National Library of Energy BETA

Sample records for file upload vulnerability

  1. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  2. Help:Uploading Files | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavy ElectricalsFTLTechnology Srl JumpSubObjects JumpUploading Files

  3. Uploading Files to Your University Writing Portfolio: ENGL 1100 & Note: If your file is over 250mb, please see the section in troubleshooting about uploading files

    E-Print Network [OSTI]

    Gopalakrishnan, K.

    a saved document from your computer into your University Writing Portfolio. 8. Select the document you forgot to save your document with the course prefix and course number. BE SURE to save or change finished, click "save file(s)." Always SAVE after uploading new content! *Tip: You may upload and rename

  4. File FTP Document Upload Website | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document Upload Website Author

  5. illions of people around the world create and share documents through Google Docs, upload and store music or photo files through

    E-Print Network [OSTI]

    Motai, Yuichi

    Docs, upload and store music or photo files through Amazon.com, or write and publish posts through of users' computing environments in this infrastructure is critical for trust on both ends of the user

  6. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  7. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site ScriptingDepartment|

  8. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeployment |Energyand Let

  9. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  10. Troubleshooting: I uploaded my file but how do I get it to show up under my class?....................2

    E-Print Network [OSTI]

    Gopalakrishnan, K.

    permission to the wrong instructor. How do I delete a reviewer? .....8 OneStop is down. How do I get into iWebfolio?...................................................9 How do I go back to view my other portfolios or switch between them?.........10 How do I delete files from my University Writing Portfolio? ...........................11 How do I delete files from

  11. NERSC FTP Upload Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJessework usesof Energy Moving ForwardAchievementScienceDataNERSC FTP Upload

  12. Environmental Data Upload and Visualization Tools

    E-Print Network [OSTI]

    Environmental Data Upload and Visualization Tools Cristina Grosso, John Oram, Shira Bezalel, Todd;Tool Development Data upload Standard data storage Data visualization #12;Regional Monitoring Program ­tailored to answer specific questions #12;Data Upload Tools #12;#12;#12;#12;Please add new Method Code

  13. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  14. Uploading Syllabus in DigitalMeasures 1. Login to DigitalMeasures (http://www.depts.ttu.edu/opa/dmsr.php)

    E-Print Network [OSTI]

    Gelfond, Michael

    by saving your Word Document in PDF format) 8. Your syllabus will be uploaded upon "Save and Return File Browse 2. Syllabus is Saved by Clicking on "Save and Return" #12;

  15. GPFA-AB_Phase1RiskAnalysisTask5DataUpload

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Teresa E. Jordan

    2015-09-30

    This submission contains information used to compute the risk factors for the GPFA-AB project (DE-EE0006726). The risk factors are natural reservoir quality, thermal resource quality, potential for induced seismicity, and utilization. The methods used to combine the risk factors included taking the product, sum, and minimum of the four risk factors. The files are divided into images, rasters, shapefiles, and supporting information. The image files show what the raster and shapefiles should look like. The raster files contain the input risk factors, calculation of the scaled risk factors, and calculation of the combined risk factors. The shapefiles include definition of the fairways, definition of the US Census Places, the center of the raster cells, and locations of industries. Supporting information contains details of the calculations or processing used in generating the files. An image of the raster will have the same name except *.png as the file ending instead of *.tif. Images with “fairways” or “industries” added to the name are composed of a raster with the relevant shapefile added. The file About_GPFA-AB_Phase1RiskAnalysisTask5DataUpload.pdf contains information the citation, special use considerations, authorship, etc. More details on each file are given in the spreadsheet “list_of_contents.csv” in the folder “SupportingInfo”. Code used to calculate values is available at https://github.com/calvinwhealton/geothermal_pfa under the folder “combining_metrics”.

  16. A Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures

    E-Print Network [OSTI]

    Shahabi, Cyrus

    of mobile videos with metadata (e.g., geospatial properties), which are captured using the sensors available a typical video upload workflow consisting of three phases: 1) video transmission and archival, 2) metadata server along with its metadata (e.g., geospatial properties of video such as camera location and viewing

  17. Northwestern University -Accounting Services NUcore Journal Upload Registration Form

    E-Print Network [OSTI]

    Chisholm, Rex L.

    Northwestern University - Accounting Services NUcore Journal Upload Registration Form This form recharge journals to NUFinancials. Accounting Services will assign a unique three character alphanumeric-ackermann@northwestern.edu Accounting Services, Room 222 Fax: 847-467-7261 619 Clark Street, Evanston, IL 60208 Business Manger: Phone

  18. EISA 432 Compliance Tracking System Data Upload Templates

    Broader source: Energy.gov [DOE]

    These generic Excel templates are available for federal contractors and service providers to provide federal clients with reports in the format agencies are required to use. Providing data in these templates will make it easy for agencies to upload your data into the EISA 432 Compliance Tracking System.

  19. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  20. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  1. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Environmental Management (EM)

    Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code...

  2. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOLUTION: Vendor recommends updating to version 2.5.1 Addthis Related Articles U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  3. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartmentV-138: Red HatLet

  4. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  5. The price is right There is no cost to ASU students to upload resumes, or

    E-Print Network [OSTI]

    monthly, and over 13,000 employers are registered in Sun Devil CareerLink. Unlike the majority of postings Registration Go to asu.edu/career and follow the Sun Devil CareerLink Student login link. If you are new my resume on line. How do I upload or change documents to my Sun Devil CareerLink account? First

  6. Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

    E-Print Network [OSTI]

    Mahmud, Syed Masud

    Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Syed Masud Mahmud, remote diagnostic, etc. will significantly increase the complexity of a vehicle's software modules. From time to time, the vehicle's software may need to be updated due to many reasons

  7. Grading Instructions in PeopleSoft Grade Entry using Spreadsheet Upload

    E-Print Network [OSTI]

    Fletcher, Robin

    ­ Spreadsheet Upload Demo Spreadsheet Template 3/22/2011 3 Enter Institution - QUNIV Enter Term - Can be selected from the list of valid values by clicking on the Search icon to see the list and then the term. Enter Subject - Can be selected from the list of valid values by clicking on the Search icon to see

  8. Supporting data for: "The Lifetime of Android API vulnerabilities:case study on the JavaScript-to-Java interface"

    E-Print Network [OSTI]

    Thomas, Daniel R.; Coudray, Thomas; Sutcliffe, Tom

    2015-05-26

    _norm(vulnerable, total_file, condition, prefix, installed, prob, vulnerability_discovered, data_collected): norm_file = '{prefix}_{condition}_{installed}_{prob}-norm.csv'.format( prefix=prefix, condition=condition, prob=prob, installed=installed) with open... (total_file) as f: total = count_total(f) norm = OrderedDict() averagable_values = [] for day, count in vulnerable.items(): normed_value = count / total[day] if day >= vulnerability_discovered and day = data_collected: averagable_values.append(normed_value) norm...

  9. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  10. GPFA-AB_Phase1UtilizationTask4DataUpload

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Teresa E. Jordan

    2015-09-30

    This submission of Utilization Analysis data to the Geothermal Data Repository (GDR) node of the National Geothermal Data System (NGDS) is in support of Phase 1 Low Temperature Geothermal Play Fairway Analysis for the Appalachian Basin (project DE-EE0006726). The submission includes data pertinent to the methods and results of an analysis of the Surface Levelized Cost of Heat (SLCOH) for US Census Bureau ‘Places’ within the study area. This was calculated using a modification of a program called GEOPHIRES, available at http://koenraadbeckers.net/geophires/index.php. The MATLAB modules used in conjunction with GEOPHIRES, the MATLAB data input file, the GEOPHIRES output data file, and an explanation of the software components have been provided. Results of the SLCOH analysis appear on 4 .png image files as mapped ‘risk’ of heat utilization. For each of the 4 image (.png) files, there is an accompanying georeferenced TIF (.tif) file by the same name. In addition to calculating SLCOH, this Task 4 also identified many sites that may be prospects for use of a geothermal district heating system, based on their size and industry, rather than on the SLCOH. An industry sorted listing of the sites (.xlsx) and a map of these sites plotted as a layer onto different iterations of maps combining the three geological risk factors (Thermal Quality, Natural Reservoir Quality, and Risk of Seismicity) has been provided. In addition to the 6 image (.png) files of the maps in this series, a shape (.shp) file and 7 associated files are included as well. Finally, supporting files (.pdf) describing the utilization analysis methodology and summarizing the anticipated permitting for a deep district heating system are supplied.

  11. GPFA-AB_Phase1ReservoirTask2DataUpload

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Teresa E. Jordan

    2015-10-22

    This submission to the Geothermal Data Repository (GDR) node of the National Geothermal Data System (NGDS) in support of Phase 1 Low Temperature Geothermal Play Fairway Analysis for the Appalachian Basin. The files included in this zip file contain all data pertinent to the methods and results of this task’s output, which is a cohesive multi-state map of all known potential geothermal reservoirs in our region, ranked by their potential favorability. Favorability is quantified using a new metric, Reservoir Productivity Index, as explained in the Reservoirs Methodology Memo (included in zip file). Shapefile and images of the Reservoir Productivity and Reservoir Uncertainty are included as well.

  12. Abstract--Software modules of an advanced vehicle can be updated using Remote Software Upload (RSU) techniques. The

    E-Print Network [OSTI]

    Mahmud, Syed Masud

    Abstract-- Software modules of an advanced vehicle can be updated using Remote Software Upload (RSU) techniques. The RSU employs infrastructure-based wireless communication technique where the software supplier sends the software to the targeted vehicle via a roadside Base Station (BS). However, security

  13. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  14. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  15. File:0 - Overall Flow (Solar).pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document UploadEnergyFile Edit

  16. File:0 - Overall Flow - Transmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document UploadEnergyFile Edit

  17. File:0 - OverallFlow-1.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document UploadEnergyFile Edit

  18. File:0 Overview - Hydro.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document UploadEnergyFile

  19. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  20. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  1. The Rio File Cache: Surviving Operating System Crashes 1 The Rio File Cache: Surviving Operating System Crashes

    E-Print Network [OSTI]

    Chen, Peter M.

    . A $119 uninterruptible power supply can keep a system running long enough to dump memory to disk place to store permanent data (files) because it is vulnerable to power outages and operating system crashes [Tanenbaum95, page 146]. Memory's vulnerability to power outages is easy to understand and fix

  2. Winter, snow : an inquiry into vulnerability

    E-Print Network [OSTI]

    Orme, Wanda

    2012-01-01

    snow} ..SAN DIEGO Winter, Snow. An Inquiry into Vulnerability. AOF THE THESIS Winter, Snow. An Inquiry into Vulnerability by

  3. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  4. MALI CLIMATE VULNERABILITY JANUARY 2014

    E-Print Network [OSTI]

    Columbia University

    MALI CLIMATE VULNERABILITY MAPPING JANUARY 2014 This report is made possible by the support at Columbia University Cover Photo: Overall vulnerability map of Mali (quintile map legend), CIESIN, 2013 Project Manager Burlington, Vermont Tel.: 802-658-3890 Anna.Farmer@tetratech.com #12;MALI CLIMATE

  5. Carver File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage File Storage Disk Quota Change Request Form Carver File Systems Carver has 3 kinds of file systems available to users: home directories, scratch directories and...

  6. Euclid File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and...

  7. Continuum of consciousness: Mind uploading and resurrection of human consciousness. Is there a place for physics, neuroscience and computers?

    E-Print Network [OSTI]

    V. Astakhov

    2007-10-12

    In this paper, I perform mental experiment to analyze hypothetical process of mind uploading. That process suggested as a way to achieve resurrection of human consciousness. Mind uploading can be seen as a migration process of the core mental functions, which migrate from a human brain to an artificial environment. To simulate the process, I suggest a topological approach which is based on a formalism of information geometry. Geometrical formalism lets us simulate the toy mind as geometrical structures as well as gives us powerful geometrical and topological methods for analysis of the information system. This approach leads to the insight about using holographic model as an analogy for the mind migration to an artificial environment. This model represents the toy mind functionality in terms of information geometry (as a geometrical shape) on information manifold. Such shape can have distributed holographic representation. This representation gives us delocalized representation of the system. At the same time, the process of creating the holographic representation gives us a strategy to migrate from original to an artificial environment and back. The interface between brain and an environment is modeled as an entropy flow which is defined as a geometrical flow on information manifold. Such flow is an analogy of holography recording for the toy mind. The opposite process of holography reconstruction is modeled by none-local Hamiltonians defined on the information manifold.

