI, Université de

374

INSTITUTE OF PHYSICS PUBLISHING EUROPEAN JOURNAL OF PHYSICS Eur. J. Phys. 28 (2007) 215230 doi:10.1088/0143-0807/28/2/007  

E-Print Network (OSTI)

of nonlinear physics and stability analysis, they are generally introduced to students only in post gutter-like experiments where a liquid overflows from an overhang, as well as a numerical model-forming instabilities, is generally a further stage in the complexity of mathematical analysis. As a system involving

Brunet, Philippe

375

SLUDGE PARTICLE SEPAPATION EFFICIENCIES DURING SETTLER TANK RETRIEVAL INTO SCS-CON-230  

SciTech Connect

The purpose of this document is to release, into the Hanford Document Control System, FA1/0991, Sludge Particle Separation Efficiencies for the Rectangular SCS-CON-230 Container, by M. Epstein and M. G. Plys, Fauske & Associates, LLC, June 2009. The Sludge Treatment Project (STP) will retrieve sludge from the 105-K West Integrated Water Treatment System (IWTS) Settler Tanks and transfer it to container SCS-CON-230 using the Settler Tank Retrieval System (STRS). The sludge will enter the container through two distributors. The container will have a filtration system that is designed to minimize the overflow of sludge fines from the container to the basin. FAI/09-91 was performed to quantify the effect of the STRS on sludge distribution inside of and overflow out of SCS-CON-230. Selected results of the analysis and a system description are discussed. The principal result of the analysis is that the STRS filtration system reduces the overflow of sludge from SCS-CON-230 to the basin by roughly a factor of 10. Some turbidity can be expected in the center bay where the container is located. The exact amount of overflow and subsequent turbidity is dependent on the density of the sludge (which will vary with location in the Settler Tanks) and the thermal gradient between the SCS-CON-230 and the basin. Attachment A presents the full analytical results. These results are applicable specifically to SCS-CON-230 and the STRS filtration system's expected operating duty cycles.

DEARING JI; EPSTEIN M; PLYS MG

2009-07-16T23:59:59.000Z

376

PIPENETa wireless sensor network for pipeline monitoring  

Science Conference Proceedings (OSTI)

US water utilities are faced with mounting operational and maintenance costs as a result of aging pipeline infrastructures. Leaks and ruptures in water supply pipelines and blockages and overflow events in sewer collectors cost millions of dollars a ... Keywords: Intel mote platforms, pipeline monitoring, water supply systems, wireless sensor networks

Ivan Stoianov; Lama Nachman; Sam Madden; Timur Tokmouline

2007-04-01T23:59:59.000Z

377

Energy recovery in SUDS towards smart water grids: A case study Helena M. Ramos a,n  

E-Print Network (OSTI)

flooding while fully utilizing the available resources. Flood drainage systems are infrastructures, together with the ageing of the existing drainage infrastructure, to Contents lists available at Science exceeding the drainage capacity. The overflowing of roads, properties and infrastructures causes not just

Diggavi, Suhas

378

Evolution of the Deep Water in the Canadian Basin in the Arctic Ocean  

Science Conference Proceedings (OSTI)

An overflow of magnitude 0.25 Sv (Sv ? 106 m?3 s?1) has been predicted to enter the Makarov Basin (part of the Canadian Basin in the Arctic Ocean) from the Eurasian Basin via a deep gap in the dividing Lomonosov ridge. The authors argue that this ...

M-L. Timmermans; Chris Garrett

2006-05-01T23:59:59.000Z

379

(Monkey & Banana Problem, MBP)  

E-Print Network (OSTI)

. , , hybridization, ligation, PCR, Gel , . MBP . . , DNA) PCR : (4) gel : PCR (2) MBP . 5 6 . 5. (3) , (4) . 3) . PCR #12; , . (4) QIAquick Gel Extraction Kit (QIAGEN, USA) . kit QG buffer, PE buffer

380

Overview  

E-Print Network (OSTI)

Subject: ESP-SCSI for Parameter Data This proposal defines a mechanism for applying SA parameter data to descriptors that are transferred in data-in buffer and/or data-out buffer parameter data.

From Ralph; O. Weber; Matt Ball; David Black

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Hydrocarbon-free resonance transition 795 nm rubidium laser  

E-Print Network (OSTI)

transition 795-nm rubidium laser," Opt. Lett. 32, 2423- S.transition 795- nm rubidium laser using 3 He buffer gas",transition 795-nm Rubidium laser with He buffer gas" (

Wu, Sheldon Shao Quan

2009-01-01T23:59:59.000Z

382

RIP: An Efficient Hybrid Repeater Insertion Scheme for Low Power Xun Liu Yuantao Peng  

E-Print Network (OSTI)

and Systems, 1990. [12] N. Hedenstierna and K. O. Jeppson. CMOS circuit speed and buffer optimization. IEEE

Paris-Sud XI, Université de

383

Modeling and Layout Optimization of VLSI Devices and Interconnects In Deep Submicron Design  

E-Print Network (OSTI)

. Jeppson, "CMOS Circuit Speed and Buffer Optimization," IEEE Trans. on Computer-Aided Design, 1987, pp. 270

Cong, Jason "Jingsheng"

384

An Ultra-Low-Power Power Management IC for Energy-Scavenged Wireless Sensor Nodes  

E-Print Network (OSTI)

as an energy buffer, although the use of a supercapacitor is also feasible. The electromagnetic shaker utilizes

Sanders, Seth

385

BiCMOS Sampling Circuits for High-Speed Data Converters  

E-Print Network (OSTI)

the power consumption of the buffer, 6 parallel devices werewhere power consumption is critical [9]. InP devices are

Madsen, Kristian Norgaard

386

Reactive Transport and Coupled THM Processes in Engineering Barrier Systems (EBS)  

E-Print Network (OSTI)

installation and initial water intake of the buffer over asaturated with water. Water intake is a slow process because

Steefel, Carl

2010-01-01T23:59:59.000Z

387

Low-energy Electron Reflectivity from Graphene R. M. Feenstra, N. Srivastava, Qin Gao, and M. Widom  

E-Print Network (OSTI)

( surface, prepared in disilane, for which a graphene-like buffer layer also exists and can be decouple

Feenstra, Randall

388

Subunit interactions and protein-DNA interactions of the Drosophila melanogaster small nuclear RNA activating protein complex  

E-Print Network (OSTI)

fusion protein, prepare 20ml of HEMG wash buffer and store it in the refrigerator so it will be cold

Titus, Mitchell

2007-01-01T23:59:59.000Z

389

Tutorial T3 Traffic Engineering in IP/MPLS Networks  

E-Print Network (OSTI)

; Policing; Buffer management usec #12;Road Map · TE and QoS Management in IP (datagram) Networks: ­ Routing

Elwalid, Anwar

390

Evaluate Si Layers: Cooperative Research and Development Final Report, CRADA Number CRD-07-255  

DOE Green Energy (OSTI)

Evaluate Si layers based on heteroepitaxial Si growth on RABITS textured metal substrates coated with textured buffer layers.

Teplin, C.

2013-04-01T23:59:59.000Z

391

Biogeosciences, 5, 407419, 2008 www.biogeosciences.net/5/407/2008/  

E-Print Network (OSTI)

+ pumps 64 Ca2+ buffers 65 #12;viii ·Table of Contents Simulation Methods 66 Simulations of a Biophysical

Paris-Sud XI, Université de

392

Photoelectrodialytic cell  

DOE Patents (OSTI)

A multicompartment photoelectrodialytic demineralization cell is provided with a buffer compartment interposed between the product compartment and a compartment containing an electrolyte solution. Semipermeable membranes separate the buffer compartment from the product and electrolyte compartments. The buffer compartment is flushed to prevent leakage of the electrolyte compartment from entering the product compartment.

