Sample records for gila-knob structure access

  1. CX-007151: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Gila-Knob Structure, Access Road Maintenance & Vegetation RemovalCX(s) Applied: B4.6Date: 02/07/2011Location(s): Yuma County, AZ; Imperial County, CA, Arizona, CaliforniaOffice(s): Western Area Power Administration-Desert Southwest Region

  2. CX-007150: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Gila-Knob Structure, Access Road Maintenance & Vegetation RemovalCX(s) Applied: B4.6Date: 08/02/2011Location(s): Yuma County, AZ; Imperial County, CA, Arizona, CaliforniaOffice(s): Western Area Power Administration-Desert Southwest Region

  3. CX-007149: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Gila-Knob Structure, Access Road Maintenance & Vegetation Removal Amendment 1CX(s) Applied: B4.6Date: 02/18/2011Location(s): Yuma County, AZ; Imperial County, CA, Arizona, CaliforniaOffice(s): Western Area Power Administration-Desert Southwest Region

  4. CX-010545: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Gila Knob Transmission Line Crossarm Replacement at Structure 18/3 CX(s) Applied: B4.6 Date: 06/03/2013 Location(s): California Offices(s): Western Area Power Administration-Desert Southwest Region

  5. Structured Video: A Data Type with ContentBased Access

    E-Print Network [OSTI]

    Gifford, David K.

    Structured Video: A Data Type with Content­Based Access Andrzej Duda y Ron Weiss September 1993 MIT: video indexing and searching, video databases, content­ based retrieval, video algebra #12; Abstract We describe structured video, a general video data model allowing free form annotation, composition

  6. Structured Video: A Data Type with Content-Based Access

    E-Print Network [OSTI]

    Gifford, David K.

    Structured Video: A Data Type with Content-Based Access Andrzej Duday Ron Weiss September 1993 MIT or implied, of the Defense Advanced Research Projects Agency or the U.S. Government. #12;Keywords: video indexing and searching, video databases, content- based retrieval, video algebra #12;Abstract We describe

  7. Strongly Secure Ramp Secret Sharing Schemes for General Access Structures

    E-Print Network [OSTI]

    Yamamoto, Hirosuke

    Strongly Secure Ramp Secret Sharing Schemes for General Access Structures Mitsugu Iwamoto 1 , Hirosuke Yamamoto 2 Abstract Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even

  8. Secret sharing schemes on access structures with intersection number equal to one

    E-Print Network [OSTI]

    Secret sharing schemes on access structures with intersection number equal to one Jaume Mart important problems in secret sharing. These problems are studied in this paper for access structures on the optimal information rate are provided for the non-ideal case. Keywords. Cryptography; secret sharing

  9. Scalla: Structured Cluster Architecture for Low Latency Access

    SciTech Connect (OSTI)

    Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

    2012-03-20T23:59:59.000Z

    Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

  10. PROCEEDINGS Open Access Characterising RNA secondary structure space

    E-Print Network [OSTI]

    Schierup, Mikkel Heide

    -pseudoknotted secondary structure prediction. Thermodynamic optimisation based on minimising free-energy functions has evolutionary information from RNA alignments to increase prediction accuracy. The model is often described secondary structures produced for RNA alignments by a phylo-SCFG, and implement it for the PPfold model. We

  11. User Effort and Network Structure Mediate Access to Information in Networks

    E-Print Network [OSTI]

    Kang, Jeon-Hyung

    2015-01-01T23:59:59.000Z

    Individuals' access to information in a social network depends on its distributed and where in the network individuals position themselves. However, individuals have limited capacity to manage their social connections and process information. In this work, we study how this limited capacity and network structure interact to affect the diversity of information social media users receive. Previous studies of the role of networks in information access were limited in their ability to measure the diversity of information. We address this problem by learning the topics of interest to social media users by observing messages they share online with their followers. We present a probabilistic model that incorporates human cognitive constraints in a generative model of information sharing. We then use the topics learned by the model to measure the diversity of information users receive from their social media contacts. We confirm that users in structurally diverse network positions, which bridge otherwise disconnected...

