Powered by Deep Web Technologies
Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

2

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities T-543: Wireshark 0.8.20 through...

3

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

4

T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

5

T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

service conditions. PLATFORM: Prior to 1.6.1 - Apache Santuario XML Security for C++ library versions prior to V1.6.1 ABSTRACT: A buffer overflow exists when creating or...

6

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

7

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

8

U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...  

Broader source: Energy.gov (indexed) [DOE]

Pidgin Multiple Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities...

9

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabiliti...  

Broader source: Energy.gov (indexed) [DOE]

RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found...

10

U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference...  

Broader source: Energy.gov (indexed) [DOE]

system can trigger a buffer overflow or null pointer dereference in the display drivers to execute arbitrary code on the target system with elevated privileges. A null...

11

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities...  

Broader source: Energy.gov (indexed) [DOE]

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-207: Pidgin 'mxitshowmessage()'...

12

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets...  

Broader source: Energy.gov (indexed) [DOE]

Lifecycle Attachmate Downloads SecurityTracker Alert ID: 1026340 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Attachmate Reflection. A remote user...

13

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is aDepartmentDepartment

14

T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow  

Broader source: Energy.gov [DOE]

Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

15

V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerabili...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system. PLATFORM: Kingsoft Office 2012, Kingsoft Weirwe 2012...

16

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems forVulnerabilities

17

V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & SolarDepartment of Energy

18

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:|7: Adobeof

19

V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers Denyof

20

V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discovered a

22

V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy SEARCH-LAB

23

U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

24

U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

25

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost analysis of planting grass buffer  

E-Print Network [OSTI]

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost and summer storms lead to large scale sediment deposition on roadways, and cleanup costs are a major concern characteristics which control sediment deposition on roadways in order to compare the cost of planting grass

Boyer, Edmond

26

Overflow control valve  

DOE Patents [OSTI]

An overflow control valve for use in a liquid sodium coolant pump tank which valve can be extended to create a seal with the pump tank wall or retracted to break the seal thereby accommodating valve removal. An actuating shaft which controls valve disc position also has cams which bear on roller surfaces to force retraction of a sliding cylinder against spring tension to retract the cylinder from sealing contact with the pump tank.

Hundal, Rolv (Hempfield, PA); Kessinger, Boyd A. (Murrysville, PA); Parlak, Edward A. (North Huntingdon, PA)

1984-07-24T23:59:59.000Z

27

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC) REFERENCE LINKS: Secunia Advisory SA53864 SecurityTracker Alert ID: 1028683 Symantec...

28

V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacks

29

V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:

30

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

31

U-236: Microsoft JScript and VBScript Engine Integer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code...

32

T-588: HP Virtual SAN Appliance Stack Overflow  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in HP StorageWorks P4000 Virtual SAN Appliance Software, which can be exploited by malicious people to compromise a vulnerable system.

33

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

34

V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il :^ a.7 V

35

V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOS

36

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|| Department

37

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA documentRed

38

V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department

39

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMBFirmware

40

U-115: Novell GroupWise Client Address Book Processing Buffer Overflow  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting AttacksForgery,

42

V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment of Energy VMware ESX /

43

Response of the Greenland-Scotland overflow to changing deep water supply from the Arctic Mediterranean  

E-Print Network [OSTI]

Response of the Greenland-Scotland overflow to changing deep water supply from the Arctic with a topographic barrier is used to study the response of the overflows across the Greenland-Scotland Ridge of the exchanges across the ridge is seen when the supply decreases. Transport variations in the East-Greenland

44

Ecosystem Vulnerability Assessment - Patterns of Climate Change...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

45

STAMP-Based Analysis of a Refinery Overflow Accident Nancy Leveson, Margaret Stringfellow, and John Thomas  

E-Print Network [OSTI]

1 STAMP-Based Analysis of a Refinery Overflow Accident Nancy Leveson, Margaret Stringfellow, and John Thomas As an example of STAMP, we have taken an accident report produced for a real refinery

Leveson, Nancy

46

StackOverflow and GitHub: Associations Between Software Development and Crowdsourced  

E-Print Network [OSTI]

Overflow employs gamification [4]: questions and answers are voted upon by members of the community; the number the developers' performance [1], especially when gamification is factored in. In this paper we investigate

Filkov, Vladimir

47

Energy vulnerability relationships  

SciTech Connect (OSTI)

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

Shaw, B.R.; Boesen, J.L.

1998-02-01T23:59:59.000Z

48

Plutonium Vulnerability Management Plan  

SciTech Connect (OSTI)

This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

NONE

1995-03-01T23:59:59.000Z

49

Resource dimensioning through buffer sampling  

E-Print Network [OSTI]

, theoretical dimensioning formulae that estimate the required capacity C as a function of the input traffic the buffer content, estimates the buffer content distribution, and `inverts' this to the variance. We of capacity that should be added, advanced modeling and performance techniques are required. These predictions

Boucherie, Richard J.

50

Dealing with arithmetic overflows in the polyhedral model Bruno Cuervo Parrino  

E-Print Network [OSTI]

Dealing with arithmetic overflows in the polyhedral model Bruno Cuervo Parrino INRIA Camus Universidad de Buenos Aires bcuervo@dc.uba.ar Julien Narboux INRIA Camus Université de Strasbourg CNRS UMR 7005 Julien.Narboux@inria.fr Eric Violard INRIA Camus Université de Strasbourg CNRS UMR 7005 Eric

Paris-Sud XI, Université de

51

Neogene overflow of Northern Component Water at the Greenland-Scotland Ridge  

E-Print Network [OSTI]

Neogene overflow of Northern Component Water at the Greenland-Scotland Ridge H. R. Poore Department counterpart Northern Component Water (NCW), across the Greenland-Scotland Ridge (GSR) is thought to have,280 words, 12 figures, 3 tables. Keywords: Northern Component Water; Greenland-Scotland Ridge; Iceland

Samworth, Richard

52

Securing software : an evaluation of static source code analyzers  

E-Print Network [OSTI]

This thesis evaluated five static analysis tools--Polyspace C Verifier, ARCHER, BOON, Splint, and UNO--using 14 code examples that illustrated actual buffer overflow vulnerabilities found in various versions of Sendmail, ...

Zitser, Misha, 1979-

2003-01-01T23:59:59.000Z

53

Common Control System Vulnerability  

SciTech Connect (OSTI)

The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

Trent Nelson

2005-12-01T23:59:59.000Z

54

Analysis of overflow-induced sloshing coupled with oscillation of elastic wall  

SciTech Connect (OSTI)

In the liquid metal cooled fast breeder reactor (LMFBR), a thin-wall weir is installed inside the main reactor vessel to form a circulation loop of cold sodium for the protection of the main vessel from the hot coolant sodium. Under such conditions, there is a possibility of overflow-induced vibration of the weir coupled with sloshing of the coolant once observed in the French Demonstration LMFBR Super Phenix (SPx). Therefore it is very important for the safety assessment of LMFBR to study the mechanism and conditions for the occurrence of this sloshing-vibration instability. Numerical simulation of 2D experiment on overflow-induced fluid-structure interaction instability was carried out using physical component boundary fitted coordinate (PCBFC) method. Numerical stability of free surface was never violated even though it is under the influence of both oscillation of structure and hitting of overflow at the fluid surface. The computation showed the occurrence scope of instability similar to the experiment. By computations with modified initial and boundary conditions, physical explanation of the occurrence conditions of this instability was given.

Lu, D.; Kondo, Shunsuke [Univ. of Tokyo (Japan). Dept. of Quantum Engineering and Systems Science; Takizawa, Akihiko [Tokyo Electric Power Co., Yokohama (Japan). Nuclear Power R and D Center

1995-11-01T23:59:59.000Z

55

U-174: Serendipity Unspecified SQL Injection Vulnerability |...  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

56

Buffer Tank Design for Acceptable Control Performance  

E-Print Network [OSTI]

Buffer Tank Design for Acceptable Control Performance Audun Faanes and Sigurd Skogestad for the design of buffer tanks. We consider mainly the case where the objective of the buffer tank is to dampen- trol system. We consider separately design procedures for (I) mixing tanks to dampen quality

Skogestad, Sigurd

57

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,  

E-Print Network [OSTI]

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

58

V-092: Pidgin Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

59

Feasibility of cold rolling titanium strip cast by the plasma melt overflow process  

SciTech Connect (OSTI)

A new fabrication method tailored specifically for titanium alloys and intermetallics combined direct strip casting and cold rolling to produce foil products by completely eliminating hot working steps. Titanium strips 0.4-mm- to 0.7-mm-thick and 100-mm-wide were cast by the plasma melt overflow process. The cast strips were cold rolled to 0.15-mm-thick, fully dense foils. The effect of thermal and mechanical treatments on the microstructure of the cast strip was investigated. The cold rolled foils were characterized by measurement of average surface roughness, chemical composition, gas content and tensile properties.

Gaspar, T.A. [Ribbon Technology Corp., Columbus, OH (United States); Sukonnik, I.M. [Texas Instruments, Attleboro, MA (United States); Bird, R.K.; Brewer, W.D. [National Aeronautics and Space Administration, Hampton, VA (United States). Langley Research Center

1995-12-31T23:59:59.000Z

60

Buffered Electrochemical Polishing of Niobium  

SciTech Connect (OSTI)

The standard preparation of superconducting radio-frequency (SRF) cavities made of pure niobium include the removal of a 'damaged' surface layer, by buffered chemical polishing (BCP) or electropolishing (EP), after the cavities are formed. The performance of the cavities is characterized by a sharp degradation of the quality factor when the surface magnetic field exceeds about 90 mT, a phenomenon referred to as 'Q-drop'. In cavities made of polycrystalline fine grain (ASTM 5) niobium, the Q-drop can be significantly reduced by a low-temperature ({approx} 120 C) 'in-situ' baking of the cavity if the chemical treatment was EP rather than BCP. As part of the effort to understand this phenomenon, we investigated the effect of introducing a polarization potential during buffered chemical polishing, creating a process which is between the standard BCP and EP. While preliminary results on the application of this process to Nb cavities have been previously reported, in this contribution we focus on the characterization of this novel electrochemical process by measuring polarization curves, etching rates, surface finish, electrochemical impedance and the effects of temperature and electrolyte composition. In particular, it is shown that the anodic potential of Nb during BCP reduces the etching rate and improves the surface finish.

Gianluigi Ciovati, Hui Tian, Sean Corcoran

2011-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect (OSTI)

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

62

T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

63

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND  

E-Print Network [OSTI]

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

64

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Broader source: Energy.gov (indexed) [DOE]

5: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow...

65

Stepwise Probabilistic Buffering for Epidemic Information Dissemination  

E-Print Network [OSTI]

and distributes the load of buffering evenly to the entire system where all peers have only partial knowledge and distributes the load of buffering to the entire system where every peer does not have the complete view. They are simple to implement, inexpensive to run, robust and they impose a constant load on the links

Caglar, Mine

66

Buffer layer for thin film structures  

DOE Patents [OSTI]

A composite structure including a base substrate and a layer of a mixture of strontium titanate and strontium ruthenate is provided. A superconducting article can include a composite structure including an outermost layer of magnesium oxide, a buffer layer of strontium titanate or a mixture of strontium titanate and strontium ruthenate and a top-layer of a superconducting material such as YBCO upon the buffer layer.

Foltyn, Stephen R.; Jia, Quanxi; Arendt, Paul N.; Wang, Haiyan

2010-06-15T23:59:59.000Z

67

Buffer layer for thin film structures  

DOE Patents [OSTI]

A composite structure including a base substrate and a layer of a mixture of strontium titanate and strontium ruthenate is provided. A superconducting article can include a composite structure including an outermost layer of magnesium oxide, a buffer layer of strontium titanate or a mixture of strontium titanate and strontium ruthenate and a top-layer of a superconducting material such as YBCO upon the buffer layer.

Foltyn, Stephen R.; Jia, Quanxi; Arendt, Paul N.; Wang, Haiyan

2006-10-31T23:59:59.000Z

68

Climate Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group and Userof aChristinaCliff joins EMSLClimate Vulnerabilities

69

Assessing the Security Vulnerabilities of Correctional Facilities  

SciTech Connect (OSTI)

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Morrison, G.S.; Spencer, D.S.

1998-10-27T23:59:59.000Z

70

T-540: Sybase EAServer Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

and Remote Directory Traversal Vulnerability issues. Addthis Related Articles T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System U-198: IBM...

71

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

72

Proliferation Vulnerability Red Team report  

SciTech Connect (OSTI)

This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

1996-10-01T23:59:59.000Z

73

Detecting Network Vulnerabilities Through Graph Theoretical Methods  

E-Print Network [OSTI]

vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

Geddes, Cameron Guy Robinson

74

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS  

E-Print Network [OSTI]

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

Paris-Sud XI, Université de

75

T-550: Apache Denial of Service Vulnerability | Department of...  

Broader source: Energy.gov (indexed) [DOE]

1.2.8 Multiple Vulnerabilities U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability...

76

PBC: A Partially Buffered Crossbar Packet Switch  

E-Print Network [OSTI]

fabric is widely used as the interconnect of high-performance packet switches due to its low cost-performance packet switches because of its low cost and scalability. As a result, the vast majority and scalability. There are two main variants of the crossbar fabric: unbuffered and internally buffered. On one

Kuzmanov, Georgi

77

Locating Climate Insecurity: Where Are the Most Vulnerable Places...  

Open Energy Info (EERE)

disasters, (2) household and community vulnerability, (3) governance and political violence, and (4) population density. Each of these areas of vulnerability was given...

78

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

79

aquifer contamination vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

80

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

82

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR  

E-Print Network [OSTI]

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

83

Cancer Vulnerabilities Unveiled by Genomic Loss  

E-Print Network [OSTI]

Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

Nijhawan, Deepak

84

Efficient buffer design algorithms for production line profit maximization  

E-Print Network [OSTI]

A production line is a manufacturing system where machines are connected in series and separated by buffers. The inclusion of buffers increases the average production rate of the line by limiting the propagation of ...

Shi, Chuan, Ph. D. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

85

A Systematic Approach to the Design of Buffer Tanks  

E-Print Network [OSTI]

#12;A Systematic Approach to the Design of Buffer Tanks Audun Faanes £ ½ Sigurd Skogestad Abstract: Buffer tanks are often designed and implemented for control purposes, yet control theory is rarely used when sizing and designing buffer tanks and their control system. Instead, rules of thumb

Skogestad, Sigurd

86

A Systematic Approach to the Design of Buffer Tanks  

E-Print Network [OSTI]

#12; A Systematic Approach to the Design of Buffer Tanks Audun Faanes #3;;1 Sigurd Skogestad #3 Trondheim, NORWAY Abstract: Buffer tanks are often designed and implemented for control purposes, yet control theory is rarely used when sizing and designing buffer tanks and their control system. Instead

Skogestad, Sigurd

87

Buffer for a gamma-insensitive optical sensor with gas and a buffer assembly  

DOE Patents [OSTI]

A buffer assembly is disclosed for a gamma-insensitive gas avalanche focal plane array operating in the ultra-violet/visible/infrared energy wavelengths and using a photocathode and an avalanche gas located in a gap between an anode and the photocathode. The buffer assembly functions to eliminate chemical compatibility between the gas composition and the materials of the photocathode. The buffer assembly in the described embodiment is composed of two sections, a first section constructed of glass honeycomb under vacuum and a second section defining a thin barrier film or membrane constructed, for example, of Al and Be, which is attached to and supported by the honeycomb. The honeycomb section, in turn, is supported by and adjacent to the photocathode. 7 figures.

Kruger, H.W.

1994-05-10T23:59:59.000Z

88

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nations energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

89

Floor Buffer Guidelines Floor buffers can expose employees to noise, hazardous materials, and hazards related to  

E-Print Network [OSTI]

produced by the propane buffer is considered high. Hearing protection such as ear plugs and ear muffs and use of hearing protection. Propane Re-filling Only trained and qualified personnel may refill propane containers. Propane Storage Storage of propane should occur in identified well ventilated storage containers

de Lijser, Peter

90

System and method for implementing periodic early discard in on-chip buffer memories of network elements  

DOE Patents [OSTI]

An advance is made over the prior art in accordance with the principles of the present invention that is directed to a new approach for a system and method for a buffer management scheme called Periodic Early Discard (PED). The invention builds on the observation that, in presence of TCP traffic, the length of a queue can be stabilized by selection of an appropriate frequency for packet dropping. For any combination of number of TCP connections and distribution of the respective RTT values, there exists an ideal packet drop frequency that prevents the queue from over-flowing or under-flowing. While the value of the ideal packet drop frequency may quickly change over time and is sensitive to the series of TCP connections affected by past packet losses, and most of all is impossible to compute inline, it is possible to approximate it with a margin of error that allows keeping the queue occupancy within a pre-defined range for extended periods of time. The PED scheme aims at tracking the (unknown) ideal packet drop frequency, adjusting the approximated value based on the evolution of the queue occupancy, with corrections of the approximated packet drop frequency that occur at a timescale that is comparable to the aggregate time constant of the set of TCP connections that traverse the queue.

Francini, Andrea

2013-05-14T23:59:59.000Z

91

Chemical Safety Vulnerability Working Group Report  

SciTech Connect (OSTI)

This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

Not Available

1994-09-01T23:59:59.000Z

92

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

93

Fragile Networks: Identifying Vulnerabilities and Synergies  

E-Print Network [OSTI]

, Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced

Nagurney, Anna

94

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

95

alpha storage buffers: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of electrical energy storage (EES) elements, utilizing the benefits Pedram, Massoud 4 BATTERY-POWERED, ELECTRIC-DRIVE VEHICLES PROVIDING BUFFER STORAGE FOR PV CAPACITY VALUE...

96

Back contact buffer layer for thin-film solar cells  

DOE Patents [OSTI]

A photovoltaic cell structure is disclosed that includes a buffer/passivation layer at a CdTe/Back contact interface. The buffer/passivation layer is formed from the same material that forms the n-type semiconductor active layer. In one embodiment, the buffer layer and the n-type semiconductor active layer are formed from cadmium sulfide (CdS). A method of forming a photovoltaic cell includes the step of forming the semiconductor active layers and the buffer/passivation layer within the same deposition chamber and using the same material source.

Compaan, Alvin D.; Plotnikov, Victor V.

2014-09-09T23:59:59.000Z

97

U-171: DeltaV Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

98

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network [OSTI]

Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

99

Surface Treatments of Nb by Buffered Electropolishing  

SciTech Connect (OSTI)

Buffered electropolishing (BEP) is a Nb surface treatment technique developed at Jefferson Lab1. Experimental results obtained from flat Nb samples show2-4 that BEP can produce a surface finish much smoother than that produced by the conventional electropolishing (EP), while Nb removal rate can be as high as 4.67 ?m/min. This new technique has been applied to the treatments of Nb SRF single cell cavity employing a vertical polishing system5 constructed at JLab as well as a horizontal polishing system at CEA Saclay. Preliminary results show that the accelerating gradient can reach 32 MV/m for a large grain cavity and 26.7 MV/m for a regular grain cavity. In this presentation, the latest progresses from the international collaboration between Peking University, CEA Saclay, and JLab on BEP will be summarized.

Wu, Andy T. [JLAB; Rimmer, Robert A. [JLAB; Ciovati, Gianluigi [JLAB; Manus, Robert L. [JLAb; Reece, Charles E. [JLAB; Williams, J. S. [JLAB; Eoznou, F. [CEA, Gif-sur-Yvette; Jin, S. [PKU/IHIP, Beijing; Lin, L. [PKU/IHIP, Beijing; Lu, X.Y. [PKU/IHIP, Beijing; Mammosser, John D. [JLAB; Wang, E. [BNL

2009-11-01T23:59:59.000Z

100

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Vendor System Vulnerability Testing Test Plan  

SciTech Connect (OSTI)

The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INLs Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendors system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendors) System replaces the name of the specific SCADA/EMS being tested.

James R. Davidson

2005-01-01T23:59:59.000Z

102

Current isolating epitaxial buffer layers for high voltage photodiode array  

DOE Patents [OSTI]

An array of photodiodes in series on a common semi-insulating substrate has a non-conductive buffer layer between the photodiodes and the semi-insulating substrate. The buffer layer reduces current injection leakage between the photodiodes of the array and allows optical energy to be converted to high voltage electrical energy.

Morse, Jeffrey D. (Martinez, CA); Cooper, Gregory A. (Pleasant Hill, CA)

2002-01-01T23:59:59.000Z

103

Buffer Minimization in Pass Transistor Logic Advanced Technology Group  

E-Print Network [OSTI]

function cells and four inverters with various drive capabilities. The approach in [2] also utilizesBuffer Minimization in Pass Transistor Logic Hai Zhou Advanced Technology Group Synopsys, Inc are inverters, where phase assignment need to be done with buffer insertion. Exper iments are done on MCNC

Zhou, Hai

104

Methods for improved growth of group III nitride buffer layers  

DOE Patents [OSTI]

Methods are disclosed for growing high crystal quality group III-nitride epitaxial layers with advanced multiple buffer layer techniques. In an embodiment, a method includes forming group III-nitride buffer layers that contain aluminum on suitable substrate in a processing chamber of a hydride vapor phase epitaxy processing system. A hydrogen halide or halogen gas is flowing into the growth zone during deposition of buffer layers to suppress homogeneous particle formation. Some combinations of low temperature buffers that contain aluminum (e.g., AlN, AlGaN) and high temperature buffers that contain aluminum (e.g., AlN, AlGaN) may be used to improve crystal quality and morphology of subsequently grown group III-nitride epitaxial layers. The buffer may be deposited on the substrate, or on the surface of another buffer. The additional buffer layers may be added as interlayers in group III-nitride layers (e.g., GaN, AlGaN, AlN).

Melnik, Yurity; Chen, Lu; Kojiri, Hidehiro

2014-07-15T23:59:59.000Z

105

U-187: Adobe Flash Player Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

106

Replenishing data descriptors in a DMA injection FIFO buffer  

DOE Patents [OSTI]

Methods, apparatus, and products are disclosed for replenishing data descriptors in a Direct Memory Access (`DMA`) injection first-in-first-out (`FIFO`) buffer that include: determining, by a messaging module on an origin compute node, whether a number of data descriptors in a DMA injection FIFO buffer exceeds a predetermined threshold, each data descriptor specifying an application message for transmission to a target compute node; queuing, by the messaging module, a plurality of new data descriptors in a pending descriptor queue if the number of the data descriptors in the DMA injection FIFO buffer exceeds the predetermined threshold; establishing, by the messaging module, interrupt criteria that specify when to replenish the injection FIFO buffer with the plurality of new data descriptors in the pending descriptor queue; and injecting, by the messaging module, the plurality of new data descriptors into the injection FIFO buffer in dependence upon the interrupt criteria.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Cernohous, Bob R. (Rochester, MN); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN)

2011-10-11T23:59:59.000Z

107

Gilliam County Riparian Buffers; 2003-2004 Annual Reports.  

SciTech Connect (OSTI)

Interest appears to be at an all-time high for riparian conservation programs in Gilliam County. With the recently added Herbaceous Buffer and the already established CREP program interest is booming. However, more and more people are turning towards the herbaceous buffer because of expense. The riparian forest buffer is becoming too expensive. Even with the excellent cost share and incentives landowners are having trouble with Farm Service Agency's payment limitation. Because of this payment limitation landowners are not receiving their full rental and incentive payments, usually in year one. This has cooled the installation of riparian forest buffers and peaked interest in the CP-29 (Herbaceous Buffer for Wildlife). Either way, riparian lands are being enhanced and water quality is being improved. Year three should be very similar to the accomplishments of year 2. There has already been several projects proposed that may or may not be approved during year 3. I am currently working on three projects that are all over 2.5 miles long on each side and total anywhere from 60 to 250 acres in size. Along with these three projects there at least seven small projects being proposed. Four of those projects are riparian forest buffers and the remaining are herbaceous buffers.

Coiner, Josh (Gilliam Soil and Water Conservation District, Condon, OR)

2004-06-01T23:59:59.000Z

108

Wasco Riparian Buffer Project, Annual Report 2003-2004.  

SciTech Connect (OSTI)

This project implements riparian buffer systems in the Mid-Columbia, addressing limiting factors identified in the Deschutes River Sub-basin Summary, March 2, 2001. This project is providing the technical planning support needed to implement at least 20 riparian buffer system contracts on approximately 800 acres covering an estimated 36 miles of anadromous fish streams. During this second year of implementation, 17 buffer contracts were established on 173,462 ft. of stream (25.9 miles). Acreage included in the buffers totaled 891.6 acres. Average buffer width was 112 ft. on each side of the stream. Cumulative totals through the first two project years are 26 buffers on 36.6 stream miles covering 1,283.6 acres. Actual implementation costs, lease payments, and maintenance costs will be borne by existing USDA programs: Conservation Reserve (CRP) and Conservation Reserve Enhancement Programs (CREP). The lease period of each contract may vary from 10 to 15 years. During this year, the average lease period was 14.9 years. The total value of contracts established this year is $1,421,268 compared with $55,504 in BPA contract costs to provide the technical support needed to get the contracts implemented. Cumulative contract value for the first two years is $1,919,451 compared to $103,329 cost to BPA. This project provides technical staffing to conduct assessments and develop conservation plans required for riparian buffer systems to help keep pace with a growing backlog of potential buffer projects. This project meets a critical need in the lower Deschutes and lower John Day River basins and complements the Riparian Buffer project approved for Fifteenmile watershed, Project No. 2001-021-00 begun in fiscal year 2001. This project supports RPA 150 and 153 as required under the Federal Hydropower System biological opinion and benefits the mid-Columbia ESU of steelhead.