Murphy, George W. (2328 Ashwood, Norman, OK 73069)

1983-01-01T23:59:59.000Z

393

Improved photoelectrodialytic cell  

DOE Patents (OSTI)

A multicompartment photoelectrodialytic demineralization cell is provided with a buffer compartment interposed between the product compartment and a compartment containing an electrolyte solution. Semipermeable membranes separate the buffer compartment from the product and electrolyte compartments. The buffer compartment is flushed to prevent leakage of the electrolyte compartment from entering the product compartment.

Murphy, G.W.

1981-08-14T23:59:59.000Z

394

CX-006972: Categorical Exclusion Determination | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: Categorical Exclusion Determination 72: Categorical Exclusion Determination CX-006972: Categorical Exclusion Determination 285-H Cooling Tower Basin Well Water Makeup Supply Bypass CX(s) Applied: B1.5 Date: 09/16/2011 Location(s): Aiken, South Carolina Office(s): Environmental Management, National Energy Technology Laboratory Install bypass on makeup well water supply to cooling tower 285-11H per M-MT-H-07595. The location of the work is outdoors in the vicinity of, and adjacent to the 285-H basin and the 285-11H tower. This modification will not change the chemical or physical parameters of the water entering the 285-11H basin, nor will it change the ultimate destination of flush water or basin overflow. The only consequential change will be the chemical characteristics of the 285-H overflow. Due to the new bypass entering the

395

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

211: IBM iNotes Multiple Vulnerabilities 211: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related to MIME mail is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) An integer overflow error within the DWA9W ActiveX control can be exploited to execute arbitrary code.

396

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 20160 of 28,905 results. 51 - 20160 of 28,905 results. Article DOE Issues Notice of Proposed Rulemaking to Improve Energy Efficiency Enforcement Process Today, the Department of Energy announced a Notice of Proposed Rulemaking seeking comment on proposed reforms designed to improve its energy efficiency certification and enforcement regulations. http://energy.gov/gc/articles/doe-issues-notice-proposed-rulemaking-improve-energy-efficiency-enforcement-process Article U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. http://energy.gov/cio/articles/u-202-apple-quicktime-multiple-stack-overflow-vulnerabilities Article U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases

397

Device and method for automated separation of a sample of whole blood into aliquots  

DOE Patents (OSTI)

A device and a method for automated processing and separation of an unmeasured sample of whole blood into multiple aliquots of plasma. Capillaries are radially oriented on a rotor, with the rotor defining a sample chamber, transfer channels, overflow chamber, overflow channel, vent channel, cell chambers, and processing chambers. A sample of whole blood is placed in the sample chamber, and when the rotor is rotated, the blood moves outward through the transfer channels to the processing chambers where the blood is centrifugally separated into a solid cellular component and a liquid plasma component. When the rotor speed is decreased, the plasma component backfills the capillaries resulting in uniform aliquots of plasma which may be used for subsequent analytical procedures.

Burtis, Carl A. (Oak Ridge, TN); Johnson, Wayne F. (Loudon, TN)

1989-01-01T23:59:59.000Z

398

Blacksville No. 2 Coal Preparation Plant final report  

Science Conference Proceedings (OSTI)

This report discusses an investigation of the effects of washing on the concentrations of selected metals and non-metals in coal. The investigation concerned the Blacksville No. 2 coal preparation plant of CONSOL Inc. Samples of four solids and three water streams were collected at the plant with the assistance of CONSOL. The solids were the raw coal, the product coal, and both coarse and fine grades of refuse. The water streams analyzed were input water (a mixture of makeup water and recycled thickener overflow), output water (thickener overflow), and water from the thickener underflow. The contaminants determined in these materials were 16 trace metals, 5 major metals, and four non-metals.

NONE

1995-03-28T23:59:59.000Z

399

High level radioactive waste vitrification process equipment component testing  

Science Conference Proceedings (OSTI)

Remote operability and maintainability of vitrification equipment were assessed under shielded-cell conditions. The equipment tested will be applied to immobilize high-level and transuranic liquid waste slurries that resulted from plutonium production for defense weapons. Equipment tested included: a turntable for handling waste canisters under the melter; a removable discharge cone in the melter overflow section; a thermocouple jumper that extends into a shielded cell; remote instrument and electrical connectors; remote, mechanical, and heat transfer aspects of the melter glass overflow section; a reamer to clean out plugged nozzles in the melter top; a closed circuit camera to view the melter interior; and a device to retrieve samples of the glass product. A test was also conducted to evaluate liquid metals for use in a liquid metal sealing system.

Siemens, D.H.; Heath, W.O.; Larson, D.E.; Craig, S.N.; Berger, D.N.; Goles, R.W.

1985-04-01T23:59:59.000Z

400

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - 17930 of 29,416 results. 21 - 17930 of 29,416 results. Article U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. http://energy.gov/cio/articles/u-202-apple-quicktime-multiple-stack-overflow-vulnerabilities Article U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases A vulnerability was reported in OpenLDAP. The system may use a weaker cipher suite than specified. http://energy.gov/cio/articles/u-185-openldap-may-ignore-tlsciphersuite-setting-some-cases Article U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Deflate decompressor  

Science Conference Proceedings (OSTI)

A deflate decompressor includes at least one decompressor unit, a memory access controller, a feedback path, and an output buffer unit. The memory access controller is coupled to the decompressor unit via a data path and includes a data buffer to receive the data stream and temporarily buffer a first portion the data stream. The memory access controller transfers fixed length data units of the data stream from the data buffer to the decompressor unit with reference to a memory pointer pointing into the memory buffer. The feedback path couples the decompressor unit to the memory access controller to feed back decrement values to the memory access controller for updating the memory pointer. The decrement values each indicate a number of bits unused by the decompressor unit when decoding the fixed length data units. The output buffer unit buffers a second portion of the data stream after decompression.

Hamlet, Jason R. (Albuquerque, NM); Robertson, Perry J. (Albuquerque, NM); Pierson, Lyndon G. (Albuquerque, NM); Olsberg, Ronald R. (Albuquerque, NM)

2012-02-28T23:59:59.000Z

402

Tankathon-A Process Plant Simulation  

E-Print Network (OSTI)

Tankathon is a simulation of a process plant in a computer generated environment. Interaction and control in three dimensional control systems are studied. The simulated "process" consists of seven tanks containing a "liquid" flowing from tanks to tanks. The goal of the "plant manager", the user, is to keep the tanks from draining or overflowing. The user can interact with valves in the pipes connecting the tanks in order to regulate the liquid flow and check the flow rate.

Kai-Mikael Jää-Aro

1992-01-01T23:59:59.000Z

403

M-Area Hazardous Waste Management Facility. Fourth Quarter 1994, Groundwater Monitoring Report  

SciTech Connect

The unlined settling basin operated from 1958 until 1985, receiving waste water that contained volatile organic solvents used for metal degreasing and chemical constituents and depleted uranium from fuel fabrication process in M Area. The underground process sewer line transported M-Area process waste waters to the basin. Water periodically overflowed from the basin through the ditch to the seepage area adjacent to the ditch and to Lost Lake.

Chase, J.A.

1995-04-20T23:59:59.000Z

404

WTP Calculation Sheet: Determining the LAW Glass Former Constituents and Amounts for G2 and Acm Models. 24590-LAW-M4C-LFP-00002, Rev. B  

SciTech Connect

The purpose of this calculation is to determine the LAW glass former recipe and additives with their respective amounts. The methodology and equations contained herein are to be used in the G2 and ACM models until better information is supplied by R&T efforts. This revision includes calculations that determines the mass and volume of the bulk chemicals/minerals needed per batch. Plus, it contains calculations (for the G2 model) to help prevent overflow in LAW Feed Preparation Vessel.

Gimpel, Rodney F.; Kruger, Albert A.

2013-12-16T23:59:59.000Z

405

Process for particulate removal from coal liquids  

DOE Patents (OSTI)

Suspended solid particulates are removed from liquefied coal products by first subjecting such products to hydroclone action for removal in the underflow of the larger size particulates, and then subjecting the overflow from said hydroclone action, comprising the residual finer particulates, to an electrostatic field in an electrofilter wherein such finer particulates are deposited in the bed of beads of dielectric material on said filter. The beads are periodically cleaned by backwashing to remove the accumulated solids.