  12. Point and find: the intuitive user experience in accessing spatially structured dialect dictionaries

    E-Print Network [OSTI]

    Wandl-Vogt, Eveline

    2010-02-01T23:59:59.000Z

    35 Point and find: the intuitive user experience in accessing spatially structured dialect dictionaries eveline wanDl-voGt Institut fr sterreichische Dialekt- und Namenlexika (I DINAMLEX), Wohllebengasse 12-14/2, A 1040 Wien..., Eveline.Wandl-Vogt@oeaw.ac.at ?lanek predstavlja dolgoro?ni projekt izdelave avstrijskega akademskega nare?nega slovarja bavarskih nare?ij v Avstriji Wrterbuch der bairischen Mundarten in sterreich (WB). Projekt DB Datenbank der bairischen...

  13. Web Accessibility Accessibility

    E-Print Network [OSTI]

    Oklahoma, University of

    Web Accessibility #12;Accessibility Webaim This is a pre-y prolific site that vary based on the type of web content. StaFc, content managed and dynamic web sites can benefit from our accessibility review service. Rich media

  14. Gila to North Gila Transmission Line Rebuild

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the new APS line. Western's land action entails acquiring up to an additional 50 feet right-of-way adjacent to the existing Gila Knob ROW, transferring a portion of the Gila...

  15. A Web-Accessible Protein Structure Prediction Pipeline Michael S. Lee

    E-Print Network [OSTI]

    atomic structures. The pipeline was designed to be used with high performance computing clusters is currently installed at the Department of Defense (DoD) Maui High Performance Computing CenterD High Performance Computing Modernization Program Users Group Conference 978-0-7695-3946-1/10 $26

  16. Effect of hydrogel particle additives on water-accessible pore structure of sandy soils: A custom pressure plate apparatus and capillary bundle model

    E-Print Network [OSTI]

    Y. Wei; D. J. Durian

    2013-04-30T23:59:59.000Z

    To probe the effects of hydrogel particle additives on the water-accessible pore structure of sandy soils, we introduce a custom pressure plate method in which the volume of water expelled from a wet granular packing is measured as a function of applied pressure. Using a capillary bundle model, we show that the differential change in retained water per pressure increment is directly related to the cumulative cross-sectional area distribution $f(r)$ of the water-accessible pores with radii less than $r$. This is validated by measurements of water expelled from a model sandy soil composed of 2 mm diameter glass beads. In particular, the expelled water is found to depend dramatically on sample height and that analysis using the capillary bundle model gives the same pore size distribution for all samples. The distribution is found to be approximately log-normal, and the total cross-sectional area fraction of the accessible pore space is found to be $f_0=0.34$. We then report on how the pore distribution and total water-accessible area fraction are affected by superabsorbent hydrogel particle additives, uniformly mixed into a fixed-height sample at varying concentrations. Under both fixed volume and free swelling conditions, the total area fraction of water-accessible pore space in a packing decreases exponentially as the gel concentration increases. The size distribution of the pores is significantly modified by the swollen hydrogel particles, such that large pores are clogged while small pores are formed.

  17. Vehicle barrier with access delay

    DOE Patents [OSTI]

    Swahlan, David J; Wilke, Jason

    2013-09-03T23:59:59.000Z

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  18. ACCESS 2010 Level 1 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and modify new databases. Course Goals: Identify the basic components of an Access database. Build the structure of a database. Manage data in tables. Query a database. Design...

  19. Remote File Access 2010

    E-Print Network [OSTI]

    University of Technology, Sydney

    Remote File Access 2010 Mac Users Guide #12;Remote File Access: MAC Users Guide 2010 2 Table Remote File Access 11 Part IV: Using Remote File Access 15 Part V: FAQ 24 #12;Remote File Access: MAC Users Guide 2010 3 1. What is Remote File Access? UTS Remote File Access service is provided to enable

  20. Accessing PDSF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean WaterAccessing HPSS

  1. Open Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTest and Evaluation |quasicrystals65 (9/12) Page 1 of

  2. OPEN ACCESS

    E-Print Network [OSTI]