Graves, Ron

2003-07-01T23:59:59.000Z

109

Buffer layers for REBCO films for use in superconducting devices  

SciTech Connect (OSTI)

A superconducting article includes a substrate having a biaxially textured surface. A biaxially textured buffer layer, which can be a cap layer, is supported by the substrate. The buffer layer includes a double perovskite of the formula A.sub.2B'B''O.sub.6, where A is rare earth or alkaline earth metal and B' and B'' are different transition metal cations. A biaxially textured superconductor layer is deposited so as to be supported by the buffer layer. A method of making a superconducting article is also disclosed.

Goyal, Amit; Wee, Sung-Hun

2014-06-10T23:59:59.000Z

110

Enhanced adhesion for LIGA microfabrication by using a buffer layer  

DOE Patents [OSTI]

The present invention is an improvement on the LIGA microfabrication process wherein a buffer layer is applied to the upper or working surface of a substrate prior to the placement of a resist onto the surface of the substrate. The buffer layer is made from an inert low-Z material (low atomic weight), a material that absorbs secondary X-rays emissions from the substrate that are generated from the substrate upon exposure to a primary X-rays source. Suitable materials for the buffer layer include polyamides and polyimide. The preferred polyimide is synthesized form pyromellitic anhydride and oxydianiline (PMDA-ODA).

Bajikar, Sateesh S.; De Carlo, Francesco; Song, Joshua J.

2004-01-27T23:59:59.000Z

111

Social vulnerability indicators as a sustainable planning tool  

SciTech Connect (OSTI)

In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to cross-administrative boundaries, which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. Seventeen social vulnerability indicators are categorized into four dimensions. This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. This study provides a foundation for sustainable strategic planning to deal with environmental change. Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

2014-01-15T23:59:59.000Z

112

Smart buildings with electric vehicle interconnection as buffer for local renewables?  

E-Print Network [OSTI]

as buffer for local renewables? Michael Stadler, Gonaloas buffer for local renewables? *) Michael Stadler Gonaloowners to integrate renewables and electric vehicles?

Stadler, Michael

2012-01-01T23:59:59.000Z

113

Data sheet acquired from Harris Semiconductor Buffered Inputs  

E-Print Network [OSTI]

1 Data sheet acquired from Harris Semiconductor SCHS121D Features · Buffered Inputs · Typical. The suffixes 96 and R denote tape and reel. The suffix T denotes a small-quantity reel of 250. CAUTION

Kretchmar, R. Matthew

114

Buffer-Gas Cooled Bose-Einstein Condensate  

E-Print Network [OSTI]

We report the creation of a Bose-Einstein condensate using buffer-gas cooling, the first realization of Bose-Einstein condensation using a broadly general method which relies neither on laser cooling nor unique atom-surface ...

Ketterle, Wolfgang

115

Evaluating operating system vulnerability to memory errors.  

SciTech Connect (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

116

T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities  

Broader source: Energy.gov [DOE]

Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

117

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

118

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

119

Mapping Climate Change Vulnerability and Impact Scenarios - A...  

Open Energy Info (EERE)

Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

120

areas vulnerabilities impacts: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

assessing infrastructure vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

122

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

123

Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc  

Broader source: Energy.gov (indexed) [DOE]

for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security...

124

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

125

Antioch University and EPA Webinar: Assessing Vulnerability of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing Vulnerability of Water Conveyance...

126

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency planning of the energy grids and energy plants considering also the ICT systems used in...

127

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

128

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

:"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

129

Method and tool for network vulnerability analysis  

DOE Patents [OSTI]

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

2006-03-14T23:59:59.000Z

130

T-616: PHP Stream Component Remote Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

131

Analyses Of Two End-User Software Vulnerability Exposure Metrics  

SciTech Connect (OSTI)

The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

Jason L. Wright; Miles McQueen; Lawrence Wellman

2012-08-01T23:59:59.000Z

132

Benjamin Livshits and Monica S. Lam 1. PHPList Admin Page SQL Injection Vulnerability  

E-Print Network [OSTI]

Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability 9. Zlib Local Race Condition Privilege Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary

Livshits, Ben

133

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE: AN APPLICATION OF  

E-Print Network [OSTI]

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE development aid is more effective in reducing vulnerability than is emission abatement. The hypothesis, vulnerability, adaptive capacity, development #12;EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE

134

Fifteenmile Creek Riparian Buffers Project, Annual Report 2002-2003.  

SciTech Connect (OSTI)

This project implements riparian buffer systems in the Mid-Columbia, addressing limiting factors identified in the Fifteenmile Subbasin Summary, June 30, 2000. The project is providing the technical planning support needed to implement at least 36 riparian buffer system contracts on approximately 872 acres covering an estimated 40 miles of anadromous fish streams over a three year period. During this second year of the project, 11 buffer contracts were implemented on 10.9 miles of stream. Buffer widths averaged 132 ft. on each side of the stream. Implementation included prescribed plantings, fencing, and related practices. Actual implementation costs, lease payments, and maintenance costs are borne by existing USDA programs: Conservation Reserve and Conservation Reserve Enhancement Programs. The lease period of each contract may vary between 10 to 15 years. During this year the average was 14.6 years. The total value of contracts established this year is $666,121 compared with $71,115 in Bonneville Power Administration (BPA) contract costs to provide the technical support needed to get the contracts implemented. This project provides technical staffing to conduct assessments and develop plans to help keep pace with the growing backlog of potential riparian buffer projects. Word of mouth from satisfied customers has brought in many new sign-ups during the year. In addition, specific outreach efforts targeting the orchard areas of the county began to bear fruit with orchardists sign-ups as the project year ended. Progress this second year of project includes only work accomplished in the Fifteenmile subbasin. A similar but separate effort to implement buffers in the Columbia Plateau Province was initiated during the year under project number 2002-019-00. This project supports RPA 150 and 153 as required under the Federal Hydropower System biological opinion.

Graves, Ron

2004-02-01T23:59:59.000Z

135

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

136

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

137

E-Print Network 3.0 - attitudes perceived vulnerability Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

vulnerability Page: << < 1 2 3 4 5 > >> 1 ORIGINAL ARTICLE Perceived Stress and Cognitive Vulnerability Mediate the Summary: ORIGINAL ARTICLE Perceived Stress and Cognitive...

138

Automated Vulnerability Detection for Compiled Smart Grid Software  

SciTech Connect (OSTI)

While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

2012-01-01T23:59:59.000Z

139

Predictive Line Buffer: A fast, Energy Efficient Cache Architecture  

E-Print Network [OSTI]

. In this paper, we propose a new cache architecture that results in a faster memory access and lower energy memory access time, and energy consuption. In this paper, we propose a new cache architecturePredictive Line Buffer: A fast, Energy Efficient Cache Architecture Kashif Ali MoKhtar Aboelaze

Aboelaze, Mokhtar

140

Semiconducting chalcogenide buffer layer for oxide heteroepitaxy on Si,,001...  

E-Print Network [OSTI]

controlled laminar growth of a crystalline transition metal oxide on Si 001 without SiOx or silicide/or silicides at the Si/oxide interface. Subnanometer buffer layers can prevent interface reac- tions while, also enables flexible strain relief. We observe nei- ther oxide nor silicide formation at the buried Si

Olmstead, Marjorie

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Modeling Buffers with Data Refresh Semantics in Automotive Architectures  

E-Print Network [OSTI]

studies from the automotive electronics domain. Categories and Subject Descriptors: C.3 [SpecialModeling Buffers with Data Refresh Semantics in Automotive Architectures Linh T.X. Phan1 Reinhard,lee}@cis.upenn.edu reinhard.schneider@rcs.ei.tum.de samarjit@tum.de ABSTRACT Automotive architectures consist of multiple

Pennsylvania, University of

142

Characterization of A Shared Buffer Optoelectronic Packet Router  

E-Print Network [OSTI]

transparency are actively being researched as a way to improve energy efficiency and capacity scaling over multiple optical switch planes and a shared electronic buffer to resolve output-port contention. By using multiple ports on the switch planes for each input and output fiber, and by using some switch- plane ports

Panwar, Shivendra S.

143

Energy Efficient Prefetching with Buffer Disks for Cluster File Systems  

E-Print Network [OSTI]

Energy Efficient Prefetching with Buffer Disks for Cluster File Systems Adam Manzanares, Xiaojun the energy- efficiency of large scale parallel storage systems. To address these issues we introduce EEVFS (Energy Efficient Virtual File System), which is able to manage data placement and disk states to help

Qin, Xiao

144

Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks  

E-Print Network [OSTI]

causes energy waste, throughput reduction, and information loss. However, the important problem space, communication bandwidth, and above all, energy supply. When a critical event triggers a surge based on light- weight buffer management. We describe simple yet effective approaches that prevent data

Chen, Shigang

145

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

146

Vulnerability and social risk management in India and Mexico  

E-Print Network [OSTI]

The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

Flores Ballesteros, Luis

2008-01-01T23:59:59.000Z

147

Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011  

E-Print Network [OSTI]

.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating to the Department's review and approval of Security Vulnerability Assessments and Site Security Plans, including

Pawlowski, Wojtek

148

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

149

Assessing the vulnerability of the fiber infrastructure to disasters  

E-Print Network [OSTI]

Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

Neumayer, Sebastian James

150

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

151

Assessing node risk and vulnerability in epidemics on networks  

E-Print Network [OSTI]

Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

Rogers, Tim

2015-01-01T23:59:59.000Z

152

Buffer insertion in large circuits using look-ahead and back-off techniques  

E-Print Network [OSTI]

Buffer insertion is an essential technique for reducing interconnect delay in submicron circuits. Though it is a well researched area, there is a need for robust and effective algorithms to perform buffer insertion at the circuit level. This thesis...

Waghmode, Mandar

2007-04-25T23:59:59.000Z

153

The design and implementation of the buffer manager for an experimental relational database management system  

E-Print Network [OSTI]

Buffer management is an essential component of database management. This thesis presents a design and implementation of the buffer manager for an experimental relational database management system. The relationship and difference between database...

Li, Zaichun

1994-01-01T23:59:59.000Z

154

Generalized buffering of pass transistor logic (PTL) stages using Boolean division and don't cares  

E-Print Network [OSTI]

the outputs of the PTL blocks, while also reducing the height and delay of the PTL block. PTL synthesis with generalized buffering was implemented in two different ways. In the first approach, Boolean division was used to perform generalized buffering...

Garg, Rajesh

2007-09-17T23:59:59.000Z

155

Buffered coscheduling for parallel programming and enhanced fault tolerance  

DOE Patents [OSTI]

A computer implemented method schedules processor jobs on a network of parallel machine processors or distributed system processors. Control information communications generated by each process performed by each processor during a defined time interval is accumulated in buffers, where adjacent time intervals are separated by strobe intervals for a global exchange of control information. A global exchange of the control information communications at the end of each defined time interval is performed during an intervening strobe interval so that each processor is informed by all of the other processors of the number of incoming jobs to be received by each processor in a subsequent time interval. The buffered coscheduling method of this invention also enhances the fault tolerance of a network of parallel machine processors or distributed system processors

Petrini, Fabrizio (Los Alamos, NM); Feng, Wu-chun (Los Alamos, NM)

2006-01-31T23:59:59.000Z

156

Mechanical interaction between rock, buffer and canister in repositories  

SciTech Connect (OSTI)

The bentonite clay buffer, which is used in the repository concept of Sweden as well as many other countries, has an important role for mechanical protection of the canister. Of special interest is the effect of a rock shear, i.e. displacement of the rock along a fracture intersecting the deposition hole, on the canister. The article shows the results of some FEM calculations of a rock shear when the new composite copper/steel canister, is used. The effect of the swelling pressure from the bentonite before shear and the effect of a symmetric as well as an asymmetric rock shear will be shown. The calculations have been preceded by extensive laboratory tests and verification calculations by which material models for the buffer and proper calculation techniques have been developed. The material model for the clay is an elastic plastic model in which porous elasticity, based on the effective stress theory, is combined with Drucker-Prager plasticity. The results indicate that the bentonite clay acts as a very good mechanical buffer against such rock displacements. Although plastic yielding may occur, mainly in the copper, the plastic strain is not more than a few percent just after the shear.

Borgesson, L. [Clay Technology AB, Lund (Sweden)

1993-12-31T23:59:59.000Z

157

Buffer Tank Design for Acceptable Control Performance Audun Faanes and Sigurd Skogestad*  

E-Print Network [OSTI]

Buffer Tank Design for Acceptable Control Performance Audun Faanes and Sigurd Skogestad* Department provides a systematic approach for the design of buffer tanks. We consider mainly the case where the objective of the buffer tank is to dampen ("average out") the fast (i.e., high- frequency) disturbances

Skogestad, Sigurd

158

Climate variability and climate change vulnerability and adaptation. Workshop summary  

SciTech Connect (OSTI)

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

1995-12-31T23:59:59.000Z

159

Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

Not Available

1994-09-01T23:59:59.000Z

160

Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material  

SciTech Connect (OSTI)

The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

Nicholson, Lary G.; Purvis, James W.

1999-07-21T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Controlled Chemical Doping of Semiconductor Nanocrystals Using Redox Buffers  

SciTech Connect (OSTI)

Semiconductor nanocrystal solids are attractive materials for active layers in next-generation optoelectronic devices; however, their efficient implementation has been impeded by the lack of precise control over dopant concentrations. Herein we demonstrate a chemical strategy for the controlled doping of nanocrystal solids under equilibrium conditions. Exposing lead selenide nanocrystal thin films to solutions containing varying proportions of decamethylferrocene and decamethylferrocenium incrementally and reversibly increased the carrier concentration in the solid by 2 orders of magnitude from their native values. This application of redox buffers for controlled doping provides a new method for the precise control of the majority carrier concentration in porous semiconductor thin films.

Engel, Jesse H.; Surendranath, Yogesh; Alivisatos, Paul

2013-07-09T23:59:59.000Z

162

Conductive and robust nitride buffer layers on biaxially textured substrates  

DOE Patents [OSTI]

The present invention relates to epitaxial, electrically conducting and mechanically robust, cubic nitride buffer layers deposited epitaxially on biaxially textured substrates such as metals and alloys. The invention comprises of a biaxially textured substrate with epitaxial layers of nitrides. The invention also discloses a method to form such epitaxial layers using a high rate deposition method as well as without the use of forming gases. The invention further comprises epitaxial layers of oxides on the biaxially textured nitride layer. In some embodiments the article further comprises electromagnetic devices which may have superconducting properties.

Sankar, Sambasivan [Chicago, IL; Goyal, Amit [Knoxville, TN; Barnett, Scott A [Evanston, IL; Kim, Ilwon [Skokie, IL; Kroeger, Donald M [Knoxville, TN

2009-03-31T23:59:59.000Z

163

Sodium bicarbonate and Alkaten as buffers in beef cattle diets  

E-Print Network [OSTI]

. PROCEDURE FOR INDIGESTIBLE ACID DETERGENT FIBER ( IAOF ) DETERMINATION. 84 LIST OF FIGURES Figure l. Time vs. rumen pH in the 90% concentrate diet. 2. Time vs. rumen pH in the 50% concentrate diet. 3. Time vs. duodena1 pH in the 90% concentrate diet 4... steers fed two levels of concentrate. 2. To determine the effect of NaHCO 3 and Alkaten on the site and extent of nutr 1ent digestibility and to exam1ne the relationship of pH and digestibility. 3. To determ1ne the effect of buffers on intake, feed...

Boerner, Benedict Joseph

1985-01-01T23:59:59.000Z

164

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters  

E-Print Network [OSTI]

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters Agis A. Iliadis effects on single CMOS inverters, the fundamental building block of logic ICs, consisting of an NMOS and a PMOS transistor. The inverters were designed in our group and fabricated in the AMI-1.5µm MOSIS line

Anlage, Steven

165

Climate Change: Conflict, Security and Vulnerability Professor of Climate Change  

E-Print Network [OSTI]

Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

Hulme, Mike

166

NV: Nessus Vulnerability Visualization for the Web Lane Harrison  

E-Print Network [OSTI]

NV: Nessus Vulnerability Visualization for the Web Lane Harrison Oak Ridge National Laboratory Oak Ridge TN, USA harrisonlt@ornl.gov Riley Spahn Oak Ridge National Laboratory Oak Ridge TN, USA spahnrb1@ornl.gov Mike Iannacone Oak Ridge National Laboratory Oak Ridge TN, USA iannaconemd@ornl.gov Evan

Kaiser, Gail E.

167

Vulnerability of Hydropower Projects to Climate Change Revision: 20th  

E-Print Network [OSTI]

Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

Harrison, Gareth

168

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability  

E-Print Network [OSTI]

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity Implications for agricultural production, trade and poverty The issue of climate volatility Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

169

Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware  

E-Print Network [OSTI]

Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed of critical and complex vulnerabilities. In addition, frequently middleware systems bases their security are safe. Therefore, security of distributed systems have been placed under the watchful eye of security

Miller, Barton P.

170

Advance in Vertical Buffered Electropolishing on Niobium for Particle Accelerators*  

SciTech Connect (OSTI)

Niobium (Nb) is the most popular material that has been employed for making superconducting radio frequency (SRF) cavities to be used in various particle accelerators over the last couple of decades. One of the most important steps in fabricating Nb SRF cavities is the final chemical removal of 150 {mu}m of Nb from the inner surfaces of the SRF cavities. This is usually done by either buffered chemical polishing (BCP) or electropolishing (EP). Recently a new Nb surface treatment technique called buffered electropolishing (BEP) has been developed at Jefferson Lab. It has been demonstrated that BEP can produce the smoothest surface finish on Nb ever reported in the literature while realizing a Nb removal rate as high as 10 {mu}m/min that is more than 25 and 5 times quicker than those of EP and BCP(112) respectively. In this contribution, recent advance in optimizing and understanding BEP treatment technique is reviewed. Latest results from RF measurements on BEP treated Nb single cell cavities by our unique vertical polishing system will be reported.

A.T. Wu, S. Jin, J.D. Mammosser, C.E. Reece, R.A. Rimmer,L. Lin, X.Y. Lu, K. Zhao

2011-09-01T23:59:59.000Z

171

Abstract -A current-mode logic (CML) buffer is based on a simple differential circuit. This paper investigates important  

E-Print Network [OSTI]

circuits can. However, CML buffers suffer from dissipating more static power than CMOS inverters. Recently buffers. A new design procedure to sys- tematically design a chain of tapered CML buffers is pro- posed. The circuit design issues in regard to the CML buffer are compared with those in a conventional CMOS inverter

Heydari, Payam

172

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies  

E-Print Network [OSTI]

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies for Prioritizing Management #12;Low-Energy Ecoregions: Greater Yellowstone Energy Richness Conservation Category systems may be vulnerable to human activities. #12;-difficult for managers to crystallize key conservation

Hansen, Andrew J.

173

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

174

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for  

E-Print Network [OSTI]

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity Govindarasu, Member, IEEE Abstract--Vulnerability assessment is a requirement of NERC's cybersecurity within the substation networks. Countermeasures are identified for improvement of the cybersecurity

Manimaran, Govindarasu

175

http://webhelp.esri.com/arcgisdesktop/9.3/index.cfm?id=1348&pid=1347&topicname=Buffer_(Analysis) Buffer Creates buffer polygons to a specified distance around the Input Features. An optional  

E-Print Network [OSTI]

http://webhelp.esri.com/arcgisdesktop/9.3/index.cfm?id=1348&pid=1347&topicname ­Proximity Toolset ­ Buffer #12;http://webhelp.esri.com/arcgisdesktop/9.3/index.cfm?id=1348&pid=1347

Brownstone, Rob

176

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

177

Doped Y.sub.2O.sub.3 buffer layers for laminated conductors  

DOE Patents [OSTI]

A laminated conductor includes a metallic substrate having a surface, a biaxially textured buffer layer supported by the surface of the metallic substrate, the biaxially textured buffer layer comprising Y.sub.2O.sub.3 and a dopant for blocking cation diffusion through the Y.sub.2O.sub.3, and a biaxially textured conductor layer supported by the biaxially textured buffer layer.

Paranthaman, Mariappan Parans (Knoxville, TN) [Knoxville, TN; Schoop, Urs (Westborough, MA) [Westborough, MA; Goyal, Amit (Knoxville, TN) [Knoxville, TN; Thieme, Cornelis Leo Hans (Westborough, MA) [Westborough, MA; Verebelyi, Darren T. (Oxford, MA) [Oxford, MA; Rupich, Martin W. (Framingham, MA) [Framingham, MA

2007-08-21T23:59:59.000Z

178

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment  

E-Print Network [OSTI]

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores baseline and greater climate change vulnerability than did alien species. Fifty percent of California

179

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

180

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to  

E-Print Network [OSTI]

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels 02318 (M.A.Z., N.M.H.) The relation between xylem vessel age and vulnerability to cavitation of sugar-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure

Melcher, Peter

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Climate Change and Infrastructure, Urban Systems, and Vulnerabilities  

SciTech Connect (OSTI)

This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

2014-01-01T23:59:59.000Z

182

Effect of buffer structures on AlGaN/GaN high electron mobility transistor reliability  

SciTech Connect (OSTI)

AlGaN/GaN high electron mobility transistors (HEMTs) with three different types of buffer layers, including a GaN/AlGaN composite layer, or 1 or 2 lm GaN thick layers, were fabricated and their reliability compared. The HEMTs with the thick GaN buffer layer showed the lowest critical voltage (Vcri) during off-state drain step-stress, but this was increased by around 50% and 100% for devices with the composite AlGaN/GaN buffer layers or thinner GaN buffers, respectively. The Voff - state for HEMTs with thin GaN and composite buffers were 100 V, however, this degraded to 50 60V for devices with thick GaN buffers due to the difference in peak electric field near the gate edge. A similar trend was observed in the isolation breakdown voltage measurements, with the highest Viso achieved based on thin GaN or composite buffer designs (600 700 V), while a much smaller Viso of 200V was measured on HEMTs with the thick GaN buffer layers. These results demonstrate the strong influence of buffer structure and defect density on AlGaN/GaN HEMT performance and reliability.

Liu, L. [University of Florida, Gainesville; Xi, Y. Y. [University of Florida, Gainesville; Ren, F. [University of Florida; Pearton, S. J. [University of Florida; Laboutin, O. [Kopin Corporation, Taunton, MA; Cao, Yu [Kopin Corporation, Taunton, MA; Johnson, Wayne J. [Kopin Corporation, Taunton, MA; Kravchenko, Ivan I [ORNL

2012-01-01T23:59:59.000Z

183

Pulsed extraction of ionization from helium buffer gas  

E-Print Network [OSTI]

The migration of intense ionization created in helium buffer gas under the influence of applied electric fields is considered. First the chemical evolution of the ionization created by fast heavy-ion beams is described. Straight forward estimates of the lifetimes for charge exchange indicate a clear suppression of charge exchange during ion migration in low pressure helium. Then self-consistent calculations of the migration of the ions in the electric field of a gas-filled cell at the National Superconducting Cyclotron Laboratory (NSCL) using a Particle-In-Cell computer code are presented. The results of the calculations are compared to measurements of the extracted ion current caused by beam pulses injected into the NSCL gas cell.

D. J. Morrissey; G. Bollen; M. Facina; S. Schwarz

2008-08-13T23:59:59.000Z

184

Superconducting composite with multilayer patterns and multiple buffer layers  

DOE Patents [OSTI]

An article of manufacture is described including a substrate, a patterned interlayer of a material selected from the group consisting of magnesium oxide, barium-titanium oxide or barium-zirconium oxide, the patterned interlayer material overcoated with a secondary interlayer material of yttria-stabilized zirconia or magnesium-aluminum oxide, upon the surface of the substrate whereby an intermediate article with an exposed surface of both the overcoated patterned interlayer and the substrate is formed, a coating of a buffer layer selected from the group consisting of cerium oxide, yttrium oxide, curium oxide, dysprosium oxide, erbium oxide, europium oxide, iron oxide, gadolinium oxide, holmium oxide, indium oxide, lanthanum oxide, manganese oxide, lutetium oxide, neodymium oxide, praseodymium oxide, plutonium oxide, samarium oxide, terbium oxide, thallium oxide, thulium oxide, yttrium oxide and ytterbium oxide over the entire exposed surface of the intermediate article, and, a ceramic superconductor. 5 figures.

Wu, X.D.; Muenchausen, R.E.

1993-10-12T23:59:59.000Z

185

Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution  

SciTech Connect (OSTI)

Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

2010-04-30T23:59:59.000Z

186

Vulnerability assessment of water supply systems for insufficient fire flows  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER SUPPLY SYSTEMS FOR INSUFFICIENT FIRE FLOWS A Thesis by LUFTHANSA RAHMAN KANTA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Kelly Brumbelow Committee Members, Francisco Olivera Sergiy Butenko Head of Department...