Rappe, Gerald C. (Macungie, PA)

1983-01-01T23:59:59.000Z

406

Nuclear waste solidification  

DOE Patents (OSTI)

High level liquid waste solidification is achieved on a continuous basis by atomizing the liquid waste and introducing the atomized liquid waste into a reaction chamber including a fluidized, heated inert bed to effect calcination of the atomized waste and removal of the calcined waste by overflow removal and by attrition and elutriation from the reaction chamber, and feeding additional inert bed particles to the fluidized bed to maintain the inert bed composition.

Bjorklund, William J. (Richland, WA)

1977-01-01T23:59:59.000Z

407

Effect of protein kinase C inhibitors on the actions of phorbol esters on vascular tone and adrenergic transmission in the isolated rat kidney  

SciTech Connect

The effect of protein kinase C (PKC) inhibitors 1-(5-isoquinoline-sulfonyl)-2-methylpiperazine (H-7), polymyxin B (PMB), D-sphingosine (SPH), sangivamycin (SNG) and staurosporin (ST) on the action of PKC activators phorbol 12,13-dibutyrate (PDBu) and 12-o-tetradecanoylphorbol-13-acetate (TPA), on adrenergic neuroeffector events was investigated to determine the contribution of PKC in adrenergic transmission in the rat kidney. Infusion of TPA (5 x 10(-6) mM) or PDBu (6 x 10(-6) mM) produced renal vasoconstriction and enhanced the overflow of tritium elicited by periarterial renal nerve stimulation (RNS) (2 Hz) in the isolated rat kidney perfused with Tyrode's solution and prelabeled with (3H)norepinephrine. H-7 (2.7 x 10(-3) mM) and ST (2 x 10(-5) mM) did not alter RNS-induced overflow of tritium but attenuated the vasoconstrictor response to RNS and exogenous NE. PMB (1 x 10(-8) mM) and SPH (3.3 x 10(-4) mM) but not SNG (3.3 x 10(-3) mM) attenuated the RNS-induced overflow of tritium but increased the basal renal vascular tone and enhanced the vasoconstrictor response to RNS and exogenous NE. H-7, PMB, SPH, SNG or ST failed to alter the effects of PDBu to increase basal vascular tone and the overflow of tritium and the increase in renal vasoconstriction to RNS. PMB at 1 x 10(-9) mM but not at 1 x 10(-8) mM and SPH (3.3 x 10(-4) mM) but not H-7, SNG or ST inhibited the effect of TPA to increase the overflow of tritium. The effect of TPA on the vasoconstrictor response to RNS or to increase basal vascular tone was not altered by PKC inhibitors. These data suggest that in the rat kidney, PKC is either resistant to the actions of H-7, PMB, SPH, SNG and ST, or PDBu and TPA produce renal vasoconstriction and facilitate adrenergic transmission by a mechanism unrelated to PKC activation.

Sehic, E.; Malik, K.U. (Univ. of Tennessee, Memphis (USA))

1990-05-01T23:59:59.000Z

408

Internode data communications in a parallel computer  

DOE Patents (OSTI)

Internode data communications in a parallel computer that includes compute nodes that each include main memory and a messaging unit, the messaging unit including computer memory and coupling compute nodes for data communications, in which, for each compute node at compute node boot time: a messaging unit allocates, in the messaging unit's computer memory, a predefined number of message buffers, each message buffer associated with a process to be initialized on the compute node; receives, prior to initialization of a particular process on the compute node, a data communications message intended for the particular process; and stores the data communications message in the message buffer associated with the particular process. Upon initialization of the particular process, the process establishes a messaging buffer in main memory of the compute node and copies the data communications message from the message buffer of the messaging unit into the message buffer of main memory.

Archer, Charles J.; Blocksome, Michael A.; Miller, Douglas R.; Parker, Jeffrey J.; Ratterman, Joseph D.; Smith, Brian E.

2013-09-03T23:59:59.000Z

409

electronic reprint Synchrotron  

E-Print Network (OSTI)

in a Laemmli buffer on a PHAST gel system (Amersham Pharmacia Biotech) at 250 V, 10.0 mA, 288 K and stained

Wallace, Bonnie Ann

410

Capillary Electrophoresis Fundamentals and Troubleshooting ...  

Science Conference Proceedings (OSTI)

... and buffer problems – formamide, urea, water, salt concentration, free ... shift in temperature of the heat plate can ... Vial caps will transfer low levels of ...

2009-03-31T23:59:59.000Z

411

Agenda for Utah DNA Training May 13-14, 2009 Salt Lake ...  

Science Conference Proceedings (OSTI)

... and buffer problems – formamide, urea, water, salt concentration, free ... shift in temperature of the heat plate can ... Vial caps will transfer low levels of ...

2009-05-08T23:59:59.000Z

412

COMPREHENSIVE RISK ASSESSMENT  

Office of Legacy Management (LM)

KEY Upper Walnut Drainage Inter - Drainage West Area Wind Blown Area Rock Creek Drainage Industrial Area Upper Woman Drainage Southeast Buffer Zone Area Lower Woman Drainage...

413

Short Tandem Repeat Analysis for Human Identity Testing  

Science Conference Proceedings (OSTI)

... 7. Fill the anode buffer reservoir to the red line with 1X Genetic ... Rapid PCR for identity testing using a battery-powered miniature thermal cycler. ...

2003-11-24T23:59:59.000Z

414

NIST Lyman-Alpha Neutron Detector (LAND)  

Science Conference Proceedings (OSTI)

... the addition of noble gas buffer gases has been ... is replaced with a noble gas, for example ... programs for non-proliferation purposes - oil-well logging ...

2012-11-16T23:59:59.000Z

415

An Evaluation of the Forgeability of Delta Processed Udimet Alloy ...  

Science Conference Proceedings (OSTI)

process sequence and an inventory buffer. REFERENCES. 1. S. Shingo,. A Study of the Toyota Production. Svstem From an. Industrial. Ensineerinq. Viewpoint,.

416

Computational Design of Complex Semiconductor Materials for ...  

Science Conference Proceedings (OSTI)

Application of Computational Thermodynamics in Solid Oxide Fuel Cell ... Electrical Properties of Point Defects in CdS and ZnS Thin-film PV Buffer Layers.

417

Dependence of Self-Assembled Peptide Hydrogel Network ...  

Science Conference Proceedings (OSTI)

... However, the introduction of a pH trigger (125 mM borate buffer ... For instance, poor solubility in nanotube and clay dispersions50 and ... Colloid Polym. ...

2011-02-28T23:59:59.000Z

418

Protecting Computer Systems Against Power Transients  

Science Conference Proceedings (OSTI)

... protection may be more important than some data loss. ... by a telephone or other network link to ... are buffered by the computer's power supply but ...

2013-05-17T23:59:59.000Z

419

Capillary electrophoresis-electrochemical detection microchip device and supporting circuits  

DOE Patents (OSTI)

The present invention is a capillary electrophoresis device, comprising a substrate; a first channel in the substrate, and having a buffer arm and a detection arm; a second channel in the substrate intersecting the first channel, and having a sample arm and a waste arm; a buffer reservoir in fluid communication with the buffer arm; a waste reservoir in fluid communication with the waste arm; a sample reservoir in fluid communication with the sample arm; and a detection reservoir in fluid communication with the detection arm. The detection arm and the buffer arm are of substantially equal length.

Jackson, Douglas J. (New Albany, IN); Roussel, Jr., Thomas J. (Louisville, KY); Crain, Mark M. (Georgetown, IN); Baldwin, Richard P. (Louisville, KY); Keynton, Robert S. (Louisville, KY); Naber, John F. (Prospect, KY); Walsh, Kevin M. (Louisville, KY); Edelen, John. G. (Versailles, KY)

2008-03-18T23:59:59.000Z

420

Monitoring of Computer Installations for Power Line ...  