    Thomas F. Kresina; Robert Lubran

    Abstract: Providing access to and utilization of medication assisted treatment (MAT) for the treatment of opioid abuse and dependence provides an important opportunity to improve public health. Access to health services comprising MAT in the community is fundamental to achieve broad service coverage. The type and placement of the health services comprising MAT and integration with primary medical care including human immunodeficiency virus (HIV) prevention, care and treatment services are optimal for addressing both substance abuse and co-occurring infectious diseases. As an HIV prevention intervention, integrated (same medical record for HIV services and MAT services) MAT with HIV prevention, care and treatment programs provides the best one stop shopping approach for health service utilization. Alternatively, MAT, medical and HIV services can be separately managed but co-located to allow convenient utilization of primary care, MAT and HIV services. A third approach is coordinated care and treatment, where primary care, MAT and HIV services are provided at distinct locations and case managers, peer facilitators, or others promote direct service utilization at the various locations. Developing a continuum of care for patients with opioid dependence throughout

  3. Querying Schemas With Access Restrictions

    E-Print Network [OSTI]

    Benedikt, Michael; Ley, Clemens

    2012-01-01T23:59:59.000Z

    We study verification of systems whose transitions consist of accesses to a Web-based data-source. An access is a lookup on a relation within a relational database, fixing values for a set of positions in the relation. For example, a transition can represent access to a Web form, where the user is restricted to filling in values for a particular set of fields. We look at verifying properties of a schema describing the possible accesses of such a system. We present a language where one can describe the properties of an access path, and also specify additional restrictions on accesses that are enforced by the schema. Our main property language, AccLTL, is based on a first-order extension of linear-time temporal logic, interpreting access paths as sequences of relational structures. We also present a lower-level automaton model, Aautomata, which AccLTL specifications can compile into. We show that AccLTL and A-automata can express static analysis problems related to "querying with limited access patterns" that h...

  4. CX-011203: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Emergency Storm Damage Repairs to the Gila North Gila, Gila Knob, and Sonora San Luis Transmission Lines, near Yuma, Yuma County, Arizona CX(s) Applied: B4.6 Date: 08/26/2013 Location(s): Arizona Offices(s): Western Area Power Administration-Desert Southwest Region

  5. Capital Access Program (Vermont)

    Broader source: Energy.gov [DOE]

    The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

  6. BUILDING MANAGEMENT & RESTRICTED ACCESS

    E-Print Network [OSTI]

    Johnston, Daniel

    BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

  7. Open Access Task Force Open Access to

    E-Print Network [OSTI]

    Jiang, Huiqiang

    Libraries Initiative launched by National Science Foundation; Social Sciences Research Network (SSRN Library System rgmiller@pitt.edu #12;Open Access Task Force Open Access is... A family of copyright The only constraint on reproduction and distribution, and the only role for copyright in this domain

  8. Accessibility to dental services

    E-Print Network [OSTI]

    Evenden, Craig Andrew

    2007-08-15T23:59:59.000Z

    . Accessibility indexes need to be developed that incorporate a number of characteristics that are currently affecting accessibility to dental services. More research needs to be conducted at a local level to provide better advice to health planners and policy...

  9. Analysis of Substrate Access to Active Sites in Bacterial Multicomponent Monooxygenase Hydroxylases: X-Ray Crystal Structure of Xenon-Pressurized Phenol Hydroxylase from Pseudomonas Sp Ox1

    E-Print Network [OSTI]

    McCormick, Michael S.

    In all structurally characterized bacterial multicomponent monooxygenase (BMM) hydroxylase proteins, a series of hydrophobic cavities in the ?-subunit trace a conserved path from the protein exterior to the carboxylate-bridged ...

  10. Demystifying Open Access

    SciTech Connect (OSTI)

    Mele, Salvatore

    2007-05-14T23:59:59.000Z

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  11. Identity and Access Management: Access Management Survey 1 Access Management Survey Questions

    E-Print Network [OSTI]

    Maroncelli, Mark

    Identity and Access Management: Access Management Survey 1 Access Management Survey Questions has developed a survey to solicit your input for Access Management. Please take a moment to complete be submitted by Friday May 14, 2010. #12;Identity and Access Management: Access Management Survey 2 Group

  12. Internet architecture Access networks

    E-Print Network [OSTI]

    access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

  13. ATLAS Data Access Policy

    E-Print Network [OSTI]

    The ATLAS collaboration

    2015-01-01T23:59:59.000Z

    ATLAS has fully supported the principle of open access in its publication policy. This document outlines the policy of ATLAS as regards open access to data at different levels as described in the DPHEP model. The main objective is to make the data available in a usable way to people external to the ATLAS collaboration.