Kanta, Lufthansa Rahman

2009-05-15T23:59:59.000Z

187

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

188

T-682:Double free vulnerability in MapServer  

Broader source: Energy.gov [DOE]

MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

189

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed JumpCartagena Vulnerability

190

Report to Congress on Insular Area energy vulnerability  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Not Available

1994-05-01T23:59:59.000Z

191

Climate Change Vulnerability Assessment for Idaho National Laboratory  

SciTech Connect (OSTI)

The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

2014-10-01T23:59:59.000Z

192

Buffer Sizing for Minimum Energy-Delay Product by Using an Approximating Polynomial  

E-Print Network [OSTI]

Buffer Sizing for Minimum Energy-Delay Product by Using an Approximating Polynomial Chang Woo Kang to derive sizing rules for buffered chains, which optimize the overall energy-delay product. Categories result in a poor solution in terms of the energy-delay product. The focus of this work is on multi

Pedram, Massoud

193

SOLARCAP: Super Capacitor Buffering of Solar Energy for Self-Sustainable Field Systems  

E-Print Network [OSTI]

SOLARCAP: Super Capacitor Buffering of Solar Energy for Self-Sustainable Field Systems Amal Fahad of the conventional battery-based energy storage, this paper argues that the super capacitor buffering of solar energy (SOLARCAP) has the advantages of precise energy lifetime awareness, low maintenance, and operational

Shen, Kai

194

A New Method for Minimizing Buffer Sizes for Cyclo-Static Dataflow Graphs  

E-Print Network [OSTI]

. This paper presents an original methodology to minimize the global surface of the buffers for a Cyclo for real life problems. The resolution of the optimization problem for a Reed- Solomon Decoder application that the methodology developed in [5] to minimize the surface of the buffers for a minimum fixed throughput for a SDF

Paris-Sud XI, Université de

195

Stepwise Fair-Share Buffering for Gossip-Based Peer-to-Peer Data Dissemination  

E-Print Network [OSTI]

bounds for reliability of dissemination are also provided. Index Terms--Distributed systems; performance mechanism, system-wide buffer usage can be optimized while providing reliability and scalability distribution and reduces the overall buffer usage where every peer has a partial view of the system. We report

Caglar, Mine

196

Chemical Reactivity of Pd-Au Bimetallic Nanoclusters Grown via Amorphous Solid Water as Buffer Layer  

E-Print Network [OSTI]

grown via ASW buffer layer on silica, presumably due to suppression of the trimerization pathway of both, is often rather difficult to obtain. Model catalysis has been studied in recent decades by in an industrial catalyst.16-20 Intro- duction of weakly bound buffer layers to assist the growth of clusters

Asscher, Micha

197

Propagation of misfit dislocations from buffer/Si interface into Si  

DOE Patents [OSTI]

Misfit dislocations are redirected from the buffer/Si interface and propagated to the Si substrate due to the formation of bubbles in the substrate. The buffer layer growth process is generally a thermal process that also accomplishes annealing of the Si substrate so that bubbles of the implanted ion species are formed in the Si at an appropriate distance from the buffer/Si interface so that the bubbles will not migrate to the Si surface during annealing, but are close enough to the interface so that a strain field around the bubbles will be sensed by dislocations at the buffer/Si interface and dislocations are attracted by the strain field caused by the bubbles and move into the Si substrate instead of into the buffer epi-layer. Fabrication of improved integrated devices based on GaN and Si, such as continuous wave (CW) lasers and light emitting diodes, at reduced cost is thereby enabled.

Liliental-Weber, Zuzanna (El Sobrante, CA); Maltez, Rogerio Luis (Porto Alegre, BR); Morkoc, Hadis (Richmond, VA); Xie, Jinqiao (Raleigh, VA)

2011-08-30T23:59:59.000Z

198

Method of deforming a biaxially textured buffer layer on a textured metallic substrate and articles therefrom  

DOE Patents [OSTI]

The present invention provides methods and biaxially textured articles having a deformed epitaxial layer formed therefrom for use with high temperature superconductors, photovoltaic, ferroelectric, or optical devices. A buffer layer is epitaxially deposited onto biaxially-textured substrates and then mechanically deformed. The deformation process minimizes or eliminates grooves, or other irregularities, formed on the buffer layer while maintaining the biaxial texture of the buffer layer. Advantageously, the biaxial texture of the buffer layer is not altered during subsequent heat treatments of the deformed buffer. The present invention provides mechanical densification procedures which can be incorporated into the processing of superconducting films through the powder deposit or precursor approaches without incurring unfavorable high-angle grain boundaries.

Lee, Dominic F. (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); Goyal, Amit (Knoxville, TN)

2000-01-01T23:59:59.000Z

199

Superconducting composite with multilayer patterns and multiple buffer layers  

DOE Patents [OSTI]

An article of manufacture including a substrate, a patterned interlayer of a material selected from the group consisting of magnesium oxide, barium-titanium oxide or barium-zirconium oxide, the patterned interlayer material overcoated with a secondary interlayer material of yttria-stabilized zirconia or magnesium-aluminum oxide, upon the surface of the substrate whereby an intermediate article with an exposed surface of both the overcoated patterned interlayer and the substrate is formed, a coating of a buffer layer selected from the group consisting of cerium oxide, yttrium oxide, curium oxide, dysprosium oxide, erbium oxide, europium oxide, iron oxide, gadolinium oxide, holmium oxide, indium oxide, lanthanum oxide, manganese oxide, lutetium oxide, neodymium oxide, praseodymium oxide, plutonium oxide, samarium oxide, terbium oxide, thallium oxide, thulium oxide, yttrium oxide and ytterbium oxide over the entire exposed surface of the intermediate article, and, a ceramic superco n FIELD OF THE INVENTION The present invention relates to the field of superconducting articles having two distinct regions of superconductive material with differing in-plane orientations whereby the conductivity across the boundary between the two regions can be tailored. This invention is the result of a contract with the Department of Energy (Contract No. W-7405-ENG-36).

Wu, Xin D. (Greenbelt, MD); Muenchausen, Ross E. (Espanola, NM)

1993-01-01T23:59:59.000Z

200

Water vulnerabilities for existing coal-fired power plants.  

SciTech Connect (OSTI)

This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

Elcock, D.; Kuiper, J.; Environmental Science Division

2010-08-19T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

202

V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

203

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department Multiple

204

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy

205

Chemical Safety Vulnerability Working Group report. Volume 2  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

Not Available

1994-09-01T23:59:59.000Z

206

Chemical Safety Vulnerability Working Group report. Volume 3  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

Not Available

1994-09-01T23:59:59.000Z

207

Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)  

SciTech Connect (OSTI)

The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

2013-02-01T23:59:59.000Z

208

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

209

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

210

T-572: VMware ESX/ESXi SLPD denial of service vulnerability  

Broader source: Energy.gov [DOE]

VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

211

U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

212

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

213

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability  

Broader source: Energy.gov [DOE]

Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

214

Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion  

SciTech Connect (OSTI)

In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

2010-05-21T23:59:59.000Z

215

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...  

Broader source: Energy.gov (indexed) [DOE]

process termination, the PDF rendering process will restart automatically but will not resume processing the same PDF file. Successful exploitation of this vulnerability requires a...

216

East Boston buffer : a transferable urban framework for adapting to sea rise  

E-Print Network [OSTI]

Urban vulnerability to climate change is constantly increasing. Many coastal cities will need to begin sea rise mitigation efforts soon, and now is a critical time for architects to intervene in this process with good ...

Jenkins, Carolyn (Carolyn Hiller)

2013-01-01T23:59:59.000Z

217

Potential for N pollution swapping from riparian buffer strips and an instream wetland  

E-Print Network [OSTI]

Diffuse agricultural pollution is a major contributor to poor water quality in many parts of the world. Consequently agri-environment policy promotes the use of riparian buffer strips and/or denitrifying wetlands to ...

Boukelia, Willena Esther

2012-11-29T23:59:59.000Z

218

Enhanced dielectric properties from barium strontium titanate films with strontium titanate buffer layers  

E-Print Network [OSTI]

Enhanced dielectric properties from barium strontium titanate films with strontium titanate buffer in their PE state. One of the leading material candidates for tunable materials is barium strontium titanate

Alpay, S. Pamir

219

Poly(vinyl alcohol)-based buffering membranes for isoelectric trapping separations  

E-Print Network [OSTI]

Isoelectric trapping (IET) in multicompartment electrolyzers (MCE) has been widely used for the electrophoretic separation of ampholytic compounds such as proteins. In IET, the separation occurs in the buffering membranes that form a step-wise p...

Craver, Helen C.

2009-05-15T23:59:59.000Z

220

Successive structuring of source coding algorithms for data fusion, buffering, and distribution in networks  

E-Print Network [OSTI]

(cont.) We also explore the interactions between source coding and queue management in problems of buffering and distributing distortion-tolerant data. We formulate a general queuing model relevant to numerous communication ...

Draper, Stark Christiaan.

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Strained Silicon on Silicon by Wafer Bonding and Layer Transfer from Relaxed SiGe Buffer  

E-Print Network [OSTI]

We report the creation of strained silicon on silicon (SSOS) substrate technology. The method uses a relaxed SiGe buffer as a template for inducing tensile strain in a Si layer, which is then bonded to another Si handle ...

Isaacson, David M.

222

A multilevel energy buffer and voltage modulator for grid-interfaced micro-inverters  

E-Print Network [OSTI]

Micro-inverters operating into the single-phase grid from solar photovoltaic (PV) panels or other low-voltage sources must buffer the twice-line-frequency variations between the energy sourced by the PV panel and that ...

Chen, Minjie

223

A Multilevel Energy Buffer and Voltage Modulator for Grid-Interfaced Microinverters  

E-Print Network [OSTI]

Microinverters operating into the single-phase grid from solar photovoltaic (PV) panels or other low-voltage sources must buffer the twice-line-frequency variations between the energy sourced by the PV panel and that ...

Chen, Minjie

224

The buffer management scheme for the new Triumf VAX-based data acquisition and analysis system  

SciTech Connect (OSTI)

The new TRIUMF VAX-based DAAS requires data to be exchanged between acquisition, monitoring and analysis processes executing on a VAX. Data records are passed via a set of buffers contained in a region of memory shared by all processes. The responsibility for buffer management is distributed among the processes and synchronized access to the region is achieved by using the VAX self-relative queue instructions and common event flags.

Ludgate, G.A.; Haley, B.; Lee, L.

1987-08-01T23:59:59.000Z

225

Method of depositing an electrically conductive oxide buffer layer on a textured substrate and articles formed therefrom  

DOE Patents [OSTI]

An article with an improved buffer layer architecture includes a substrate having a textured metal surface, and an electrically conductive lanthanum metal oxide epitaxial buffer layer on the surface of the substrate. The article can also include an epitaxial superconducting layer deposited on the epitaxial buffer layer. An epitaxial capping layer can be placed between the epitaxial buffer layer and the superconducting layer. A method for preparing an epitaxial article includes providing a substrate with a metal surface and depositing on the metal surface a lanthanum metal oxide epitaxial buffer layer. The method can further include depositing a superconducting layer on the epitaxial buffer layer, and depositing an epitaxial capping layer between the epitaxial buffer layer and the superconducting layer.

Paranthaman, M. Parans; Aytug, Tolga; Christen, David K.

2005-10-18T23:59:59.000Z

226

Using vulnerability assessments to design facility safeguards and security systems  

SciTech Connect (OSTI)

The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

Snell, M.; Jaeger, C.

1994-08-01T23:59:59.000Z

227

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect (OSTI)

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

228

Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California  

E-Print Network [OSTI]

the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

229

Finding Semantic Vulnerabilities in PHP Applications The University of Texas at Austin  

E-Print Network [OSTI]

SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Sooel Son The University of Texas the first characterization of these types of vulner- abilities in PHP applications, develop novel inter-procedural algorithms for discovering them in PHP source code, and implement these algorithms as part of SAFERPHP

Shmatikov, Vitaly

230

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley  

E-Print Network [OSTI]

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu-cream vendors of Kathmandu valley, Case study of Jawalakhel, Ratnapark area and Balaju area' explores

Richner, Heinz

231

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data  

E-Print Network [OSTI]

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

Mitasova, Helena

232

Impact of relief accuracy on flood simulations and road network vulnerability analysis  

E-Print Network [OSTI]

network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

Paris-Sud XI, Universit de

233

What about vulnerability to a fault attack of the Miller algorithm during an  

E-Print Network [OSTI]

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

Paris-Sud XI, Université de

234

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an  

E-Print Network [OSTI]

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

Paris-Sud XI, Université de

235

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

236

Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant  

SciTech Connect (OSTI)

A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

HERZOG, K.R.

1999-09-01T23:59:59.000Z

237

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental  

E-Print Network [OSTI]

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

Paris-Sud XI, Université de

238

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

Richner, Heinz

239

Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii  

E-Print Network [OSTI]

vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

Herrera, Carlos M.

240

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation  

E-Print Network [OSTI]

1 APPENDIX A: Climate Change Vulnerability Literature Review Purpose The purpose of this discussion is to review the existing literature surrounding climate change adaptation and vulnerability with a focus thought surrounding methods for conducting climate change vulnerability assessments. The review

Brownstone, Rob

242

Optically pumped alkali laser and amplifier using helium-3 buffer gas  

DOE Patents [OSTI]

In one embodiment, a laser oscillator is provided comprising an optical cavity, the optical cavity including a gain medium including an alkali vapor and a buffer gas, the buffer gas including .sup.3He gas, wherein if .sup.4He gas is also present in the buffer gas, the ratio of the concentration of the .sup.3He gas to the .sup.4He gas is greater than 1.37.times.10.sup.-6. Additionally, an optical excitation source is provided. Furthermore, the laser oscillator is capable of outputting radiation at a first frequency. In another embodiment, an apparatus is provided comprising a gain medium including an alkali vapor and a buffer gas including .sup.3He gas, wherein if .sup.4He gas is also present in the buffer gas, the ratio of the concentration of the .sup.3He gas to the .sup.4He gas is greater than 1.37.times.10.sup.-6. Other embodiments are also disclosed.

Beach, Raymond J. (Livermore, CA); Page, Ralph (Castro Valley, CA); Soules, Thomas (Livermore, CA); Stappaerts, Eddy (San Ramon, CA); Wu, Sheldon Shao Quan (Livermore, CA)

2010-09-28T23:59:59.000Z

243

Decoherence of trapped bosons by buffer gas scattering: What length scales matter?  

E-Print Network [OSTI]

We ask and answer a basic question about the length scales involved in quantum decoherence: how far apart in space do two parts of a quantum system have to be, before a common quantum environment decoheres them as if they were entirely separate? We frame this question specifically in a cold atom context. How far apart do two populations of bosons have to be, before an environment of thermal atoms of a different species (`buffer gas') responds to their two particle numbers separately? An initial guess for this length scale is the thermal coherence length of the buffer gas; we show that a standard Born-Markov treatment partially supports this guess, but predicts only inverse-square saturation of decoherence rates with distance, and not the much more abrupt Gaussian behavior of the buffer gas's first-order coherence. We confirm this Born-Markov result with a more rigorous theory, based on an exact solution of a two-scatterer scattering problem, which also extends the result beyond weak scattering. Finally, however, we show that when interactions within the buffer gas reservoir are taken into account, an abrupt saturation of the decoherence rate does occur, exponentially on the length scale of the buffer gas's mean free path.

Lukas Gilz; Luis Rico-Prez; James R. Anglin

2014-02-13T23:59:59.000Z

244

Riparian Buffer Project : Annual Report for the Period April 1, 2001 to March 31, 2002.  

SciTech Connect (OSTI)

This project implements riparian buffer systems in the Mid-Columbia, addressing limiting factors identified in the Fifteen mile Subbasin Summary, June 30, 2000. The project is providing the technical planning support needed to implement at least 36 riparian buffer system contracts on approximately 872 acres covering an estimated 40 miles of anadromous fish streams over a three year period. In the first year of implementation, 26 buffer contracts were established on 25-26 miles of stream. This nearly doubled the annual goal. Buffer widths averaged 83 ft. on each side of the stream. Implementation included prescribed plantings, fencing, and related practices. Actual implementation costs, lease payments, and maintenance costs are borne by existing USDA programs: Conservation Reserve and Conservation Reserve Enhancement Programs. The lease period of each contract may vary between 10 to 15 years. During this year the average was 14.5 years. The total value of contracts established this year is $1,491,235 compared with $64,756 in BPA contract costs to provide the technical support needed to get the contracts implemented. This project provides technical staffing to conduct assessments and develop plans to help keep pace with the growing backlog of potential riparian buffer projects. Word of mouth from satisfied customers has brought in many new sign-ups during the year. More than half of the contracts this year have been done in the Hood and Fifteen mile sub-basins with additional contracts in adjacent sub-basins.

Wasco County Soil and Water Conservation District

2002-01-01T23:59:59.000Z

245

Safeguards Evaluation Method for evaluating vulnerability to insider threats  

SciTech Connect (OSTI)

As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

1986-01-01T23:59:59.000Z

246

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.; Gaylor, T.

1998-05-03T23:59:59.000Z

247

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

1998-01-01T23:59:59.000Z

248

A graph-based system for network-vulnerability analysis  

SciTech Connect (OSTI)

This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.

1998-06-01T23:59:59.000Z

249

Electron dynamics of the buffer layer and bilayer graphene on SiC  

SciTech Connect (OSTI)

Angle- and time-resolved two-photon photoemission (TPPE) was used to investigate electronic states in the buffer layer of 4H-SiC(0001). An image potential state (IPS) series was observed on this strongly surface-bound buffer layer, and dispersion measurements indicated free-electron-like behavior for all states in this series. These results were compared with TPPE taken on bilayer graphene, which also show the existence of a free-electron-like IPS series. Lifetimes for the n?=?2, and n?=?3 states were obtained from time-resolved TPPE; slightly increased lifetimes were observed in the bilayer graphene sample for the n?=?2 the n?=?3 states. Despite the large band gap of graphene at the center of the Brillouin zone, the lifetime results demonstrate that the graphene layers do not behave as a simple tunneling barrier, suggesting that the buffer layer and graphene overlayers play a direct role in the decay of IPS electrons.

Shearer, Alex J.; Caplins, Benjamin W.; Suich, David E.; Harris, Charles B., E-mail: cbharris@berkeley.edu [Department of Chemistry, University of California at Berkeley, Berkeley, California 94720 (United States); Chemical Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, California 94720 (United States); Johns, James E. [Department of Chemistry, University of Minnesota Twin Cities, Minneapolis, Minnesota 55455 (United States); Hersam, Mark C. [Department of Materials Science and Engineering, Northwestern University, Evanston, Illinois 60208 (United States); Department of Chemistry, Northwestern University, Evanston, Illinois 60208 (United States)

2014-06-09T23:59:59.000Z

250

Buffering the aqueous phase pH in water-in-CO{sub 2} microemulsions  

SciTech Connect (OSTI)

Water-in-oil (w/o) microemulsions have been exploited for use in a wide range of applications, including chemical and enzymatic reactions, protein and metal extraction, and the production of nanoparticles. Microemulsions are attractive systems for studying such applications because they have the ability to function as a universal solvent medium by solubilizing high concentrations of both polar and apolar molecules within their dispersed aqueous and continuous oil phases, respectively. The addition of organic and inorganic buffers to nanometer size water-in-CO{sub 2} microemulsion droplets stabilized by ammonium perfluoropolyether (PFPE-NH{sub 4}) results in an increase in pH from 3 to values of 5--7. The effects of temperature, pressure, buffer type, buffer concentration, ionic strength, and CO{sub 2} solubility on the pH inside water-in-CO{sub 2} microemulsions and on biphasic water-CO{sub 2} systems were measured by the hydrophilic indicator 4-nitrophenyl-2-sulfonate and were predicted accurately with thermodynamic models. In both systems, modest buffer loadings result in a steep pH jump from 2.5 pH units. Further increases in pH require large amounts of base to overcome buffering due to the carbonic acid-bicarbonate equilibrium. A pH approaching neutrality was obtained in w/c microemulsions with approximately 1.5 mol kg{sup {minus}1} NaOH. At high buffer loadings, the effects of temperature and pressure on pH values are negligible.

Holmes, J.D.; Ziegler, K.J.; Audriani, M.; Lee, C.T. Jr.; Bhargava, P.A.; Johnston, K.P. [Univ. of Texas, Austin, TX (United States). Dept. of Chemical Engineering] [Univ. of Texas, Austin, TX (United States). Dept. of Chemical Engineering; Steytler, D.C. [Univ. of East Anglia, Norwich (United Kingdom). School of Chemical Sciences] [Univ. of East Anglia, Norwich (United Kingdom). School of Chemical Sciences

1999-07-08T23:59:59.000Z

251

Relations of Buffer Capacity for Acids to Basicity and Exchangeable Bases of the Soil.  

E-Print Network [OSTI]

of a soil for acids is measured by the quantity of acids required to attain a given degree of acidity or hange the degree of acidity to a given extent. It is of both tical and scientific importance, in that it measures the re- lnce of the soil..., the mixtures of soil may be acid -- though undecomposad carbonates remain. The adequate session of the buffer capacity of soil requires the construc- of a curve, or statement of the total buffer capacity to a mite degree of acidity (pH) and of the specific...

Fraps, G. S. (George Stronach); Fudge, J. F.

1932-01-01T23:59:59.000Z

252

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard  

E-Print Network [OSTI]

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

Leal, Manuel S.

253

A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks  

E-Print Network [OSTI]

the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

Kundur, Deepa

254

USE OF COMPOSITE MATERIALS TO REPAIR STEEL STRUCTURES VULNERABLE TO FATIGUE DAMAGE  

E-Print Network [OSTI]

This study investigates mainly two different topics related to the use of CFRP's for strengthening and repair of steel bridges: the use of CFRP's to prevent damage in fatigue vulnerable welded connections prior to fatigue-crack initiation...

Alemdar, Fatih

2010-01-01T23:59:59.000Z

255

Seismic vulnerability of older reinforced concrete frame structures in Mid-America  

E-Print Network [OSTI]

This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

Beason, Lauren Rae

2004-09-30T23:59:59.000Z

256

U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

257

Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems  

E-Print Network [OSTI]

The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

Michaud, David, 1975-

2005-01-01T23:59:59.000Z

258

A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress  

E-Print Network [OSTI]

Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

Covington, HerbertE.

259

Detection of morphological markers of vulnerable atherosclerotic plaque using multimodal spectroscopy  

E-Print Network [OSTI]

Vulnerable plaques, which are responsible for most acute ischemic events, are presently invisible to x-ray angiography. Their primary morphological features include a thin or ulcerated fibrous cap, a large necrotic core, ...

Fitzmaurice, Maryann

260

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Assessment of chemical vulnerabilities in the Hanford high-level waste tanks  

SciTech Connect (OSTI)

The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

Meacham, J.E. [and others

1996-02-15T23:59:59.000Z

262

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

263

Analysis of Power-Aware Buffering Schemes in Wireless Sensor Networks  

E-Print Network [OSTI]

problem in battery-powered sensor networks, focusing on the fixed-size and fixed-interval buffering parameters of radio module and memory bank, data arrival rate, and data-size variation, thereby providing operational requirement of battery-powered sensor networks [

Chen, Shigang

264

High-quality germanium photodiodes integrated on silicon substrates using optimized relaxed graded buffers  

E-Print Network [OSTI]

High-quality germanium photodiodes integrated on silicon substrates using optimized relaxed graded Ge photodiodes on a graded optimized relaxed SiGe buffer on Si. The dark current in the Ge mesa are capable of operating at high frequencies 2.35 GHz . The photodiodes exhibit an external quantum efficiency

265

Energy and Thermal Aware Buffer Cache Replacement Algorithm Jianhui Yue, Yifeng Zhu, Zhao Cai, Lin Lin  

E-Print Network [OSTI]

simultaneously. We use three real-world I/O server traces, including TPC-C, LM-TBF and MSN-BEFS to evaluate our efficiency becomes a pressing concern, especially for high-density racks and blade servers. Buffer cache

Zhu, Yifeng

266

BATTERY-POWERED, ELECTRIC-DRIVE VEHICLES PROVIDING BUFFER STORAGE FOR PV CAPACITY VALUE  

E-Print Network [OSTI]

BATTERY-POWERED, ELECTRIC-DRIVE VEHICLES PROVIDING BUFFER STORAGE FOR PV CAPACITY VALUE Steven requirements that will result in a number of new battery-powered electric drive vehicles being sold beginning as vehicle-to-grid (V2G) power. In a recent press release, the Electric Power Research Institute speculates

Perez, Richard R.

267

Improving Data Access Efficiency by Using a Tagless Access Buffer (TAB)  

E-Print Network [OSTI]

of the processor's energy expenditure. We describe the implemen- tation and use of a tagless access buffer (TAB University of Technology [perla/mckee/pers]@chalmers.se Abstract The need for energy efficiency continues) that greatly improves data access energy efficiency while slightly im- proving performance. The compiler

Whalley, David

268

Thus, rarer species may be more buffered from extinction than expected from neutral sampling  

E-Print Network [OSTI]

Thus, rarer species may be more buffered from extinction than expected from neutral sampling effects. However, time-lagged extinctions due to extinction debt may lead to additional species loss (31 species abundances, at least until future extinction debt is paid. References and Notes 1. M. Gaertner, A

Tong, Liang

269

Water as Buffer Material for Gold Nanocluster Growth Elad Gross, Yonatan Horowitz, and Micha Asscher*  

E-Print Network [OSTI]

in the same buffer layer thickness range. Significantly different morphology of the clusters is obtained when are the basis for industrial heterogeneous catalysis.1-4 Gold nanoclusters held on oxide substrates were silicon oxide, SiO2/ Si(100), was chosen as the substrate in this study as a model for silica supports

Asscher, Micha

270

CALCULATIONS OF TRITIUM FLOW BETWEEN THE BUFFER VESSEL UP TO THE FIRST VACUUM SYSTEM  

E-Print Network [OSTI]

CALCULATIONS OF TRITIUM FLOW BETWEEN THE BUFFER VESSEL UP TO THE FIRST VACUUM SYSTEM Felix Sharipov diff., Eq.(32) µ viscosity of tritium Pa s 1 Introduction The present work is a continuation of the previous report [1], where the preliminary results were obtained for the tritium flow through the source

Sharipov, Felix

271

Designing a Residential Hybrid Electrical Energy Storage System Based on the Energy Buffering Strategy  

E-Print Network [OSTI]

Designing a Residential Hybrid Electrical Energy Storage System Based on the Energy Buffering-connected hybrid electrical energy storage (HEES) system can help residential users lower their electric bills system consists of different types of electrical energy storage (EES) elements, utilizing the benefits

Pedram, Massoud

272

GLOBAL CHANGE ECOLOGY -ORIGINAL PAPER Buffered climate change effects in a Mediterranean pine species  

E-Print Network [OSTI]

GLOBAL CHANGE ECOLOGY - ORIGINAL PAPER Buffered climate change effects in a Mediterranean pine Abstract Within-range effects of climatic change on tree growth at the sub-regional scale remain poorly- growth responses to climate change, the role of drought becomes even more complex in shaping communities

Herrera, Carlos M.