  8. T-566: Citrix Secure Gateway Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system.

  9. File Transfer Protocol (FTP) Site Instructions | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document Upload Website

  10. File:(131112) Presentacion LAC LEDs.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document Upload Website(131112)

  11. File:00 BRRTP FEIS-EIR cover sheet FINAL-R.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document UploadEnergyFile00

  12. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  13. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  14. Identify-Isolate-Inform: A Modified Tool for Initial Detection and Management of Middle East Respiratory Syndrome Patients in the Emergency Department

    E-Print Network [OSTI]

    Koenig, Kristi L.

    2015-01-01

    www.acep.org/uploadedFiles/ACEP/practiceResources/is- Junwww.acep.org/uploadedFiles/ACEP/practiceResources/issues-

  15. ViVUD: Virtual Server Cluster based View-Upload Decoupling for Multi-Channel P2P Video Streaming Systems

    E-Print Network [OSTI]

    Liu, Yong

    churn and resource imbalance, the View-Upload Decoupling (VUD) [1] P2P streaming design decouples peer in extreme peer churn scenarios, such as flash-crowd. In this paper, we propose ViVUD, a Virtual Server issues due to channel churn and resource imbalance in ISO systems, it still suffers from the following

  16. Franklin File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Files systems Files systems NERSC's global home and project file systems are available on Franklin. Additionally, Franklin has over 400 TB of locally attached high-performance...

  17. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFileFileFile

  18. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  19. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  20. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of cyber security architectures and frameworks, including some for microgrids. Detailed vulnerability assessment of systems, devices, components, and procedures....

  1. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  2. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  3. VULCAN: Vulnerability Assessment Framework for Cloud Computing

    E-Print Network [OSTI]

    Kavi, Krishna

    services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform services on Cloud is complex because the security depends on the vulnerability of infrastruc- ture?". Or "I want to host this software application in this cloud environment, what security vulnerabilities I

  4. APPROACHES TO VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Bateman, Ian J.

    APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger CSERGE Working Paper GEC 96-05 #12;APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger Centre for Social and Economic Research and Physical Approaches to Vulnerability to Climate Change in Vietnam' is also gratefully acknowledged. ISSN

  5. SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW

    E-Print Network [OSTI]

    Columbia University

    SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA, METHODS, AND ISSUES AUGUST 2014: A Review of Data, Methods, and Issues i SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA Climate Change Vulnerability Assessments: A Review of Data, Methods, and Issues ii TABLE OF CONTENTS

  6. SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA Seismic hazard and vulnerability

    E-Print Network [OSTI]

    SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA I Seismic hazard and vulnerability assessment in Turrialba, Costa Rica Rafael German Urban Lamadrid March 2002 #12;SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA II Seismic hazard and vulnerability assessment in Turrialba

  7. Abstract: One of the fundamental limits to high-perfor-mance, high-reliability file systems is memory's vulnerabil-

    E-Print Network [OSTI]

    Chen, Peter M.

    's vulnerability to power outages is easy to understand and fix. A $119 uninterruptible power supply can keep data (files) because it is vulnerable to power outages and operating system crashes. Memory a system running long enough to dump memory to disk in the event of a power outage [APC96], or one can use

  8. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFileFile

  9. Files systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji FijiO FileFiles

  10. File:(2010)2 full paper with cover LEDS FINAL (2).pdf | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document Upload

  11. File:(PECC) Special Program on Climate Change SUMMARY (english).pdf | Open

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP Document UploadEnergy

  12. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  13. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  14. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on...

  15. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  16. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll 1q4207---TO: FILE

  17. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE

  18. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE3

  19. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE3F&i

  20. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFile Systems

  1. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFile

  2. FERC Filing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans - PermeationGovernment | Department ofFerc Filing

  3. UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of

    E-Print Network [OSTI]

    Sorin, Eric J.

    UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of Hawaiian jacks captured tournaments can provide synoptic data on diet and gear vulnerability that would otherwise be very dif

  4. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  5. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  6. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  7. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of...

  8. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  9. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  10. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  11. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  12. Cizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially flooded

    E-Print Network [OSTI]

    Cizelj, Leon

    flooded PWR reactor cavity to a steam explosion Leon Cizelj, Bostjan Koncar, Matjaz Leskovar "Jozef StefanCizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially 5885 215; fax + 386 1 5885 377; e-mail: Leon.Cizelj@ijs.si Keywords Steam explosion, reactor cavity

  13. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. )

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  14. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  15. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  16. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  17. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  18. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  19. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  20. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  1. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  2. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  3. FAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    models for the related processes. A few vulnerability discovery models (VDMs) have been proposed recently that attempt to model the vulnerability discovery process during the lifecycle of a given software productFAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution HyunChul Joh, Jinyoo Kim

  4. Modeling Learningless Vulnerability Discovery using a Folded Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    model is logistic, and thus the increase and decrease in the discovery process is assumedModeling Learningless Vulnerability Discovery using a Folded Distribution Awad A. Younis1 , Hyun, CO 80523, USA Abstract ­ A vulnerability discovery model describes the vulnerability discovery rate

  5. On automated prepared statement generation to remove SQL injection vulnerabilities

    E-Print Network [OSTI]

    Xie, Tao

    On automated prepared statement generation to remove SQL injection vulnerabilities Stephen Thomas in revised form 5 August 2008 Accepted 8 August 2008 Available online 27 September 2008 Keywords: SQL vulnerabilities were SQL injection vulnerabilities (SQLIVs). This paper presents an algorithm of prepared

  6. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  7. UNIX file permissions

    E-Print Network [OSTI]

    ... out sensitive information (like promotion documents and qualifier exams). ... about security, you will want to change your "umask" line in your .cshrc file.

  8. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  9. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  10. Angelique Diaz To Subject UPLOAD

    E-Print Network [OSTI]

    © The Author 2013. Published by Oxford University Press on behalf of the Society for Experimental Biology. All conductance and leaf hydraulic conductance: an introduction to their measurement and coordination Jaume Flexas) and leaf hydraulic conductance (Kleaf) and addresses the physiological integration of these parameters

  11. Tony Nesky To Subject UPLOAD

    E-Print Network [OSTI]

    the authority of the Clean Air Act. EPA's "National Emission Standards for Hazardous Air Pollutants (NESHAPS radon emissions from tailings at operating uranium mills. EPA originally issued Subpart W in 1989 (54 FR the radon releases and doses to the public from the normal operations of facilities licensed to manage

  12. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  13. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect (OSTI)

    LaChance, J.; Kolaczkowski, A.; Kahn, J. [and others

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  14. Renewal-anomalous-heterogeneous files

    E-Print Network [OSTI]

    Ophir Flomenbom

    2010-08-13

    Renewal-anomalous-heterogeneous files are solved. A simple file is made of Brownian hard spheres that diffuse stochastically in an effective 1D channel. Generally, Brownian files are heterogeneous: the spheres' diffusion coefficients are distributed and the initial spheres' density is non-uniform. In renewal-anomalous files, the distribution of waiting times for individual jumps is exponential as in Brownian files, yet obeys: {\\psi}_{\\alpha} (t)~t^(-1-{\\alpha}), 0renewal as all the particles attempt to jump at the same time. It is shown that the mean square displacement (MSD) in a renewal-anomalous-heterogeneous file, , obeys, ~[_{nrml}]^{\\alpha}, where _{nrml} is the MSD in the corresponding Brownian file. This scaling is an outcome of an exact relation (derived here) connecting probability density functions of Brownian files and renewal-anomalous files. It is also shown that non-renewal-anomalous files are slower than the corresponding renewal ones.

  15. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy & Drilling Technology HomeGrid Cyber Vulnerability

  16. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  17. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  18. BPA files reciprocity tariff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 12 BONNEVILLE POWER ADMINISTRATION FOR IMMEDIATE RELEASE Friday, March 30, 2012 CONTACT: Doug Johnson, 503-230-5840 or 503-230-5131 BPA files reciprocity tariff Portland, Ore. -...

  19. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  20. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  1. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  2. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  6. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  7. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  8. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  9. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  10. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  11. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change...

  12. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  13. Hopper File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance...

  14. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  15. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  16. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  17. 1999 CBECS Public Use Files

    Gasoline and Diesel Fuel Update (EIA)

    oil, propane, district steam or district hot water were used in the building. HOW ARE THE PUBLIC USE FILES USED? For each group of variables, there are two items: a layout file and...

  18. EPA -- Amended Environmental Impact Statement Filing System Guidance...

    Office of Environmental Management (EM)

    Amended Environmental Impact Statement Filing System Guidance EPA -- Amended Environmental Impact Statement Filing System Guidance Amended Environmental Impact Statement Filing...

  19. TO: FILE MEMORANDUM

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM:FILE

  20. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  1. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience...

  2. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  3. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  4. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  5. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  6. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  7. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  8. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  9. VULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS

    E-Print Network [OSTI]

    Atkinson, Robert C

    be routed around electricity substation compounds wirelessly. Furthermore, wireless communication with the deployment of Bluetooth (and other similar wireless technologies) in electricity substations for controlVULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS S A Bhattil

  10. Vulnerability assessment of water supply systems for insufficient fire flows 

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15

    Water supply systems’ vulnerability towards physical, chemical, biological, and cyber threats was recognized and was under study long before September 11, 2001. But greater attention toward security measures for water ...

  11. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  12. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  13. Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

    E-Print Network [OSTI]

    Saxena, Prateek

    2012-01-01

    HTML content of the blog. HTML and other web languages lackmecha- nisms in HTML and other web languages to separateHTML pseudocode generated by a vulnerable social networking web

  14. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  15. Cover photo credits: Clockwise from top left Dave Marci, file photo, file photo, Blair E. Witherington. Background file photo.

    E-Print Network [OSTI]

    #12;Cover photo credits: Clockwise from top left ­ Dave Marci, file photo, file photo, Blair E. Witherington. Background ­ file photo. #12;Deepwater Horizon Oil Spill Phase II Early Restoration Plan

  16. Cover photo credits: Clockwise from top left Dave Marci, file photo, file photo, Blair E. Witherington. Background file photo.

    E-Print Network [OSTI]

    #12;#12;Cover photo credits: Clockwise from top left ­ Dave Marci, file photo, file photo, Blair E. Witherington. Background ­ file photo. #12;Deepwater Horizon Oil Spill Phase II Early Restoration Plan

  17. LONG TERM FILE MIGRATION - PART I: FILE REFERENCE PATTERNS

    E-Print Network [OSTI]

    Smith, A.J.

    2011-01-01

    death). or even and a renewal model two state Semi-MarkovThus model for those files displaying no trend, a renewal

  18. Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    1 Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya Computer Science models for the vulnerability discovery process have just been published recently. Such models will allow of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models

  19. File:20121127144736519.pdf | Open Energy Information

    Open Energy Info (EERE)

    pixels, file size: 116 KB, MIME type: applicationpdf) File history Click on a datetime to view the file as it appeared at that time. DateTime Thumbnail Dimensions User...

  20. 1999 CBECS Public Use Files

    U.S. Energy Information Administration (EIA) Indexed Site

    only. Geographic identifiers and National Oceanic and Atmospheric Administration Weather Division identifiers are not included on any data files delivered to EIA. Geographic...

  1. Instructions to CBECS 1995 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    5 Files WHAT IS CBECS? Please Note: These microdata files, which contain building characteristics, energy consumption and expenditures, and energy end-use estimates replace the...

  2. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  3. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  4. MEMORANDUfl J: FILE DATE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and MyersHr. Anthony V. Andolina:I.)p' : ,J: FILE

  5. TO: FILE FROM: SUBJECT:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM: I .-

  6. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES ScienceInformation Company Name orElectronicElenaEliza File

  7. MICROCOMP output file

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA PublicLED1,400 Jobs |Inc.MEETINGO:\END\EPAC300.lc (file 1 of

  8. Other File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/O Streams forOrhan Kizilkaya, Ph.D. Title:Other File Systems

  9. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding

    E-Print Network [OSTI]

    Breaux, Travis D.

    , as applied to criminal court records to identify mitigating requirements that improve privacy protectionsIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding Travis D,jdlewis,pnotto,anton}@ncsu.edu ABSTRACT Information systems governed by laws and regulations are subject to civil and criminal violations

  10. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings

    E-Print Network [OSTI]

    Young, R. Michael

    and goal models, as applied to criminal court records to identify mitigating requirements. In a sustainableIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings Travis D,jdlewis,pnotto,anton}@ncsu.edu Abstract Information systems governed by laws and regulations are subject to both civil and criminal

  11. Flood Vulnerability and Flood Protection North and Baltic Seas

    E-Print Network [OSTI]

    Vries, Hans de

    G G G G Flood Vulnerability and Flood Protection North and Baltic Seas Meteorological Forcings for the Dutch Continental Shelf Model Hans de Vries KNMI, Weather Service Research and Development G G G G control forecast 50 perturbed forecasts 240 hours 2 per day Not enough spread for tf

  12. Predicting Cancer-Specific Vulnerability via Data-Driven

    E-Print Network [OSTI]

    Ruppin, Eytan

    Resource Predicting Cancer-Specific Vulnerability via Data-Driven Detection of Synthetic LethalityCancer Research UK, The Beatson Institute for Cancer Research, Switchback Road, Glasgow G61 1BD, Scotland the inhibition of each single gene is not. It can be harnessed to selectively treat cancer by identifying

  13. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  14. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  15. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  16. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  17. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot­ tleneck in mobile devices (the battery power

  18. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot- tleneck in mobile devices (the battery power

  19. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the...