Science Conference Proceedings (OSTI)

... Minutes," is based on 65 outages monitored during ... a certain number of minutes of power buffering ... The average outage rate was 0.6 incidentslmonth ...

2013-05-17T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Time and Frequency from A to Z: Re to Ru  

Science Conference Proceedings (OSTI)

... The natural frequency of an oscillator. ... The optical beam from the rubidium lamp pumps the 87 Rb buffer gas atoms into a particular energy state. ...

2010-10-05T23:59:59.000Z

422

Published: June 17, 2011 r 2011 American Chemical Society 9040 dx.doi.org/10.1021/jp201402h |J. Phys. Chem. B 2011, 115, 90409049  

E-Print Network (OSTI)

. 2004, 2006). Buffers SDS-buffer: 5 % (w/v) SDS, 0.025 % (w/v) NaN3, 50 mM sodium phosphate, pH 7.0 SDS1 by incubating PM (1 g L-1 ) in SDS1-buffer for 2 h at room temperature in the dark. A solution of A8(a.u.)absorbance(a.u.) a b Fig. 3 Renaturation by dialysis. PM was denatured in 2.5 % SDS (SDS1/buffer). BO/SDS samples (1 g

Biswas, Ranjit

423

Existence and Uniqueness of Periodic Solutions of a Lienard Equation with Delay  

E-Print Network (OSTI)

.1% SDS, 1% BSA and then hybridized for 16h at 420 C in a buffer with a final concen- tration of 5x SSC, 0

Martin, Ralph R.

424

Parallel Sparse Polynomial Division Using Heaps - CECM - Simon ...  

E-Print Network (OSTI)

reduce contention by up to an order of magnitude. We first used the trick of caching shared variables in the circular buffers of the parallel multiplication algorithm ...

425

Kangley - Echo Lake Transmission Line Project, Final Environmental...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Clean Water Act. Reduce off- site tracking of sediment and the generation of dust. Leave vegetative buffers along stream courses to minimize erosion and bank instability....

426

Why Is It Washing Away? Advocacy Groups and the Framing of Louisiana's Coastal Wetlands Loss in Local Newspapers.  

E-Print Network (OSTI)

??Louisianas coastal wetlands provide a habitat for diverse wildlife, recreational opportunities for Louisiana residents and tourists, and an important natural buffer between communities and powerful… (more)

Harang, Paul

2009-01-01T23:59:59.000Z

427

Standard Reference Material 2366 for Measurement of ...  

Science Conference Proceedings (OSTI)

... buffer and sterile perfluoroalkoxy (PFA) plastic bottles. ... consecutive tubes in the packaging process; therefore ... R package version 3.1e107, 2013 33. ...

2013-04-16T23:59:59.000Z

428

Progress towards high precision measurements on ultracold metastable hydrogen and trapping deuterium  

E-Print Network (OSTI)

(cont.) not achieve deuterium trapping through helium-surface cooling. It is proposed that buffer gas loading can be used to cryogenically cool and trap deuterium.

Steinberger, Julia K., 1974-

2004-01-01T23:59:59.000Z

429

Complete Fiber/Copper Cable Solution for Long-Term Temperature...  

Open Energy Info (EERE)

Draka will develop the required advances in buffer tubing, cladding, wire insulation materials and cable packaging as well as coordinate activities of other...

430

DrewLatta_CV_11_2010  

NLE Websites -- All DOE Office Websites (Extended Search)

Proposal title: Role of Fe and S as redox buffers that mediate the subsurface mobility of uranium * Awarded user facility time on electron microscopes U.S. DOE...

431

Thermodynamics of Metallic Nanoalloys: Towards an Understanding ...  

Science Conference Proceedings (OSTI)

... are investigated, where GBs act as buffer layer accommodating excess components. ... First Order Structural Transformations in Symmetrical Tilt S5 Grain ...

432

NEWTON's General Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

General Science Archive: Loading Most Recent General Science Questions: What is Equilibrium? Banana and Human Genetics Hair Examination Body Buffer Action Jellyfish : Plant or...

433

Individual tree species identification using LIDAR-derived crown structures and intensity data.  

E-Print Network (OSTI)

??Tree species identification is important for a variety of natural resource management and monitoring activities including riparian buffer characterization, wildfire risk assessment, biodiversity monitoring, and… (more)

Kim, Sooyoung

2008-01-01T23:59:59.000Z

434

Hydrothermal energy extraction, Auburn, New York: Final report: Volume 2, Chapters 6-10  

DOE Green Energy (OSTI)

This paper discusses a hydrothermal energy extraction system in detail. General topics covered are: Reservoir circulation loop; HVAC buffer loop; and automatic temperature control system. (LSP)

Castor, T.P.

1988-03-01T23:59:59.000Z

435

216-B-3 expansion ponds closure plan  

SciTech Connect

This document describes the activities for clean closure under the Resource Conservation and Recovery Act of 1976 (RCRA) of the 216-B-3 Expansion Ponds. The 216-B-3 Expansion Ponds are operated by the US Department of Energy, Richland Operations Office (DOE-RL) and co-operated by Westinghouse Hanford Company (Westinghouse Hanford). The 216-B-3 Expansion Ponds consists of a series of three earthen, unlined, interconnected ponds that receive waste water from various 200 East Area operating facilities. The 3A, 3B, and 3C ponds are referred to as Expansion Ponds because they expanded the capability of the B Pond System. Waste water (primarily cooling water, steam condensate, and sanitary water) from various 200 East Area facilities is discharged to the Bypass pipe (Project X-009). Water discharged to the Bypass pipe flows directly into the 216-B-3C Pond. The ponds were operated in a cascade mode, where the Main Pond overflowed into the 3A Pond and the 3A Pond overflowed into the 3C Pond. The 3B Pond has not received waste water since May 1985; however, when in operation, the 3B Pond received overflow from the 3A Pond. In the past, waste water discharges to the Expansion Ponds had the potential to have contained mixed waste (radioactive waste and dangerous waste). The radioactive portion of mixed waste has been interpreted by the US Department of Energy (DOE) to be regulated under the Atomic Energy Act of 1954; the dangerous waste portion of mixed waste is regulated under RCRA.

1994-10-01T23:59:59.000Z

436

ISSN0249-6399ISRNINRIA/RR--7886--FR+ENG Project-Team ROMA  

E-Print Network (OSTI)

- tributed platform such as a grid. This kind of applications is used to process large data sets or data provide an optimal algorithm for constellations with identical buffer capacities. When buffer sizes type pipe- line exécutées sur des platformes distribuées avec des temps de reconfiguration. Dans ce

Paris-Sud XI, Université de

437

Frequency and diversity of small cryptic plasmids in the genus Rahnella  

E-Print Network (OSTI)

, the membrane was pre-hybridised with Church buffer [58] containing 100 ?g/ml freshly denaturated herring sperm DNA. The probe was prepared by PCR: a 50 ?l reaction contained 1 U GoTaq (Promega, Madison, WI), 10 ?l 5× buffer containing Mg2+, 1 ng pHW4594...

Rozhon, Wilfried; Petutschnig, Elena; Khan, Mamoona; Summers, David K; Poppenberger, Brigitte

2010-02-19T23:59:59.000Z

438

American Chemical Society Division of Colloid and Surface Chemistry  

E-Print Network (OSTI)

was concentrated by ultrafiltration using an Amicon YM-10 cell membrane, buffer exchanged against 10% ACN and 0L by ultrafiltration using an Amicon stirred cell concentrator with a YM-10 membrane, and the buffer was exchanged evaporator to remove ACN, and then concentrated to 30 mL by ultrafiltration using an Amicon stirred cell

Wagner, Oliver

439

Publications by number 1. Synthesis of rhodium (II) pyrazolate complexes. Crystal structure of tetra-m-3,5-  

E-Print Network (OSTI)

was concentrated by ultrafiltration using an Amicon YM-10 cell membrane, buffer exchanged against 10% ACN and 0L by ultrafiltration using an Amicon stirred cell concentrator with a YM-10 membrane, and the buffer was exchanged evaporator to remove ACN, and then concentrated to 30 mL by ultrafiltration using an Amicon stirred cell

Alvarez, Pedro J.