273

Preparation of CIGS-based solar cells using a buffered electrodeposition bath  

DOE Patents [OSTI]

A photovoltaic cell exhibiting an overall conversion efficiency of at least 9.0% is prepared from a copper-indium-gallium-diselenide thin film. The thin film is prepared by simultaneously electroplating copper, indium, gallium, and selenium onto a substrate using a buffered electro-deposition bath. The electrodeposition is followed by adding indium to adjust the final stoichiometry of the thin film.

Bhattacharya, Raghu Nath (Littleton, CO)

2007-11-20T23:59:59.000Z

274

Scheduling in Switches with Small Internal Buffers Nikos Chrysos and Manolis Katevenis  

E-Print Network [OSTI]

. INTRODUCTION Packet networks require low-cost and fast packet switches to keep pace with the increase of today belong to the former category, but the trend is towards buffered fabrics that exploit advances://archvlsi.ics.forth.gr/bpbenes/ Draft version of 22 July 2005 Abstract-- Unbuffered crossbars or switching fabrics contain no internal

Katevenis, Manolis G.H.

275

Congestion Avoidance based on Light-Weight Buffer Management in Sensor Networks  

E-Print Network [OSTI]

, congestion may occur as data packets converge toward a sink. Congestion causes energy waste, throughput1 Congestion Avoidance based on Light-Weight Buffer Management in Sensor Networks Shigang Chen, and above all, energy supply. When a critical event triggers a surge of data generated by the sensors

Chen, Shigang

276

Parvalbumin 3 is an Abundant Ca2+ Buffer in Hair Cells  

E-Print Network [OSTI]

Parvalbumin 3 is an Abundant Ca2+ Buffer in Hair Cells STEFAN HELLER,* ANDREA M. BELL, CHARLOTTE S parts of a hair cell. The Ca2+ concentration in ste- reocilia regulates adaptation and, through rapid saccular and chicken cochlear hair cells. We cloned cDNAs en- coding this protein from the corresponding

Hudspeth, A. James

277

Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding  

SciTech Connect (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

2010-12-16T23:59:59.000Z

278

ZnS/Zn(O,OH)S-based buffer layer deposition for solar cells  

DOE Patents [OSTI]

The invention provides CBD ZnS/Zn(O,OH)S and spray deposited ZnS/Zn(O,OH)S buffer layers prepared from a solution of zinc salt, thiourea and ammonium hydroxide dissolved in a non-aqueous/aqueous solvent mixture or in 100% non-aqueous solvent. Non-aqueous solvents useful in the invention include methanol, isopropanol and triethyl-amine. One-step deposition procedures are described for CIS, CIGS and other solar cell devices.

Bhattacharya, Raghu N. (Littleton, CO)

2009-11-03T23:59:59.000Z

279

Corrosion in low dielectric constant Si-O based thin films: Buffer concentration effects  

SciTech Connect (OSTI)

Organosilicate glass (OSG) is often used as an interlayer dielectric (ILD) in high performance integrated circuits. OSG is a brittle material and prone to stress-corrosion cracking reminiscent of that observed in bulk glasses. Of particular concern are chemical-mechanical planarization techniques and wet cleans involving solvents commonly encountered in microelectronics fabrication where the organosilicate film is exposed to aqueous environments. Previous work has focused on the effect of pH, surfactant, and peroxide concentration on the subcritical crack growth of these films. However, little or no attention has focused on the effect of the conjugate acid/base concentration in a buffer. Accordingly, this work examines the strength of the buffer solution in both acidic and basic environments. The concentration of the buffer components is varied keeping the ratio of acid/base and therefore pH constant. In addition, the pH was varied by altering the acid/base ratio to ascertain any additional effect of pH. Corrosion tests were conducted with double-cantilever beam fracture mechanics specimens and fracture paths were verified with ATR-FTIR. Shifts in the threshold fracture energy, the lowest energy required for bond rupture in the given environment, G{sub TH}, were found to shift to lower values as the concentration of the base in the buffer increased. This effect was found to be much larger than the effect of the hydroxide ion concentration in unbuffered solutions. The results are rationalized in terms of the salient chemical bond breaking process occurring at the crack tip and modeled in terms of the chemical potential of the reactive species.

Zeng, F. W.; Lane, M. W., E-mail: mlane@ehc.edu [Department of Chemistry, Emory and Henry College, Emory, Virginia 24340 (United States); Gates, S. M. [IBM TJ Watson Research Center, Yorktown Heights, New York 10598 (United States)] [IBM TJ Watson Research Center, Yorktown Heights, New York 10598 (United States)

2014-05-15T23:59:59.000Z

280

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Burst Buffer  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6Energy, science, and technology forBudgetThison Partnerships

282

BiN: A Buffer-in-NUCA Scheme for Accelerator-Rich CMPs As the number of on-chip accelerators grows rapidly to improve  

E-Print Network [OSTI]

BiN: A Buffer-in-NUCA Scheme for Accelerator-Rich CMPs ABSTRACT As the number of on-chip accelerators grows rapidly to improve power-efficiency, the buffer size required by accelerators drastically increases. Existing solutions allow the accelerators to share a common pool of buffers or/and allocate

Cong, Jason "Jingsheng"

283

U-178: VMware vMA Library Loading Error Lets Local Users Gain...  

Broader source: Energy.gov (indexed) [DOE]

Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges...

284

Growth of CdTe Films on Amorphous Substrates Using CaF2 Nanorods as a Buffer Layer  

E-Print Network [OSTI]

Growth of CdTe Films on Amorphous Substrates Using CaF2 Nanorods as a Buffer Layer NICHOLAS LICAUSI biaxially textured CdTe films were grown on biaxial CaF2 buffer layers. The CaF2 nanorods were grown by oblique angle vapor deposition and possessed a {111}h121i biaxial texture. The CdTe film was deposited

Wang, Gwo-Ching

285

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Approved October 1, 2002 Revised review: August 14, 2016 Statement and Reason for Standard Administrative Procedure The purpose

286

Vulnerability of the New York City Metropolitan Area to Coastal Hazards,  

E-Print Network [OSTI]

Trade Center site in Lower Manhattan, and of the Brooklyn water- front, long home to the former Brooklyn-Level Rise: Inferences for Urban Coastal Risk Management and Adaptation Policies Klaus Jacob, Vivien Gornitz at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

287

educating | innovating | transforming | advocating | strengthening vulnerable families social workuniversity of illinois at urbana-champaign  

E-Print Network [OSTI]

educating | innovating | transforming | advocating | strengthening vulnerable families social innovative efforts and collaborations are having on the lives of people in need. Whose lives? Those of · Low to work through the social barriers hindering the project. "We needed to gain trust from the local

Gilbert, Matthew

288

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities  

E-Print Network [OSTI]

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities Yun--There is a growing demand for large-scale dis- tributed storage systems to support resource sharing and fault attention has yet been paid to security solutions designed for distributed storage systems

Qin, Xiao

289

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

290

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste  

E-Print Network [OSTI]

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

291

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

292

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

293

Vulnerability of national economies to the impacts of climate change on fisheries  

E-Print Network [OSTI]

economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

Reynolds, John D.

294

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams  

E-Print Network [OSTI]

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

Young, R. Michael

295

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez  

E-Print Network [OSTI]

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

Mejia-Alvarez, Pedro

296

Seismic vulnerability assessment to slight dam-age based on experimental modal parameters  

E-Print Network [OSTI]

Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

Paris-Sud XI, Université de

297

PHS 650-section 052: Healthcare Quality Improvement and Evaluation for Vulnerable Populations  

E-Print Network [OSTI]

can contribute to global health system reform and realization of the Millennium Development Goals. II. Learning Objectives To understand how quality health care has been defined and implemented with vulnerable health care quality" BMJ 2004; 328: 1124-9 Bloom BS. "Crossing the quality chasm: a new health system

Sheridan, Jennifer

298

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory  

E-Print Network [OSTI]

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

Mutlu, Onur

299

American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE  

E-Print Network [OSTI]

1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

Pockman, William T.

300

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network [OSTI]

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

Aloul, Fadi

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability  

E-Print Network [OSTI]

(river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

Paris-Sud XI, Universit de

302

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

303

1900 CROP SCIENCE, VOL. 44, NOVEMBERDECEMBER 2004 Reducing the Genetic Vulnerability of Cotton  

E-Print Network [OSTI]

1900 CROP SCIENCE, VOL. 44, NOVEMBER­DECEMBER 2004 Reducing the Genetic Vulnerability of Cotton. Lloyd May, and C. Wayne Smith change in cotton yields has steadily declined since 1985. The u.s. cotton (Gossypium spp.) production system By 1998, absolute cotton yields (not just the rate ofexemplifies

Chee, Peng W.

304

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices  

E-Print Network [OSTI]

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

Cizelj, Leon

305

Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1  

E-Print Network [OSTI]

and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

306

Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass  

E-Print Network [OSTI]

'. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

307

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection  

E-Print Network [OSTI]

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection Agis A. Iliadis effects on the fundamental units of IC circuits, ie individual devices (MOSFETs) and gates (CMOS Inverters MOSFET devices as on-chip sensing and protecting elements. · Develop on-chip sensing, registration

Anlage, Steven

308

Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port hierarchy  

E-Print Network [OSTI]

1 Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port@parisgeo.cnrs.fr Sung-Woo LEE Korea Maritime Institute Shipping, Port & Logistics Research Department KBS media Center: revisiting the Northeast Asian port hierarchy Abstract This paper is essentially an empirical investigation

Paris-Sud XI, Université de

309

Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2  

SciTech Connect (OSTI)

The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

Fesharaki, F.; Rizer, J.P.; Greer, L.S.

1994-05-01T23:59:59.000Z

310

Using Whole-House Field Tests to Empirically Derive Moisture Buffering Model Inputs  

SciTech Connect (OSTI)

Building energy simulations can be used to predict a building's interior conditions, along with the energy use associated with keeping these conditions comfortable. These models simulate the loads on the building (e.g., internal gains, envelope heat transfer), determine the operation of the space conditioning equipment, and then calculate the building's temperature and humidity throughout the year. The indoor temperature and humidity are affected not only by the loads and the space conditioning equipment, but also by the capacitance of the building materials, which buffer changes in temperature and humidity. This research developed an empirical method to extract whole-house model inputs for use with a more accurate moisture capacitance model (the effective moisture penetration depth model). The experimental approach was to subject the materials in the house to a square-wave relative humidity profile, measure all of the moisture transfer terms (e.g., infiltration, air conditioner condensate) and calculate the only unmeasured term: the moisture absorption into the materials. After validating the method with laboratory measurements, we performed the tests in a field house. A least-squares fit of an analytical solution to the measured moisture absorption curves was used to determine the three independent model parameters representing the moisture buffering potential of this house and its furnishings. Follow on tests with realistic latent and sensible loads showed good agreement with the derived parameters, especially compared to the commonly-used effective capacitance approach. These results show that the EMPD model, once the inputs are known, is an accurate moisture buffering model.

Woods, J.; Winkler, J.; Christensen, D.; Hancock, E.

2014-08-01T23:59:59.000Z

311

High speed, very large (8 megabyte) first in/first out buffer memory (FIFO)  

DOE Patents [OSTI]

A fast FIFO (First In First Out) memory buffer capable of storing data at rates of 100 megabytes per second. The invention includes a data packer which concatenates small bit data words into large bit data words, a memory array having individual data storage addresses adapted to store the large bit data words, a data unpacker into which large bit data words from the array can be read and reconstructed into small bit data words, and a controller to control and keep track of the individual data storage addresses in the memory array into which data from the packer is being written and data to the unpacker is being read.

Baumbaugh, Alan E. (Batavia, IL); Knickerbocker, Kelly L. (Aurora, IL)

1989-01-01T23:59:59.000Z

312

Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third  

E-Print Network [OSTI]

1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

Columbia University

313

Executing scatter operation to parallel computer nodes by repeatedly broadcasting content of send buffer partition corresponding to each node upon bitwise OR operation  

DOE Patents [OSTI]

Executing a scatter operation on a parallel computer includes: configuring a send buffer on a logical root, the send buffer having positions, each position corresponding to a ranked node in an operational group of compute nodes and for storing contents scattered to that ranked node; and repeatedly for each position in the send buffer: broadcasting, by the logical root to each of the other compute nodes on a global combining network, the contents of the current position of the send buffer using a bitwise OR operation, determining, by each compute node, whether the current position in the send buffer corresponds with the rank of that compute node, if the current position corresponds with the rank, receiving the contents and storing the contents in a reception buffer of that compute node, and if the current position does not correspond with the rank, discarding the contents.

Archer, Charles J. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN)

2009-11-06T23:59:59.000Z

314

Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico  

E-Print Network [OSTI]

this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer.... Statistical analyses were used to support the results of the quantitative assessments. The results of the simulation model showed a significant impact on economic production given different scenarios of water volume and of higher probabilities of droughts...

Sanchez Flores, Maria Del Rosario

2010-10-12T23:59:59.000Z

315

Children with disabilities in the context of disaster: A social vulnerability perspective  

E-Print Network [OSTI]

draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a discussion... of the theory of resilience as it per- tains to children with disabilities in disaster and outline additional research needs. Social Vulnerability and Disaster Historically, disasters have been viewed as random events that cause indiscriminate losses and suffer...

Stough, Laura

2010-01-01T23:59:59.000Z

316

Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

Not Available

1994-09-01T23:59:59.000Z

317

Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

1994-05-01T23:59:59.000Z

318

Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?  

SciTech Connect (OSTI)

Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

2013-07-01T23:59:59.000Z

319

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-10-01T23:59:59.000Z

320

Redox buffered hydrofluoric acid etchant for the reduction of galvanic attack during release etching of MEMS devices having noble material films  

DOE Patents [OSTI]

Etchant solutions comprising a redox buffer can be used during the release etch step to reduce damage to the structural layers of a MEMS device that has noble material films. A preferred redox buffer comprises a soluble thiophosphoric acid, ester, or salt that maintains the electrochemical potential of the etchant solution at a level that prevents oxidation of the structural material. Therefore, the redox buffer preferentially oxidizes in place of the structural material. The sacrificial redox buffer thereby protects the exposed structural layers while permitting the dissolution of sacrificial oxide layers during the release etch.

Hankins, Matthew G. (Albuquerque, NM)

2009-10-06T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

322

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

323

A new buffer system for the potentiometric determination of fluoride ion  

SciTech Connect (OSTI)

This paper attempts to eliminate the lengthy stage of hydrolytic separation of the elements during the potentiometric determination of fluoride ions and also to develop a universal method for the determination of flouride ions. During the development of a procedure for the determination of fluoride ions it is necessary to eliminate the interfering effects of elements which form stable fluoride complexes such as A1 (III), Fe (III), Si (III), Ti (IV), V (IV), Mo (V), and W (V). By the addition of diethylenetriaminepentaacetate to the buffer solution and preliminary extraction of the benzoylphenylhydroxylaminates of the interfering elements with chloroform it was possible to develop a method for the determination of fluoride with a detection limit of 1.10/sup -5/ M.

Zhobinskii, E.Y.; Askochenskaya, R.M.; Novikova, L.B; Wl' Figarov, O.S.

1985-05-01T23:59:59.000Z

324

CAST solar axion search with 3^He buffer gas: Closing the hot dark matter gap  

E-Print Network [OSTI]

The CERN Axion Solar Telescope (CAST) has finished its search for solar axions with 3^He buffer gas, covering the search range 0.64 eV < m_a <1.17 eV. This closes the gap to the cosmological hot dark matter limit and actually overlaps with it. From the absence of excess X-rays when the magnet was pointing to the Sun we set a typical upper limit on the axion-photon coupling of g_ag < 3.3 x 10^{-10} GeV^{-1} at 95% CL, with the exact value depending on the pressure setting. Future direct solar axion searches will focus on increasing the sensitivity to smaller values of g_a, for example by the currently discussed next generation helioscope IAXO.

M. Arik; S. Aune; K. Barth; A. Belov; S. Borghi; H. Brauninger; G. Cantatore; J. M. Carmona; S. A. Cetin; J. I. Collar; E. Da Riva; T. Dafni; M. Davenport; C. Eleftheriadis; N. Elias; G. Fanourakis; E. Ferrer-Ribas; P. Friedrich; J. Galan; J. A. Garcia; A. Gardikiotis; J. G. Garza; E. N. Gazis; T. Geralis; E. Georgiopoulou; I. Giomataris; S. Gninenko; H. Gomez; M. Gomez Marzoa; E. Gruber; T. Guthorl; R. Hartmann; S. Hauf; F. Haug; M. D. Hasinoff; D. H. H. Hoffmann; F. J. Iguaz; I. G. Irastorza; J. Jacoby; K. Jakovcic; M. Karuza; K. Konigsmann; R. Kotthaus; M. Krcmar; M. Kuster; B. Lakic; P. M. Lang; J. M. Laurent; A. Liolios; A. Ljubicic; V. Lozza; G. Luzon; S. Neff; T. Niinikoski; A. Nordt; T. Papaevangelou; M. J. Pivovaroff; G. Raffelt; H. Riege; A. Rodriguez; M. Rosu; J. Ruz; I. Savvidis; I. Shilon; P. S. Silva; S. K. Solanki; L. Stewart; A. Tomas; M. Tsagri; K. van Bibber; T. Vafeiadis; J. Villar; J. K. Vogel; S. C. Yildiz; K. Zioutas

2014-09-15T23:59:59.000Z

325

ZnO buffer layer for metal films on silicon substrates  

DOE Patents [OSTI]

Dramatic improvements in metallization integrity and electroceramic thin film performance can be achieved by the use of the ZnO buffer layer to minimize interfacial energy between metallization and adhesion layers. In particular, the invention provides a substrate metallization method utilizing a ZnO adhesion layer that has a high work of adhesion, which in turn enables processing under thermal budgets typically reserved for more exotic ceramic, single-crystal, or metal foil substrates. Embodiments of the present invention can be used in a broad range of applications beyond ferroelectric capacitors, including microelectromechanical systems, micro-printed heaters and sensors, and electrochemical energy storage, where integrity of metallized silicon to high temperatures is necessary.

Ihlefeld, Jon

2014-09-16T23:59:59.000Z

326

Next generation input-output data format for HEP using Google's protocol buffers  

E-Print Network [OSTI]

We propose a data format for Monte Carlo (MC) events, or any structural data, including experimental data, in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the so-called ProMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in ProMC files can be written, read and manipulated in a number of programming languages, such C++, Java and Python.

Chekanov, S V

2013-01-01T23:59:59.000Z

327

Next generation input-output data format for HEP using Google's protocol buffers  

E-Print Network [OSTI]

We propose a data format for Monte Carlo (MC) events, or any structural data, including experimental data, in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the so-called ProMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in ProMC files can be written, read and manipulated in a number of programming languages, such C++, Java and Python.

S. V. Chekanov

2013-06-27T23:59:59.000Z

328

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but  

E-Print Network [OSTI]

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

Mencuccini, Maurizio

329

Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer  

E-Print Network [OSTI]

A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

Ren, Yin

330

Autonomic Buffer Pool Configuration in PostgreSQL Wendy Powley, Pat Martin, Nailah Ogeer and Wenhu Tian  

E-Print Network [OSTI]

serves as a proof of concept, illustrating how autonomic principles can be applied to a DBMS to provide automatic sizing of buffer pools, a key resource in a DBMS. We describe an implementation of our autonomic approach to this management problem is an autonomic DBMS that is capable of automatically managing its

331

BUFFER MANAGER, FILES AND RECORDS (LOOSELY BASED ON THE COW BOOK: 9.4 9.7)  

E-Print Network [OSTI]

Eally looks like one big file that is a large byte array 2. OR, the DBMS grabs;9/10/13 CS 564: Database Management Systems 4 Buffer Management in a DBMS · Data must be in RAM for DBMS to operate on it! ­ Can't keep all the DBMS pages in main

Patel, Jignesh

332

Mechanical reorganization of cross-linked F-actin networks at the air-buffer Thomas Boatwright,a  

E-Print Network [OSTI]

Mechanical reorganization of cross-linked F-actin networks at the air-buffer interface Thomas compression is studied. We observe two distinct classes of behavior: a mechanically induced structural reorganization of the monolayer and a subsequent reversible, nonlinear mechanical response. Measurements

Dennin, Michael

333

Infrared reflection of GaN and AlGaN thin film heterostructures with AlN buffer layers  

E-Print Network [OSTI]

Infrared reflection of GaN and AlGaN thin film heterostructures with AlN buffer layers C. Wetzel, Nagoya, Japan Received 11 December 1995; accepted for publication 21 February 1996 Infrared reflection, their alloys and potential substrates need to be investigated as well. Here we present a study of the infrared

Wetzel, Christian M.

334

Formation of a Buffer Layer for Graphene on C-face SiC{0001} Guowei He, N. Srivastava, and R. M. Feenstra  

E-Print Network [OSTI]

1 Formation of a Buffer Layer for Graphene on C-face SiC{0001} Guowei He, N. Srivastava, and R. M. Feenstra Dept. Physics, Carnegie Mellon University, Pittsburgh, PA 15213 Abstract Graphene films prepared a graphene-like "buffer layer" that forms between the graphene and the SiC, similar to that observed on Si

Feenstra, Randall

335

LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions  

SciTech Connect (OSTI)

A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

1998-08-01T23:59:59.000Z

336

California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area  

SciTech Connect (OSTI)

In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

Moran, J E; Hudson, G B; Eaton, G F; Leif, R

2004-11-01T23:59:59.000Z

337

Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress  

E-Print Network [OSTI]

ral ssBioMed CentBMC Neuroscience Open AcceResearch article Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress Xinkun Wang*1,2, Asma Zaidi2,3, Ranu Pal1,2, Alexander S Garrett4...: Daiichi Sankyo Inc., Two Hilton Court, Parsippany, NJ 07054, USA Email: Xinkun Wang* - xwang@ku.edu; Asma Zaidi - azaidi@kcumb.edu; Ranu Pal - ranupal@ku.edu; Alexander S Garrett - asg@stowers- institute.org; Rogelio Braceras - rbraceras@dsus.com; Xue...

Wang, Xinkun; Zaidi, Asma; Pal, Ranu; Garrett, Alexander S.; Braceras, Rogelio; Chen, Xue-wen; Michaelis, Mary L.; Michaelis, Elias K.

2009-02-19T23:59:59.000Z

338

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

SciTech Connect (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

339

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

340

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems forVulnerabilities ||

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||Vulnerability

342

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | DepartmentMultiple

343

Study of the Nucleation and Growth of YBCO on Oxide Buffered Metallic Tapes  

SciTech Connect (OSTI)

The CRADA collaboration concentrated on developing the scientific understanding of the factors necessary for commercialization of high temperature superconductors (HTS) based on the YBCO coated conductor technology for electric power applications. The project pursued the following objectives: 1. Establish the correlations between the YBCO nuclei density and the properties of the CeO{sub 2} layer of the RABiTS{trademark} template; 2. Compare the nucleation and growth of e-beam and MOD based precursors on the buffered RABiTS{trademark} templates and clarify the materials science behind the difference; and 3. Explore routes for the optimization of the nucleation and growth of thick film MOD precursors in order to achieve high critical current densities in thick films. The CRADA work proceeded in two steps: 1. Detailed characterization of epitaxial ceria layers on model substrates, such as (001) YSZ and on RABiTS tapes; and 2. Study of YBCO nucleation on well-defined substrates and on long-length RABiTS.

Solovyov, Vyacheslav

2009-04-10T23:59:59.000Z

344

Oxygen buffering of Kilauea volcanic gases and the oxygen fugacity of Kilauea basalt  

SciTech Connect (OSTI)

Volcanic gases collected during episode 1 of the Puu Oo eruption along the east rift zone of Kilauea Volcano, Hawaii, have uniform C-O-H-S-Cl-F compositions that are sharply depleted in CO[sub 2]. The CO[sub 2]-poor gases are typical of Type II volcanic gases (GERLACH and GRAEBER, 1985) and were emitted from evolved magma stored for a prolonged period of time in the east rift zone after releasing CO[sub 2]-rich gases during an earlier period of temporary residence in the summit magma chamber. The samples are remarkably free of contamination by atmospheric gases and meteoric water. Thermodynamic evaluation of the analytical data shows that the episode 1 gases have equilibrium compositions appropriate for temperatures between 935 and 1032[degrees]C. Open- and closed-system equilibrium models of species distributions for the episode 1 gases show unequivocally that coexisting lavas buffered the gas oxygen fugacities during cooling. These models indicate that the F[sub o[sub 2

Gerlach, T.M. (Geological Survey, Vancouver, WA (United States))

1993-02-01T23:59:59.000Z

345

Determination of effective axion masses in the helium-3 buffer of CAST  

SciTech Connect (OSTI)

The CERN Axion Solar Telescope (CAST) is a ground based experiment located in Geneva (Switzerland) searching for axions coming from the Sun. Axions, hypothetical particles that not only could solve the strong CP problem but also be one of the favored candidates for dark matter, can be produced in the core of the Sun via the Primakoff effect. They can be reconverted into X-ray photons on Earth in the presence of strong electromagnetic fields. In order to look for axions, CAST points a decommissioned LHC prototype dipole magnet with different X-ray detectors installed in both ends of the magnet towards the Sun. The analysis of the data acquired during the first phase of the experiment yielded the most restrictive experimental upper limit on the axion-to-photon coupling constant for axion masses up to about 0.02 eV/c{sup 2}. During the second phase, CAST extends its mass sensitivity by tuning the electron density present in the magnetic field region. Injecting precise amounts of helium gas has enabled CAST to look for axion masses up to 1.2 eV/c{sup 2}. This paper studies the determination of the effective axion masses scanned at CAST during its second phase. The use of a helium gas buffer at temperatures of 1.8 K has required a detailed knowledge of the gas density distribution. Complete sets of computational fluid dynamic simulations validated with experimental data have been crucial to obtain accurate results.