  20. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    E-Print Network [OSTI]

    Ryder, Barbara G.

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud large-scale cloud applications. Index Terms--cloud security, outsourced computation, side- channel, newly discovered vulnerabilities in cloud virtualization envi- ronment have threatened the security

  1. Reading File Bonneville Power Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reading File Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 POWER SERVICES In reply refer to: PG-5 Ms. Renata Kurschner Director, Generation Resource...

  2. Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    count has been set back to 2 on Aug 5. The file stripe count of 1 triggered a bug with "cp -p" in a loop calling sytem function ioctl(). The bug has been fixed in new Lustre...

  3. Using pico to edit files

    E-Print Network [OSTI]

    Using pico to edit files. Someday you might want to learn emacs or vi. They are much more powerful editors than pico, but much more complicated, too. I have ...

  4. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  5. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  6. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  7. Vulnerability Discovery in Multi-Version Software Systems Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

    E-Print Network [OSTI]

    Ray, Indrakshi

    a model of the discovery process that can predict the number of vulnerabilities that are likely to be discovered in a given time frame. Recent studies have produced vulnerability discovery process models a new approach for quantitatively modeling the vulnerability discovery process, based on shared source

  8. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies vulnerabilities such as failures of the communication and control systems that transmit and implement critical smart grids. In this paper the vulnerabilities in the control and communication system are coupled

  9. GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE DULY genetically modified organisms. Key words: Consumer. Vulnerability. Lacking of resources. GMO Résumé - Le : France (2010)" #12;GMO, consumption and consumer vulnerability in Brazilian Consumer Law: the right

  10. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  11. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  12. Structural Vulnerability Analysis of Electric Power Distribution Grids

    E-Print Network [OSTI]

    Koc, Yakup; Warnier, Martijn; Kumar, Tarun

    2015-01-01

    Power grid outages cause huge economical and societal costs. Disruptions in the power distribution grid are responsible for a significant fraction of electric power unavailability to customers. The impact of extreme weather conditions, continuously increasing demand, and the over-ageing of assets in the grid, deteriorates the safety of electric power delivery in the near future. It is this dependence on electric power that necessitates further research in the power distribution grid security assessment. Thus measures to analyze the robustness characteristics and to identify vulnerabilities as they exist in the grid are of utmost importance. This research investigates exactly those concepts- the vulnerability and robustness of power distribution grids from a topological point of view, and proposes a metric to quantify them with respect to assets in a distribution grid. Real-world data is used to demonstrate the applicability of the proposed metric as a tool to assess the criticality of assets in a distribution...

  13. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  14. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  15. CMSC 412 Project #5 File System

    E-Print Network [OSTI]

    Hollingsworth, Jeffrey K.

    will be emailed to you). CFS - Chameleon FileSystem The main part of this project is to develop a new filesystem. The second IDE disk's image is called diskd.img. CFS will provide a filesystem that includes multiple. Then you can mount the CFS file system on drive 1 onto /d, for instance. VFS and file operations Since

  16. Upload Data - OpenEI Datasets

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin, New York:Power CompanyCROSS-VALIDATION OF

  17. FTP Document Upload Website | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH JumpEllenville,PowerEvaporative|| Open Energy InformationFTP

  18. UTILITY Submit to BPA: Upload Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With WIPPfinal design andBiofuels for MilitaryUSRussianLetter.pdfUT

  19. zeller-aps2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 rz machine | National NuclearNuInt09, path

  20. zeller-panic2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 rz machine | National NuclearNuInt09,NO-VEPANIC

  1. zeller-sbl2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 rz machine | NationalSBL Workshop May 13, 2011

  2. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  3. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  4. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have been

  5. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  6. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  7. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergyMultiple

  8. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities

  9. A Metadata-Rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  10. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  11. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  12. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  13. Seismic Vulnerability and Performance Level of confined brick walls

    SciTech Connect (OSTI)

    Ghalehnovi, M.; Rahdar, H. A. [University of Sistan and Baluchestan, Zahedan (Iran, Islamic Republic of)

    2008-07-08

    There has been an increase on the interest of Engineers and designers to use designing methods based on displacement and behavior (designing based on performance) Regarding to the importance of resisting structure design against dynamic loads such as earthquake, and inability to design according to prediction of nonlinear behavior element caused by nonlinear properties of constructional material.Economically speaking, easy carrying out and accessibility of masonry material have caused an enormous increase in masonry structures in villages, towns and cities. On the other hand, there is a necessity to study behavior and Seismic Vulnerability in these kinds of structures since Iran is located on the earthquake belt of Alpide.Different reasons such as environmental, economic, social, cultural and accessible constructional material have caused different kinds of constructional structures.In this study, some tied walls have been modeled with software and with relevant accelerator suitable with geology conditions under dynamic analysis to research on the Seismic Vulnerability and performance level of confined brick walls. Results from this analysis seem to be satisfactory after comparison of them with the values in Code ATC40, FEMA and standard 2800 of Iran.

  14. Small file aggregation in a parallel computing system

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  15. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Thermoelectric power generation is vulnerable to increasing temperatures and reduced water availability in most regions, particularly in the Midwest, Great Plains, and southern...

  16. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  17. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  18. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  19. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  20. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  1. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  2. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  3. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    code analysis to detect software security vulnerabilities—A systematic review of software fault prediction studies.47] Noopur Davis. Secure Software Development Life Cycle

  4. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  5. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  6. GDCT Initialization File [gdct.ini] Format Specification Guide

    E-Print Network [OSTI]

    Rosebrugh, Robert

    GDCT Initialization File [gdct.ini] Format Specification Guide Written By: Jeremy Bradbury June 22, 2000 Below is the layout of the gdct.ini file. It is important to note the following: · If the gdct.ini to represent that a file does not exist under the "Recent Files" section of the gdct.ini file. [Internal

  7. Saving Output to a File (Using Codeblocks or Dev-C++) Saving Your Output to a File

    E-Print Network [OSTI]

    Sokol, Dina

    Saving Output to a File (Using Codeblocks or Dev-C++) Saving Your Output to a File To save | New | Source File. d. In the new window, right-click and select Paste. e. Then select "File | Save as" to save and name the file. i. In the window that pops up, the bottom fill-in box is labelled "Save as type

  8. The extreme vulnerability of interdependent spatially embedded networks

    E-Print Network [OSTI]

    Bashan, Amir; Buldyrev, Sergey V; Havlin, Shlomo

    2015-01-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, while below this "critical dependency" (CD) a failure of few nodes leads only to small damage to the system. So far, the research has been focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically analyze the stability of systems consisting of interdependent spatially embedded networks modeled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no CD and \\textit{any} small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of t...

  9. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  10. Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State University

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State Discovery Models (VDMs) have been proposed to model vulnerability discovery and have has been fitted discovery process, presenting a static approach to estimating the initial values of one of the VDM

  11. VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA RICA

    E-Print Network [OSTI]

    VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA and Earth Observation (ITC) Enschede Netherlands Figure 5.4. Damage maps for #12;Vulnerability Analysis And Risk Assessment For Seismic And Flood Hazard In Turialba City, Costa Rica By Muh Aris Marfai and Jacob

  12. Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset-based approach

    E-Print Network [OSTI]

    Krivobokova, Tatyana

    Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset vulnerability to poverty and livelihood choices in small-scale fishing areas. The use of an asset on natural resources for their livelihoods, such as fishing, are often marginalized or ignored in national

  13. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  14. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  15. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Hu, Fei

    of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE on supervisory control and data acquisition (SCADA) systems. Compliance of the require- ment to meet the standard a vulnerability assessment framework to systemat- ically evaluate the vulnerabilities of SCADA systems at three

  16. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  17. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  18. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  19. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    ). · Identify most prominent vulnerabilities of the units to RF direct injection and irradiation, and examine and fabricated and the packaged chips were placed on the boards with matching elements for RF injection. The RF vulnerabilities are examined both by simulation and experimental injection of RF at the MOSFETGate, Drain, Source

  20. File:CDPHE Industrial Individual Wastewater Discharge Permit...

    Open Energy Info (EERE)

    Help Apps Datasets Community Login | Sign Up Search File Edit History File:CDPHE Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search...

  1. Department of Energy Files Motion to Withdraw Yucca Mountain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Files Motion to Withdraw Yucca Mountain License Application Department of Energy Files Motion to Withdraw Yucca Mountain License Application March 3, 2010 -...

  2. NERSC Online Training May 3: Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Online Training May 3: Navigating NERSC File Systems NERSC Online Training May 3: Navigating NERSC File Systems April 26, 2011 by Richard Gerber A NERSC training event, "Navigating...

  3. 1 Files and Databases mass storage

    E-Print Network [OSTI]

    Verschelde, Jan

    Outline 1 Files and Databases mass storage hash functions 2 Dictionaries logical key values nested Jan Verschelde, 28 January 2015 Intro to Computer Science (MCS 260) mass storage and dictionaries L-7 28 January 2015 1 / 32 #12;mass storage dictionaries in Python 1 Files and Databases mass storage

  4. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  5. TO: FILE FROM: I SUBJECT:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM: I .-

  6. TO: FILE MEMORANDUM ALTERNATE NAME:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE

  7. Index of /radsafe/files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR THE SITE-218in aradsafe/files [ICO] Name Last

  8. Repairable File and Storage Systems A Dissertation Presented

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Repairable File and Storage Systems A Dissertation Presented by Ningning Zhu to The Graduate School of the Dissertation Repairable File and Storage System by Ningning Zhu Doctor of Philosophy in Computer Science Stony stream file/storage system. Repairable file/storage system needs to perform two tasks. First it has

  9. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  10. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  11. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  12. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica 

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20

    relationships between selected characteristics of adopter innovativeness and farmer vulnerability level. Random sampling was used to select participants (N=52). Personal interviews were conducted with farmers using an instrument consisting of LVI components...

  13. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to ...

  14. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    C Lisp Scala Scheme Erlang SQL Lua 17.  Please enter your Ernst. Automatic Creation of SQL Injection and Cross-SiteXSS and first-order SQL injection vulnerabilities (i.e. ,

  15. Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian Universities

    E-Print Network [OSTI]

    Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian universities, among these causes of weaknesses was: weak interest in the Arab world in general scientific

  16. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  17. In vivo Raman spectral pathology of human atherosclerosis and vulnerable plaque

    E-Print Network [OSTI]

    Motz, Jason T.

    The rupture of vulnerable atherosclerotic plaque accounts for the majority of clinically significant acute cardiovascular events. Because stability of these culprit lesions is directly related to chemical and morphological ...

  18. Public health implications of hot summer days and vulnerability indexes in Massachusetts

    E-Print Network [OSTI]

    Reeves, Halley Brunsteter

    2015-01-01

    Due to ever-increasing summer temperatures and a population with minimal technological adaptations to help them cope, extreme heat events will likely have a large impact on vulnerable populations in Massachusetts. As such, ...

  19. Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss Model

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss to be surveyed and defined. Within this context the State of Florida has created the Florida Public Hurricane

  20. Interoperability format translation and transformation between IFC architectural design file and simulation file formats

    DOE Patents [OSTI]

    Chao, Tian-Jy; Kim, Younghun

    2015-01-06

    Automatically translating a building architecture file format (Industry Foundation Class) to a simulation file, in one aspect, may extract data and metadata used by a target simulation tool from a building architecture file. Interoperability data objects may be created and the extracted data is stored in the interoperability data objects. A model translation procedure may be prepared to identify a mapping from a Model View Definition to a translation and transformation function. The extracted data may be transformed using the data stored in the interoperability data objects, an input Model View Definition template, and the translation and transformation function to convert the extracted data to correct geometric values needed for a target simulation file format used by the target simulation tool. The simulation file in the target simulation file format may be generated.