440

Optical Spectroscopic Diagnostics Of Dusty Plasma In RF Discharge  

Science Conference Proceedings (OSTI)

The parameters of the buffer plasma containing dust particles were measured by means of spectroscopic methods. The change in the emission spectrum of the buffer plasma with addition of dust was observed. It seems to relate to changing in temperature and number density of electrons due to the influence of dusts.

Orazbayev, S. A.; Jumagulov, M. N.; Dosbolayev, M. K.; Silamiya, M.; Ramazanov, T. S. [IETP, Al Farabi Kazakh National University, 96a, Tole bi, Almaty, 050012 (Kazakhstan); Boufendi, L. [Universite d'Orleans, 14 Rue d'Issoudun, B.P. 6744-45067 Orleans Cedex 2 (France)

2011-11-29T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

A high-performance ATM switch based on modified shuffle-exchange network  

Science Conference Proceedings (OSTI)

This paper presents an output buffering ATM switch, called modified shuffle-exchange network (MSN) that is obtained by inserting a connection pattern just after every other shuffle-exchange stage. The purpose of modifying a shuffle-exchange network by ... Keywords: Destination tag routing scheme, Internal conflict, Output buffering ATM switch, Performance evaluation, Shuffle-exchange network

Hasan Cam

1999-01-01T23:59:59.000Z

442

Alternative Window Schemes for CuInSe2-Based Solar Cells Final Report: 3 November 1995-December 1997  

DOE Green Energy (OSTI)

This work demonstrated high-efficiency CIGS cells based on highly resistive ZnO buffer layers grown by MOCVD. One cell based on NREL CIGS and a ZnO buffer layer exhibited an active-area efficiency of nearly 14%. This result is one of the best efficiencies reported for a ''direct'' ZnO/CIGS cell made with a vacuum process.

Olsen, L.C. (Electronic Materials Laboratory: Washington State University at Tri-Cities)

1998-10-26T23:59:59.000Z

443

Gas mixtures for spark gap closing switches  

DOE Patents (OSTI)

Gas mixtures for use in spark gap closing switches comprised of fluorocarbons and low molecular weight, inert buffer gases. To this can be added a third gas having a low ionization potential relative to the buffer gas. The gas mixtures presented possess properties that optimized the efficiency spark gap closing switches. 6 figs.

Christophorou, L.G.; McCorkle, D.L.; Hunter, S.R.

1987-02-20T23:59:59.000Z

444

16.810 (16.682)16.810 (16.682) Engineering Design and Rapid PrototypingEngineering Design and Rapid Prototyping  

E-Print Network (OSTI)

to reconfigure the plant? #12;16.810 (16.682) 5 Life Cycle: Conceive, Design, Implement 1 Beginning of Lifecycle Manufacturing Plant Warehouse PF1 ... PFn QA1 ... QAn Parts Buffer Supplier Buffer Assembly Final Inspection cool Injection Molding - mainly polymers Layup ­ e.g. Pre-preg composite manufacturing Sintering - form

de Weck, Olivier L.

445

FRP Retrofit of the Ring-Beam of a Nuclear Reactor Containment Structure  

E-Print Network (OSTI)

to reconfigure the plant? #12;16.810 (16.682) 5 Life Cycle: Conceive, Design, Implement 1 Beginning of Lifecycle Manufacturing Plant Warehouse PF1 ... PFn QA1 ... QAn Parts Buffer Supplier Buffer Assembly Final Inspection cool Injection Molding - mainly polymers Layup ­ e.g. Pre-preg composite manufacturing Sintering - form

446

Embedded Electronics for Intelligent Structures  

E-Print Network (OSTI)

to reconfigure the plant? #12;16.810 (16.682) 5 Life Cycle: Conceive, Design, Implement 1 Beginning of Lifecycle Manufacturing Plant Warehouse PF1 ... PFn QA1 ... QAn Parts Buffer Supplier Buffer Assembly Final Inspection cool Injection Molding - mainly polymers Layup ­ e.g. Pre-preg composite manufacturing Sintering - form

447

KING FAHAD UNIVERSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGENEERING DEPARTMENT  

E-Print Network (OSTI)

to reconfigure the plant? #12;16.810 (16.682) 5 Life Cycle: Conceive, Design, Implement 1 Beginning of Lifecycle Manufacturing Plant Warehouse PF1 ... PFn QA1 ... QAn Parts Buffer Supplier Buffer Assembly Final Inspection cool Injection Molding - mainly polymers Layup ­ e.g. Pre-preg composite manufacturing Sintering - form

Al-Ghadhban, Samir

448

RPS: range-based path selection method for concurrent multipath transfer  

Science Conference Proceedings (OSTI)

Throughput of Concurrent Multipath Transfer varies with different path selection schemes. As the number of path increases, the path selection solution space increases exponentially while receiving buffer efficiency decreases. To solve this problem, we ... Keywords: CMT, multipath, path selection, range-based, receive buffer, transport layer

Wang Yang; Hewu Li; Fenghua Li; Qian Wu; Jianping Wu

2010-06-01T23:59:59.000Z

449

Simulation of a method for forming a laser-cooled positron plasma A. S. Newbury,* B. M. Jelenkovic,  

E-Print Network (OSTI)

axis at the same frequency as the 9 Be ions . Therefore, a centrifugal separation will occur, forcing beams of high brightness for a number of different ex- periments 4,6,18 . A dense gas of positrons-temperature buffer gas of N2 to provide trapping and cooling. By remov- ing the buffer gas, the base pressure

450

A case for bufferless routing in on-chip networks  

Science Conference Proceedings (OSTI)

Buffers in on-chip networks consume significant energy, occupy chip area, and increase design complexity. In this paper, we make a case for a new approach to designing on-chip interconnection networks that eliminates the need for buffers for routing ... Keywords: memory systems, multi-core, on-chip networks, routing

Thomas Moscibroda; Onur Mutlu

2009-06-01T23:59:59.000Z

451

Simulation of a viscous fluid spreading by a bidimensional shallow water model  

E-Print Network (OSTI)

In this paper we propose a numerical method to solve the Cauchy problem based on the viscous shallow water equations in an horizontally moving domain. More precisely, we are interested in a flooding and drying model, used to modelize the overflow of a river or the intrusion of a tsunami on ground. We use a non conservative form of the two-dimensional shallow water equations, in eight velocity formulation and we build a numerical approximation, based on the Arbitrary Lagrangian Eulerian formulation, in order to compute the solution in the moving domain.

Di Martino, Bernard; Paoli, Jean-Martin; Simonnet, Pierre; 10.1016/j.apm.2011.01.015

2011-01-01T23:59:59.000Z

452

Natural gas: Removing the obstacles  

Science Conference Proceedings (OSTI)

Defining and then figuring out how to remove whatever obstacles may be blocking the wider use of natural gas was the purpose of a conference held early last month in Phoenix, Arizona. The unique, three-day event was jointly sponsored by the U.S. Department of Energy (DOE) and the National Association of Regulatory Utility Commissioners (NARUC). It drew an overflow crowd of more than 500, with a registration list that read like a Who's Who of the natural gas industry. This article summarizes some of the main points of this conference.

Romo, C.