  14. Access Management Software Requirements Specification

    E-Print Network [OSTI]

    Maroncelli, Mark

    with a digital identity record. Attributes may be general or personal. A subset of all attributes defines. IAM Defined #12; Access to Protected Library Resources Library Staff Access to Integrated Library System Access to Library Public Workstations HMC Affiliate Access to Library Resources Access

  15. access study access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  16. Special Access Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-03-29T23:59:59.000Z

    This Order is for OFFICIAL USE ONLY and will not be distributed on the Directives' Portal. For distribution, please contact the Executive Secretary of the Special Access Program Oversight Committee at (202) 586-3345. Does not cancel other directives.

  17. Virginia Capital Access Program (Virginia)

    Broader source: Energy.gov [DOE]

    The Virginia Capital Access Program (CAP), in partnership with Virginias Small Business Financing Authority, provides access to capital for small businesses. Businesses must apply to...

  18. Capital Access Program (CAP) (Michigan)

    Broader source: Energy.gov [DOE]

    The Capital Access Program (CAP), utilizes public resources to generate private financing for small business in Michigan seeking access to capital. Funding from the Michigan Strategic Fund is...

  19. A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous

    E-Print Network [OSTI]

    Keinan, Alon

    A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources1 of resources such as computing resources, storage resources, instrument resources, data resources, etc. However, because of the differences of formats, descriptions, structures, and access modes of these resources, grid

  20. Accessing HPSS at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean WaterAccessing HPSS Accessing

  1. Process and Intermediate Calculations User AccessInputs Outputs

    E-Print Network [OSTI]

    Process and Intermediate Calculations User AccessInputs Outputs Fire Behavior & Probability STARFire System Flow Valuation Processing Temporal Schedules Smoke Zones Zone impact Emissions Fire and compare Valuation (Structured Elicit Process) 1) Value Layers: Point (housing, cultural trees, etc

  2. Library Guide Access ... 3

    E-Print Network [OSTI]

    Steiner, Ullrich

    ____________________________ Library Guide 2014-2015 #12;Contents Access ... 3 Finding things ... 4-6 Layout and classification... 7 Floor plans ... 8-9 Borrowing things ... 10 Renewing and returning things;Sidney Sussex Library Guide 2014-2015 Welcome to the Richard Powell Library Tel: (01223) 338852 e

  3. Library Guide Access ... 3

    E-Print Network [OSTI]

    Steiner, Ullrich

    ____________________________ Library Guide 2012-2013 #12;Contents Access ... 3 Finding things ... 4-6 Layout and classification... 7 Floor plans ... 8-9 Borrowing things ... 10 Renewing and returning things;Sidney Sussex Library Guide 2012-2013 Welcome to the Richard Powell Library Tel: (01223) 338852 e

  4. Accessibility-based transit planning

    E-Print Network [OSTI]

    Busby, Jeffrey R

    2004-01-01T23:59:59.000Z

    A method for evaluating transit planning proposals using accessibility metrics is advanced in this research. A transit-accessibility model is developed intended for use by in-house transit agency planning staff as a ...

  5. Property Verification for Access Control Models via Model Checking1 Vincent C. Hu1

    E-Print Network [OSTI]

    Young, R. Michael

    Property Verification for Access Control Models via Model Checking1 Vincent C. Hu1 , D. Richard. In this paper, we propose a new general approach for property verification for access control models via model checking. The approach defines a standardized structure for access control models, providing for both

  6. Role-Based Access Controls

    E-Print Network [OSTI]

    Ferraiolo, David F

    2009-01-01T23:59:59.000Z

    While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC.

  7. Access for All

    E-Print Network [OSTI]

    Stearns, Linda Lea Merenda

    2012-07-16T23:59:59.000Z

    ?s Algebra 1 final grades to examine correlation with the students? grade in Algebra. Each scatter plot contained a solid linear regression line and a dashed line, y = x. The data points with a square shape represent the scores of students who were Waived... classes in a central Texas school district to determine if there is fair and equitable access for all students. The paper contains two major components. The first is quantitative study of the four entrance requirements for 8th grade Algebra I Pre-AP at a...