  1. Interoperability format translation and transformation between IFC architectural design file and simulation file formats

    DOE Patents [OSTI]

    Chao, Tian-Jy; Kim, Younghun

    2015-02-03

    Automatically translating a building architecture file format (Industry Foundation Class) to a simulation file, in one aspect, may extract data and metadata used by a target simulation tool from a building architecture file. Interoperability data objects may be created and the extracted data is stored in the interoperability data objects. A model translation procedure may be prepared to identify a mapping from a Model View Definition to a translation and transformation function. The extracted data may be transformed using the data stored in the interoperability data objects, an input Model View Definition template, and the translation and transformation function to convert the extracted data to correct geometric values needed for a target simulation file format used by the target simulation tool. The simulation file in the target simulation file format may be generated.

  2. File:Apschem.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf Jump to: navigation, search File File history File

  3. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  4. A case study of social vulnerability mapping: issues of scale and aggregation 

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15

    phenomena to anthropogenic calamities (Burton, Kates, and White 1993). The effects of these environmental hazards can change where and how a population develops (Van der Veen and Logtmeijer 2005). A challenge for geographers is locating vulnerable... populations, and calculating what makes these populations susceptible to harm from environmental hazards before a calamity happens. This study examines the challenges of mapping and calculating social vulnerability by expanding on concepts and knowledge...

  5. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  6. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  7. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  8. Children with disabilities in the context of disaster: A social vulnerability perspective 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    that various factors may con- tribute to the physical, psychological, and educational vulnerability of children with disabilities in disaster, including higher poverty rates, elevated risk exposure, greater vulnerability to traumatic loss or separation from...- tions of the article draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a...

  9. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin Boedecker,

  10. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin Boedecker,Coke

  11. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin

  12. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million

  13. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall

  14. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall3,"Alabama","Alabama","Electric Power

  15. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall3,"Alabama","Alabama","Electric

  16. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to

  17. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall to $3.43 by September1 7 6DEPARTMENTMonthlyMay-15

  18. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall to $3.43 by September1 7 6DEPARTMENTMonthlyMay-15Electric Power

  19. FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and Myers CoMadison -T:..) ".. _,;

  20. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 RelativeSoutheast RegionFuture Production1002 2.

  1. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 RelativeSoutheast RegionFuture Production1002

  2. Instructions to CBECS 1992 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    and dBASE (CE92F01D.DBF) formats. These files contain the 1992 CBECS basic data including building characteristics, energy consumption and expenditures, and temperature data. The...

  3. Optimizing Native Files in Energy.gov

    Broader source: Energy.gov [DOE]

    For native files in Energy.gov, following these best practices will result in better search results in commercial search engines. To learn how to optimize PDFs, see the PDF requirements.

  4. Collective operations in a file system based execution model

    DOE Patents [OSTI]

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-12

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  5. Collective operations in a file system based execution model

    DOE Patents [OSTI]

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-19

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  6. File:06COAExtraLegalVehiclePermittingProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    traLegalVehiclePermittingProcess.pdf Jump to: navigation, search File File history File usage Metadata File:06COAExtraLegalVehiclePermittingProcess.pdf Size of this preview: 463 ...

  7. GNU Radio & USRPGNU Radio & USRP File transfer through WirelessFile transfer through Wireless

    E-Print Network [OSTI]

    Yu, Chansu

    1 GNU Radio & USRPGNU Radio & USRP File transfer through WirelessFile transfer through WirelessSachin Hirve April 30, 2008April 30, 2008 Contents:Contents: What is Software Radio?What is Software Radio? USRPUSRP ­­ MultiMulti--functional hardwarefunctional hardware GNU RadioGNU Radio Previous Work

  8. DATABASE DESIGN, Gio Wiederhold CHAPTER 8, file CHAP8.tex This file is c

    E-Print Network [OSTI]

    Wiederhold, Gio

    To a Mouse, 1787 The previous chapter described models of databases. The structure of the database the database model, but do not make it directly available to a database management system. In this chapter we404 !le DATABASE DESIGN, Gio Wiederhold CHAPTER 8, file CHAP8.tex This file is c fl1977 by Mc

  9. Introduction Container Library Container Tools FUSE Container File System Evaluation Container Library and FUSE Container File

    E-Print Network [OSTI]

    The library was completely overhauled It now provides consistently named functions and data types The commentsIntroduction Container Library Container Tools FUSE Container File System Evaluation Container Library and FUSE Container File System Softwarepraktikum f¨ur Fortgeschrittene Michael Kuhn Parallele und

  10. Call Description cread highspeed, synchronous read from a CFS file

    E-Print Network [OSTI]

    Torczon, Virginia

    Call Description cread high­speed, synchronous read from a CFS file cwrite high­speed, synchronous write to a CFS file gilow global MIN operation used for integer scalars gopf make a global operation

  11. The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1

    E-Print Network [OSTI]

    Fernandez, Eduardo

    The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1 PGM = SPAR1 2010 FLORIDA ATLANTIC UNIVERSITY SPACE FILE PAGE: 2 PGM = SPAR1 2010 FLORIDA ATLANTIC UNIVERSITY REPORT: SPA130 ROOM INVENTORY REPORT RUN

  12. The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1

    E-Print Network [OSTI]

    Fernandez, Eduardo

    The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1 PGM = SPAR1 2010 FLORIDA ATLANTIC UNIVERSITY:515:10105671124552::::P515_REPORTS_I... #12;The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 2 PGM = SPAR1 2010 FLORIDA

  13. Duplicate File Names-A Novel Steganographic Data Hiding Technique

    E-Print Network [OSTI]

    Wu, Jie

    or a terrorist plot. None-the-less, these files can also be potentially dangerous viruses, malware, child porn

  14. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities

  15. Patent subsidy and patent filing in China By Zhen Lei

    E-Print Network [OSTI]

    Sekhon, Jasjeet S.

    Patent subsidy and patent filing in China By Zhen Lei , Zhen Sun, and Brian Wright Department of patent subsidy policies on patent filings in Chi- na. China had rapid growth in patenting in recent years and became the number one in patent filings in 2011. We study five neighboring cities in Jiangsu province

  16. The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1

    E-Print Network [OSTI]

    Fernandez, Eduardo

    The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 1 PGM = SPAR1 2010 FLORIDA ATLANTIC UNIVERSITY:515:10105671124552::::P515_REPORTS_I... #12;The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 2 PGM = SPAR1 2010 FLORIDA:515:10105671124552::::P515_REPORTS_I... #12;The SAS System PHYSICAL FACILITIES SPACE FILE PAGE: 3 PGM = SPAR1 2010 FLORIDA

  17. 3.0 Exporting Models Save model as OBJ file

    E-Print Network [OSTI]

    Gordon, Scott

    3.0 Exporting Models Save model as OBJ file: o Make sure that the model, and the UV are saved. Save model as an OgreXML file: o Install the blender2ogre exporter Visit https directory (remember that single-click selects a folder) o Type a name for the saved file in the box just

  18. Tuning HDF5 for Lustre File Systems

    SciTech Connect (OSTI)

    Howison, Mark; Koziol, Quincey; Knaak, David; Mainzer, John; Shalf, John

    2010-09-24

    HDF5 is a cross-platform parallel I/O library that is used by a wide variety of HPC applications for the flexibility of its hierarchical object-database representation of scientific data. We describe our recent work to optimize the performance of the HDF5 and MPI-IO libraries for the Lustre parallel file system. We selected three different HPC applications to represent the diverse range of I/O requirements, and measured their performance on three different systems to demonstrate the robustness of our optimizations across different file system configurations and to validate our optimization strategy. We demonstrate that the combined optimizations improve HDF5 parallel I/O performance by up to 33 times in some cases running close to the achievable peak performance of the underlying file system and demonstrate scalable performance up to 40,960-way concurrency.

  19. 11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-are-vulnerable-to-slackers/#comment-8042

    E-Print Network [OSTI]

    West, Stuart

    11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers « Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-NonCommercial- ShareAlike 2.5 License. Carnivals #12;11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers

  20. The Future of the Andrew File System

    ScienceCinema (OSTI)

    None

    2011-04-25

    The talk will discuss the ten operational capabilities that have made AFS unique in the distributed file system space and how these capabilities are being expanded upon to meet the needs of the 21st century. Derrick Brashear and Jeffrey Altman will present a technical road map of new features and technical innovations that are under development by the OpenAFS community and Your File System, Inc. funded by a U.S. Department of Energy Small Business Innovative Research grant. The talk will end with a comparison of AFS to its modern days competitors.

  1. Transportation and Energy Use Data Files

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0Proved ReservesData Files Transportation and Energy Use Data Files

  2. Optimizing File Availability in a Secure Serverless Distributed File System John R. Douceur and Roger P. Wattenhofer

    E-Print Network [OSTI]

    Optimizing File Availability in a Secure Serverless Distributed File System John R. Douceur, and availability by storing replicas of each file on multiple machines. It continuously monitors machine availability and relocates replicas as necessary to maximize the effective availability of the system. We

  3. DATA META FILE 2004 This file describes the instrumentation, field setup, and quality control procedures

    E-Print Network [OSTI]

    Minnesota, University of

    to revision. See dates above for recent updates concerning the data file and metadata. The following data) was measured in 2004. A calibration drift was discovered and the sensor was replaced for 2005. PAR can

  4. Computing and Informatics, Vol. , , 113, V 2011-May-18 VULNERABILITY ASSESSMENT ENHANCEMENT

    E-Print Network [OSTI]

    Miller, Barton P.

    systems usually do not undergo a thorough vulnerability assessment during their life cycle or after de FOR MIDDLEWARE FOR COMPUTING AND INFORMATICS Jairo Serrano, Elisa Heymann, Eduardo Cesar Computer Architecture that is insufficiently addressed in most ex- isting grid and cloud projects, even SCADA systems. Such projects use

  5. Climate change vulnerability of forest biodiversity: climate and competition tracking of demographic rates

    E-Print Network [OSTI]

    Teskey, Robert O.

    al., 2002; Thomas et al., 2004; Jetz et al., 2007). Some experts argue that responses will depend insight regarding vulnerability to any one (Streng et al., 1989; Elliott & Baker, 2004; Iba´n~ez et al., 2006; Yang et al., 2006; Canham & Thomas, 2010). CIS are further complicated by the fact that current

  6. On the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design

    E-Print Network [OSTI]

    Hopper, Nicholas J.

    , the Tor network consists of roughly 2000 "Onion Routers" that voluntarily relay traffic between who can observe a Tor client's network connections and even control some Onion Routers shouldOn the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design Jon

  7. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    EXaMINE - Experimentation of a Monitoring and Control System for Managing Vulnerabilities). The general objective of the project is to design, prototype and test novel monitor- ing systems supporting-border energy trade. A system with unlimited ca- pacity of interconnection between State, Regional or even Zonal

  8. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  9. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    strength and injuries of human beings with nuclear power plant models used in probabilistic safetyVulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which

  10. American Journal of Botany 89(12): 19161924. 2002. THE VULNERABILITY TO FREEZING-INDUCED XYLEM

    E-Print Network [OSTI]

    Pockman, William T.

    1916 American Journal of Botany 89(12): 1916­1924. 2002. THE VULNERABILITY TO FREEZING, Albuquerque, New Mexico 87131-1091 USA The temperature dependence of freezing-induced xylem cavitation- rated the previously observed relationship between minimum freezing temperature and embolism. The area

  11. How a butterfly's wing can bring down Goliath / Chaos theories calculate the vulnerability of megasystems

    E-Print Network [OSTI]

    and computer expert Vickie Lynch have been computer-modeling the vulnerability of electrical grids for several ever-larger power networks to transmit electricity, experts said Thursday. When a system becomes super-power failures. "The whole grid is very strongly coupled, and when you do something in one point

  12. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  13. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak 

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  14. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    that the population of a city grows, new problems arise, which include scarcity of resources, pollution, and traffic [1]. However, bigger cities generate new kinds of problems, such as scarcity of resources, pollutionDetection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz

  15. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

  16. Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage Drop

    E-Print Network [OSTI]

    Najm, Farid N.

    Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage voltage drops on the power grid that can affect circuit timing. We propose a statistical analysis supply voltage to circuit devices is referred to as the power grid. The consequences of power grid

  17. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  18. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  19. Software mitigations to hedge AES against cachebased software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache­based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat­ forms, software side channels have become a subject of interest. Recent publications discussed cache­based software side channel

  20. Software mitigations to hedge AES against cache-based software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat- forms, software side channels have become a subject of interest. Recent publications discussed cache-based software side channel

  1. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    are built with traditional metrics of complexity, code churn, and fault history. We have performed to the code [17]. Hence, complexity metrics and code churn metrics have been used for fault prediction [5, 17 fault prediction metrics ­ complexity, code churn, and fault history metrics for vulnerability

  2. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  3. A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES

    E-Print Network [OSTI]

    Gilbes, Fernando

    A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES Juan of a disaster. Unfortunately, that is not the case for Puerto Rican coastal cities when it comes to tsunamis. Over 55% of all cities in Puerto Rico have territories in tsunami evacuation zones (TEZ); nevertheless

  4. Seer: An analysis package for LHCO files

    E-Print Network [OSTI]

    Travis A. W. Martin

    2015-03-10

    Seer is a multipurpose package for performing trigger, signal determination and cuts of an arbitrary number of collider processes stored in the LHCO file format. This article details the use of Seer, including the necessary details for users to customize the code for investigating new kinematic variables.