1992-03-15T23:59:59.000Z

453

Hydrogen & Fuel Cells | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Georgia Erosion and Sedimentation Act (Georgia) Georgia Erosion and Sedimentation Act (Georgia) The Georgia Erosion and Sedimentation Act (GESA) is designed to protect vegetated buffers. GESA establishes a minimum undisturbed, vegetated buffer of 25 feet for all streams in Georgia (measured from where vegetation is wrested by normal stream flow). Trout streams, both primary and secondary, require a minimum 50 foot undisturbed vegetated buffer. These buffer requirements are also incorporated into the General Construction Permit. Small trout streams with an annual flow of less than 24 gallons per minute (GPM) are exempt from the buffer requirements. October 16, 2013 Georgia Commercial Laboratory Act (Georgia) The Georgia Commercial Laboratory Act requires all commercial environmental laboratories submitting data to the Environmental Protection Division (EPD)

454

Enhanced input/output architecture for toroidally-connected distributed-memory parallel computers  

SciTech Connect

This patent describes an improvement in a toroidally-connected distributed-memory parallel computer having rows and columns of processors, wherein each processor has an independent memory and is connected to four neighboring processors. It comprises: at least one common I/O channel; a buffering mechanisms, each being connected to such I/O channel and to only one corresponding processor in a given row of processors; and each such processor of the given row being connected to only one corresponding buffer mechanism in such a manner that it can access its buffer mechanism independently of the access top such buffer mechanism by the I/O channel, and independently of access to the buffer mechanisms corresponding to other processors in the given row.

Cok, R.S.

1990-07-17T23:59:59.000Z

455

Lightweight, durable lead-acid batteries  

Science Conference Proceedings (OSTI)

A lightweight, durable lead-acid battery is disclosed. Alternative electrode materials and configurations are used to reduce weight, to increase material utilization and to extend service life. The electrode can include a current collector having a buffer layer in contact with the current collector and an electrochemically active material in contact with the buffer layer. In one form, the buffer layer includes a carbide, and the current collector includes carbon fibers having the buffer layer. The buffer layer can include a carbide and/or a noble metal selected from of gold, silver, tantalum, platinum, palladium and rhodium. When the electrode is to be used in a lead-acid battery, the electrochemically active material is selected from metallic lead (for a negative electrode) or lead peroxide (for a positive electrode).

Lara-Curzio, Edgar (Lenoir City, TN); An, Ke (Knoxville, TX); Kiggans, Jr., James O. (Oak Ridge, TN); Dudney, Nancy J. (Knoxville, TN); Contescu, Cristian I. (Knoxville, TN); Baker, Frederick S. (Oak Ridge, TN); Armstrong, Beth L. (Clinton, TN)

2011-09-13T23:59:59.000Z

456

Lightweight, durable lead-acid batteries  

DOE Patents (OSTI)

A lightweight, durable lead-acid battery is disclosed. Alternative electrode materials and configurations are used to reduce weight, to increase material utilization and to extend service life. The electrode can include a current collector having a buffer layer in contact with the current collector and an electrochemically active material in contact with the buffer layer. In one form, the buffer layer includes a carbide, and the current collector includes carbon fibers having the buffer layer. The buffer layer can include a carbide and/or a noble metal selected from of gold, silver, tantalum, platinum, palladium and rhodium. When the electrode is to be used in a lead-acid battery, the electrochemically active material is selected from metallic lead (for a negative electrode) or lead peroxide (for a positive electrode).

Lara-Curzio, Edgar; An, Ke; Kiggans, Jr., James O; Dudney, Nancy J; Contescu, Cristian I; Baker, Frederick S; Armstrong, Beth L

2013-05-21T23:59:59.000Z

457

Parallel processor-based raster graphics system architecture  

DOE Patents (OSTI)

An apparatus for generating raster graphics images from the graphics command stream includes a plurality of graphics processors connected in parallel, each adapted to receive any part of the graphics command stream for processing the command stream part into pixel data. The apparatus also includes a frame buffer for mapping the pixel data to pixel locations and an interconnection network for interconnecting the graphics processors to the frame buffer. Through the interconnection network, each graphics processor may access any part of the frame buffer concurrently with another graphics processor accessing any other part of the frame buffer. The plurality of graphics processors can thereby transmit concurrently pixel data to pixel locations in the frame buffer.

Littlefield, Richard J. (Seattle, WA)

1990-01-01T23:59:59.000Z

458

Full scale field demonstration of unheated anaerobic contact stabilization. Quarterly project status report, April-June 1980  

DOE Green Energy (OSTI)

The City of Columbus provided funds for the preliminary shakedown of the anaerobic contact stabilization system. During the shakedown period, the sludge recycle system was tested, and the temperature control system was refurbished. At temperatures as low as 82/sup 0/F there is no noticeable loss in gas production for SRT's over 14 days. Some of the preliminary data on the overflow and underflow liquors from unit 6E suggested that substantial amounts of VS were not settling in 6E and, consequently, were not being recycled. Therefore, an examination of the settleability of the transfer sludge (4E to 6E) is underway. Some typical preliminary results are shown. The occurence of gasification in the scum layer raises the issue of where the mathanogenic bacteria are to be found in the settler (6E). Some preliminary tests have been conducted to answer this question, and a typical set of results demonstrate the relative population densities of methanogens in scum and settled digested solids. It is clear that if scum is not retained in the system, significant losses of system biomass will occur via the settler overflow.

Sykes, R.M.

1980-08-01T23:59:59.000Z

459

Drain Holes for Criticality Safety Control Guidance for the Analyst  

SciTech Connect

Drain and overflow holes are integral to the nuclear criticality safety basis of many processes and provide different functions in achieving their safety goal. In most cases, unverified engineering judgement was used to conclude that the holes were adequate to accomplish their mission. Such judgement may adequately serve some configurations but is inadequate in other applications. It was determined that the exact function of every hole for both normal and upset process conditions must be understood and clearly documented. Y-12 has embarked on an effort to document engineering analyses of drain and overflow holes. This effort is essential to demonstrating that the holes are capable performing their intended safety function. The Y-12 EUO approach is based on criticality safety function and engineering analysis. The main components of the policies regarding drain holes are: C The criticality safety requirements are written in terms of function (e.g., depth in pan filter must always be less than 5 cm). C Engineering justifications are being written to show existing drains meet required function. Sometimes, detailed analysis of inflows and outflows is required. In some other cases, physical functional tests are performed. C Drains are documented on controlled drawings to ensure configuration control. A program of periodic inspections (usually annual) is in place for each required drain.

LeTellier, m.s.; Smallwood, d.j.

1998-11-30T23:59:59.000Z

460

Analysis of the effect of packing capacity on pork prices  

E-Print Network (OSTI)

In 1998, pork prices fell to an all time low. Across the industry, concern was expressed for research as to what led to this price crash. Capacity constraints at the packer level have been a key area of concern. This study is an analysis of the effect of capacity constraints on pork prices. Ordinary least squares (OLS) models were run for both live and cutout prices. Capacity constraints were measured three ways: using a binary variable (0,1 dummy) and two continuous variables. One continuous variable was for the number of head slaughtered on the weekend, and the second continuous variable was found by using a ratio of slaughter during the weekends to slaughter during the 5-day workweek ("over-flow" ratio). The continuous variables used to measure capacity constraints were statistically significant explanatory factors in the regressions for hog and pork prices. The capacity constraints were estimated to have a different relationship with the prices at the farm level as compared with packer prices. Increasing capacity constraints is associated with a negative relationship to farm prices, and a positive relationship to packer prices. The measurement used for over-flow ratio, the ratio of weekend slaughter to slaughter during the 5-day workweek, did not generate different results than the continuous variable of weekend slaughter. The estimated coefficients for both continuous variables were more statistically significant than a dummy variable approach for the capacity constraint.