  8. LANL access restrictions lifted

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as ReadyAppointedKyungmin Ham, Ph.D.access restrictions

  9. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In theACME -ToggleAccess to the ALS Print

  10. Accessibility | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In theACME -ToggleAccess to the ALS

  11. Pennsylvania Capital Access Program (Pennsylvania)

    Broader source: Energy.gov [DOE]

    The Pennsylvania Capital Access Program provides loan guarantees for all businesses for the purchase of land, buildings, machinery, equipment and working capital through participating banks. The...

  12. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  13. A quantum access network

    E-Print Network [OSTI]

    Bernd Frhlich; James F. Dynes; Marco Lucamarini; Andrew W. Sharpe; Zhiliang Yuan; Andrew J. Shields

    2014-09-02T23:59:59.000Z

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realising multi-user QKD networks with resource efficiency and brings QKD closer to becoming the first widespread technology based on quantum physics.

  14. Access Digital Library, Search, News and more

    E-Print Network [OSTI]

    Goodrich, Lisa V.

    [General] Access Digital Library, Search, News and more [Education] Access MyCourses content [Research] Access Digital Library, NCBI Blast and more [Personal] Access your portable bookmarks using My and 500 textbooks via the Digital Library, one click access to NCBI Blast sequence databases. [General

  15. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  16. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  17. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  18. access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  19. accessibility: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  20. Dynamic, Flexible, and Optimistic Access Control

    E-Print Network [OSTI]

    Peisert, Sean; Bishop, Matt

    2013-01-01T23:59:59.000Z

    and N. Dulay. Rumpole: A Flexible Break-Glass Access ControlDynamic, Flexible, and Optimistic Access Control Seannor are they intended to be flexible enough to reduce access

  1. SciTech Connect: Achievements of structural genomics

    Office of Scientific and Technical Information (OSTI)

    Achievements of structural genomics Citation Details In-Document Search Title: Achievements of structural genomics You are accessing a document from the Department of Energy's...

  2. Florida Capital Access Program (Florida)

    Broader source: Energy.gov [DOE]

    The Florida Capital Access Program, run by the Florida Department of Economic Development, is a loan portfolio insurance program enabling lenders to make loans to credit-worthy small businesses. ...

  3. Access Business Systems | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Business Systems Dash provides access to select Argonne business systems without VPN. Dash is a secure platform, based on Citrix, for accessing Argonne business systems. Dash is...

  4. REVIEW Open Access Diagnosis of genital herpes simplex virus

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    REVIEW Open Access Diagnosis of genital herpes simplex virus infection in the clinical laboratory Jrme LeGoff1* , Hlne Pr2,3 and Laurent Blec2,3 Abstract Since the type of herpes simplex virus antiviral therapy. Keywords: Herpes simplex virus, Genital herpes, Diagnosis Introduction Key structure

  5. RESEARCH ARTICLE Open Access Raman characterization of Avocado Sunblotch

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    RESEARCH ARTICLE Open Access Raman characterization of Avocado Sunblotch viroid and its response of plants. To date the structural and conformational details of the cleavage of Avocado sunblotch viroid and they do not code for any protein. Viroids are divided into two families, the Avsunviroidae such as Avocado

  6. Accessing Heritage Documents according to Space Criteria within Digital Libraries

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    1 Accessing Heritage Documents according to Space Criteria within Digital Libraries Christophe, Geographic Information Retrieval and Visualization, Non-Structured Documents, Digital Libraries, Cultural on digital libraries and proposes to extend the basic services of existing Library Management System with new

  7. RESEARCH ARTICLE Open Access Bioinformatics analysis of disordered

    E-Print Network [OSTI]

    Obradovic, Zoran

    RESEARCH ARTICLE Open Access Bioinformatics analysis of disordered proteins in prokaryotes Gordana Beljanski3 Abstract Background: A significant number of proteins have been shown to be intrinsically disordered, meaning that they lack a fixed 3 D structure or contain regions that do not posses a well defined

  8. Ideal Secret Sharing Schemes: Yet Another Combinatorial Characterization, Certain Access

    E-Print Network [OSTI]

    Fuji-Hara, Ryoh

    Ideal Secret Sharing Schemes: Yet Another Combinatorial Characterization, Certain Access Structures secret sharing scheme is a method of sharing a secret key in some key space among a finite set of participants in such a way that only the authorized subsets of participants can reconstruct the secret key from

  9. A Role-involved Conditional Purpose-based Access Control Model

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    control to achieve database security and available in database management systems. The structure helps. Access control is the process of limiting access to the re- sources of a system only to authorized users a secure privacy policy to remove the fear of customers. Thus in an internal management system, a reliable

  10. Identity, Credential, and Access Management (ICAM)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-02-19T23:59:59.000Z

    To establish requirements and responsibilities for DOE identity, credential, and access management program.