  5. DEEP SEA DRILLING PROJECT DATA FILE DOCUMENTS

    E-Print Network [OSTI]

    DEEP SEA DRILLING PROJECT DATA FILE DOCUMENTS Ocean Drilling Program Texas A&M University Technical; however, republication of any portion requires the written consent of the Director, Ocean Drilling Program, Texas A&M University Research Park, 1000 Discovery Drive, College Station, Texas 77840, as well

  6. Title: Ontario Greenbelt Boundary File Data Creator /

    E-Print Network [OSTI]

    Title: Ontario Greenbelt Boundary File Data Creator / Copyright Owner: Ontario Ministry of Municipal Affairs and Housing Publisher: Ontario Ministry of Municipal Affairs and Housing Edition: N/A Versions: N/A Publication Date: N/A Coverage Date(s): N/A Updates: N/A Abstract: The Ontario Greenbelt

  7. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  8. The Design and Verification of the Rio File Cache

    E-Print Network [OSTI]

    Chen, Peter M.

    outages is straightfor- ward to understand and fix. A $100 uninterruptible power supply can keep a system because it is vulnerable to power outages and operating system crashes. Memory's vulnerability to power running long enough to dump memory to disk in the event of a power outage [3], or one can use non

  9. DMBC: Animated Gifs Demo: Animated .Gifs

    E-Print Network [OSTI]

    Stowell, Michael

    Opacity o Effects · Save for Web o GIF o Looping Options Video-Based Gifs · Video Capture · Video as an animated .gif file through the Save for Web menu option, upload it to the server, and link to it from your the file as an animated .gif file through the Save for Web menu option, upload it to the server, and link

  10. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service...

  11. Functional Assessment of Erasure Coded Storage Archive Blair...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    : Query * POSIX Gateway o Read : Write : Delete : Performance overhead 8 How We Broke Data * Pulled out HDDs (Scality, kill daemon) * Turned off nodes * Uploaded files,...

  12. INSPIRE and SPIRES Log File Analysis

    SciTech Connect (OSTI)

    Adams, Cole; /Wheaton Coll. /SLAC

    2012-08-31

    SPIRES, an aging high-energy physics publication data base, is in the process of being replaced by INSPIRE. In order to ease the transition from SPIRES to INSPIRE it is important to understand user behavior and the drivers for adoption. The goal of this project was to address some questions in regards to the presumed two-thirds of the users still using SPIRES. These questions are answered through analysis of the log files from both websites. A series of scripts were developed to collect and interpret the data contained in the log files. The common search patterns and usage comparisons are made between INSPIRE and SPIRES, and a method for detecting user frustration is presented. The analysis reveals a more even split than originally thought as well as the expected trend of user transition to INSPIRE.

  13. Exploring vulnerability and interdependency of UK infrastructure using key-linkages analysis

    E-Print Network [OSTI]

    Kelly, Scott; Tyler, Peter; Crawford-Brown, Douglas

    2015-07-27

    ) Waste (£5.8 bn) Water (£29.5 bn) Grand Total (£467 bn) Public Public/Private Private 3 Figure 1: Future source of funding for different infrastructure categories in the UK 60 Source: UK National infrastructure pipeline (2013) 61... Scientist 2012). With increasing risks from extreme weather events caused by the 65 onset of climate change and a concentration of populations now living in vulnerable 66 coastal cities, river deltas and along earth quake fault-lines, the risks of damage...

  14. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  15. U-117: Potential security vulnerability has been identified with certain HP

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple Vulnerabilities

  16. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURLDepartment

  17. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerabilityLogin|

  18. File:5 CCR 1001-5 Colorado Stationary Source Permitting and Air...

    Open Energy Info (EERE)

    Up Search File Edit History File:5 CCR 1001-5 Colorado Stationary Source Permitting and Air Pollution Control Emission Notice Requirements.pdf Jump to: navigation, search File...

  19. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore »to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  20. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  1. EPA -- Amended Environmental Impact Statement Filing System Guidance...

    Office of Environmental Management (EM)

    1506.10 of the Council on Environmental Quality's Regulations Implementing the National Environmental Policy Act The purpose of the EPA Filing System Guidelines is to provide...

  2. Building Life Cycle Cost Programs File Saving Troubleshooting...

    Energy Savers [EERE]

    Cycle Cost Programs File Saving Troubleshooting Some users have experienced difficulties saving BLCC projects. The primary issue causing the issue is that the user is not an...

  3. Public Financial Disclosure Reports Filed by the Secretary and...

    Office of Environmental Management (EM)

    Public Financial Disclosure Reports Filed by the Secretary and Deputy Secretary The Stop Trading on Congressional Knowledge (STOCK) Act requires online posting of the Public...

  4. Drinking Water and Groundwater Protection Division File Transfer...

    Open Energy Info (EERE)

    Drinking Water and Groundwater Protection Division File Transfer Protocol (FTP) Site Instructions Jump to: navigation, search OpenEI Reference LibraryAdd to library Permitting...

  5. Motion for Leave to File Consolidated Answer and Consolidated...

    Broader source: Energy.gov (indexed) [DOE]

    of Robert G. Burnley, Director ofthe Commonwealth of Virginia Department of Environmental Quality, filed in Federal Energy Regulatory Commission ("FERC") Docket No. ELOS-14S. The...

  6. FERC Hydroelectric Project Handbook for Filings other than Licenses...

    Open Energy Info (EERE)

    FERC Hydroelectric Project Handbook for Filings other than Licenses and Exemptions Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance...

  7. File:01MTALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile EditFileFile

  8. Vulnerability in Holstein-Friesian dairy cows : risk factors for culling and effect of temperament on oestrus 

    E-Print Network [OSTI]

    Chiumia, Daniel

    2011-11-25

    The general aims of the work were to determine the factors associated with vulnerability in Holstein- Friesian dairy cows in two scenarios: A) culling and B) the effect of temperament on days to first recorded oestrus ...

  9. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  10. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  11. Geothermal Electricity Technology Evaluation Model (GETEM) Individual Case Files and Summary Spreadsheet (GETEM version Spring 2013)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Hanson, Steven CJ

    This group of files-- 10 GETEM individual case files and 1 summary spreadsheet-- contain final data from the revisions between summer 2011 and spring 2013.

  12. Geothermal Electricity Technology Evaluation Model (GETEM) Individual Case Files and Summary Spreadsheet (GETEM version Spring 2013)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Hanson, Steven CJ

    2013-03-07

    This group of files-- 10 GETEM individual case files and 1 summary spreadsheet-- contain final data from the revisions between summer 2011 and spring 2013.

  13. Empty values in upload? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH JumpEllenville, New York:Corporation Jump to:Emporia County,Empty

  14. Image upload with broken thumbnail image | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA JumpDuimen RiverScoringUtilitiesRenov veis doIdeemaSunIllinoisImage

  15. Error 401 on upload? | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButtePowerEdisto Electric Coop,Erosion Flume Jump to: navigation, search BasicError

  16. Tips & Tricks for Uploading Images with Research Highlights

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S.Week DayDr.Theories81 to 1990 Timeline of& Tricks for

  17. PARS II 104 Contractor Monthly Upload | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested PartiesBuilding energy codes have a more than 20-yearPAE Evaluation

  18. Storing files in a parallel computing system based on user-specified parser function

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M; Tzelnic, Percy; Grider, Gary; Manzanares, Adam; Torres, Aaron

    2014-10-21

    Techniques are provided for storing files in a parallel computing system based on a user-specified parser function. A plurality of files generated by a distributed application in a parallel computing system are stored by obtaining a parser from the distributed application for processing the plurality of files prior to storage; and storing one or more of the plurality of files in one or more storage nodes of the parallel computing system based on the processing by the parser. The plurality of files comprise one or more of a plurality of complete files and a plurality of sub-files. The parser can optionally store only those files that satisfy one or more semantic requirements of the parser. The parser can also extract metadata from one or more of the files and the extracted metadata can be stored with one or more of the plurality of files and used for searching for files.

  19. LLaannggeerrhhaannss LLaabb PPrroottooccoollss Importing DRILL Data via .txt file

    E-Print Network [OSTI]

    Langerhans, Brian

    LLaannggeerrhhaannss LLaabb PPrroottooccoollss Importing DRILL Data via .txt file To import data into the DRILL or to modify existing entries or to delete entries, using a modified DRILL data xlsx./ .txt file instead of using the DRILL Admin functions. 1. Back up the DRILL using the weekly backup protocol. 2

  20. TIGER:Thermal-Aware File Assignment in Storage Clusters

    E-Print Network [OSTI]

    Qin, Xiao

    TIGER:Thermal-Aware File Assignment in Storage Clusters Ajit Chavan, Xunfei Jiang, Mohemmad I/O performance. I. INTRODUCTION Thermal management for power-dense storage clusters can address cooling problems. The following three factors make thermal-aware file assign- ment desirabe and practical for storage clusters

  1. Energy Efficient Prefetching with Buffer Disks for Cluster File Systems

    E-Print Network [OSTI]

    Qin, Xiao

    Energy Efficient Prefetching with Buffer Disks for Cluster File Systems Adam Manzanares, Xiaojun the energy- efficiency of large scale parallel storage systems. To address these issues we introduce EEVFS (Energy Efficient Virtual File System), which is able to manage data placement and disk states to help

  2. Replication in the Harp File System Barbara Liskov

    E-Print Network [OSTI]

    Liskov, Barbara

    many failures the file server with a small uninterruptible power supply (UPS) that is intended) after provide a strong semantics for file operations: each opera­ a power failure; the server uses, monitored by the Office of Naval Research under volatile memory at several nodes. It survives a power

  3. Access Your Files | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposalsAboutAcceleratingthYour Files Access

  4. Core File Settings | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit the followingConcentratingPortalCool MagneticCopper Palladium-Core File

  5. TO: FILE MEHClRANDUM ALTERNATE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM:

  6. Form:MapFile | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport JumpFlowood,PevafersaMapFile Jump to: navigation, search

  7. Detailed Drawings of NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HAB Packet HanfordDOEDanielDeSmall Business ForumDesignerFile System

  8. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji Is JustFile

  9. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji Is JustFile

  10. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji FijiO File storage

  11. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji FijiO File

  12. Parallel File Systems at HPC Centers: Usage,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access| Department ofStephen PSeptember|March Study Could Lead toFile

  13. Help:Managing files | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View NewGuam: Energyarea, California | OpenHeliotronicsManaging files Jump

  14. Category:Map Files | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButte County,Camilla, Georgia:Geothermal Regulatory RoadmapISGANLEDSMap Files Jump

  15. FY 16-17 ASC Utility Filings

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans -ORGANIZATION FY 2013 FY6-17-ASC-Utility-Filings

  16. T-651: Blue Coat ProxySG Discloses Potentially Sensitive Information in Core Files

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat ProxySG. A local user can obtain potentially sensitive information

  17. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  18. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilitiesApple has

  19. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department ofMultiple

  20. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergy

  1. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilitiesService | Department

  2. A Five-Year Study of File-System Metadata Nitin Agrawal

    E-Print Network [OSTI]

    Swift, Michael

    in file size, file age, file-type frequency, directory size, namespace structure, file-system population that explains the namespace structure and the distribution of directory sizes. We find significant temporal by mass-emailing a scanning pro- gram to Microsoft's employees, and we had a 22% par- ticipation rate

  3. A FiveYear Study of FileSystem Metadata Nitin Agrawal

    E-Print Network [OSTI]

    Swift, Michael

    in file size, file age, file­type frequency, directory size, namespace structure, file­system population that explains the namespace structure and the distribution of directory sizes. We find significant temporal by mass­emailing a scanning pro­ gram to Microsoft's employees, and we had a 22% par­ ticipation rate

  4. LAVA/CIS Version 2. 0: A software system for vulnerability and risk assessment

    SciTech Connect (OSTI)

    Smith, S.T.