Ruz, J

2011-11-18T23:59:59.000Z

346

Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability  

E-Print Network [OSTI]

needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

Crossley, Janet Ruth

2008-01-01T23:59:59.000Z

347

Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico  

SciTech Connect (OSTI)

Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarn et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

2008-12-30T23:59:59.000Z

348

Polycrystalline CdTe Solar Cells on Buffered Commercial TCO-Coated Glass with Efficiencies Above 15%  

SciTech Connect (OSTI)

EPIR Technologies, Inc. reports the production of thin film polycrystalline CdTe devices with National Renewable Energy Laboratory (NREL)-verified efficiencies above 15%. While previous reporting of high efficiency poly-CdTe solar cells utilized high-temperature technical glass, EPIR's cells were produced on commercially-available conductive glass. The devices exhibit fill factors up to 77% and short-circuit current densities around 24 mA/cm{sup 2}. EPIR developed a robust process for producing thin film CdTe solar cells through implementation of a high resistivity SnO{sub 2} buffer layer and optimization of the CdS window layer thickness. The effects of the high resistivity buffer layer on device performance were investigated, demonstrating improved overall performance and yield. To our knowledge, these are among the highest efficiencies yet reported and NREL-verified for a thin film CdTe solar cell fabricated using commercial conductive glass.

Banai, R.; Blissett, C.; Buurma, C.; Colegrove, E.; Bechmann, P.; Ellsworth, J.; Morley, M.; Barnes, S.; Lennon, C.; Gilmore, C.; Dhere, R.; Bergeson, J.; Scott, M.; Gessert, T.

2011-01-01T23:59:59.000Z

349

Isotherm parameters and intraparticle mass transfer kinetics on molecularly imprinted polymers in acetonitrile/buffer mobile phases  

SciTech Connect (OSTI)

The equilibrium isotherm and the intraparticle mass transfer kinetics of the enantiomers of the template were investigated on an Fmoc-L-tryptophan (Fmoc-L-Trp) imprinted polymer at different pHs and water concentrations in acetonitrile/aqueous buffer mobile phases. The equilibrium isotherm data were measured using frontal analysis at 25 {+-} 2 C. The adsorption energy distribution was found to be trimodal, with narrow modes. Consistent with this distribution, the adsorption data were modeled using a tri-Langmuir isotherm equation and the best estimates of the isotherm parameters were determined. The intraparticle mass transfer parameters were derived by comparing the profiles of experimental overloaded bands and the profiles calculated using the isotherm model and the lumped pore diffusion (POR) model of chromatography. These results showed that different adsorption and mass transfer mechanisms exist in mobile phases made of acetonitrile/aqueous buffer and of acetonitrile/acetic acid solutions.

Kim, Hyunjung [University of Tennessee, Knoxville (UTK); Kaczmarski, Krzysztof [University of Tennessee and Rzeszow University of Technology, Poland; Guiochon, Georges A [ORNL

2006-03-01T23:59:59.000Z

350

Fundamental properties of monolithic bentonite buffer material formed by cold isostatic pressing for high-level radioactive waste repository  

SciTech Connect (OSTI)

The methods of fabrication, handling, and emplacement of engineered barriers used in a deep geological repository for high level radioactive waste should be planned as simply as possible from the engineering and economic viewpoints. Therefore, a new concept of a monolithic buffer material around a waste package have been proposed instead of the conventional concept with the use of small blocks, which would decrease the cost for buffer material. The monolithic buffer material is composed of two parts of highly compacted bentonite, a cup type body and a cover. As the forming method of the monolithic buffer material, compaction by the cold isostatic pressing process (CIP) has been employed. In this study, monolithic bentonite bodies with the diameter of about 333 mm and the height of about 455 mm (corresponding to the approx. 1/5 scale for the Japanese reference concept) were made by the CIP of bentonite powder. The dry densities: {rho}d of the bodies as a whole were measured and the small samples were cut from several locations to investigate the density distribution. The swelling pressure and hydraulic conductivity as function of the monolithic body density for CIP-formed specimens were also measured. High density ({rho}d: 1.4--2.0 Mg/m{sup 3}) and homogeneous monolithic bodies were formed by the CIP. The measured results of the swelling pressure (3--15 MPa) and hydraulic conductivity (0.5--1.4 x 10{sup {minus}13} m/s) of the specimens were almost the same as those for the uniaxial compacted bentonite in the literature. It is shown that the vacuum hoist system is an applicable handling method for emplacement of the monolithic bentonite.

Kawakami, S.; Yamanaka, Y.; Kato, K.; Asano, H.; Ueda, H.

1999-07-01T23:59:59.000Z

351

Growth mechanisms of GaSb heteroepitaxial films on Si with an AlSb buffer layer  

SciTech Connect (OSTI)

The initial growth stages of GaSb epilayers on Si substrates and the role of the AlSb buffer layer were studied by high-angle annular dark-field scanning transmission electron microscopy (HAADF-STEM). Heteroepitaxy of GaSb and AlSb on Si both occur by Volmer-Weber (i.e., island mode) growth. However, the AlSb and GaSb islands have distinctly different characteristics as revealed through an atomic-resolution structural study using Z-contrast of HAADF-STEM imaging. While GaSb islands are sparse and three dimensional, AlSb islands are numerous and flattened. The introduction of 3D island-forming AlSb buffer layer facilitates the nucleation of GaSb islands. The AlSb islands-assisted nucleation of GaSb islands results in the formation of drastically higher quality planar film at a significantly smaller thickness of films. The interface of the AlSb and GaSb epilayers with the Si substrate was further investigated with energy dispersive X-ray spectrometry to elucidate the key role of the AlSb buffer layer in the growth of GaSb epilayers on Si substrates.

Vajargah, S. Hosseini; Botton, G. A. [Department of Materials Science and Engineering, McMaster University, Hamilton, Ontario L8S 4L7 (Canada) [Department of Materials Science and Engineering, McMaster University, Hamilton, Ontario L8S 4L7 (Canada); Brockhouse Institute for Materials Research, McMaster University, Hamilton, Ontario L8S 4M1 (Canada); Canadian Centre for Electron Microscopy, McMaster University, Hamilton, Ontario L8S 4M1 (Canada); Ghanad-Tavakoli, S. [Centre for Emerging Device Technologies, McMaster University, Hamilton, Ontario L8S 4L7 (Canada)] [Centre for Emerging Device Technologies, McMaster University, Hamilton, Ontario L8S 4L7 (Canada); Preston, J. S.; Kleiman, R. N. [Brockhouse Institute for Materials Research, McMaster University, Hamilton, Ontario L8S 4M1 (Canada) [Brockhouse Institute for Materials Research, McMaster University, Hamilton, Ontario L8S 4M1 (Canada); Centre for Emerging Device Technologies, McMaster University, Hamilton, Ontario L8S 4L7 (Canada); Department of Engineering Physics, McMaster University, Hamilton, Ontario L8S 4L7 (Canada)

2013-09-21T23:59:59.000Z

352

Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling  

SciTech Connect (OSTI)

Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

2009-03-26T23:59:59.000Z

353

Sublethal OxygenGlucose Deprivation Alters Hippocampal Neuronal AMPA Receptor Expression and Vulnerability to  

E-Print Network [OSTI]

Recent studies have suggested that rats subjected to transient global brain ischemia develop depressed expression of GluR-B in CA1 hippocampal neurons. The present study was performed to determine whether a similar change in AMPA receptor expression could be triggered in vitro by sublethal oxygenglucose deprivation in rat hippocampal neuronal cultures. mRNA was extracted from individual hippocampal neurons via patch electrodes and amplified by RT-PCR 2448 hr after sublethal oxygenglucose deprivation. Compared with controls, insulted neurons expressed increased levels of GluR-D flop. As an indication that this change in receptor expression was functionally significant, insulted cultures exhibited increased AMPA- or kainate-induced 45 Ca 2 ? accumulation sensitive to Joro spider toxin and increased vulnerability to kainate-induced death. These data support the hypothesis that exposure to ischemia may enhance subsequent hippocampal

Kainate-induced Death; Howard S. Ying; Jochen H. Weishaupt; Margaret Grabb; Lorella M. T. Canzoniero; Stefano L. Sensi; Christian T. Sheline; Hannah Monyer; Dennis W. Choi

354

LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

1986-01-01T23:59:59.000Z

355

High quality metamorphic graded buffers with lattice-constants intermediate to GaAs an InP for device applications  

E-Print Network [OSTI]

We have investigated the use of a continuous, linear grading scheme for compositionally-graded metamorphic InxGal-As buffers on GaAs, which can be used as virtual substrates for optical emitters operating at wavelengths > ...

Lee, Kenneth Eng Kian

2009-01-01T23:59:59.000Z

356

Women and Sustainability: Creating Community based literacy for climate solutions Women are particularly vulnerable to economic downturns and the impacts of climate change may  

E-Print Network [OSTI]

Accord (2009) acknowledges disproportionate impacts of climate change on women in developing countries are particularly vulnerable to economic downturns and the impacts of climate change may increase that vulnerability. Water is the biggest limiting factor in Colorado and climate change is anticipated to reduce its

Boone, Randall B.

357

Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium q  

E-Print Network [OSTI]

. Bhattacharya, Associate Editor Keywords: Vulnerability Particle-tracking Arsenic Uranium Classification tree through aquifer systems and also through specific redox and pH zones within aquifers. Time were generally strongest for variables computed for distinct redox zones. Classification tree analysis

358

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking water, irrigation, industry, transportation,  

E-Print Network [OSTI]

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking for drinking water is rising in the United States and around the world due to population growth. At the same water, irrigation, industry, transportation, power production, recreation and scenic beauty

Saldin, Dilano

359

Production of cold beams of ND{sub 3} with variable rotational state distributions by electrostatic extraction of He and Ne buffer-gas-cooled beams  

SciTech Connect (OSTI)

The measurement of the rotational state distribution of a velocity-selected, buffer-gas-cooled beam of ND{sub 3} is described. In an apparatus recently constructed to study cold ion-molecule collisions, the ND{sub 3} beam is extracted from a cryogenically cooled buffer-gas cell using a 2.15 m long electrostatic quadrupole guide with three 90 bends. (2+1) resonance enhanced multiphoton ionization spectra of molecules exiting the guide show that beams of ND{sub 3} can be produced with rotational state populations corresponding to approximately T{sub rot} = 918 K, achieved through manipulation of the temperature of the buffer-gas cell (operated at 6 K or 17 K), the identity of the buffer gas (He or Ne), or the relative densities of the buffer gas and ND{sub 3}. The translational temperature of the guided ND{sub 3} is found to be similar in a 6 K helium and 17 K neon buffer-gas cell (peak kinetic energies of 6.92(0.13) K and 5.90(0.01) K, respectively). The characterization of this cold-molecule source provides an opportunity for the first experimental investigations into the rotational dependence of reaction cross sections in low temperature collisions.

Twyman, Kathryn S.; Bell, Martin T.; Heazlewood, Brianna R.; Softley, Timothy P., E-mail: tim.softley@chem.ox.ac.uk [Department of Chemistry, University of Oxford, Chemistry Research Laboratory, 12 Mansfield Road, Oxford OX1 3TA (United Kingdom)

2014-07-14T23:59:59.000Z

360

EXAMINATION OF DISLOCATIONS IN LATTICE-MISMATCHED GaInAs/BUFFER LAYER/GaAs FOR III-V PHOTOVOLTAICS  

SciTech Connect (OSTI)

Dislocations act as sites for nonradiative electron/hole pair recombination, which reduces the effi ciency of photovoltaics. Lattice-matched materials can be grown on top of one another without forming a high density of dislocations. However, when the growth of lattice-mismatched (LMM) materials is attempted, many dislocations result from the relaxation of strain in the crystal structure. In an attempt to reduce the number of dislocations that propagate into a solar device when using LMM materials, a compositionally step-graded buffer is placed between the two LMM materials. In order to confi ne the dislocations to the buffer layer and therefore increase material quality and device effi ciency, the growth temperature and thickness of the buffer layer were varied. A GaInP compositionally graded buffer and GaInAs p-n junction were grown on a GaAs substrate in a metal-organic chemical vapor deposition (MOCVD) system. A multibeam optical stress sensor (MOSS) and X-ray diffraction (XRD) were used to characterize the strain in the epilayers. Electrical and optoelectronic properties were measured using a probe station and multimeter setup, solar simulator, and a quantum effi ciency instrument. It was determined that device functionality was highly dependent on the growth temperature of the graded buffer. As growth temperature increased, so did the dislocation density in the device despite an increase in the dislocation velocity, which should have increased the dislocation annihilation rate and the diffusion of dislocations to the edge of the crystal. The thickness of the graded buffer also affected device effi ciency with thinner samples performing poorly. The thinner graded buffer layers had high internal resistances from reduced carrier concentrations. In terms of effi ciency, the empirically derived recipe developed by the scientists at the National Renewable Energy Laboratory (NREL) produced the highest quality cells.

Levander, A.; Geisz, J.

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities  

SciTech Connect (OSTI)

This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

Wilkey, D.D.

1995-09-01T23:59:59.000Z

362

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume II, part 7: Mound working group assessment team report  

SciTech Connect (OSTI)

This is the report of a visit to the Mound site by the Working Group Assessment Team (WGAT) to assess plutonium vulnerabilities. Purposes of the visit were: to review results of the site`s self assessment of current practices for handling and storing plutonium; to conduct an independent assessment of these practices; to reconcile differences and assemble a final list of vulnerabilities; to calculate consequences and probability for each vulnerability; and to issue a report to the Working Group. This report, representing completion of the Mound visit, will be compiled along with those from all other sites with plutonium inventories as part of a final report to the Secretary of Energy.

NONE

1994-09-01T23:59:59.000Z

363

Long wavelength emitting GaInN quantum wells on metamorphic GaInN buffer layers with enlarged in-plane lattice parameter  

SciTech Connect (OSTI)

Metamorphic (i.e., linear composition graded) GaInN buffer layers with an increased in-plane lattice parameter, grown by plasma-assisted molecular beam epitaxy, were used as templates for metal organic vapor phase epitaxy (MOVPE) grown GaInN/GaInN quantum wells (QWs), emitting in the green to red spectral region. A composition pulling effect was observed allowing considerable higher growth temperatures for the QWs for a given In composition. The internal quantum efficiency (IQE) of the QWs was determined by temperature and excitation power density dependent photoluminescence (PL) spectroscopy. An increase in IQE by a factor of two was found for green emitting QWs grown on metamorphic GaInN buffer compared to reference samples grown on standard GaN buffer layers. The ratio of room temperature to low temperature intensity PL of the red emitting QWs were found to be comparable to the PL efficiency of green emitting QWs, both grown on metamorphic GaInN buffers. The excitation density and well width dependence of the IQE indicate a reduction of the quantum confined Stark effect upon growth on GaInN buffer layers with increased in-plane lattice parameter.

Dubler, J., E-mail: juergen.daeubler@iaf.fraunhofer.de; Passow, T.; Aidam, R.; Khler, K.; Kirste, L.; Kunzer, M.; Wagner, J. [Fraunhofer-Institut fr Angewandte Festkrperphysik, Tullastrasse 72, 79108 Freiburg (Germany)

2014-09-15T23:59:59.000Z

364

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA. [Human Reliability Analysis (HRA)  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-01-01T23:59:59.000Z

365

Development of Production PVD-AIN Buffer Layer System and Processes to Reduce Epitaxy Costs and Increase LED Efficiency  

SciTech Connect (OSTI)

The DOE has set aggressive goals for solid state lighting (SSL) adoption, which require manufacturing and quality improvements for virtually all process steps leading to an LED luminaire product. The goals pertinent to this proposed project are to reduce the cost and improve the quality of the epitaxial growth processes used to build LED structures. The objectives outlined in this proposal focus on achieving cost reduction and performance improvements over state-of-the-art, using technologies that are low in cost and amenable to high efficiency manufacturing. The objectives of the outlined proposal focus on cost reductions in epitaxial growth by reducing epitaxy layer thickness and hetero-epitaxial strain, and by enabling the use of larger, less expensive silicon substrates and would be accomplished through the introduction of a high productivity reactive sputtering system and an effective sputtered aluminum-nitride (AlN) buffer/nucleation layer process. Success of the proposed project could enable efficient adoption of GaN on-silicon (GaN/Si) epitaxial technology on 150mm silicon substrates. The reduction in epitaxy cost per cm{sup 2} using 150mm GaN-on-Si technology derives from (1) a reduction in cost of ownership and increase in throughput for the buffer deposition process via the elimination of MOCVD buffer layers and other throughput and CoO enhancements, (2) improvement in brightness through reductions in defect density, (3) reduction in substrate cost through the replacement of sapphire with silicon, and (4) reduction in non-ESD yield loss through reductions in wafer bow and temperature variation. The adoption of 150mm GaN/Si processing will also facilitate significant cost reductions in subsequent wafer fabrication manufacturing costs. There were three phases to this project. These three phases overlap in order to aggressively facilitate a commercially available production GaN/Si capability. In Phase I of the project, the repeatability of the performance was analyzed and improvements implemented to the Veeco PVD-AlN prototype system to establish a specification and baseline PVD-AlN films on sapphire and in parallel the evaluation of PVD AlN on silicon substrates began. In Phase II of the project a Beta tool based on a scaled-up process module capable of depositing uniform films on batches of 4or 6 diameter substrates in a production worthy operation was developed and qualified. In Phase III, the means to increase the throughput of the PVD-AlN system was evaluated and focused primarily on minimizing the impact of the substrate heating and cooling times that dominated the overall cycle time.

Cerio, Frank

2013-09-14T23:59:59.000Z

366

The effects of buffer layers on the performance and stability of flexible InGaZnO thin film transistors on polyimide substrates  

SciTech Connect (OSTI)

We demonstrated the fabrication of flexible amorphous indium gallium zinc oxide thin-film transistors (TFTs) on high-temperature polyimide (PI) substrates, which were debonded from the carrier glass after TFT fabrication. The application of appropriate buffer layers on the PI substrates affected the TFT performance and stability. The adoption of the SiN{sub x}/AlO{sub x} buffer layers as water and hydrogen diffusion barriers significantly improved the device performance and stability against the thermal annealing and negative bias stress, compared to single SiN{sub x} or SiO{sub x} buffer layers. The substrates could be bent down to a radius of curvature of 15?mm and the devices remained normally functional.

Ok, Kyung-Chul; Park, Jin-Seong, E-mail: hkim-2@naver.com, E-mail: jsparklime@hanyang.ac.kr [Division of Materials Science and Engineering, Hanyang University, 222, Wangsimni-ro, Seongdong-gu, Seoul 133-791 (Korea, Republic of); Ko Park, Sang-Hee; Kim, H., E-mail: hkim-2@naver.com, E-mail: jsparklime@hanyang.ac.kr [Department of Materials Science and Engineering, Korea Advanced Institute of Science and Technology, 291 Daehak-ro, Yuseong-gu, Daejeon 305-701 (Korea, Republic of); Hwang, Chi-Sun [Transparent Electronics Team, ETRI, Daejeon 305-350 (Korea, Republic of); Soo Shin, Hyun; Bae, Jonguk [LG Display R and D Center, LG Display Co., Ltd., Paju 413-811 (Korea, Republic of)

2014-02-10T23:59:59.000Z

367

GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.  

SciTech Connect (OSTI)

Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

2011-04-08T23:59:59.000Z

368

Vulnerability of the Superficial Zone of Immature Articular Cartilage to Compressive Injury  

SciTech Connect (OSTI)

The zonal composition and functioning of adult articular cartilage causes depth-dependent responses to compressive injury. In immature cartilage, shear and compressive moduli as well as collagen and sulfated glycosaminoglycan (sGAG) content also vary with depth. However, there is little understanding of the depth-dependent damage caused by injury. Since injury to immature knee joints most often causes articular cartilage lesions, this study was undertaken to characterize the zonal dependence of biomechanical, biochemical, and matrix-associated changes caused by compressive injury. Disks from the superficial and deeper zones of bovine calves were biomechanically characterized. Injury to the disks was achieved by applying a final strain of 50% compression at 100%/second, followed by biomechanical recharacterization. Tissue compaction upon injury as well as sGAG density, sGAG loss, and biosynthesis were measured. Collagen fiber orientation and matrix damage were assessed using histology, diffraction-enhanced x-ray imaging, and texture analysis. Injured superficial zone disks showed surface disruption, tissue compaction by 20.3 {+-} 4.3% (mean {+-} SEM), and immediate biomechanical impairment that was revealed by a mean {+-} SEM decrease in dynamic stiffness to 7.1 {+-} 3.3% of the value before injury and equilibrium moduli that were below the level of detection. Tissue areas that appeared intact on histology showed clear textural alterations. Injured deeper zone disks showed collagen crimping but remained undamaged and biomechanically intact. Superficial zone disks did not lose sGAG immediately after injury, but lost 17.8 {+-} 1.4% of sGAG after 48 hours; deeper zone disks lost only 2.8 {+-} 0.3% of sGAG content. Biomechanical impairment was associated primarily with structural damage. The soft superficial zone of immature cartilage is vulnerable to compressive injury, causing superficial matrix disruption, extensive compaction, and textural alteration, which results in immediate loss of biomechanical function. In conjunction with delayed superficial sGAG loss, these changes may predispose the articular surface to further softening and tissue damage, thus increasing the risk of development of secondary osteoarthritis.

Rolauffs, R.; Muehleman, C; Li, J; Kurz, B; Kuettner, K; Frank, E; Grodzinsky, A

2010-01-01T23:59:59.000Z

369

Effect of CeO{sub 2} buffer layer on the microstructure and magnetic properties of yttrium iron garnet film on Si substrate  

SciTech Connect (OSTI)

Yttrium iron garnet films were grown by radio frequency magnetron sputtering on Si(111) substrate with and without CeO{sub 2} buffer layer, and influence of CeO{sub 2} buffer on the microstructure and magnetic behaviors of the films were investigated. As compared with the film without buffer, a larger saturation magnetizaton (M{sub s}), lower coercive force (H{sub c}), and higher remnant magnetization (M{sub r}) were obtained due to the introduction of CeO{sub 2} layer. The higher M{sub s} results from the denser structure and the smaller content of Fe{sup 2+} ions. The lower H{sub c} and higher M{sub r} can be explained by the small surface roughness and crystal grains size. The film on CeO{sub 2} buffer layer possess fine microstructure and its surface roughness is smaller than the unbuffered films, which provides an increased exchange between the crystal grains and an enhanced spontaneous magnetization effect, leading to the higher remnant magnetization.

Yang Qinghui; Zhang Huaiwu; Wen Qiye; Liu Yingli [State Key Laboratory of Electronic Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu, 610054 (China); Xiao, John Q. [Department of Physics and Astronomy, University of Delaware, Newark, Delaware, 19716 (United States)

2009-04-01T23:59:59.000Z

370

Growth and Properties of (001)-oriented Pb(Zr?.??Ti?.??)O?/LaNiO? Films on Si(001) Substrates with TiN Buffer Layers  

E-Print Network [OSTI]

Pulsed laser deposition has been used to grow Pb(Zr?.??Ti?.??)O? (PZT)/LaNiO? (LNO) heterostructures with restricted crystallographic orientations on bare Si(001) and SiO?-coated Si(001) substrates, using TiN buffer layers. ...

Zhu, Tie-Jun

371

Structural and chemical investigations of CBD-and PVD-CdS buffer layers and interfaces in Cu(In,Ga)Se2-based thin film solar cells  

E-Print Network [OSTI]

(In,Ga)Se2-based thin film solar cells D. Abou-Rasa,b,*, G. Kostorza , A. Romeob,1 , D. Rudmannb , A Available online 8 December 2004 Abstract It is known that high-efficiency thin film solar cells based on Cu; Chemical bath deposition; CdS buffer 1. Introduction The highest efficiencies for thin film solar cells

Romeo, Alessandro

372

Journal of Crystal Growth 293 (2006) 273277 A study of semi-insulating GaN grown on AlN buffer/sapphire  

E-Print Network [OSTI]

-temperature GaN interlayer. In comparison with the normal GaN grown on sapphire, the crystal quality measurement results of GaN grown directly on an AlN buffer indicated that the as-grown-undoped Ga, or high density of edge-type dislocations [6­10]. However, Fe and other heavy metals tend to have reactor

Ozbay, Ekmel

373

Absorption spectra of liquid water and aqueous buffers between 0.3 and Department of Physics, University of California, Santa Barbara, California 93106  

E-Print Network [OSTI]

Absorption spectra of liquid water and aqueous buffers between 0.3 and 3.72 THz Jing Xua Department-dependent terahertz absorption with attenuation lengths on the order of tens of micrometers. To access this spectral.5 THz, these studies provide a well- documented absorption spectrum for liquid water, at approxi- mately

Xu, Jing

374

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 20, NO. 5, MAY 2001 693 Buffer Minimization in Pass Transistor Logic  

E-Print Network [OSTI]

and then mapped to cells of a pass transistor library consisting of three function cells and four inverters on multifan-out nodes. We also consider the case when buffers are inverters, where phase assignment needs by Associate Editor D. Hill. H. Zhou is with the Advanced Technology Group, Synopsys, Inc., Mountain View, CA

Zhou, Hai

375

T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service  

Broader source: Energy.gov [DOE]

This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

376

A.Y. Kim and E.A. Fitzgerald, MRS Symposia Proceedings 510 (1998) Page 1 ENGINEERING DISLOCATION DYNAMICS IN Inx(AlyGa1-y)1-xP GRADED BUFFERS  

E-Print Network [OSTI]

= 0.34 graded buffers with TDD = 5?106 cm-2 and roughness = 15 nm and a simple optimization has optimization and the incorporation of aluminum for x > 0.20 to keep the graded buffer completely transparent reactor was used with trim

377

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

"qtactivex" parameters within an HTML object. 4) A boundary error when handling the transform attribute of "text3GTrack" elements can be exploited to cause a buffer overflow via...