  11. LOCH: Open Access Implementation Responsibility Matrix

    E-Print Network [OSTI]

    Krzak, Anna

    2015-02-05T23:59:59.000Z

    Draft Responsibility Matrix for College of Medicine and Veterinary Medicine for REF Open Access requirements implementation.

  12. 2020 Vision The Trinity Access Programmes

    E-Print Network [OSTI]

    O'Mahony, Donal E.

    2020 Vision The Trinity Access Programmes Strategic Plan to 2020 #12;2020 VISION - THE TRINITY ACCESS PROGRAMMES STRATEGIC PLAN TO 20202020 VISION - THE TRINITY ACCESS PROGRAMMES STRATEGIC PLAN TO 2020 Trinity Access Programmes "Our vision for 2014 is of a university providing further leadership

  13. AVLIS industrial access program

    SciTech Connect (OSTI)

    Not Available

    1984-11-15T23:59:59.000Z

    This document deals with the procurements planned for the construction of an Atomic Vapor Laser Isotope Separation (AVLIS) production plant. Several large-scale AVLIS facilities have already been built and tested; a full-scale engineering demonstration facility is currently under construction. The experience gained from these projects provides the procurement basis for the production plant construction and operation. In this document, the status of the AVLIS process procurement is presented from two viewpoints. The AVLIS Production Plant Work Breakdown Structure is referenced at the level of the items to be procured. The availability of suppliers for the items at this level is discussed. In addition, the work that will result from the AVLIS enrichment plant project is broken down by general procurement categories (construction, mechanical equipment, etc.) and the current AVLIS suppliers are listed according to these categories. A large number of companies in all categories are currently providing AVLIS equipment for the Full-Scale Demonstration Facility in Livermore, California. These companies form an existing and expanding supplier network for the AVLIS program. Finally, this document examines the relationship between the AVLIS construction project/operational facility and established commercial suppliers. The goal is to utilize existing industrial capability to meet the needs of the project in a competitive procurement situation. As a result, costs and procurement risks are both reduced because the products provided come from within the AVLIS suppliers' experience base. At the same time, suppliers can benefit by the potential to participate in AVLIS technology spin-off markets. 35 figures.

  14. Open Source in accessibility analyses Open Source in accessibility analyses

    E-Print Network [OSTI]

    Kbben, Barend

    petrol station accessibility in Germany by Stefan Neumeier Johann Heinrich von Thnen-Institut, Federal The paper relates two closely intertwined story lines. A socioeconomic one concentrating on street petrol- sibility of street petrol stations as one core service of general interest important for the overall

  15. California State University, Fullerton Human Resources Access Request Form

    E-Print Network [OSTI]

    de Lijser, Peter

    Resources Access Request Form ** CISO Signature Date Employee Name Date Date I certify that this access

  16. open access journal Public Health

    E-Print Network [OSTI]

    Oakley, Jeremy

    open access journal Journal of Public Health in AfricaeISSN 2038-9930 i www the Journal of Public Health in Africa is a peer-reviewed, electronic quarterly, that focuses on health issues in the African continent. The journal editors seek high quality original articles on public health related issues

  17. Boston solar retrofits: studies of solar access and economics

    SciTech Connect (OSTI)

    Shapiro, M.

    1980-11-01T23:59:59.000Z

    Studies of solar access and solar retrofit economics are described for residential applications in the City of Boston. The study of solar access was based upon a random sample of 94 buildings; the sample was stratified to ensure a broad geographic representation from the city's various sections. Using available data on the heights and orientations of the sampled structures and surrounding buildings, each building's hourly access to sunlight was computed separately for the roof and south facing walls. These data were then aggregated by broad structural classifications in order to provide general measures of solar access. The second study was a comparative analysis of the economics of several solar heating and hot water systems. An active hot water system, installed using pre-assembled, commercially purchased equipment, was selected as a reference technology. A variety of measures of economic performance were computed for this system, with and without existing tax credits and under various financing arrangements. Next, a number of alternative approaches for solar space and water heating were identified from interviews with individuals and groups involved in solar retrofit projects in the Boston area. The objective was to identify approaches that many of those interviewed believe to be low-cost means of applying solar energy in residential settings. The approaches selected include thermal window covers, wall collectors, bread box water heaters, and sun spaces. Preliminary estimates of the performance of several representative designs were developed and the economics of these designs evaluated.