    1990-01-01

    LAVA (the Los Alamos Vulnerability/Risk Assessment system) is an original systematic approach to risk assessment developed at the Los Alamos National Laboratory. It is an alternative to existing quantitative methods, providing an approach that is both objective and subjective, and producing results that are both quantitative and qualitative. LAVA was developed as a tool to help satisfy federal requirements for periodic vulnerability and risk assessments of a variety of systems and to satisfy the resulting need for an inexpensive, reusable, automated risk assessment tool firmly rooted in science. LAVA is a three-part systematic approach to risk assessment that can be used to model a variety of application systems such as computer security systems, communications security systems, information security systems, and others. The first part of LAVA is the mathematical model based on classical risk assessment, hierarchical multilevel system theory, decision theory, fuzzy possibility theory, expert system theory, utility theory, and cognitive science. The second part is the implementation of the mathematical risk model as a general software engine executed on a large class of personal computers. The third part is the application data sets written for a specific application system. The user of a LAVA application is not required to have knowledge of formal risk assessment techniques. All the technical expertise and specialized knowledge are built into the software engine and the application system itself. 36 refs., 5 figs.

  5. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  6. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  7. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  8. Comparison of leading parallel NAS file systems on commodity hardware

    SciTech Connect (OSTI)

    Hedges, R; Fitzgerald, K; Gary, M; Stearman, D M

    2010-11-08

    High performance computing has experienced tremendous gains in system performance over the past 20 years. Unfortunately other system capabilities, such as file I/O, have not grown commensurately. In this activity, we present the results of our tests of two leading file systems (GPFS and Lustre) on the same physical hardware. This hardware is the standard commodity storage solution in use at LLNL and, while much smaller in size, is intended to enable us to learn about differences between the two systems in terms of performance, ease of use and resilience. This work represents the first hardware consistent study of the two leading file systems that the authors are aware of.

  9. File:03IDGTermEasement.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale,3IDGTermEasement.pdf Jump to: navigation, search File File history File usage Metadata

  10. File:04TXAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File File history File usage

  11. File:04UTAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File File history File

  12. File:05AKADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File File history File-FD-a -5-FD-b

  13. File:01IDALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile EditFile Edit

  14. File:01LandUseOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile EditFile

  15. RandFile package for Mathematica for accessing file-based sources of randomness

    E-Print Network [OSTI]

    J. A. Miszczak; M. Wahl

    2015-03-15

    We present a package for Mathematica computer algebra system which allows the exploitation of local files as sources of random data. We provide the description of the package and illustrate its usage by showing some examples. We also compare the provided functionality with alternative sources of randomness, namely a built-in pseudo-random generator and the package for accessing hardware true random number generators.

  16. C++11 header files appear missing on Edison

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aborted for test.cxx (code 4) edison03: > This is because the installed Intel compilers rely upon the GNU header files for C++11 support, while the default SLES version of...

  17. A Multilevel File System for High Assurancey Cynthia E. Irvine

    E-Print Network [OSTI]

    A Multilevel File System for High Assurancey Cynthia E. Irvine Computer Science Department Naval to provide an interface which is both \\friendly" and exible, and relies entirely upon the high assur- ance

  18. "Annual Electric Power Industry Report (EIA-861 data file)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    In 2013, demand-side management data started being collected as energy efficiency and demand response data. Retail Sales, Customer Sited is a new file; this data was previously...

  19. The Umbrella File System: Storage Management Across Heterogeneous Devices 

    E-Print Network [OSTI]

    Garrison, John Allen

    2011-08-08

    With the advent of Flash based solid state devices (SSDs), the differences in physical devices used to store data in computers are becoming more and more pronounced. Effectively mapping the differences in storage devices to the files...

  20. Annual Electric Generator data - EIA-860 data file

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    in the file are wholly-owned by their operator). 61EnviroAssocYyyyy Contains boiler association data for the environmental equipment data collected on the Form EIA-860....

  1. ReadMe file: A user's guide for the vitality model parameter fitting routine and the S-Plus functions contained in file VitalityModelFitting.ssc.

    E-Print Network [OSTI]

    Washington at Seattle, University of

    ReadMe file: A user's guide for the vitality model parameter fitting routine and the S-Plus functions contained in file VitalityModelFitting.ssc. The VitalityModelFitting.ssc file contains all functions necessary to run the MLE parameter fitting routine for the vitality-based survival model

  2. File:03MTCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale,3IDGTermEasement.pdf Jump to: navigation, search File File

  3. File:05DrillingPermittingOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File File

  4. File:Archaeological Consultants.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf Jump to: navigation, search File File history

  5. File:Archaeology excavation permit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf Jump to: navigation, search File File

  6. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  7. Thermal Analysis of the Vulnerability of the Spacesuit Battery Design to Short-Circuit Conditions (Presentation)

    SciTech Connect (OSTI)

    Kim, G. H.; Chaney, L.; Smith, K.; Pesaran, A.; Darcy, E.

    2010-04-22

    NREL researchers created a mathematical model of a full 16p-5s spacesuit battery for NASA that captures electrical/thermal behavior during shorts to assess the vulnerability of the battery to pack-internal (cell-external) shorts. They found that relocating the short from battery pack-external (experimental validation) to pack-internal (modeling study) causes substantial additional heating of cells, which can lead to cell thermal runaway. All three layers of the bank-to-bank separator must fail for the pack-internal short scenario to occur. This finding emphasizes the imperative of battery pack assembly cleanliness. The design is tolerant to pack-internal shorts when stored at 0% state of charge.

  8. Federating LHCb datasets using the DIRAC File catalog

    E-Print Network [OSTI]

    Haen, Christophe; Frank, Markus; Tsaregorodtsev, Andrei

    2015-01-01

    In the distributed computing model of LHCb the File Catalog (FC) is a central component that keeps track of each file and replica stored on the Grid. It is federating the LHCb data files in a logical namespace used by all LHCb applications. As a replica catalog, it is used for brokering jobs to sites where their input data is meant to be present, but also by jobs for finding alternative replicas if necessary. The LCG File Catalog (LFC) used originally by LHCb and other experiments is now being retired and needs to be replaced. The DIRAC File Catalog (DFC) was developed within the framework of the DIRAC Project and presented during CHEP 2012. From the technical point of view, the code powering the DFC follows an Aspect oriented programming (AOP): each type of entity that is manipulated by the DFC (Users, Files, Replicas, etc) is treated as a separate 'concern' in the AOP terminology. Hence, the database schema can also be adapted to the needs of a Virtual Organization. LHCb opted for a highly tuned MySQL datab...

  9. Design and Implementation of Ceph: A Scalable Distributed File System

    SciTech Connect (OSTI)

    Weil, S A; Brandt, S A; Miller, E L; Long, D E; Maltzahn, C

    2006-04-19

    File system designers continue to look to new architectures to improve scalability. Object-based storage diverges from server-based (e.g. NFS) and SAN-based storage systems by coupling processors and memory with disk drives, delegating low-level allocation to object storage devices (OSDs) and decoupling I/O (read/write) from metadata (file open/close) operations. Even recent object-based systems inherit decades-old architectural choices going back to early UNIX file systems, however, limiting their ability to effectively scale to hundreds of petabytes. We present Ceph, a distributed file system that provides excellent performance and reliability with unprecedented scalability. Ceph maximizes the separation between data and metadata management by replacing allocation tables with a pseudo-random data distribution function (CRUSH) designed for heterogeneous and dynamic clusters of unreliable OSDs. We leverage OSD intelligence to distribute data replication, failure detection and recovery with semi-autonomous OSDs running a specialized local object storage file system (EBOFS). Finally, Ceph is built around a dynamic distributed metadata management cluster that provides extremely efficient metadata management that seamlessly adapts to a wide range of general purpose and scientific computing file system workloads. We present performance measurements under a variety of workloads that show superior I/O performance and scalable metadata management (more than a quarter million metadata ops/sec).

  10. WeatherMaker: Weather file conversion and evaluation

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1999-07-01

    WeatherMaker is a weather-data utility for use with the ENERGY-10 design-tool computer program. The three main features are: Convert--Weather files can be converted from one format to another. For example, a TMY2 format file can be converted to an ENERGY-10 binary file that can be used in a simulation. This binary file can then be converted to a text format that allows it to be read and/or manipulated in WordPad or Excel. Evaluate--ENERGY-10 weather files can be studied in great detail. There are 8 graphical displays of the data that provide insight into the data, and a summary tables that presents results calculated from the hourly data. Adjust--Hourly temperature data can be adjusted starting with hourly data from a nearby TMY2 site. Dry-bulb and wet-bulb temperatures are adjusted up or down as required to match given monthly statistics. This feature can be used to generate weather files for any of 3,958 sites in the US where such monthly statistics are tabulated. The paper shows a variety of results, explains the methods used, and discusses the rationale for making the adjustments. It is anticipated that WeatherMaker will be released by the time of the ASES Solar 99 conference.

  11. New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one

    E-Print Network [OSTI]

    Gilbes, Fernando

    New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one contaminant at a level of concern for human contaminants in groundwater. Regional summaries of where and why groundwater is vulnerable to contamination now

  12. Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation (DGT): Proposal of a Spatial

    E-Print Network [OSTI]

    Boyer, Edmond

    Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation.garbolino@mines-paristech.fr Each year millions of tons of Dangerous Goods are transported between France and Italy using especially for the territory Dangerous Goods Transportation (DGT) is a crucial activity that participates to the development

  13. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  14. The Fifth Workshop on HPC Best Practices: File Systems and Archives

    E-Print Network [OSTI]

    Hick, Jason

    2013-01-01

    2009. U.S. Department of Energy Best Practices Workshop onU.S. Department of Energy Best Practices Workshop on FileU.S. Department of Energy Best Practices Workshop on File

  15. Does not take an "=" as part of the name of a source file.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Does not take an "" as part of the name of a source file. Does not take an "" as part of the name of a source file. November 12, 2013 by Mike Stewart, NERSC USG STATUS: Bug 19671...

  16. [FIXED] perl 5.16.0 File::Glob() causes crashes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    perl 5.16.0 File::Glob() causes crashes FIXED perl 5.16.0 File::Glob() causes crashes August 15, 2013 by Doug Jacobsen (1 Comments) There is an issue with the default modules...

  17. Native File Formats and PDFs on Websites Outside of the Energy.gov Drupal Environment

    Broader source: Energy.gov [DOE]

    Websites and applications outside the Energy.gov Drupal environment should follow these requirements when linking to non-HTML resources or native files like PDFs or Word, Excel, and PowerPoint files.

  18. 2011_Accelerator_Detector_RD_PI_Meeting_files | U.S. DOE Office...

    Office of Science (SC) Website

    Session II Talks Technical Session III Talks Technical Session IV Talks 2011 Accelerator & Detector R&D PI Meeting .pdf file (6.2MB) Attendees List .pdf file (92KB) Introductory...

  19. The Life and Times of Files and Information: A Study of Desktop Provenance

    E-Print Network [OSTI]

    relationships are common, and provenance cues aid recall. Author Keywords Provenance, Documents, Desktop Search, File Organization ACM Classification Keywords H5.m. Information interfaces and presentation (e.g., HCI personal computers are rapidly becoming black holes for files and digital resources such as: word files

  20. The Echo Distributed File System Andrew D. Birrell, Andy Hisgen, Chuck Jerian,

    E-Print Network [OSTI]

    Chin, Shiu-Kai

    . All rights reserved. #12;The Echo Distributed File System · 1 WHAT AND WHY? One of the holy grails systems with the virtues of distributed and personal computer systems. This grail is all the harder to capture the file system portion of this grail. We thought of the Echo file system as a crucial first piece

  1. Understanding Pollution Dynamics in P2P File Sharing , Junghoo Cho

    E-Print Network [OSTI]

    Cho, Junghoo "John"

    Understanding Pollution Dynamics in P2P File Sharing Uichin Lee , Min Choi , Junghoo Cho , M. Y,cho,medy,gerla}@cs.ucla.edu, min@kaist.ac.kr ABSTRACT Pollution in P2P file sharing occurs when a large number of decoy files that pollution dynamics are closely related to user behavior. Therefore, we first conduct a human subject study

  2. A Cryptographic File System for Unix AT&T Bell Laboratories

    E-Print Network [OSTI]

    Pommerening, Klaus - Institute of Medical Biostatistics, Epidemiology, and Informatics & Fachbereich 08

    File System (CFS) pushes encryption services into the file system itself. CFS supports secure storage intervention; cleartext is never stored on a disk or sent to a remote file server. CFS can use any available of the key. This paper describes the design and implementation of CFS under Unix. Encryption techniques

  3. PDF-file of web pages coming soon Welcome to Lipidomics Unit

    E-Print Network [OSTI]

    Palva, Tapio

    PDF-file of web pages coming soon Welcome to Lipidomics Unit The Helsinki University L Biological +358 reijo.kakela@helsinki.fi file of web pages coming soon Welcome to Lipidomics Unit The Helsinki phone +358-(0)50 reijo.kakela@helsinki.fi file of web pages coming soon Welcome to Lipidomics Unit

  4. A Flexible File Sharing Mechanism for iRODS Tufts University

    E-Print Network [OSTI]

    Tarboton, David

    A Flexible File Sharing Mechanism for iRODS Alva Couch Tufts University Medford, MA couchRODS mechanisms for file sharing, including user groups, often require some form of iRODS ad- ministrative. The result is an access control mechanism that closely matches scientific needs for file sharing, and brings

  5. Create an ETD Using Adobe Lesson 1: Create a PDF File

    E-Print Network [OSTI]

    Carver, Jeffrey C.