378

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime...

379

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime...

380

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

382

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

383

Epitaxial strontium titanate films grown by atomic layer deposition on SrTiO{sub 3}-buffered Si(001) substrates  

SciTech Connect (OSTI)

Epitaxial strontium titanate (STO) films have been grown by atomic layer deposition (ALD) on Si(001) substrates with a thin STO buffer layer grown by molecular beam epitaxy (MBE). Four unit cells of STO grown by MBE serve as the surface template for ALD growth. The STO films grown by ALD are crystalline as-deposited with minimal, if any, amorphous SiO{sub x} layer at the STO-Si interface. The growth of STO was achieved using bis(triisopropylcyclopentadienyl)-strontium, titanium tetraisopropoxide, and water as the coreactants at a substrate temperature of 250 Degree-Sign C. In situ x-ray photoelectron spectroscopy (XPS) analysis revealed that the ALD process did not induce additional Si-O bonding at the STO-Si interface. Postdeposition XPS analysis also revealed sporadic carbon incorporation in the as-deposited films. However, annealing at a temperature of 250 Degree-Sign C for 30 min in moderate to high vacuum (10{sup -6}-10{sup -9} Torr) removed the carbon species. Higher annealing temperatures (>275 Degree-Sign C) gave rise to a small increase in Si-O bonding, as indicated by XPS, but no reduced Ti species were observed. X-ray diffraction revealed that the as-deposited STO films were c-axis oriented and fully crystalline. A rocking curve around the STO(002) reflection gave a full width at half maximum of 0.30 Degree-Sign {+-} 0.06 Degree-Sign for film thicknesses ranging from 5 to 25 nm. Cross-sectional transmission electron microscopy revealed that the STO films were continuous with conformal growth to the substrate and smooth interfaces between the ALD- and MBE-grown STO. Overall, the results indicate that thick, crystalline STO can be grown on Si(001) substrates by ALD with minimal formation of an amorphous SiO{sub x} layer using a four-unit-cell STO buffer layer grown by MBE to serve as the surface template.

McDaniel, Martin D.; Posadas, Agham; Ngo, Thong Q.; Dhamdhere, Ajit; Smith, David J.; Demkov, Alexander A.; Ekerdt, John G. [Department of Chemical Engineering, University of Texas at Austin, 1 University Station C0400, Austin, Texas 78712 (United States); Department of Physics, University of Texas at Austin, 1 University Station C1600, Austin, Texas 78712 (United States); Department of Chemical Engineering, University of Texas at Austin, 1 University Station C0400, Austin, Texas 78712 (United States); Department of Physics, Arizona State University, Tempe, Arizona 85287-1504 (United States); Department of Physics, University of Texas at Austin, 1 University Station C1600, Austin, Texas 78712 (United States); Department of Chemical Engineering, University of Texas at Austin, 1 University Station C0400, Austin, Texas 78712 (United States)

2013-01-15T23:59:59.000Z

384

Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.  

SciTech Connect (OSTI)

Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

Enos, David George; Goods, Steven Howard

2006-11-01T23:59:59.000Z

385

Volatile fatty acid fermentation of AFEX-treated newspaper and bagasse by rumen microorganisms  

E-Print Network [OSTI]

days and filters were replaced every 12 hours. Loading rate does not include alfalfa. H A D Figure 4. Continuous culture system. A, buffer reservoir, B, fermenter; C, overflow effluent reservoir; D, filtered effluent reservoir; E, gas collector; F..., G, peristaltic pumps; H, filter, I, magnetic stir plate, containing up to 4 fermenter vessels; J, temperature bath circulator 28 FIGURE 5. Fermentor diagram. 1, fermenter lid; 2, buffer input; 3, gas outlet; 4, overflow port; 5, filter; 6...

Blasig, Jorge Dari?o

1991-01-01T23:59:59.000Z

386

Lattice-engineered Si{sub 1-x}Ge{sub x}-buffer on Si(001) for GaP integration  

SciTech Connect (OSTI)

We report a detailed structure and defect characterization study on gallium phosphide (GaP) layers integrated on silicon (Si) (001) via silicon-germanium (SiGe) buffer layers. The presented approach uses an almost fully relaxed SiGe buffer heterostructure of only 400?nm thickness whose in-plane lattice constant is matched to GaPnot at room but at GaP deposition temperature. Single crystalline, pseudomorphic 270?nm thick GaP is successfully grown by metalorganic chemical vapour deposition on a 400?nm Si{sub 0.85}Ge{sub 0.15}/Si(001) heterosystem, but carries a 0.08% tensile strain after cooling down to room temperature due to the bigger thermal expansion coefficient of GaP with respect to Si. Transmission electron microscopy (TEM) studies confirm the absence of misfit dislocations in the pseudomorphic GaP film but growth defects (e.g., stacking faults, microtwins, etc.) especially at the GaP/SiGe interface region are detected. We interpret these growth defects as a residue of the initial 3D island coalescence phase of the GaP film on the SiGe buffer. TEM-energy-dispersive x-ray spectroscopy studies reveal that these defects are often correlated with stoichiometric inhomogeneities in the GaP film. Time-of-flight Secondary ion mass spectrometry detects sharp heterointerfaces between GaP and SiGe films with a minor level of Ga diffusion into the SiGe buffer.

Skibitzki, Oliver, E-mail: skibitzki@ihp-microelectronics.com; Zaumseil, Peter; Yamamoto, Yuji; Andreas Schubert, Markus [IHP, Im Technologiepark 25, 15236 Frankfurt (Oder) (Germany); Paszuk, Agnieszka; Hannappel, Thomas [Technische Universitt Ilmenau, Gustav-Kirchhoff-Str. 5, 98693 Ilmenau (Germany); Hatami, Fariba; Ted Masselink, W. [Institut fr Physik, Humboldt Universitt zu Berlin, Newtonstrasse 15, 12489 Berlin (Germany); Trampert, Achim [Paul Drude Institut fr Festkrperelektronik, Hausvogteiplatz 5-7, 10117 Berlin (Germany); Tillack, Bernd [IHP, Im Technologiepark 25, 15236 Frankfurt (Oder) (Germany); Technische Universitt Berlin, HFT4, Einsteinufer 25, 10587 Berlin (Germany); Schroeder, Thomas [IHP, Im Technologiepark 25, 15236 Frankfurt (Oder) (Germany); Brandenburgische Technische Universitt, Konrad-Zuse Str. 1, 03046 Cottbus (Germany)

2014-03-14T23:59:59.000Z

387

BUFFERED WELL FIELD OUTLINES  

U.S. Energy Information Administration (EIA) Indexed Site

drainage radii) ...see figure below. Copy the code into a new module. Inputs: In ArcMap, data frame named "Task 1" Well FC as first layer (layer 0). Output: Polygon feature class...

388

BUFFERED WELL FIELD OUTLINES  

U.S. Energy Information Administration (EIA) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:SeadovCooperativeA2.Reformulated, Average RefinerEnergy923Demand9.40 8.95RU OIL & GAS

389

IR spectroscopy of lattice vibrations and comparative analysis of the ZnTe/CdTe quantum-dot superlattices on the GaAs substrate and with the ZnTe and CdTe buffer layers  

SciTech Connect (OSTI)

A comparative analysis of multiperiod ZnTe/CdTe superlattices with the CdTe quantum dots grown by molecular beam epitaxy on the GaAs substrate with the ZnTe and CdTe buffer layers is carried out. The elastic-stress-induced shifts of eigenfrequencies of the modes of the CdTe- and ZnTe-like vibrations of materials forming similar superlattices but grown on different buffer ZnTe and CdTe layers are compared. The conditions of formation of quantum dots in the ZnTe/CdTe superlattices on the ZnTe and CdTe buffer layers differ radically.

Kozyrev, S. P. [Russian Academy of Sciences, Lebedev Institute of Physics (Russian Federation)], E-mail: skozyrev@sci.lebedev.ru

2009-07-15T23:59:59.000Z

390

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server  

Broader source: Energy.gov [DOE]

BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

391

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume 2, Appendix A: Process and protocol  

SciTech Connect (OSTI)

This appendix contains documentation prepared by the Plutonium ES and H Vulnerability Working Group for conducting the Plutonium ES and H Vulnerability Assessment and training the assessment teams. It has the following five parts. (1) The Project Plan describes the genesis of the project, sets forth the goals, objectives and scope, provides definitions, the projected schedule, and elements of protocol. (2) The Assessment Plan provides a detailed methodology necessary to guide the many professionals who have been recruited to conduct the DOE-wide assessment. It provides guidance on which types and forms of plutonium are to be considered within the scope of the assessment, and lays out the assessment methodology to be used. (3) The memorandum from the Project to Operations Office Managers provides the protocol and direction for participation in the assessment by external stakeholders and members of the public; and the guidance for the physical inspection of plutonium materials in storage. (4) The memorandum from the Project to the assessment teams provides guidance for vulnerability screening criteria, vulnerability evaluation and prioritization process, and vulnerability quantification for prioritization. (5) The Team Training manual was used at the training session held in Colorado Springs on April 19--21, 1994 for all members of the Working Group Assessment Teams and for the leaders of the Site Assessment Teams. The goal was to provide the same training to all of the individuals who would be conducting the assessments, and thereby provide consistency in the conduct of the assessments and uniformity in reporting of the results. The training manual in Section A.5 includes supplemental material provided to the attendees after the meeting.

NONE

1994-09-01T23:59:59.000Z

392

Poly(3,4-ethylenedioxypyrrole) Modified Emitter Electrode for Substitution of Homogeneous Redox Buffer Agent Hydroquinone in Electrospray Ionization Mass Spectrometry  

SciTech Connect (OSTI)

The electrolysis inherent to the operation of the electrospray ionization (ESI) source used with mass spectrometry (MS) is a well-known attendant effect of generating unipolar spray droplets and may affect the analysis of the analyte of interest. Undesirable electrolysis of an analyte may be prevented by limiting the emitter electrode current and/or the mass transport characteristics of the system. However, these ways to avoid analyte electrolysis may not be applcable in all ESI-MS experiments. For example, in the case of specific nanospray systems (e.g. the wire-in-a-capillary bulk-loaded or chip-based tip-loaded nanospray configurations), the solution flow rate is fixed in the 50-500 nL/min range and the electrode surface to volume ratio is large presenting a very effcient analyte to electrode mass transport configuration. In these situations, control over the interfacial potential of the working electrode via homogeneous or traditional heterogeneous (sacrificial metal) redox buffering is a possible way to prevent analyte electrolysis. However, byproducts of these redox buffering approaches can appear in the mass spectra and/or they can chemically alter the analyte. For example, the main reason for using hydroquinone as a homogeneous redox buffer, in addition to its relatively low oxidation potential, is that neither the original compound nor its oxidation product benzoquinone can be detected directly by ESI-MS. However, benzoquinone can alter analytes with thiol functional groups by reacting with those groups via a 1,4-Michael addition.

Peintler-Krivan, Emese [ORNL; Van Berkel, Gary J [ORNL; Kertesz, Vilmos [ORNL

2010-01-01T23:59:59.000Z

393

Influence of a TiO{sub 2} buffer layer on the magnetic properties of anatase Co:TiO{sub 2} thin films  

SciTech Connect (OSTI)

Our study addresses the influence of a TiO{sub 2} buffer layer on the morphological, structural, and magnetic properties of Co:TiO{sub 2} films grown on (001) SrTiO{sub 3} substrates by RF sputtering. We demonstrate that a direct correlation exist between the morphology, the Co heterogeneity, and the magnetic properties measured in the films. Correlated analysis by cross section transmission electron microscopy, energy dispersive x-ray, and x-ray photoemission spectroscopy reveals that the Co is not uniformly distributed in the film but concentrated in the surface clusters. Atomic force microscopy analysis illustrates that the unbuffered films present a large density of surface clusters. These clusters are not metallic Co but Co rich TiO{sub 2} anatase phase and they are accompanied by structural defects in the film: dislocations, small angle grain boundaries. Magnetometry analysis shows that the unbuffered films have a net ferromagnetic behavior, while in the buffered ones the ferromagnetism is quenched. Therefore, we conclude that the magnetism in unbuffered samples is related to the surface clusters and seems to have an extrinsic nature.

Gabor, M. S.; Petrisor, T. Jr.; Tiusan, C. [Technical University of Cluj-Napoca, Materials Science Laboratory, Cluj-Napoca (Romania); Institut Jean Lamour, P2M, CNRS - Nancy University, Nancy (France); Hehn, M. [Institut Jean Lamour, P2M, CNRS - Nancy University, Nancy (France); Vasile, B. S. [Faculty of Applied Chemistry and Material Science, Department of Science and Engineering of Oxide Materials and Nanomaterials, University POLITEHNICA Bucharest, Bucharest (Romania); Petrisor, T. [Technical University of Cluj-Napoca, Materials Science Laboratory, Cluj-Napoca (Romania)

2012-04-15T23:59:59.000Z

394

ZnO film with ultra-low background electron concentration grown by plasma-assisted MBE using Mg film as the buffer layer  

SciTech Connect (OSTI)

Highlights: ? High quality ZnO film with ultra-low background electron concentration is grown by plasma-assisted molecular beam epitaxy using Mg film as a buffer layer. ? High resolution X-ray diffraction and photoluminescence (PL) spectroscopy indicate a high degree of crystallization. ? Hall measurement shows a carrier concentration as low as ?10{sup 14} cm{sup ?3}. ? The mechanism of the improved crystallinity is discussed in detail. -- Abstract: High quality ZnO epilayer with background electron concentration as low as 2.6 10{sup 14} cm{sup ?3} was obtained by plasma-assisted MBE on c-sapphire using a thin Mg film as the buffer layer. High-resolution XRD measurement shows a sharp (0 0 2) peak with full width at half maximum (FWHM) of only 0.029. Photoluminescence spectroscopy presents a weak defect-related near-edge emission. A metalsemiconductormetal (MSM) typed photodetector based on the material demonstrates a response of ?43 A/W under the bias of 1 V and an ON/OFF ratio of 10{sup 4}. This un-doped ZnO with ultra-low background electron concentration could be a promising starting material for p-type doping.

Chen, Mingming; Zhang, Quanlin; Su, Longxing; Su, Yuquan; Cao, Jiashi; Zhu, Yuan; Wu, Tianzhun; Gui, Xuchun [State Key Laboratory of Optoelectronic Materials and Technologies, School of Physics and Engineering, Sun Yat-sen University, Guangzhou (China)] [State Key Laboratory of Optoelectronic Materials and Technologies, School of Physics and Engineering, Sun Yat-sen University, Guangzhou (China); Yang, Chunlei [Center for Photovoltaics and Solar Energy, Shen Zhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shen Zhen (China)] [Center for Photovoltaics and Solar Energy, Shen Zhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shen Zhen (China); Xiang, Rong, E-mail: xiangr2@mail.sysu.edu.cn [State Key Laboratory of Optoelectronic Materials and Technologies, School of Physics and Engineering, Sun Yat-sen University, Guangzhou (China)] [State Key Laboratory of Optoelectronic Materials and Technologies, School of Physics and Engineering, Sun Yat-sen University, Guangzhou (China); Tang, Zikang, E-mail: phzktang@ust.hk [State Key Laboratory of Optoelectronic Materials and Technologies, School of Physics and Engineering, Sun Yat-sen University, Guangzhou (China) [State Key Laboratory of Optoelectronic Materials and Technologies, School of Physics and Engineering, Sun Yat-sen University, Guangzhou (China); Department of Physics, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong (China)

2012-09-15T23:59:59.000Z

395

Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework  

SciTech Connect (OSTI)

In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

2012-07-01T23:59:59.000Z

396

The Potential Role of Optical Coherence Tomography in the Evaluation of Vulnerable Carotid Atheromatous Plaques: A Pilot Study  

SciTech Connect (OSTI)

Purpose. The decision to intervene surgically in patients with carotid artery disease is based on the presence of symptoms, along with the severity of carotid artery stenosis as assessed by ultrasound or X-ray computed tomography (CT). Optical coherence tomography (OCT) is a relatively new imaging technique that offers potential in the identification of, as well as the distinction between, stable and unstable atherosclerotic plaques. The purpose of our study was to evaluate whether OCT can be used as a noninvasive diagnostic tool to reveal the morphology of carotid stenosis from the adventitial surface of the carotid artery. To achieve this aim, excised atheromatous plaques were scanned by OCT from the external surface. Methods. Plaques removed at carotid endarterectomy were scanned by OCT from the external surface within 72 hr of surgery and then examined histologically. The images of the histologic slides and the scans were then compared. Results. We examined 10 carotid endarterectomy specimens and were able to identify calcification, cholesterol crystal clefts, and lipid deposits in the OCT images with histologic correlation. The strong light scattering from the calcified tissue and cholesterol crystal clefts limited the depth of light penetration, making observation of the intimal surface and the detail of the fibrous cap difficult. However, we were able to confidently identify the absence of an atherosclerotic plaque by OCT scans even from the external surface. Conclusion. The results of this pilot study demonstrate that OCT can reveal the main features of carotid stenosis but that plaque vulnerability cannot be reliably and precisely assessed if scanned from the external surface with OCT in its present form.

Prabhudesai, Vikramaditya [St. Joseph's Hospital, Diagnostic Imaging (Canada); Phelan, Cordelia [University Hospital of North Staffordshire, NHS Trust, Department of Pathology (United Kingdom); Yang, Ying [Institute of Science and Technology in Medicine, Keele University (United Kingdom)], E-mail: bea00@keele.ac.uk; Wang, Ruikang K. [Oregon Health and Science University, Department of Biomedical Engineering (United States); Cowling, Mark G. [University Hospital of North Staffordshire, NHS Trust, Department of Radiology (United Kingdom)

2006-12-15T23:59:59.000Z

397

Vulnerability of Northwestern  

E-Print Network [OSTI]

, USDA Forest Service Warren Lab, provided funding, inspiration, and a steady review of our analysis with geospatial data on their forest stands. We are grateful to Wendell Wallace, Laura Drake, Andrea Hille, Ed-parametric method of statistical analysis called Classification and Regression Tree analysis (CART) on data about

398

Nuclear Fuel Cycle & Vulnerabilities  

SciTech Connect (OSTI)

The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

Boyer, Brian D. [Los Alamos National Laboratory

2012-06-18T23:59:59.000Z

399

Infrared spectroscopy of lattice vibrations in ZnTe/CdTe superlattices with quantum dots on the GaAs substrate with the ZnTe buffer layer  

SciTech Connect (OSTI)

The results of the analysis of the infrared lattice reflectance spectra of multiperiod ZnTe/CdTe superlattices with CdTe quantum dots are reported. The samples are grown by molecular beam epitaxy on the GaAs substrate with the ZnTe buffer layer. Due to the large number of periods of the superlattices, it is possible to observe CdTe-like vibration modes in the quantum dots, i.e., the dislocation-free stressed islands formed during the growth due to relaxation of elastic stresses between the ZnTe and CdTe layers are markedly different in their lattice parameters. From the frequency shifts of the CdTe- and ZnTe-like vibration modes with respect to the corresponding modes in the unstressed materials, it is possible to estimate the level of elastic stresses.

Kozyrev, S. P. [Russian Academy of Sciences, Lebedev Physical Institute (Russian Federation)], E-mail: skozyrev@sci.lebedev.ru

2009-03-15T23:59:59.000Z

400

Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents  

SciTech Connect (OSTI)

The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

Not Available

1993-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

@CRC Press 2015. This chapter appears as N. Gekakis, A. Nadeau, M. Hassanalieragh, Y. Chen, Z. Liu, G. Honan, F. Erdem, G. Sharma and T. Soyata, "Modeling of Supercapacitors as an Energy Buffer for Cyber-Physical Systems," Cyber Physical Systems -  

E-Print Network [OSTI]

, G. Honan, F. Erdem, G. Sharma and T. Soyata, "Modeling of Supercapacitors as an Energy Buffer, 2015. Modeling of Supercapacitors as an Energy Buffer for Cyber-Physical Systems Nicholas Gekakis Supercapacitors have superior power density, 10x higher than that of the rechargeable batteries, while

Sharma, Gaurav

402

Aspects of the SrO-CuO-TiO2 Ternary System Related to the Deposition of SrTiO3 and Copper-Doped SrTiO3 Thin-Film Buffer Layers  

SciTech Connect (OSTI)

YBa{sub 2}Cu{sub 3}O{sub 7-{delta}} (YBCO) coated conductors are promising materials for large-scale superconductivity applications. One version of a YBCO coated conductor is based on ion beam assisted deposition (IBAD) of magnesium oxide (MgO) onto polycrystalline metal substrates. SrTiO{sub 3} (STO) is often deposited by physical vapor deposition (PVD) methods as a buffer layer between the YBCO and IBAD MgO due to its chemical stability and lattice mismatch of only {approx}1.5% with YBCO. In this work, some aspects of the stability of STO with respect to copper (Cu) and chemical solution deposition of STO on IBAD MgO templates were examined. Solubility limits of Cu in STO were established by processing Cu-doped STO powders by conventional bulk preparation techniques. The maximum solubility of Cu in STO was {approx}1% as determined by transmission electron microscopy (TEM) and Rietveld refinements of x-ray diffraction (XRD) data. XRD analysis, performed in collaboration with NIST, on powder compositions on the STO/SrCuO{sub 2} tie line did not identify any ternary phases. SrCu{sub 0.10}Ti{sub 0.90}O{sub y} buffer layers were prepared by pulsed laser deposition (PLD) and CSD on IBAD MgO flexible metallic textured tapes. TEM analysis of a {approx}100 nm thick SrCu{sub 0.10}Ti{sub 0.90}O{sub y} buffer layer deposited by PLD showed a smooth Cu-doped STO/MgO interface. A {approx}600 nm thick YBCO film, deposited onto the SrCu{sub 0.10}Ti{sub 0.90}O{sub y} buffer by PLD, exhibited a T{sub c} of 87 K and critical current density (J{sub c}) of {approx}1 MA/cm{sup 2}. STO and Cu-doped STO thin films by CSD were {approx}30 nm thick. The in plane alignment (FWHM) after deposition of the STO improved by {approx}1{sup o} while it degraded by {approx}2{sup o} with the SrCu{sub 0.05}TiO{sub y} buffer. YBCO was deposited by PLD on the STO and SrCu{sub 0.05}TiO{sub y} buffers. The in plane alignment (FWHM) of the YBCO with the STO buffer layer slightly improved while that of the YBCO with the SrCu{sub 0.05}TiO{sub y} buffer layer remained constant. A goal of the CSD approach to fabrication of coated conductors is process simplicity. In this study, single layer textured films were obtained without a nucleating seed layer that has been deemed necessary by several investigators. These results indicate that Cu-doped STO buffer layers deposited by PLD or CSD are compatible with IBAD MgO and YBCO and that CSD is a viable approach to coated conductor fabrication.

A. Ayala

2004-12-20T23:59:59.000Z

403

Magneto-optical resonance of electromagnetically induced absorption with high contrast and narrow width in a vapour cell with buffer gas  

E-Print Network [OSTI]

The method for observing the high-contrast and narrow-width resonances of electromagnetically induced absorption (EIA) in the Hanle configuration under counterpropagating light waves is proposed. We theoretically analyze the absorption of a probe light wave in presence of counterpropagating one with the same frequency as the function of a static magnetic field applied along the vectors of light waves, propagating in a vapour cell. Here, as an example, we study a "dark" type of atomic dipole transition Fg=1-->Fe=1 in D1 line of 87Rb, where usually the electromagnetically induced transparency (EIT) can be observed. To obtain the EIA signal one should proper chose the polarizations of light waves and intensities. In contrast of regular schemes for observing EIA signals (in a single travelling light wave in the Hanle configuration or in a bichromatic light field consisted of two travelling waves), the proposed scheme allows one to use buffer gas to significantly enhance properties of the resonance. Also the dramatic influence of atomic transition openness on contrast of the resonance is revealed, that gives great advantage in comparison with cyclic atomic transitions. The obtained results can be interesting in high-resolution spectroscopy, nonlinear and magneto-optics.

D. V. Brazhnikov; A. V. Taichenachev; V. I. Yudin

2014-08-11T23:59:59.000Z

404

Introduction of Artificial Pinning Center into PLD-YBCO Coated Conductor on IBAD and Self-Epitaxial CeO2 Buffered Metal Substrate  

SciTech Connect (OSTI)

In order to fabricate YBa2Cu3O7-x (YBCO) coated conductors with high critical current density Jc in magnetic fields, we fabricated YBCO coated conductors with artificial pinning centers by the pulsed laser deposition (PLD) method on a self epitaxial PLD-CeO2 layer and ion-beam assisted deposition (IBAD)-Gd2Zr2O7 (GZO) buffered Hastelloy tape. Artificial pinning centers were introduced by the PLD deposition using the yttria-stabilized zirconia (YSZ) oxide target (nano-dot method) and YBCO target including YSZ particles (mixed target method). In the experiments using YSZ oxide target, YSZ nano-dots were observed. They were approximately 15 nm in height and 10 nm to 70 nm in diameter. We found that the density of nano-dots was controlled by the number of laser pulses. These samples exhibited higher Jc than YBCO films in magnetic fields. Furthermore, a similar improvement of Jc was observed in the experiments using YBCO target including YSZ particles. TEM observation revealed that columnar nano-structure made of BaZrO3 was formed during YBCO deposition and it was effective for pinning. We call this new epitaxial nano-structure 'bamboo structure' from its anisotropic growth and morphology.