  18. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean Water Innovations

  19. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Become agovEducationWelcome FinancialScience at

  20. Site Access Policy | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Access Policy All visitors to Argonne require appropriate authorization before they are allowed on the Argonne site. For information regarding site access for a U.S. citizen...

  1. City of Boulder- Solar Access Ordinance

    Broader source: Energy.gov [DOE]

    The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

  2. Metropolitan Accessibility and Transportation Sustainability:Sustainability

    E-Print Network [OSTI]

    Papalambros, Panos

    Metropolitan Accessibility and Transportation Sustainability:Sustainability: Comparative Reduce (fulfillment of)Promote Sustainability: Meet needs of (fulfillment of) needs present Institute SMART Sustainable Mobility and Accessibility Research andSMART Sustainable Mobility

  3. Alexandria Digital Library Project Content Access Characterization

    E-Print Network [OSTI]

    Jane, Greg

    Alexandria Digital Library Project Content Access Characterization in Digital Libraries Greg Jane James Frew David Valentine University of California, Santa Barbara #12;Alexandria Digital Library environments e.g., GIS #12;Alexandria Digital Library Project Jane, Frew, Valentine Content Access

  4. Argonne Site Access | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Site Access Argonne National Laboratory is a controlled-access facility. You will need a visitor's pass or a user badge to enter the Argonne campus. You must notify us of...

  5. Fast Access Data Acquisition System

    SciTech Connect (OSTI)

    Dr. Vladimir Katsman

    1998-03-17T23:59:59.000Z

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  6. Subject Access to Your Information

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Subject Access to Your Information Sandy Tucker Texas A&M University Libraries August 1, 2006 Second International Symposium on Transportation Technology Transfer Introduction You have packages ? books, pamphlets, files, electronic documents. You... have records of packages ? cards or an online database. Other? We?re talking about adding subject information to the records of packages. Specifically, we?ll talk about using a ?controlled vocabulary.? Controlled Vocabulary Using a fixed list...

  7. Human Resources Security Access Matrix Function Training

    E-Print Network [OSTI]

    Wu, Shin-Tson

    June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

  8. Revised Spring 2008 NIH Public Access Policy

    E-Print Network [OSTI]

    Revised Spring 2008 NIH Public Access Policy Notice Number: NOT-OD-08-033 - (See Notice NOT-OD-08-161 (Consolidated Appropriations Act, 2008), the NIH voluntary Public Access Policy (NOT-OD-05-022) is now mandatory shall implement the public access policy in a manner consistent with copyright law. Specifics 1. The NIH

  9. AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE

    E-Print Network [OSTI]

    Oregon, University of

    AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

  10. Instructions for Accessing FedConnect Postings, June 30, 2009...

    Broader source: Energy.gov (indexed) [DOE]

    Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings and...

  11. Acronyms A AAAP Accelerated Access Authorization Program ACREM...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    S S Secret SRD SecretRestricted Data SAACS Security Alarm and Access Control System SAP Special Access Program SAPOC Special Access Program Oversight Committee SC Office...

  12. Administrative Access Policy Exception Process & Request Form Administrative Access Policy Exception Process

    E-Print Network [OSTI]

    Arnold, Jonathan

    Administrative Access Policy ­ Exception Process & Request Form (Page 1) Administrative Access Policy ­ Exception Process Administrative Access Policy Overview According to the Franklin College Administrative Access Policy , all IT devices with a UGA control number will be setup with user

  13. Subject Access to Your Information

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Lists Transportation Research Thesaurus Your own list Use a Short List or a Long List of Terms? If you have a small collection, a short list of terms is appropriate. If you have a large collection, a longer list of more specific terms..., such as the Transportation Research Thesaurus, may be helpful. Longer list will help describe your packages in more specific ways. Subject Access to Other Kinds of Information People ? Expertise Groups of People Projects Equipment, Facilities Use the same set of subject...