    Create an ETD Using Adobe® Acrobat® Lesson 1: Create a PDF File 1 Create a PDF File #12;Create an ETD Using Adobe® Acrobat® Lesson 1: Create a PDF File 2 Tip The default settings will create an ETD. Click on the Restore Defaults button to make sure that the defaults are selected or click

  6. A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies

    E-Print Network [OSTI]

    Kindy, Diallo Abdoulaye

    2012-01-01

    In today's world, Web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions are done online with the aid of different Web applications. Though these applications are used by hundreds of people, in many cases the security level is weak, which makes them vulnerable to get compromised. In most of the scenarios, a user has to be identified before any communication is established with the backend database. An arbitrary user should not be allowed access to the system without proof of valid credentials. However, a crafted injection gives access to unauthorized users. This is mostly accomplished via SQL Injection input. In spite of the development of different approaches to prevent SQL injection, it still remains an alarming threat to Web applications. In this paper, we present a detailed ...

  7. Compiler-Directed File Layout Optimization for Hierarchical Storage Systems

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ding, Wei; Zhang, Yuanrui; Kandemir, Mahmut; Son, Seung Woo

    2013-01-01

    File layout of array data is a critical factor that effects the behavior of storage caches, and has so far taken not much attention in the context of hierarchical storage systems. The main contribution of this paper is a compiler-driven file layout optimization scheme for hierarchical storage caches. This approach, fully automated within an optimizing compiler, analyzes a multi-threaded application code and determines a file layout for each disk-resident array referenced by the code, such that the performance of the target storage cache hierarchy is maximized. We tested our approach using 16 I/O intensive application programs and compared its performancemore »against two previously proposed approaches under different cache space management schemes. Our experimental results show that the proposed approach improves the execution time of these parallel applications by 23.7% on average.« less

  8. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  9. EVALUATED NUCLEAR STRUCTURE DATA FILE AND RELATED PRODUCTS.

    SciTech Connect (OSTI)

    TULI,J.K.

    2004-09-26

    The Evaluated Nuclear Structure Data File (ENSDF) is a leading resource for the experimental nuclear data. It is maintained and distributed by the National Nuclear Data Center, Brookhaven National Laboratory. The file is mainly contributed to by an international network of evaluators under the auspice of the International Atomic Energy Agency. The ENSDF is updated, generally by mass number, i.e., evaluating together all isobars for a given mass number. If, however, experimental activity in an isobaric chain is limited to a particular nuclide then only that nuclide is updated. The evaluations are published in the journal Nuclear Data Sheets, Academic Press, a division of Elsevier.

  10. File:05IDADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File FileOpen Energy

  11. File:BLM MOU Geothermal.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf Jump to: navigation, search File FileBLM MOU

  12. File:EIA-PRB-S-LIQ.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf JumpLIQ.pdf Jump to: navigation, search File File

  13. File:Fut gasp 03.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdfgasp 03.pdf Jump to: navigation, search File File

  14. File:01CAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile Edit History

  15. File:01HIALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile Edit

  16. File:01NMALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-bFile

  17. Exhibit 7 Filing of Patent Applications Classified Subject Matter UT-B Contracts Div ex7-july10.doc

    E-Print Network [OSTI]

    Pennycook, Steve

    Exhibit 7 ­ Filing of Patent Applications ­ Classified Subject Matter UT-B Contracts Div July 2010 Page 1 of ex7-july10.doc Exhibit 7 Ref: FAR 52.227-10 (Dec 2007) FILING OF PATENT APPLICATIONS - CLASSIFIED SUBJECT MATTER (July 2010) (a) Before filing or causing to be filed a patent application

  18. How To Re-Encode Your Video in QuickTime Pro 1. Open and Export Your File

    E-Print Network [OSTI]

    Qiu, Weigang

    1 How To Re-Encode Your Video in QuickTime Pro 1. Open and Export Your File: Open Quick open in QuickTime Pro, go to File, Export to begin re-encoding your video file, as seen in the image to the left. 2. Change the File Settings: When you export, QuickTime will open

  19. Mapping population vulnerability and climate change in Africa David Lopez-Carr1, Narcisa G. Pricope2, Marta M. Jankowska3, Christopher Funk4, Gregory Husak1 and

    E-Print Network [OSTI]

    Lopez-Carr, David

    Mapping population vulnerability and climate change in Africa David Lopez-Carr1, Narcisa G. Pricope, and environmental degradation reduce adaptive capacity (Bremner, Lopez-Carr et al. 2010). In such a volatile context

  20. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  1. Harvard Library: FY2011 Volumes, Records, Titles, and Digital Files

    E-Print Network [OSTI]

    Harvard Library: FY2011 Volumes, Records, Titles, and Digital Files Total Expenditures *Digital Repository Service SOURCE: HARVARD LIBRARY 0.00 5.00 10.00 15.00 20.00 25.00 30.00 2007 2008 2009 2010 2011 Harvard's library system now includes more than 70 separate library units, which are operated by nearly 1

  2. Harvard Library: FY2010 Volumes, Records, Titles, and Digital Files

    E-Print Network [OSTI]

    Harvard Library: FY2010 Volumes, Records, Titles, and Digital Files Total Expenditures *Digital Repository Service SOURCE: HARVARD LIBRARY OFFICE OF THE EXECUTIVE DIRECTOR 0.00 2.00 4.00 6.00 8.00 10.00 12 Collections Costs Staffing Costs Operations Harvard's library system now includes more than 70 separate

  3. JOURNAL OF LATEX CLASS FILES 1 Robust Logistic Regression

    E-Print Network [OSTI]

    Hero, Alfred O.

    JOURNAL OF LATEX CLASS FILES 1 Robust Logistic Regression with Bounded Data Uncertainties Patrick L a formulation of robust logistic regression under bounded data uncertainties. The robust estimates are obtained compare the results of 1-Logistic Regression against 1-Robust Logistic Regression on a real gene

  4. Quality Assurance Procedures for ModCat Database Code Files

    SciTech Connect (OSTI)

    Siciliano, Edward R.; Devanathan, Ram; Guillen, Zoe C.; Kouzes, Richard T.; Schweppe, John E.

    2014-04-01

    The Quality Assurance procedures used for the initial phase of the Model Catalog Project were developed to attain two objectives, referred to as “basic functionality” and “visualization.” To ensure the Monte Carlo N-Particle model input files posted into the ModCat database meet those goals, all models considered as candidates for the database are tested, revised, and re-tested.

  5. Population Files for use with CAP88 at Los Alamos

    SciTech Connect (OSTI)

    McNaughton, Michael W [Los Alamos National Laboratory; Brock, Burgandy R [Los Alamos National Laboratory

    2012-07-10

    CAP88 (Clean Air Act Assessment Package 1988) is a computer model developed for the US Environmental Protection Agency to assess the potential dose from radionuclide emissions to air and to demonstrate compliance with the Clean Air Act. It has options to calculate either individual doses, in units of mrem, or a collective dose, also called population dose, in units of person-rem. To calculate the collective dose, CAP88 uses a population file such as LANL.pop, that lists the number of people in each sector (N, NNE, NE, etc.) as a function of distance (1 to 2 km, etc.) out to a maximum radius of 80 km. Early population files are described in the Los Alamos National Laboratory (LANL) Environmental Reports for 1985 (page 14) and subsequent years. LA-13469-MS describes a population file based on the 1990 census. These files have been updated several times, most recently in 2006 for CAP88 version 3. The 2006 version used the US census for 2000. The present paper describes the 2012 updates, using the 2010 census.

  6. A file with robust index Wilberd van der Kallen

    E-Print Network [OSTI]

    Kallen, Wilberd

    of makeindex, but that construction is broken by our package. (The encapsulating construction uses the encap about labels or names. Do not exclude any relevant files. For instance, do not use \\includeonly. Say we the index. The package hyperref may break our code. Therefore one must use the op- tion hyperindex

  7. March 24, 2008 ADBS: Index 1 Indexing Structures for Files

    E-Print Network [OSTI]

    Adam, Salah

    , the binary search cost would be: log2b= log230000= 15 block accesses #12;March 24, 2008 ADBS: Index 6March 24, 2008 ADBS: Index 1 Indexing Structures for Files #12;March 24, 2008 ADBS: Index 2 Chapter Outline Indexes as Access Paths Single Level Indexes Primary Indexes Clustering Indexes Secondary Indexes

  8. Proposed database model and file structures for arthropod collection management

    E-Print Network [OSTI]

    Miller, Scott

    the context of a single data management system. The value of this linkage is that it permits developers who. In some mainframe based database management systems, it is possible to define repeating subsets of information as part of a single database file structure. However, few personal computer-based systems have

  9. .An Experimental Performance Evaluation of Touchstone Delta Concurrent File System*

    E-Print Network [OSTI]

    Touchstone Delta's Concurrent File System ( CFS). The main objective of the study is to determine the maximum, the result shows that performance of CFS scales as the number of disks is increased, but the sustained of CFS scales with the number of processors in the beginning, how- ever, a plateu a quickly reached due

  10. Procedure for Packing Weather Files for DOE-2e 

    E-Print Network [OSTI]

    Kim, K. H.; Baltazar-Cervantes, J. C.

    2010-01-01

    -09-03 Procedure for Packing Weather Files for DOE-2e Kee Han Kim Juan-Carlos Baltazar-Cervantes, Ph.D. September 2010 ESL-TR-10-09-03 TABLE OF CONTENTS CHAPTER 1... ................................................................................................................................................. 7 1. OVERVIEW ..................................................................................................................................... 7 2. PROCESS OF PACKING WEATHER DATA FOR DOE-2e SIMULATION ............................... 8 2...

  11. METHOD Open Access A standard variation file format for human

    E-Print Network [OSTI]

    Yandell, Mark

    was originally developed during the human genome project to compare human genome annotations [17]. ImportantlyMETHOD Open Access A standard variation file format for human genome sequences Martin G Reese1 data. The 10Gen dataset, ten human genomes in GVF format, is freely available for com- munity analysis

  12. January 2001 Open File Report 2001-0027 O

    E-Print Network [OSTI]

    Patterson, William P.

    January 2001 Open File Report 2001-0027 O DESKTOP DATABASE COMPILATION OF SACS UNIT INFORMATION, 2001). Acknowledgements for use of this database should refer to the "SACS database compilation prepared by the Council for Geoscience, Pretoria; as documented by Eglington et al. (2001)". This open

  13. Notes on Lgapack Fhp6_simp Params.h file

    E-Print Network [OSTI]

    Sukop, Mike

    Notes on Lgapack Fhp6_simp Params.h file #define NX 16 #define NY 40 #define TPRINT 4000000 #define=(int) dR*cos(phi*2*PI)+XC; nx+ix) = 1; PtrSolid=fopen("disksolid","w"); nx;ix++) nx+ix]);

  14. Optimizing Native Files in Energy.gov for Search Engines

    Broader source: Energy.gov [DOE]

    For native files in Energy.gov on Office of Energy Efficiency and Renewable Energy (EERE) websites, follow these best practices to help them rank higher in commercial search engine results. To learn how to optimize PDFs, see the PDF requirements.

  15. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  16. JENDL Actinoid File 2008 and Plan of Covariance Evaluation

    SciTech Connect (OSTI)

    Iwamoto, O. Nakagawa, T.; Otuka, N.; Chiba, S.; Okumura, K.; Chiba, G.

    2008-12-15

    JENDL Actinoid File 2008 (JENDL/AC-2008), which is one of JENDL special purpose files, was released in March 2008. It provides nuclear data for neutron induced nuclear reactions for actinoid nuclides from Ac (Z=89) to Fm (Z=100). The data for 62 nuclides in JENDL-3.3 were revised and newly evaluated data were added for 17 nuclides that have a half-life longer than 1 day. The energy range of incident neutrons is from 10{sup -5} eV to 20 MeV. The nuclear reaction model code CCONE was widely used for the evaluation of cross sections and energy-angular distributions of secondary neutrons in the fast energy region. Covariance data for the fission and capture cross sections and the number of neutrons per fission will be evaluated for important nuclides in JENDL/AC-2008. The evaluation methods and the preliminary results of estimated covariances are presented.