Kobayashi, H.; Yamada, Y.; Ishida, S.; Takahashi, K.; Konishi, M.; Ibi, A.; Miyata, S. [Superconductivity Research Laboratory, ISTEC, 2-4-1 Mutsuno, Atsuta-ku, Nagoya, 456-8587 (Japan); Kato, T.; Hirayama, T. [Materials R and D Laboratory, Japan Fine Ceramics Center, 2-4-1 Mutsuno, Atsuta-ku, Nagoya 456-8587 (Japan); Shiohara, Y. [Superconductivity Research Laboratory, ISTEC, 1-10-13 Shinonome, Koto-ku, Tokyo 135-0062 (Japan)

2006-03-31T23:59:59.000Z

405

Structural characterisation of BaTiO{sub 3} thin films deposited on SrRuO{sub 3}/YSZ buffered silicon substrates and silicon microcantilevers  

SciTech Connect (OSTI)

We report on the progress towards an all epitaxial oxide layer technology on silicon substrates for epitaxial piezoelectric microelectromechanical systems. (101)-oriented epitaxial tetragonal BaTiO{sub 3} (BTO) thin films were deposited at two different oxygen pressures, 5.10{sup ?2} mbar and 5.10{sup ?3} mbar, on SrRuO{sub 3}/Yttria-stabilized zirconia (YSZ) buffered silicon substrates by pulsed laser deposition. The YSZ layer full (001) orientation allowed the further growth of a fully (110)-oriented conductive SrRuO{sub 3} electrode as shown by X-ray diffraction. The tetragonal structure of the BTO films, which is a prerequisite for the piezoelectric effect, was identified by Raman spectroscopy. In the BTO film deposited at 5.10{sup ?2} mbar strain was mostly localized inside the BTO grains whereas at 5.10{sup ?3} mbar, it was localized at the grain boundaries. The BTO/SRO/YSZ layers were finally deposited on Si microcantilevers at an O{sub 2} pressure of 5.10{sup ?3} mbar. The strain level was low enough to evaluate the BTO Young modulus. Transmission electron microscopy (TEM) was used to investigate the epitaxial quality of the layers and their epitaxial relationship on plain silicon wafers as well as on released microcantilevers, thanks to Focused-Ion-Beam TEM lamella preparation.

Colder, H.; Jorel, C., E-mail: corentin.jorel@unicaen.fr; Mchin, L. [GREYC, UMR 6072, CNRS, ENSICAEN, UCBN, 6 bd du Marchal Juin, 14050 Caen Cedex (France); Domengs, B. [LAMIPS, CRISMAT-NXP Semiconductors-Presto Engineering laboratory, CNRS-UMR 6508, ENSICAEN, UCBN, 2 rue de la Girafe, 14 000 Caen (France); Marie, P.; Boisserie, M. [CIMAP, UMR 6252, CNRS, ENSICAEN, UCBN, CEA, 6 bd du Marchal Juin, 14050 Caen Cedex (France); Guillon, S.; Nicu, L. [LAAS, CNRS, Univ de Toulouse, 7 avenue du Colonel Roche, 31400 Toulouse (France); Galdi, A. [GREYC, UMR 6072, CNRS, ENSICAEN, UCBN, 6 bd du Marchal Juin, 14050 Caen Cedex (France); Department of Industrial Engineering, CNR-SPIN Salerno, Universit di Salerno, 84084 Fisciano, Salerno (Italy)

2014-02-07T23:59:59.000Z

406

Strain relief and AlSb buffer layer morphology in GaSb heteroepitaxial films grown on Si as revealed by high-angle annular dark-field scanning transmission electron microscopy  

SciTech Connect (OSTI)

The interfacial misfit (IMF) dislocation array of an epitaxial GaSb film on a Si substrate has been imaged with high-angle annular dark-field scanning transmission electron microscopy (HAADF-STEM). The mismatch strain accommodation through dislocation formation has been investigated using geometric phase analysis (GPA) on HAADF-STEM images with atomic resolution to probe the defects' local strain distribution. These measurements indicate that the lattice parameter of the epitaxial film recovers its bulk value within three unit cells from the interface due to the relaxation through IMF dislocations. The atomic number contrast of the HAADF-STEM images and energy dispersive x-ray spectrometry illustrate the formation of islands of AlSb buffer layer along the interface. The role of the AlSb buffer layer in facilitating the GaSb film growth on Si is further elucidated by investigating the strain field of the islands with the GPA.

Vajargah, S. Hosseini; Couillard, M.; Cui, K. [Department of Material Science and Engineering, McMaster University, 1280 Main St. W., Hamilton, Ontario L8S 4M1 (Canada); Tavakoli, S. Ghanad; Robinson, B.; Kleiman, R. N.; Preston, J. S. [Department of Engineering Physics, McMaster University, Hamilton, Ontario L8S 4M1 (Canada); Botton, G. A. [Department of Material Science and Engineering, McMaster University, 1280 Main St. W., Hamilton, Ontario L8S 4M1 (Canada); Canadian Centre for Electron Microscopy, McMaster University, Hamilton, Ontario L8S 4M1 (Canada)

2011-02-21T23:59:59.000Z

407

Oxidation of In2S3 films to synthetize In2S3(1-x)O3x thin films as a buffer layer in solar cells  

E-Print Network [OSTI]

Oxidation of In2S3 films to synthetize In2S3(1-x)O3x thin films as a buffer layer in solar cells S layers for solar cells. PACS : 68.55.ag Semiconductors, 68.55.J Morphology of films , 68.55.Nq the oxidation occurs is strongly dependent on the texture of deposited films. As-grown films deposited

Boyer, Edmond

408

Towards III-V solar cells on Si: Improvement in the crystalline quality of Ge-on-Si virtual substrates through low porosity porous silicon buffer layer and annealing  

SciTech Connect (OSTI)

A comparison between the crystalline quality of Ge grown on bulk Si and on a low porosity porous Si (pSi) buffer layer using low energy plasma enhanced chemical vapor deposition is reported. Omega/2Theta coupled scans around the Ge and Si (004) diffraction peaks show a reduction of the Ge full-width at half maximum (FWHM) of 22.4% in presence of the pSi buffer layer, indicating it is effective in improving the epilayer crystalline quality. At the same time atomic force microscopy analysis shows an increase in root means square roughness for Ge grown on pSi from 38.5 nm to 48.0 nm, as a consequence of the larger surface roughness of pSi compared to bulk Si. The effect of 20 minutes vacuum annealing at 580C is also investigated. The annealing leads to a FWHM reduction of 23% for Ge grown on Si and of 36.5% for Ge on pSi, resulting in a FWHM of 101 arcsec in the latter case. At the same time, the RMS roughness is reduced of 8.8% and of 46.5% for Ge grown on bulk Si and on pSi, respectively. The biggest improvement in the crystalline quality of Ge grown on pSi with respect to Ge grown on bulk Si observed after annealing is a consequence of the simultaneous reorganization of the Ge epilayer and the buffer layer driven by energy minimization. A low porosity buffer layer can thus be used for the growth of low defect density Ge on Si virtual substrates for the successive integration of III-V multijunction solar cells on Si. The suggested approach is simple and fast thus allowing for high throughput-, moreover is cost effective and fully compatible with subsequent wafer processing. Finally it does not introduce new chemicals in the solar cell fabrication process and can be scaled to large area silicon wafers.

Calabrese, Gabriele; Baricordi, Stefano; Bernardoni, Paolo; Fin, Samuele; Guidi, Vincenzo; Vincenzi, Donato [University of Ferrara - Physics and Earth Science Department, Via Saragat 1, 44122 Ferrara (Italy)

2014-09-26T23:59:59.000Z

409

Buffer layers for coated conductors  

DOE Patents [OSTI]

A composite structure is provided including a base substrate, an IBAD oriented material upon the base substrate, and a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material. Additionally, an article is provided including a base substrate, an IBAD oriented material upon the base substrate, a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material, and a thick film upon the cubic metal oxide material. Finally, a superconducting article is provided including a base substrate, an IBAD oriented material upon the base substrate, a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material, and an yttrium barium copper oxide material upon the cubic metal oxide material.

Stan, Liliana (Los Alamos, NM); Jia, Quanxi (Los Alamos, NM); Foltyn, Stephen R. (Los Alamos, NM)

2011-08-23T23:59:59.000Z

410

Climate change and climate variability affect all regions of the world. U.S. vulnerability to the changes and variations are not only dependent on changes within the U.S. but also on  

E-Print Network [OSTI]

OVERVIEW Climate change and climate variability affect all regions of the world. U.S. vulnerability, it is important to assess emerging threats to national security due to climate change far into the future. Having with national security establish practical responses to climate change and extreme weather events

411

Position Description: Ph.D. Student in Vegetation Modeling and Climate Vulnerability Montana State University is seeking a Ph.D. student for a NASA Applied Sciences project on  

E-Print Network [OSTI]

Information. An overview of the project can be found at (http://www.montana.edu/lccvp/) Application Procedures Montana State University is seeking a Ph.D. student for a NASA Applied Sciences project on vulnerability of biological resources under climate and land use change. The project will use NASA resources to inform climate

Hansen, Andrew J.

412

Aupetit, S., Riff, J., Gallier, V., & Espi, S. (2012). Conceptual and methodological tools for analyzing situations of vulnerability on the road. Examples from a motorcycle riding study. European Conference on Cognitive Ergonomics (ECCE), 28-31 August, Ed  

E-Print Network [OSTI]

Conference on Cognitive Ergonomics (ECCE), 28-31 August, Edinburgh, Scotland. Conceptual and methodological are conventionally used in transport research, and which have limitations for ergonomics research. Keywords of vulnerability when one or more of the dimensions that are given importance in ergonomics is hindered or impaired

Paris-Sud XI, Université de

413

Storms exploding off the surface of the sun can wreak havoc on technologies like satellites, phones, GPS, and electrical power grids. As society's dependence on these technologies grows, so does our vulnerability to changes on the Sun and in space.  

E-Print Network [OSTI]

Storms exploding off the surface of the sun can wreak havoc on technologies like satellites, phones vulnerability to changes on the Sun and in space. For example, GPS is present in almost all aspects of our is expected to total $75 billion by 2013. Meanwhile, the Sun is approaching a heightened period of activity

414

Ge{sub 1-y}Sn{sub y} (y = 0.01-0.10) alloys on Ge-buffered Si: Synthesis, microstructure, and optical properties  

SciTech Connect (OSTI)

Novel hydride chemistries are employed to deposit light-emitting Ge{sub 1-y}Sn{sub y} alloys with y???0.1 by Ultra-High Vacuum Chemical Vapor Deposition (UHV-CVD) on Ge-buffered Si wafers. The properties of the resultant materials are systematically compared with similar alloys grown directly on Si wafers. The fundamental difference between the two systems is a fivefold (and higher) decrease in lattice mismatch between film and virtual substrate, allowing direct integration of bulk-like crystals with planar surfaces and relatively low dislocation densities. For y???0.06, the CVD precursors used were digermane Ge{sub 2}H{sub 6} and deuterated stannane SnD{sub 4}. For y???0.06, the Ge precursor was changed to trigermane Ge{sub 3}H{sub 8,} whose higher reactivity enabled the fabrication of supersaturated samples with the target film parameters. In all cases, the Ge wafers were produced using tetragermane Ge{sub 4}H{sub 10} as the Ge source. The photoluminescence intensity from Ge{sub 1?y}Sn{sub y}/Ge films is expected to increase relative to Ge{sub 1?y}Sn{sub y}/Si due to the less defected interface with the virtual substrate. However, while Ge{sub 1?y}Sn{sub y}/Si films are largely relaxed, a significant amount of compressive strain may be present in the Ge{sub 1?y}Sn{sub y}/Ge case. This compressive strain can reduce the emission intensity by increasing the separation between the direct and indirect edges. In this context, it is shown here that the proposed CVD approach to Ge{sub 1?y}Sn{sub y}/Ge makes it possible to approach film thicknesses of about 1??m, for which the strain is mostly relaxed and the photoluminescence intensity increases by one order of magnitude relative to Ge{sub 1?y}Sn{sub y}/Si films. The observed strain relaxation is shown to be consistent with predictions from strain-relaxation models first developed for the Si{sub 1?x}Ge{sub x}/Si system. The defect structure and atomic distributions in the films are studied in detail using advanced electron-microscopy techniques, including aberration corrected STEM imaging and EELS mapping of the average diamondcubic lattice.

Senaratne, C. L.; Kouvetakis, J. [Department of Chemistry and Biochemistry, Arizona State University, Tempe, Arizona 85287-1604 (United States); Gallagher, J. D.; Jiang, Liying; Smith, D. J.; Menndez, J. [Department of Physics, Arizona State University, Tempe, Arizona 85287-1504 (United States); Aoki, Toshihiro [LeRoy Eyring Center for Solid State Science, Arizona State University, Tempe, Arizona 85287-1704 (United States)

2014-10-07T23:59:59.000Z

415

Ultraviolet GaN photodetectors on Si via oxide buffer heterostructures with integrated short period oxide-based distributed Bragg reflectors and leakage suppressing metal-oxide-semiconductor contacts  

SciTech Connect (OSTI)

Based on a novel double step oxide buffer heterostructure approach for GaN integration on Si, we present an optimized Metal-Semiconductor-Metal (MSM)-based Ultraviolet (UV) GaN photodetector system with integrated short-period (oxide/Si) Distributed Bragg Reflector (DBR) and leakage suppressing Metal-Oxide-Semiconductor (MOS) electrode contacts. In terms of structural properties, it is demonstrated by in-situ reflection high energy electron diffraction and transmission electron microscopy-energy dispersive x-ray studies that the DBR heterostructure layers grow with high thickness homogeneity and sharp interface structures sufficient for UV applications; only minor Si diffusion into the Y{sub 2}O{sub 3} films is detected under the applied thermal growth budget. As revealed by comparative high resolution x-ray diffraction studies on GaN/oxide buffer/Si systems with and without DBR systems, the final GaN layer structure quality is not significantly influenced by the growth of the integrated DBR heterostructure. In terms of optoelectronic properties, it is demonstrated thatwith respect to the basic GaN/oxide/Si system without DBRthe insertion of (a) the DBR heterostructures and (b) dark current suppressing MOS contacts enhances the photoresponsivity below the GaN band-gap related UV cut-off energy by almost up to two orders of magnitude. Given the in-situ oxide passivation capability of grown GaN surfaces and the one order of magnitude lower number of superlattice layers in case of higher refractive index contrast (oxide/Si) systems with respect to classical III-N DBR superlattices, virtual GaN substrates on Si via functional oxide buffer systems are thus a promising robust approach for future GaN-based UV detector technologies.

Szyszka, A., E-mail: szyszka@ihp-microelectronics.com, E-mail: adam.szyszka@pwr.wroc.pl [IHP, Im Technologiepark 25, 15236 Frankfurt (Oder) (Germany); Faculty of Microsystem Electronics and Photonics, Wroclaw University of Technology, Janiszewskiego 11/17, 50-372 Wroclaw (Poland); Lupina, L.; Lupina, G.; Schubert, M. A.; Zaumseil, P. [IHP, Im Technologiepark 25, 15236 Frankfurt (Oder) (Germany); Haeberlen, M.; Storck, P.; Thapa, S. B. [Siltronic, Hanns-Seidel-Platz 4, 81737 Mnchen (Germany); Schroeder, T. [IHP, Im Technologiepark 25, 15236 Frankfurt (Oder) (Germany); BTU Cottbus-Senftenberg, Konrad-Zuse-Strasse 1, 03046 Cottbus (Germany)

2014-08-28T23:59:59.000Z

416

Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report  

SciTech Connect (OSTI)

This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

NONE

1994-09-01T23:59:59.000Z

417

Ferroelectric and ferromagnetic properties of epitaxial BiFeO{sub 3}-BiMnO{sub 3} films on ion-beam-assisted deposited TiN buffered flexible Hastelloy  

SciTech Connect (OSTI)

Growth of multifunctional thin films on flexible substrates is of great technological significance since such a platform is needed for flexible electronics. In this study, we report the growth of biaxially aligned (BiFeO{sub 3}){sub 0.5}:(BiMnO{sub 3}){sub 0.5} [BFO-BMO] films on polycrystalline Hastelloy by using a biaxially aligned TiN as a seed layer deposited by ion-beam-assisted deposited and a La{sub 0.7}Sr{sub 0.3}MnO{sub 3} (LSMO) as a buffer layer deposited by pulsed laser deposition. The LSMO is used not only as a buffer layer but also as the bottom electrode of the BFO-BMO films. X-ray diffraction showed that the BFO-BMO films are biaxially oriented along both in-plane and out-of-plane directions. The BFO-BMO films on flexible metal substrates showed a polarization of 22.9??C/cm{sup 2}. The magnetization of the BFO-BMO/LSMO is 62?emu/cc at room temperature.

Xiong, J., E-mail: jiexiong@uestc.edu.cn [State Key Laboratory of Electronic Thin Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu 610054 (China); Los Alamos National Laboratory, Center for Integrated Nanotechnologies, Division of Materials Physics and Applications, Los Alamos, New Mexico 87545 (United States); Matias, V.; Jia, Q. X. [Los Alamos National Laboratory, Center for Integrated Nanotechnologies, Division of Materials Physics and Applications, Los Alamos, New Mexico 87545 (United States); Tao, B. W.; Li, Y. R. [State Key Laboratory of Electronic Thin Films and Integrated Devices, University of Electronic Science and Technology of China, Chengdu 610054 (China)

2014-05-07T23:59:59.000Z

418

Copyright 2006 The McGraw-Hill Companies, Inc. CSC312 Principles of Programming Languages  

E-Print Network [OSTI]

Copyright © 2006 The McGraw-Hill Companies, Inc. CSC312 Principles of Programming Languages : Type #12;Copyright © 2006 The McGraw-Hill Companies, Inc. Pointers are convenient in some cases struct NodeGraw-Hill Companies, Inc. E.g. Buffer overflow problem Particularly troublesome in C as points and array are regarded

Shen, Xipeng

419

FUEL CASK IMPACT LIMITER VULNERABILITIES  

SciTech Connect (OSTI)

Cylindrical fuel casks often have impact limiters surrounding just the ends of the cask shaft in a typical 'dumbbell' arrangement. The primary purpose of these impact limiters is to absorb energy to reduce loads on the cask structure during impacts associated with a severe accident. Impact limiters are also credited in many packages with protecting closure seals and maintaining lower peak temperatures during fire events. For this credit to be taken in safety analyses, the impact limiter attachment system must be shown to retain the impact limiter following Normal Conditions of Transport (NCT) and Hypothetical Accident Conditions (HAC) impacts. Large casks are often certified by analysis only because of the costs associated with testing. Therefore, some cask impact limiter attachment systems have not been tested in real impacts. A recent structural analysis of the T-3 Spent Fuel Containment Cask found problems with the design of the impact limiter attachment system. Assumptions in the original Safety Analysis for Packaging (SARP) concerning the loading in the attachment bolts were found to be inaccurate in certain drop orientations. This paper documents the lessons learned and their applicability to impact limiter attachment system designs.

Leduc, D; Jeffery England, J; Roy Rothermel, R

2009-02-09T23:59:59.000Z

420

Vulnerability Scanning Policy 1 Introduction  

E-Print Network [OSTI]

component of any computer security plan as it provides feedback on the effectiveness of security procedures

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Glass Won't Overflow If I Pour Slowly by Bill Menke, April 21, 2010  

E-Print Network [OSTI]

new sources of fossil fuel, before exploitation can start. Create new National Parks around coal deposits. Ratify treaties that prohibit deep-water oil drilling. Concentrate all effort on prizing those and carbon sequestration technology. Sure, the production of fossil fuels will slowly decrease, but it would

Menke, William

422

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBM

423

Freshwater flooding from rivers, overflowing sewage and septic systems and other sources can have a signifi-  

E-Print Network [OSTI]

there is no hazardous flood debris such as pro- pane tanks, pressurized-gas cylinders, refrigerators, air conditioners/sewer lines and oil/ gas pipelines, but you will be told whether or not you will have to contact those will locate all electrical, natural gas, communications and telephone lines.It may or may not locate water

424

Universal null DTE (data terminal equipment)  

DOE Patents [OSTI]

A communication device in the form of data terminal equipment permits two data communication equipments, each having its own master clock and operating at substantially the same nominal clock rate, to communicate with each other in a multi-segment circuit configuration of a general communication network even when phase or frequency errors exist between the two clocks. Data transmitted between communication equipments of two segments of the communication network is buffered. A variable buffer fill circuit is provided to fill the buffer to a selectable extent prior to initiation of data output clocking. Selection switches are provided to select the degree of buffer preload. A dynamic buffer fill circuit may be incorporated for automatically selecting the buffer fill level as a function of the difference in clock frequencies of the two equipments. Controllable alarm circuitry is provided for selectively generating an underflow or an overflow alarm to one or both of the communicating equipments. 5 figs.

George, M.; Pierson, L.G.; Wilkins, M.E.

1987-11-09T23:59:59.000Z

425

Dielectric spectroscopy of Pb{sub 0.92}La{sub 0.08}Zr{sub 0.52}Ti{sub 0.48}O{sub 3} films on hastelloy substrates with and without LaNiO{sub 3} buffer layers.  

SciTech Connect (OSTI)

Pb{sub 0.92}La{sub 0.08}Zr{sub 0.52}Ti{sub 0.48}O{sub 3} (PLZT) films were deposited by sol-gel synthesis on Hastelloy substrates with and without a LaNiO{sub 3} buffer. The dielectric properties were measured as a function of temperature and frequency to study the cause of dielectric degradation in PLZT films directly on hastelloy substrates. These measurements indicated an increased charge carrier activity in films without a buffer layer. We propose that a region of the film closer to the substrate surface is more oxygen deficient than the bulk and is responsible for the degradation in properties rather than the presence of a low parasitic secondary-phase interfacial layer such as NiO{sub x}.

Narayanan, M.; Ma, B.; Balachandran, U.; Li, W.

2010-01-01T23:59:59.000Z

426

Dielectric spectroscopy of Pb{sub 0.92}La{sub 0.08}Zr{sub 0.52}Ti{sub0.48}O{sub 3} films on hastealloy substrates with and without LaNiO{sub 3} buffer layers.  

SciTech Connect (OSTI)

Pb{sub 0.92}La{sub 0.08}Zr{sub 0.52}Ti{sub 0.48}O{sub 3} (PLZT) films were deposited by sol-gel synthesis on Hastelloy substrates with and without a LaNiO{sub 3} buffer. The dielectric properties were measured as a function of temperature and frequency to study the cause of dielectric degradation in PLZT films directly on hastelloy substrates. These measurements indicated an increased charge carrier activity in films without a buffer layer. We propose that a region of the film closer to the substrate surface is more oxygen deficient than the bulk and is responsible for the degradation in properties rather than the presence of a low parasitic secondary-phase interfacial layer such as NiO{sub x}.

Narayanan, M.; Ma, B.; Balachandran, U.; Li, W. (Energy Systems); ( MSD)

2010-01-01T23:59:59.000Z

427

Competitive Parallel Disk Prefetching and Buffer Management  

E-Print Network [OSTI]

across the set a167 of a24 disks. A bad phase,a130a137a131a137a133a140a135a120a136a134a54a10a141a61a56 , with bad disk parameter a149a66a28 consists of blocks a142a72a68a50a143a51a144 , a141a61a25a146a145a97a147a102a148a124a54a61a141a34a94a168a104a39a56a...43a25 , laid out such that the first a25a169a163a15a25a170a81a66a64a51a55 a24 blocks a142a78a68 a143 a144 , where a141a61a25a146a145a97a147a102a148a124a54a10a141a80a94a69a104a19a56a153a25a171a163a172a25a170a81a66a64a51a55 a24 , are striped in a round...

Barve, Rakesh; Kallahalla, Mahesh; Varman, Peter J.; Vitter, Jeffrey Scott

2000-01-01T23:59:59.000Z

428

Energy Efficient Buffer Cache Replacement Jianhui Yue  

E-Print Network [OSTI]

chips. Accordingly energy saved due to higher cache hit rates may not make up for extra energy cost that achieve energy saving at little sacrifice to cache hit rates. The key idea of our algorithms is that we in terms of hit rates but potentially has large energy salvage. The rest of this paper is organized

Zhu, Yifeng

429

Understanding the Science Behind Riparian Forest Buffers  

E-Print Network [OSTI]

runoff from agricultural lands, urban areas, construction and industrial sites, and failed septic tanks, lakes, and estuar- ies are impaired by some form of water pollution (U.S. E.P.A. 1998). Pollutants can enter surface waters from point sources, such as single source industrial discharges and waste

Liskiewicz, Maciej

430

Rapid screening buffer layers in photovoltaics  

DOE Patents [OSTI]

An apparatus and method of testing electrical impedance of a multiplicity of regions of a photovoltaic surface includes providing a multi-tipped impedance sensor with a multiplicity of spaced apart impedance probes separated by an insulating material, wherein each impedance probe includes a first end adapted for contact with a photovoltaic surface and a second end in operable communication with an impedance measuring device. The multi-tipped impedance sensor is used to contact the photovoltaic surface and electrical impedance of the photovoltaic material is measured between individual first ends of the probes to characterize the quality of the photovoltaic surface.