Spivey, Sarah Elizabeth

2000-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Heat exchanger-accumulator  

DOE Patents (OSTI)

What is disclosed is a heat exchanger-accumulator for vaporizing a refrigerant or the like, characterized by an upright pressure vessel having a top, bottom and side walls; an inlet conduit eccentrically and sealingly penetrating through the top; a tubular overflow chamber disposed within the vessel and sealingly connected with the bottom so as to define an annular outer volumetric chamber for receiving refrigerant; a heat transfer coil disposed in the outer volumetric chamber for vaporizing the liquid refrigerant that accumulates there; the heat transfer coil defining a passageway for circulating an externally supplied heat exchange fluid; transferring heat efficiently from the fluid; and freely allowing vaporized refrigerant to escape upwardly from the liquid refrigerant; and a refrigerant discharge conduit penetrating sealingly through the top and traversing substantially the length of the pressurized vessel downwardly and upwardly such that its inlet is near the top of the pressurized vessel so as to provide a means for transporting refrigerant vapor from the vessel. The refrigerant discharge conduit has metering orifices, or passageways, penetrating laterally through its walls near the bottom, communicating respectively interiorly and exteriorly of the overflow chamber for controllably carrying small amounts of liquid refrigerant and oil to the effluent stream of refrigerant gas.

Ecker, Amir L. (Dallas, TX)

1980-01-01T23:59:59.000Z

462

Energetic powder  

DOE Patents (OSTI)

Fluoroalkylsilane-coated metal particles. The particles have a central metal core, a buffer layer surrounding the core, and a fluoroalkylsilane layer attached to the buffer layer. The particles may be prepared by combining a chemically reactive fluoroalkylsilane compound with an oxide coated metal particle having a hydroxylated surface. The resulting fluoroalkylsilane layer that coats the particles provides them with excellent resistance to aging. The particles can be blended with oxidant particles to form energetic powder that releases chemical energy when the buffer layer is physically disrupted so that the reductant metal core can react with the oxidant.

Jorgensen, Betty S. (Jemez Springs, NM); Danen, Wayne C. (Los Alamos, NM)

2003-12-23T23:59:59.000Z

463

Wide common mode input operational amplifier with serially programmable output offset  

E-Print Network (OSTI)

Operational amplifiers continue to develop to meet modern demands on performance. This document describes an operational amplifier designed for a highly specific telecommunications application - to serve as the buffer ...

Li, Wendi, M. Eng. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

464

ALARA Training for Technical Support Personnel  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

more than 500 radhr. VERY HIGH RADIATION AREA > 500 radhr 103-29 Danger HIGH RADIATION AREA DOE -HDBK-1110-2008 51 A Radiological Buffer Area may be established for secondary...

465

Corrosion and Cytotoxicity of a Ni-free Zr-Al-Fe-Cu Bulk Metallic Glass  

Science Conference Proceedings (OSTI)

Corrosion resistance was studied using polarization technique in phosphate buffered saline solution ... Cell viability, adhesion, morphology, and proliferation of osteoblasts, endothelial cells and .... Joining of Active Bulk Metallic Glasses in Air.

466

Microbenchmark Performance Comparison of High-Speed Cluster Interconnects  

Science Conference Proceedings (OSTI)

High-speed cluster interconnects Myrinet, Quadrics, and InfiniBand achieve low latency and high bandwidth with low host overhead. However, they show quite different performance behaviors when handling communication buffer reuse patterns.

Jiuxing Liu; Balasubramanian Chandrasekaran; Weikuan Yu; Jiesheng Wu; Darius Buntinas; Sushmitha Kini; Dhabaleswar K. Panda; Pete Wyckoff

2004-01-01T23:59:59.000Z

467

Low Power Oriented CMOS Circuit Optimization Protocol  

Science Conference Proceedings (OSTI)

Low power oriented circuit optimization consists in selecting the best alternative between gate sizing, buffer insertion and logic structure transformation, for satisfying a delay constraint at minimum area cost. In this paper we used a closed form model ...

A. Verle; X. Michel; N. Azemard; P. Maurine; D. Auvergne

2005-03-01T23:59:59.000Z

468

Transient Analysis of a CMOS Inverter Driving Resistive Interconnect Kevin T. Tang and Eby G. Friedman  

E-Print Network (OSTI)

," Technical Report, Semi- conductor Industry Association, 1997. [4] D. W. Dobberpuhl et al., "A 200-MHz 64-bit­1565, November 1992. [5] N. Hedenstierna and K. O. Jeppson, "CMOS Circuits Speed and Buffer Optimiza- tion," IEEE

Friedman, Eby G.

469

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 10, NO. 4, AUGUST 2002 487 Simultaneous Switching Noise in On-Chip  

E-Print Network (OSTI)

for the power distribution network have also been briefly discussed. REFERENCES [1] D. W. Dobberpuhl et al., "A, pp. 285­289, Sept. 1968. [19] N. Hedenstierna and K. O. Jeppson, "CMOS circuits speed and buffer

Friedman, Eby G.

470

Compact Modeling and Experimental Verification of Substrate Resistance in Lightly Doped Substrates  

E-Print Network (OSTI)

," Technical Report, Semi- conductor Industry Association, 1997. [4] D. W. Dobberpuhl et al., "A 200-MHz 64-bit­1565, November 1992. [5] N. Hedenstierna and K. O. Jeppson, "CMOS Circuits Speed and Buffer Optimiza- tion," IEEE

Chui, Chi On

471

Agroforestry Options John Munsell  

E-Print Network (OSTI)

Buffers #12;1990 1994 #12;Red Osier Dogwood Cornus stolonifera $0.35 ­ $2.00 per stem wholesale Riparian support for forestry Research for alternative crops Tax provisions for biofuel production Farm Bill 2008

Wynne, Randolph H.

472

The impact of assured supply inventory policies  

E-Print Network (OSTI)

A case study is presented of a successful quick serve fast food restaurant chain that uses inventory throughout the supply chain as a buffer against uncertainty in supply and demand. This is a common operational strategy ...

Stanton, Daniel Jonathon

2008-01-01T23:59:59.000Z

473

Arnold Schwarzenegger FINAL REPORT FOR ENERGY-  

E-Print Network (OSTI)

........................................................................69 Figure 29. Ten mil vapor retarder installation below sand buffer, slab 39, and air conditioning (HVAC) #12;15 o Houses are too tight for natural ventilation to be effective

474

T d M ll A Sit D i D di T j Si i R i Computer Science and Engineering UCSD  

E-Print Network (OSTI)

solar cells and stored in a supercapacitor. With sunlight SHiMmer can operate for longsunlight, SHi buffer ­ supercapacitor predictor prediction of future energy harvesting rate stores past energy data

Simunic, Tajana

475

Parallel sparse polynomial multiplication using heaps - CECM  

E-Print Network (OSTI)

cache lines so that false sharing does not occur. Figure 4: Circular Buffer ... char pad1[LINE - sizeof(long)]; long w; ..... This overhead is offset by the extra cache ...

476

Method of enhancing yield from an in situ oil shale retort  

SciTech Connect

To recover liquid and gaseous products from a fragmented permeable mass of particles containing oil shale, a buffer zone containing retorted oil shale is established in the fragmented mass by passing a hot processing gas substantially free of free oxygen through at least a portion of the fragmented mass. Thereafter, a combustion zone is established in the buffer zone, and a combustion zone feed containing oxygen is introduced into the fragmented mass on the trailing side of the combustion zone. This advances the combustion zone through the fragmented mass and retorts oil shale in a retorting zone on the advancing side of the combustion zone. The thickness of the buffer zone is sufficient for reaction of most of the oxygen in the combustion zone feed with residual carbonaceous material in retorted oil shale in the buffer zone.

Cha, C.Y.

1978-11-21T23:59:59.000Z

477

U.S. DEPARTMENT OF ENERGY - NETL CATEGORICAL EXCLUSION (CX) DESIGNATIO...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Rev1-PEDA Sustainable Business Recovery: Solar Farm at existing Crayola facility Install solar panels on 4.5 acres at the Crayola manufacturing facility; 8.5 acre buffer area....

478

PDF File  

Science Conference Proceedings (OSTI)

water, 9 mL of olive oil, and 21 mL of 10% gum arabic solu- tion. Lipolytic activity was measured by vigorously mixing. 40 mg of papain (crude or buffer-washed) ...