  17. A program evaluation of on-line file organization methods 

    E-Print Network [OSTI]

    Griffith, Byron James

    1973-01-01

    addresses were extracted from the records and placed in key directories. These different methods of locating records by key information are today known as list structures (5, 6, 3). Although there are many variations of list structuring techniques..., it is helpful to observe two extremes of list structures with most others be1ng combinations of them. The association of key data and DASD addresses permits retrieval of only those records required for processing without requiring a file search (6). Since...

  18. File:03MTEEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale,3IDGTermEasement.pdf Jump to: navigation, search File

  19. File:05NVADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File

  20. File:01ORALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile

  1. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  2. Function Files & 'eul' (1) To Open MATLAB on ITaP Machine: Course ...

    E-Print Network [OSTI]

    2012-09-24

    Course Software ? Standard Software ? Computational Packages. ? MATLAB ? R2012a ? MATLAB R2012a. (2) To Construct and Save a Function File:.

  3. [Composite analysis E-area vaults and saltstone disposal facilities]. PORFLOW and FACT input files

    SciTech Connect (OSTI)

    Cook, J.R.

    1997-09-01

    This diskette contains the PORFLOW and FACT input files described in Appendix B of the accompanying report `Composite Analysis E-Area Vaults and Saltstone Disposal Facilities`.

  4. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  5. Design, implementation, and benchmarking of a file manager for a relational database management system on a raw UNIX disk 

    E-Print Network [OSTI]

    Narayanan, Pudugramam Shanker

    1994-01-01

    The file management component of a database management system (DBMS) has to be tailor designed to meet the performance demands of large database applications. The operating system (OS) file systems are typically not suitable for storing...

  6. Energy Systems Laboratory: Building a Model Repository Collection 

    E-Print Network [OSTI]

    Koenig, Jay; Haberl, Jeff S.; Gilman, Don; Hughes, Sherrie

    2008-06-05

    • Metadata • Upload to Repository • Train replacements • Batch Loading • File structure created • Passed to Digital Initiatives The Model Collection • Well Organized • Self-Sufficient • Diverse • Large • Rapidly Growing Video Interview with Jeff Haberl, PhD ...

  7. Geothermal-energy files in computer storage: sites, cities, and industries

    SciTech Connect (OSTI)

    O'Dea, P.L.

    1981-12-01

    The site, city, and industrial files are described. The data presented are from the hydrothermal site file containing about three thousand records which describe some of the principal physical features of hydrothermal resources in the United States. Data elements include: latitude, longitude, township, range, section, surface temperature, subsurface temperature, the field potential, and well depth for commercialization. (MHR)

  8. Method for data compression by associating complex numbers with files of data values

    DOE Patents [OSTI]

    Feo, J.T.; Hanks, D.C.; Kraay, T.A.

    1998-02-10

    A method for compressing data for storage or transmission is disclosed. Given a complex polynomial and a value assigned to each root, a root generated data file (RGDF) is created, one entry at a time. Each entry is mapped to a point in a complex plane. An iterative root finding technique is used to map the coordinates of the point to the coordinates of one of the roots of the polynomial. The value associated with that root is assigned to the entry. An equational data compression (EDC) method reverses this procedure. Given a target data file, the EDC method uses a search algorithm to calculate a set of m complex numbers and a value map that will generate the target data file. The error between a simple target data file and generated data file is typically less than 10%. Data files can be transmitted or stored without loss by transmitting the m complex numbers, their associated values, and an error file whose size is at most one-tenth of the size of the input data file. 4 figs.

  9. Journaling versus Soft Updates: Asynchronous Metadata Protection in File Margo I. Seltzer + , Gregory R. Ganger * ,

    E-Print Network [OSTI]

    Journaling versus Soft Updates: Asynchronous Meta­data Protection in File Systems Margo I. Seltzer­data operations and recovery: journaling and Soft Updates. Journaling systems use an auxiliary log to record meta moved en masse to journaling file systems, as evidenced by their presence on nearly every server

  10. Journaling versus Soft Updates: Asynchronous Meta-data Protection in File Margo I. Seltzer

    E-Print Network [OSTI]

    Journaling versus Soft Updates: Asynchronous Meta-data Protection in File Systems Margo I. Seltzer-data operations and recovery: journaling and Soft Updates. Journaling systems use an auxiliary log to record meta moved en masse to journaling file systems, as evidenced by their presence on nearly every server

  11. AN AUTOMATED TOOL FOR HDL AND CONFIGURATION FILE GENERATION FROM UML SYSTEM DESCRIPTIONS

    E-Print Network [OSTI]

    Thornton, Mitchell

    An Automated Tool for HDL and Configuration File Generation from UML System Descriptions Advisor: Professor of optimally dividing system functionality between hardware and software. This project uses Unified Modeling#12;AN AUTOMATED TOOL FOR HDL AND CONFIGURATION FILE GENERATION FROM UML SYSTEM DESCRIPTIONS

  12. SANE: Semantic-Aware Namespace in Ultra-Large-Scale File Systems

    E-Print Network [OSTI]

    Zhu, Yifeng

    and efficiency of data access. In almost all today's file systems, the namespace management is based-tree based metadata management scheme used in almost all file systems today [4]. The most important functions exposed the following weaknesses. Weakness 1: Limited system scalability. The directory-based management

  13. Center for Ecological Management of Military Lands 1 Loading Handheld Data Files

    E-Print Network [OSTI]

    Center for Ecological Management of Military Lands 1 Loading Handheld Data Files Understanding the Process Center for Ecological Management of Military Lands No. 10 - 1998 The purpose of this document Data File Requirements Three criteria are checked by the loading program before the import process

  14. Creating, Using and Updating Thesauri Files For AutoMap and ORA

    E-Print Network [OSTI]

    or the U.S. government. #12; Keywords: Automap, ORA, Thesaurus, Universal Thesaurus, Meta-ontology, Domain Thesaurus, Split, Merge, Algorithm. #12;i Abstract AutoMap [1] is text analysis software. Automap uses thesaurus files [1] when creating meta-networks. These thesaurus files are list which allows

  15. Method for data compression by associating complex numbers with files of data values

    DOE Patents [OSTI]

    Feo, John Thomas (Dublin, CA); Hanks, David Carlton (San Ramon, CA); Kraay, Thomas Arthur (Leeburg, VA)

    1998-02-10

    A method for compressing data for storage or transmission. Given a complex polynomial and a value assigned to each root, a root generated data file (RGDF) is created, one entry at a time. Each entry is mapped to a point in a complex plane. An iterative root finding technique is used to map the coordinates of the point to the coordinates of one of the roots of the polynomial. The value associated with that root is assigned to the entry. An equational data compression (EDC) method reverses this procedure. Given a target data file, the EDC method uses a search algorithm to calculate a set of m complex numbers and a value map that will generate the target data file. The error between a simple target data file and generated data file is typically less than 10%. Data files can be transmitted or stored without loss by transmitting the m complex numbers, their associated values, and an error file whose size is at most one-tenth of the size of the input data file.

  16. Check svn for updated files / tests https://svn.cs.umd.edu/repos/geekos/project0

    E-Print Network [OSTI]

    Hollingsworth, Jeffrey K.

    code Check vfs.h TODO Add to mount point operations (why?) #12;fileio.h /* * An entry in an Access of file */ int size; /* size of the file */ unsigned int isUsed:1; /* is entry active */ unsigned int is]; /* ... */ struct VFS_ACL_Entry acls[VFS_MAX_ACL_ENTRIES]; /* ACL entries */ } GOSFSfileNode; #12;ACL system call

  17. An Online Controller Towards Self-Adaptive File System Availability and Performance

    E-Print Network [OSTI]

    Engelmann, Christian

    An Online Controller Towards Self-Adaptive File System Availability and Performance Xin Chen1 availability and high per- formance. Although many fault tolerance technologies have been proposed and used in both commercial and academic distributed file systems to achieve high avail- ability, most of them

  18. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  19. Topological Performance Measures as Surrogates for Physical Flow Models for Risk and Vulnerability Analysis for Electric Power Systems

    E-Print Network [OSTI]

    LaRocca, Sarah; Hassel, Henrik; Guikema, Seth

    2013-01-01

    Critical infrastructure systems must be both robust and resilient in order to ensure the functioning of society. To improve the performance of such systems, we often use risk and vulnerability analysis to find and address system weaknesses. A critical component of such analyses is the ability to accurately determine the negative consequences of various types of failures in the system. Numerous mathematical and simulation models exist which can be used to this end. However, there are relatively few studies comparing the implications of using different modeling approaches in the context of comprehensive risk analysis of critical infrastructures. Thus in this paper, we suggest a classification of these models, which span from simple topologically-oriented models to advanced physical flow-based models. Here, we focus on electric power systems and present a study aimed at understanding the tradeoffs between simplicity and fidelity in models used in the context of risk analysis. Specifically, the purpose of this pa...

  20. Downloading files from Moodle 1) Log into you course using your UCID login and password (http://moodle.njit.edu)

    E-Print Network [OSTI]

    Bieber, Michael

    will ask you whether you want to "Open" or "Save" the file. The exact message will vary depending upon whatPoint. With both browsers, if "Save" is selected, the file will be downloaded to your computer and can then be opened by navigating to and opening the file. #12;Figure 3: Choose "Open" or "Save" 5) Top open a Word

  1. Supplemental Material ReadMe file: A user's guide for the vitality model with initial Gaussian distribution

    E-Print Network [OSTI]

    Washington at Seattle, University of

    Supplemental Material ReadMe file: A user's guide for the vitality model with initial Gaussian distribution parameter fitting routine and the R functions contained in file vitality.gaussian.R. Ting Li and James J. Anderson University of Washington June 11, 2009 The supplemental R file vitality

  2. Resource file: practical publications for energy management, edition III

    SciTech Connect (OSTI)

    Not Available

    1980-03-01

    The Resource File is an in-depth bibliography of 166 practical and action-oriented energy conservation publications and materials. It is a reference tool, designed for Federal, state, and local energy managers or people who are asked to recommend how-to conservation guides to the public. Each listing describes a publication's intended audience and provides a summary of its contents. Included are operations and maintenance manuals, life-cycle costing handbooks, home insulation manuals, films on fuel-saving driving techniques, and courses devoted exclusively to home weatherization. 166 items.

  3. FILE6 STATE OF MISSISSIPPI PROJECT SALMON SITE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and Myers CoMadison -T:..) ".. _,;$,by FILE6

  4. MEMORANDUM I TO: FILE Fi=aP'

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and MyersHr. Anthony V. Andolina:I.) ,' .I TO: FILE

  5. TO: FILE FRml: J&-q Ma

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM: I

  6. File:05NVBSundryNotice (2).pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File5NVBSundryNotice (2).pdf Jump to:

  7. File:06 - ConstructionPermitsOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File5NVBSundryNotice6 -

  8. File:06AKATransportationOversizeOverweight.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to: navigation, search File5NVBSundryNotice6

  9. File:06NVCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1ORDExplorationInjectionPermit (1).pdf Jump to:6NVCDrinkingWaterPermit.pdf Jump to: navigation, search File

  10. File:EIA-PSJ-NW-BOE.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf JumpLIQ.pdf Jump to: navigation, search File

  11. File:EIA-PSJ-NW-GAS.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf JumpLIQ.pdf Jump to: navigation, search FileGAS.pdf

  12. File:Fut oilp 03.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdfgasp 03.pdf Jump to: navigation, search File Fileoilp

  13. File:NREL-brazil-glo.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdfgasp 03.pdfMmpa 2007.pdfglo.pdfFile Edit with form

  14. File:NREL-camdirann.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdfgasp 03.pdfMmpa 2007.pdfglo.pdfFile Editcamdirann.pdf

  15. File:NREL-camdirapr.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdfgasp 03.pdfMmpa 2007.pdfglo.pdfFile

  16. FERC Handbook for Hydroelectric Filings other than Licenses and Exemptions

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH JumpEllenville,PowerEvaporative| Open Energy Information Filings

  17. File:01AKALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP DocumentFD-b

  18. File:01ORALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile FTP1ORALandUseConsiderations.pdf

  19. File:01TXALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile1TXALandUsePlanning.pdf Jump to:

  20. File:01UTALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbHFarinello GeothermalFideris IncFile1TXALandUsePlanning.pdf Jump