List, III, Frederick Alyious; Tuncer, Enis

2014-09-09T23:59:59.000Z

431

Making Fast Buffer Insertion Even Faster via  

E-Print Network [OSTI]

and A2 of the same branch, if Q(A1)Q(A2), C(A1)C(A2) and W(A1)W(A2), then A1 is redundant. Add a wire

Shi, Weiping "Peter"

432

Design and synthesis of novel isoelectric buffers  

E-Print Network [OSTI]

Hydrolytically stable, low- and high-pI isoelectric hydrogel membranes were prepared from poly(vinyl alcohol) (PVA) as alternatives to polyacrylamide-based isoelectric membranes that hydrolyze in acidic and basic solutions. Low-pI membranes were...

Lalwani, Sanjiv Kumar Shankerdass

2006-04-12T23:59:59.000Z

433

Evaluating Elastic Buffer and Wormhole Flow Control  

E-Print Network [OSTI]

to a free output port [7]. Since this penalizes network performance and energy consumption under high loads energy to transfer a single bit through a router and offers three percent more throughput per unit energy have accounted for up to 30 percent of the total power consumption of the Intel 80-core Terascale chip

434

An efficient buffer management methods for Cachet  

E-Print Network [OSTI]

(cont.) running simulation. Third, since BCachet is almost linear under the assumption of a reasonable number of sites, BCachet is very scalable. Therefore, it can be used to for very large scale multiprocessor systems.

Kim, Byungsub, 1978-

2004-01-01T23:59:59.000Z

435

Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 3, Site team reports  

SciTech Connect (OSTI)

A self assessment was conducted of those Hanford facilities that are utilized to store Reactor Irradiated Nuclear Material, (RINM). The objective of the assessment is to identify the Hanford inventories of RINM and the ES & H concerns associated with such storage. The assessment was performed as proscribed by the Project Plan issued by the DOE Spent Fuel Working Group. The Project Plan is the plan of execution intended to complete the Secretary`s request for information relevant to the inventories and vulnerabilities of DOE storage of spent nuclear fuel. The Hanford RINM inventory, the facilities involved and the nature of the fuel stored are summarized. This table succinctly reveals the variety of the Hanford facilities involved, the variety of the types of RINM involved, and the wide range of the quantities of material involved in Hanford`s RINM storage circumstances. ES & H concerns are defined as those circumstances that have the potential, now or in the future, to lead to a criticality event, to a worker radiation exposure event, to an environmental release event, or to public announcements of such circumstances and the sensationalized reporting of the inherent risks.

Not Available

1993-11-01T23:59:59.000Z

436

Buffer Preparation (Gozani Lab) 1. 1 M Tris-HCl Buffers  

E-Print Network [OSTI]

500 ml: Add 101.65 g MgCl2.6H2O into 500 ml ddH2O. Autoclavable. 14. CaCl2 1M 400 ml: Add 58.8 g CaCl2.2H2O (FW 147), filter for sterilization. Dilute 10x to make 100 mM CaCl2. 15. MgSO4 1M 500 ml: Add

Gozani, Or

437

Sample Questions (1) Phosphate buffered saline (PBS) is a buffer solution commonly used in biological research.  

E-Print Network [OSTI]

as (3) with a mammalian cell (e.g. red blood cell (RBC)) (a) Write down the expression-potassium adenosine triphosphatase) is a Na+/K+ ion pump found in all animal cells. The pump moves 3 sodium ions out in biological research. It is a water-based salt solution containing sodium phosphate, sodium chloride and

California at San Diego, University of

438

Privacy Vulnerability of Published Anonymous Mobility Traces  

E-Print Network [OSTI]

Sep 20, 2010 ... WS defghipqpriqgpeesghgpqgtuvipqv. wxy??? ?? ???y?? ????????? ????? ????????. ??d. ?ef ..... [7] B. Gedik and L. Liu. Location...

2010-07-07T23:59:59.000Z

439

Texas Water Resources: Vulnerability from Contaminants  

E-Print Network [OSTI]

variability on E. coli transport. To explore the spatio-temporal variability of nitrate across the Trinity and Ogallala aquifers in Texas, an entropy-based method and a numerical study were employed. Results indicate that the overall mean nitrate-N has...

Dwivedi, Dipankar

2012-10-02T23:59:59.000Z

440

Thermal study of vulnerable atherosclerotic plaque  

E-Print Network [OSTI]

methods available in clinical practice. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 Differentthermography catheters: (a)thermography basket catheter using thermocouple at the maximum curve of each nitinol wire [3], (b) four deployable... flexible sensor-equipped arms catheter [19], (c) catheter with hydrofoil designed to use blood stream to drive thermistor against vessel wall [13], and (d) balloon-thermography catheter with balloon to inflate for the interruption of the flow during...

Kim, Taehong

2009-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

VULNERABILITY AND ADAPTATION TO CLIMATE CHANGE IN  

E-Print Network [OSTI]

(farmers in Yolo County). The University of California Cooperative Extension farm advisors of Yolo County Vineyards, and University of California Cooperative Extension farm advisor in Mendocino County, Glenn Mc from the California Energy Commission's California Climate Change Center JULY 2012 CEC5002012031

442

Predicting Architectural Vulnerability on Multithreaded Processors under  

E-Print Network [OSTI]

-level model correlates the AVF in a contention-free environment with important performance metrics significantly degrading the relia- bility of current high-performance processors. They occur mainly due to the electronic noises caused by energetic nuclear particles (e.g., alpha particles, neutrons, and pions) from

Koppelman, David M.

443

Natural Gas Supply Vulnerability in Europe.  

E-Print Network [OSTI]

??Demand for natural gas has been increasing steadily the past few years. Most European countries depend heavily on natural gas imports due to insufficient gas (more)

Gungor, Bekir

2013-01-01T23:59:59.000Z

444

Introduction to SCADA Protection and Vulnerabilities  

SciTech Connect (OSTI)

Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utilitys grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

Ken Barnes; Briam Johnson; Reva Nickelson

2004-03-01T23:59:59.000Z

445

Cancer Vulnerabilities Unveiled by Genomic Loss  

E-Print Network [OSTI]

,2,3,9 Yin Ren,5 Matthew R. Strickland,1 Rebecca Lamothe,1 Steven E. Schumacher,1,2 Aviad Tsherniak,2 Henrike

Bhatia, Sangeeta

446

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

of California. This paper describes the development and results from an integrated water resource management application includes management of reservoirs, run-of-river hydropower plants, water supply demand locations. Reservoir operations adapt to capture earlier and greater runoff volumes that result from earlier

447

Climate Change 2007: Impacts, Adaptation and Vulnerability.  

E-Print Network [OSTI]

di uno stato di water stress Sviluppo sostenibile: loun maggiore livello di water stress 9 . Cresceranno i rischi compresa tra il 66 e il 90% Water stress: una nazione

Schiavon, Stefano; Zecchin, Roberto

2007-01-01T23:59:59.000Z

448

Protection of Use Control Vulnerabilities and Designs  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes the policy, process and procedures for control of sensitive use control information in nuclear weapon data (NWD) categories Sigma 14 and Sigma 15 to ensure that dissemination of the information must be restricted to individuals with valid need to know. Cancels DOE M 452.4-1A

2010-05-14T23:59:59.000Z

449

COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

enforcement and auditing. Page 114 SECURITY POLICY Figure 1. PCS administration. A security plan documents the overall security architecture for a system or subsystem. Typical...

450

Protection of Use Control Vulnerabilities and Design  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This manual establishes a general process and provides direction for controlling access to and disseminating Sigma 14 and 15 nuclear weapon data (NWD) at the Department of Energy (DOE). It supplements DOE O 452.4A, Security and Control of Nuclear Explosives and Nuclear Weapons, dated 12-17-01, which establishes DOE requirements and responsibilities to prevent the deliberate unauthorized use of U.S. nuclear explosives and nuclear weapons. Cancels DOE M 452.4-1. Canceled by DOE O 452.7, 5-14-2010

2004-03-11T23:59:59.000Z

451

Protection of Use Control Vulnerabilities and Designs  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes a general process and provides direction for controlling access and dissemination of Sigma 14 and 15 Weapon Data at the Department of Energy (DOE). It supplements DOE O 452.4, SECURITY AND CONTROL OF NUCLEAR EXPLOSIVES AND NUCLEAR WEAPONS, which establishes DOE requirements and responsibilities to prevent the deliberate unauthorized use of U.S. nuclear explosives and U.S. nuclear weapons. Canceled by DOE M 452.4-1A. Does not cancel other directives.

1999-07-01T23:59:59.000Z

452

GUNNISON BASIN CLIMATE CHANGE VULNERABILITY ASSESSMENT  

E-Print Network [OSTI]

Climate change is already changing ecosystems and affecting people in the southwestern United States, as well as ecosystem services, e.g., water supply. The climate of the Gunnison Basin, Colorado Fish and Wildlife Service, US Forest Service, Upper Gunnison River Water Conservancy District, Western

Neff, Jason

453

Vulnerability Analysis of Energy Delivery Control Systems  

Broader source: Energy.gov (indexed) [DOE]

coding practices can be found in new and old products alike, and the introduction of Web applications into SCADA systems has created more, as well as new, types of...

454

Measuring and Incorporating Vulnerability into Conservation Planning  

E-Print Network [OSTI]

of biodiversity in situ. To do this, conservation areas must be able to mitigate at least some of the proximate the persistence of biodiversity in situ. Conservation areas can be important in mitigating proximate threats to biodiversity, conservation plan

Queensland, University of

455

Privacy Vulnerability of Published Anonymous Mobility Traces  

E-Print Network [OSTI]

including published media such as news articles or Web blogs. Hence, the adversary ...... [8] C. Dwork, F. McSherry, K. Nissim, and A. Smith, Calibrating noise.

2012-08-01T23:59:59.000Z

456

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for...

457

NSTB Summarizes Vulnerable Areas | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAXBalanced Scorecard Federal2 to:DieselEnergy Auditor NREL JobNSRC_MOU.pdfat

458

Vulnerability Analysis of Energy Delivery Control Systems  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear GuideReportVictor KaneContractfrom Water0-18381

459

Detecting Network Vulnerabilities Through Graph Theoretical Methods  

E-Print Network [OSTI]

a signi?cant linear relationship between generator size andof those generators. We performed simple linear regression

2007-01-01T23:59:59.000Z

460

US Energy Sector Vulnerabilities to Climate Change  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment of Energy AtNoticeMotor Company |

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

US Energy Sector Vulnerabilities to Climate Change  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energyof Energy8,November 2012U.S.Department2

462

U-100: Google Chrome Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

463

Our Changing Climate 2012 Vulnerability & Adaptation  

E-Print Network [OSTI]

/EPA, Natural Resources Agency, Department of Water Resources, Energy Commission, Air Resources Board, Ocean of climate change on the California economy. Cal/EPA entrusted the California Energy Commission and its insights for the energy, water, agriculture, public health, coastal, transportation, and ecological

464

Vulnerability, Risk Management, and Agricultural Development  

E-Print Network [OSTI]

P. (1980). Attitudes Towards Risk: Experimental MeasurementIncentive Flexibility, and Risk. Americal Journal ofCaria, A. S. (2009), Risk Attitudes and The Formation of

Fafchamps, Marcel

2009-01-01T23:59:59.000Z

465

Removal of nutrients from combined sewer overflows and lake water in a vertical-flow constructed wetland system  

E-Print Network [OSTI]

and is planted with common reed (Phragmites australis). The constructed wetland is intermittently loaded

Brix, Hans

466

Flow Control MultipleLoop, Finite Buffer Network  

E-Print Network [OSTI]

Massachusetts Institute of Technology May 2, 2002 Ecole Polytechnique Montreal Copyright c 2002 Stanley B, change in demand, etc. Copyright c 2002 Stanley B. Gershwin. All rights reserved. 6 #12; Real; compute decisions quickly, in response to changing conditions. Copyright c 2002 Stanley B. Gershwin. All

Gershwin, Stanley B.

467

Blast overpressure relief using air vacated buffer medium  

E-Print Network [OSTI]

Blast waves generated by intense explosions cause damage to structures and human injury. In this thesis, a strategy is investigated for relief of blast overpressure resulting from explosions in air. The strategy is based ...

Avasarala, Srikanti Rupa

2009-01-01T23:59:59.000Z

468

V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer...  

Broader source: Energy.gov (indexed) [DOE]

due to a boundary error within the "iscsiaddnotunderstoodresponse()" function (driverstargetiscsiiscsitargetparameters.c) when parsing keys and can be exploited to...

469

Row Buffer Locality Aware Caching Policies for Hybrid Memories  

E-Print Network [OSTI]

strengths A hybrid memory system (DRAM-PCM) aims for best of both Problem: How to place data between static energy (no refresh) 6 DRAM PCM CPU MC MC #12;Hybrid Memory Design direction: DRAM as a cache memory devices? 8 DRAM PCM CPU MC MC #12;Outline Background: Hybrid Memory Systems Motivation: Row

470

aqueous buffered solutions: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

different temperatures and determined the characteristic parameters for each adsorption isotherm. The adsorption process has been found endothermic in nature and thermodynamic...

471

STT-MRAM Based NoC Buffer Design  

E-Print Network [OSTI]

and experience. I would like to thank my committee members, Dr. Rabi Mahapatra and Dr. Paul Gratz for their valuable feedback and advice. I would also like to thank my team members at High Performance Computing group especially Hyunjun Jang, Baik Song An... by ____________ This thesis follows style of IEEE Transaction on Very Large Scale Integration Systems. 2 2 scalability issues and whole idea of only one party talking at any given instant of time defeats the whole purpose of a high performance computing environment...

Vikram Kulkarni, Nikhil

2012-10-19T23:59:59.000Z

472

SMOOTH OIL & GAS FIELD OUTLINES MADE FROM BUFFERED WELLS  

U.S. Energy Information Administration (EIA) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ <Information Administration (EIA) 10 MECS Survey Data 2010Feet)PercentCoal1.Report No.:GasThe VBA

473

20141029-Smitasin-Tierney-LBLnet-buffer-experiments.pptx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert SouthwestTechnologies |November 2011 Mon, Next ReleaseEFRC NEESShockOpticsNIFU0

474

Molecular Biology Buffers And Solutions NOTE: Use ACS grade chemicals, and dH2O for all buffers.  

E-Print Network [OSTI]

/BRL, or Sigma. 1. Dissolve 50 mg proteinase K in 0.5 ml 10 mM Hepes-NaOH, pH 7.5, 1 mM CaCl2. 2. Self-digest 15;CaCl2 solution for competent cells: 200 ml 30 g Glycerol 0.76 g Pipes (dipotassium) (378.5 g/mol; 10 mM) 1.76 g CaCl2-2H2O (147.0 g/mol; 60 mM) Add HCl to pH 7.0. Divide into 100 ml aliquots. Autoclave

Aris, John P.

475

JOURNAL OF GEOPHYSICAL RESEARCH, VOL. 104,NO. Cll, PAGES 25,913-25,935,NOVEMBER 15, 1999 Overflow into the deep Caribbean: Effects of plume  

E-Print Network [OSTI]

into the deep Caribbean: Effects of plume variability ParkerMacCready,1WilliamE.Johns,2ClaesG.Rooth,2DavidCaribbeanandtheAtlanticis overthe Jungfern-GrapplerSill complexat 1815m depth.Throughthesegapsflowsthesolesourceof waterforthedeepCaribbean Sv -- 106m3s-l) of Atlanticwatercolderthan0=-3.965øCflowingintothe Caribbean

MacCready, Parker

476

Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities  

E-Print Network [OSTI]

Architecture diagram for Kudzu. The components drawn in theapplications. . . . . . . . . . . . 4.10 Kudzu code coveragealone (dark bars) vs. complete Kudzu (light bars). For each

Saxena, Prateek

2012-01-01T23:59:59.000Z

477

V-001: Mozilla Security vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

is accessible by other domain objects, which can be exploited to bypass the same origin policy and gain access to sensitive information. 2) An unspecified error within the...

478

Forecasting the Vulnerability of Lakes to Aquatic Plant Invasions  

E-Print Network [OSTI]

water, hull fouling), aquarium and ornamental trades, angling (discharging live bait, trailer boats.g., public boat launch, urban land use) and physical­chemical conditions (e.g., lake area, elevation crispus L. PTMCR. Key words: Aquarium trade, ecological niche models, exotic plants, nursery plants

Olden, Julian D.

479

Displacement Demand Effects in Vulnerable Reinforced Concrete Columns  

E-Print Network [OSTI]

................................................. 69 Figure 3.20 Horizontal LDVT LH1 expansion ........................................................ 70 ix Figure 3.21 Measured load-lateral drift (a) specimen 3 (b) specimen 4 .................. 74 Figure 3.22 Measured axial strain vs... material tests. To track the curing behavior of the specimens, cylinders were tested in compression on days 7, 14, 21, and 28, as well as on the final day of testing. ASTM C 39 (2009) procedures were adhered to. Additionally, flexure beam tests...

Woods, Charles

2010-06-01T23:59:59.000Z

480

Mitigation of Collapse Risk in Vulnerable Concrete Buildings  

E-Print Network [OSTI]

on the final day of column testing, in accordance with ASTM C 78 and ASTM C 469, respectively. The average flexural strength f r and modulus of elasticity E c for each of the two specimens are also listed in Table 2.3. 28 Table 2.1: Concrete mix... Day strength 4800 psi 4880 psi Flexural strength, f r 740 psi 870 psi Modulus of elasticity, E c 3770 ksi 3610 ksi Type I/II Cement ASTM C 150 Class C Fly Ash ASTM C 618 Coarse Aggregate ASTM C 33 Fine Aggregate ASTM C 33 Water Reducer ASTM...

Matchulat, Lisa Marie

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "buffer overflow vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

DIAGNOSING VULNERABILITY, EMERGENT PHENOMENA, and VOLATILITY in MANMADE NETWORKS  

E-Print Network [OSTI]

properties 4. Additive effect to grid #12;16 Wind power contributions - MW wind energy as a % of total energy structures: MANMADE proposal the network of networks that comprise Europe's critical infrastructure of network Conversion of HV grid map into a weighted graph Substation, power plant Modes #12;5 Weighted graph

Arrowsmith, David

482

area energy vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

further aggravate the environmental conditions and the associated risks. Despite the climate warming, cold climatic conditions will prevail in circumpolar areas and contribute...

483

U-151: Bugzilla Cross-Site Request Forgery Vulnerability  

Broader source: Energy.gov [DOE]

The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.

484

Embryo stability and vulnerability in an always changing world  

E-Print Network [OSTI]

to the view that embryos and larvae are the most fragile stages of life, development is stable under real during early developmental stages are more sensitive than at any other time in their life cycle such as the immune system or the nervous system. One ap- proach, especially developed in the mammals, is parental

485

Cognitive Vulnerability to Depression in Canadian and Chinese Adolescents  

E-Print Network [OSTI]

163. Beck, A. T. (1983). Cognitive therapy of depression:Y. (1988). Testing the cognitive diathesis-stress theoriesIn L. Alloy (Ed. ), Cognitive processes in depression (pp.

Auerbach, Randy P.; Eberhart, Nicole K.; Abela, John R.

2010-01-01T23:59:59.000Z

486

Kiran Chandra Sapkota Livelihood strategies and vulnerability of urban poor  

E-Print Network [OSTI]

management of drinking water. 97.7 percent HHs have got the electricity and entertainment facilities, electric charge, etc. This study has tried to show five capital assets of urban poor in Khadi Pakha in local social institution but not represented in local government. Above 95 percent HHs involved

Richner, Heinz

487

Correlates of vulnerability among arthropod species threatened by invasive ants  

E-Print Network [OSTI]

declines and extinctions of native species worldwide.and even extinctions, of native species through variousG (2004) How species respond to multiple extinction threats.

Krushelnycky, Paul D.; Gillespie, Rosemary G.

2010-01-01T23:59:59.000Z

488

Extinction vulnerability in marine populations Nicholas K Dulvy1  

E-Print Network [OSTI]

exploited species, it is often argued that economic extinction of exploited popula- tions will occur before biological extinction, but this is not the case for non-target species caught in multispecies sheries could be considered extinct if their status as valid distinct species can be conrmed (Carlton et al

Reynolds, John D.

489

Reducing the Vulnerability of Electric Power Grids to Terrorist Attacks  

SciTech Connect (OSTI)

This report describes the development of a cascading outage analyzer that, given an initial disturbance on an electric power system, checks for thermal overloads, under-frequency and over-frequency conditions, and under-voltage conditions that would result in removal of elements from the system. The analyzer simulates the successive tripping of elements due to protective actions until a post-event steady state or a system blackout is reached.

Ross Baldick; Thekla Boutsika; Jin Hur; Manho Joung; Yin Wu; Minqi Zhong

2009-01-31T23:59:59.000Z

490

Cyber-Vulnerability of Power Grid Monitoring and Control Systems  

E-Print Network [OSTI]

, a methodology is proposed for the evaluation of the impact of cyber attacks on the power grid-effect on the proposed method determines the likelihood of the consequence, which can be evaluated based on a substation networks can lead to undesirable switching operations executed by attackers, resulting in widespread power

Manimaran, Govindarasu

491

T-532: Vulnerability in Graphics Rendering Engine Could Allow...  

Broader source: Energy.gov (indexed) [DOE]

to the location in Windows Explorer. When the user navigates to the share, the affected control path is triggered via the Graphics Rendering Engine. The specially crafted...

492

Sandia National Laboratories: Cyber-Based Vulnerability Assessments  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(NESL) Brayton Lab SCO2 Brayton Cycle Technology Videos Heat Exchanger Development Diffusion Bonding Characterization Mechanical Testing Deep Borehole Disposal Nuclear...

493

V-070: Apache CouchDB Multiple Vulnerabilities | Department of...  

Broader source: Energy.gov (indexed) [DOE]

access files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences. Only Microsoft Windows versions of Apache CouchDB are affected....

494

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary...

495

Analyses of power system vulnerability and total transfer capability  

E-Print Network [OSTI]

companies and the ISOs. An uninterrupted and high quality power is required for the sustainable development of a technological society. Power system blackouts generally result from cascading outages. Protection system hidden failures remain dormant when...

Yu, Xingbin

2006-04-12T23:59:59.000Z

496

Environmental Tracers for Determining Water Resource Vulnerability to Climate Change  

SciTech Connect (OSTI)

Predicted changes in the climate will have profound impacts on water availability in the Western US, but large uncertainties exist in our ability to predict how natural and engineered hydrological systems will respond. Most predictions suggest that the impacts of climate change on California water resources are likely to include a decrease in the percentage of precipitation that falls as snow, earlier onset of snow-pack melting, and an increase in the number of rain on snow events. These processes will require changes in infrastructure for water storage and flood control, since much of our current water supply system is built around the storage of winter precipitation as mountain snow pack. Alpine aquifers play a critical role by storing and releasing snowmelt as baseflow to streams long after seasonal precipitation and the disappearance of the snow pack, and in this manner significantly impact the stream flow that drives our water distribution systems. Mountain groundwater recharge and, in particular, the contribution of snowmelt to recharge and baseflow, has been identified as a potentially significant effect missing from current climate change impact studies. The goal of this work is to understand the behavior of critical hydrologic systems, with an emphasis on providing ground truth for next generation models of climate-water system interactions by implementing LLNL capabilities in environmental tracer and isotopic science. We are using noble gas concentrations and multiple isotopic tracers ({sup 3}H/{sup 3}He, {sup 35}S, {sup 222}Rn, {sup 2}H/{sup 1}H, {sup 18}O/{sup 16}O, and {sup 13}C/{sup 12}C) in groundwater and stream water in a small alpine catchment to (1) provide a snapshot of temperature, altitude, and physical processes at the time of recharge, (2) determine subsurface residence times (over time scales ranging from months to decades) of different groundwater age components, and (3) deconvolve the contribution of these different groundwater components to alpine stream baseflow. This research is showing that groundwater in alpine areas spends between a few years to several decades in the saturated zone below the surface, before feeding into streams or being pumped for use. This lag time may act to reduce the impact on water resources from extreme wet or dry years. Furthermore, our measurements show that the temperature of water when it reaches the water table during recharge is 4 to 9 degrees higher than would be expected for direct influx of snowmelt, and that recharge likely occurs over diffuse vegetated areas, rather than along exposed rock faces and fractures. These discoveries have implications for how alpine basins will respond to climate effects that lead to more rain than snow and earlier snow pack melting.

Singleton, M

2009-07-08T23:59:59.000Z

497

ISSO Information Alert Multiple Vulnerabilities in Adobe Flash  

E-Print Network [OSTI]

SHARING AND ANALYSIS CENTER CYBER SECURITY ADVISORY MS-ISAC ADVISORY NUMBER: 2012-014 DATE(S) ISSUED: 3 to take complete control of affected systems. Adobe Flash Player is a widely distributed multimedia or URL and distributes that file or URL to unsuspecting users via e-mail or some other means. When

Dyer, Bill

498

1 INTRODUCTION The full characterization of the vulnerability of criti-  

E-Print Network [OSTI]

the network are of- ten highly variable quantities both in space and time. Functional models are, then, often in Section 2; in Section 3, the physical characterization of interde- pendencies is introduced; in Section 4, the functional model for interdependent CIs is detailed; in Section 5, the proposed model is applied to three

Paris-Sud XI, Université de

499

U-104: Adobe Flash Player Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and...

500

T-625: Opera Frameset Handling Memory Corruption Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

security and stability enhancements. Opera Download Addthis Related Articles V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-105: Google Chrome...