479

2008ENGINEERING SCHOLARS PROGRAM 2008 JOURNAL  

E-Print Network (OSTI)

St. Marie Madeleine Parish By Akua Abu, Andrew Acevedo, Ari Bogotch, Jared Carron, Adam Carter, including the 470 nF capacitor and25. 1 M resistor at the buffer amplifier input. The capacitor is used

Marques, Oge

480

News Release Media Contact: Mike Bradley  

E-Print Network (OSTI)

materials onto inexpensive metal templates coated with ceramic buffer layers will make high temperature agreement with SuperPower is a great example of ORNL working with industry and delivering the science

Note: This page contains sample records for the topic "autostart buffer overflows" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Geometry-aware framebuffer level of detail  

Science Conference Proceedings (OSTI)

This paper introduces a framebuffer level of detail algorithm for controlling the pixel workload in an interactive rendering application. Our basic strategy is to evaluate the shading in a low resolution buffer and, in a second rendering pass, resample ...

Lei Yang; Pedro V. Sander; Jason Lawrence

2008-06-01T23:59:59.000Z

482

Mercury Removal from Aqueous Systems Using Commercial and Laboratory Prepared Metal Oxide Nanoparticles  

E-Print Network (OSTI)

Five commercial metal oxide nanoparticles (CuO, SiO2, Fe2O3, TiO2 and Al2O3) have been individually screened for mercury removal in a batch reactor under bicarbonate buffered and non-buffered aqueous solutions (DI water). Copper oxide was then selected for surface modification to enhance mercury removal. The surfaces of both laboratory prepared and commercially available copper oxide nanoparticles were treated with 1-octanethiol to produce copper sulfide and/or copper alkanethiol nanoparticles. The resulting particles were characterized using X-Ray Fluorescence(XRF), X-Ray Diffraction (XRD) and Scanning Electron Microscopy (SEM). The novel nanoparticles demonstrated very high mercury removal (> 99%) from both the buffered and non-buffered aqueous solutions.

Desai, Ishan

2009-08-01T23:59:59.000Z

483

Biology Department - Brookhaven National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

must be with a volatile buffer such as 20 mM ammonium acetate or water. After the final wash, the grid is pinched between two pieces of filter paper (leaving a retained layer of...

484

Slide 1  

NLE Websites -- All DOE Office Websites (Extended Search)

University Ph.D. Thesis by Peter Eschbach, "Investigation of Buffer Layers in Copper Indium Gallium Selenium Solar Cells" (2002) 50 52 54 56 58 60 62 64 66 Binding Energy (eV)...

485

Handoff In Mobile ATM Networks: A Framework for Performance Optimization  

Science Conference Proceedings (OSTI)

Current handoff rerouting techniques in Mobile ATM networks fail to optimize some or all of the following parameters: handoff latency, route length, computational complexity, communication disruption period, network buffer requirements,a nd bandwidth ...

Sirisha R. Medidi; Forouzan Golshani

2002-06-01T23:59:59.000Z

486

Transient Thermal, Hydraulic, and Mechanical Analysis of a Counter Flow Offset Strip Fin Intermediate Heat Exchanger using an Effective Porous Media Approach  

E-Print Network (OSTI)

et al. Assessment of Candidate Molten Salt Coolants for thehelium and liquid or molten salt. In order to estimate theintermediate liquid, or molten, salt loop acts as a buffer

Urquiza, Eugenio

2009-01-01T23:59:59.000Z

487

PowerPlex™ 16 System Technical Manual (TMD012)  

Science Conference Proceedings (OSTI)

... Nucl. Acids Res. 24, 2807. 18. ... TAE 50X buffer (pH 7.2) 242g Tris base 57.1ml glacial acetic acid 100ml 0.5M EDTA stock ...

2001-01-03T23:59:59.000Z

488

Building Scale DC Microgrids  

E-Print Network (OSTI)

an increasingly familiar generation source and elec- tronicssource of ancillary services either to buffer local variable generation,sources, e.g. photovoltaic modules (PV), from other direct current (DC) generation,

Marnay, Chris

2013-01-01T23:59:59.000Z

489

A Heavy Flavor Tracker for STAR  

E-Print Network (OSTI)

Event FIFO Event FIFO Event FIFO trigger/DAQ trigger handlerTCD. Subsequent triggers enable additional event FIFOs untilSubsequent triggers enable additional event buffer until all

Chasman, C.

2008-01-01T23:59:59.000Z

490

Progress on the MICE Liquid Absorber Cooling and Cryogenic Distribution System  

E-Print Network (OSTI)

The condenser in the surge tank must not be covered byK determines the surge volume of the condenser-surge tank.the buffer volume and condenser, the absorber vacuum, the

2005-01-01T23:59:59.000Z

491

V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabili...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Service). 1) An error within the "parseHeaders()" function (InternalNioInputBuffer.java) when parsing request headers does not properly verify the permitted size and can be...

492

A new polynomial data structure for Maple 17 with parallel ... - CECM  

E-Print Network (OSTI)

Threads try to acquire global heap as buffer fills up to balance load. Michael Monagan. POLY .... Profile for factor(p1); for 1 core. Maple 16. New Maple.

493

POLY - CECM - Simon Fraser University  

E-Print Network (OSTI)

Threads try to acquire global heap as buffer fills up to balance load. Michael Monagan .... Profile for factor(p1); Real time from 2.63s to 1.11s real. Maple 16.

494

Substrate engineering for monolithic integration of III-V semiconductors with Si CMOS technology  

E-Print Network (OSTI)

Ge virtual substrates, fabricated using Si1-xGex-.Ge, compositionally graded buffers, enable the epitaxial growth of device-quality GaAs on Si substrates, but monolithic integration of III-V semiconductors with Si CMOS ...

Dohrman, Carl Lawrence

2008-01-01T23:59:59.000Z

495

Organized Turbulence Structures in the Near-Neutral Atmospheric Surface Layer  

Science Conference Proceedings (OSTI)

The Tiederman method, which was originally designed for unambiguous detection of “bursts” in the buffer layer of smooth surface laboratory boundary-layer flow, is shown to work equally well in the neutral atmospheric surface layer. It enables ...

Ulf Högström; Hans Bergström

1996-09-01T23:59:59.000Z

496

Electrical Properties of Point Defects in CdS and ZnS Thin-film PV ...  

Science Conference Proceedings (OSTI)

... Electrical Properties of Point Defects in CdS and ZnS Thin-film PV Buffer ... but whose band gap is too small for complete transparency to solar radiation.

497

MOVPE Growth of High Efficiency Inverted Metamorphic 1.1eV Solar ...  

Science Conference Proceedings (OSTI)

This paper focuses on the 1.1ev Ga0.77In0.23As inverted metamorphic solar cell grown with AlGaInAs quarternary step graded buffer on 6o miscut (001) thin Ge ...

498

PERCENT FEDERAL LAND FOR OIL/GAS FIELD OUTLINES  

U.S. Energy Information Administration (EIA) Indexed Site

pFLayer As IFeatureLayer, pOutSR As ISpatialReference) As IPolygon ' project the search geometry (well buffer polygon) into ' whatever the projection of the federal land...

499

A market analysis for high efficiency multi-junction solar cells grown on SiGe  

E-Print Network (OSTI)

Applications, markets and a cost model are presented for III-V multi-junction solar cells built on compositionally graded SiGe buffer layers currently being developed by professors Steven Ringell of Ohio State University ...

Judkins, Zachara Steele

2007-01-01T23:59:59.000Z

500

Soil community composition and ecosystem processes Comparing agricultural ecosystems with natural ecosystems  

E-Print Network (OSTI)

Soil community composition and ecosystem processes Comparing agricultural ecosystems with natural, nitrogen, pesticides Abstract. Soil organisms play principal roles in several ecosystem functions, i decomposition, and acting as an environmental buffer. Agricultural soils would more closely resemble soils

Neher, Deborah A.