  14. Laboratory Access | Sample Preparation Laboratories

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home asLCLS ExperimentalFiveVentureFrontiers inAccess

  15. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote Access Ames Laboratory

  16. 1486 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 51, NO. 9, SEPTEMBER 2006 Accessibility of Switched Linear Systems

    E-Print Network [OSTI]

    Wang, Yuan

    the controllability of switched linear sys- tems. The structure of accessibility Lie algebra is revealed. Some accessi or normal) controllability of a large class of switched linear systems are obtained. Index Terms--Accessibility, controllability, Lie algebra, switched linear system. I. INTRODUCTION Consider a switched linear system _x(t) = A

  17. 2005 International Conference on Wireless Networks, Communications and Mobile Computing Optimal Power Control for Multiple Access Channel

    E-Print Network [OSTI]

    Chen, Rong-Rong

    Power Control for Multiple Access Channel with Peak and Average Power Constraints Rong-Rong Chen}I@ece.utah.edu Abstract- In this paper, we study optimal power control for multiple access channel with peak and average and the receiver. We characterize the structures of the optimal power control policy and show that the optimal

  18. automotive structural composites: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Page Last Page Topic Index 1 Mechanistic Effects of Porosity on Structural Composite Materials. Open Access Theses and Dissertations Summary: ??As fiber reinforced composites...

  19. automotive structural composite: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Page Last Page Topic Index 1 Mechanistic Effects of Porosity on Structural Composite Materials. Open Access Theses and Dissertations Summary: ??As fiber reinforced composites...

  20. aerospace composite structures: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sbester, Andrs 9 Mechanistic Effects of Porosity on Structural Composite Materials. Open Access Theses and Dissertations Summary: ??As fiber reinforced composites...

  1. aerospace structural composites: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sbester, Andrs 9 Mechanistic Effects of Porosity on Structural Composite Materials. Open Access Theses and Dissertations Summary: ??As fiber reinforced composites...

  2. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  3. Structuring Access to a Dynamic Collection of Digital Documents

    E-Print Network [OSTI]

    Francisco-Revilla, Luis

    for managing dynamic collections of digital documents. These directories are not physically present in the file by their location in the document hierarchy. Most file systems are created and managed by trained system collections of documents are manageable, users find it difficult to remember long paths to documents

  4. Accessing graphic information: Challenges of tomorrow

    SciTech Connect (OSTI)

    Frazer, G. Jr. [Power System Engineering, Inc., Madison, WI (United States). AM/FM Service Div.

    1995-12-31T23:59:59.000Z

    During the justification process of AM/FM projects, utilities seek to find as many benefits as possible using AM/FM technology. In many cases the ultimate benefit of simply providing users the ability to access the digital information is overlooked. This paper outlines why access may be overlooked, why providing access is important and what kind of tool is needed in the long term.

  5. SLAC All Access: Laser Labs

    SciTech Connect (OSTI)

    Minitti, Mike; Woods Mike

    2013-03-01T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  6. SLAC All Access: Laser Labs

    ScienceCinema (OSTI)

    Minitti, Mike; Woods Mike

    2014-06-03T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  7. Characterizing Open Access Publishing at Your Institution

    E-Print Network [OSTI]

    Hubbard, David E.; Li, Yu

    2014-11-03T23:59:59.000Z

    Medical Library, 2008) Open Access (OA) digital, online, free of charge, and free of most copyright and licensing restrictions. (Suber, 2012, p. 4) Flavors of Open Access Gold: provide immediate open access, peer reviewed; authors retain copyright...://becker.wustl.edu/services/scholarly/whatis.html. Ali, A., Shah, T. A., & Mirza, I. Z. (2011). Open Access Research Output of the University of Kashmir. Trends in Information Management, 7(2), 237-243. Amos, K., Mower, A., James, M. A., Weber, A., Yaffe, J., & Youngkin, M. (2012). Exploring...

  8. International Electricity Trade - Open Access | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    DOE has consistently expressed its policy that international electricity trade should be subject to the same principles of comparable open access and non-discrimination that apply...

  9. The Ohio Capital Access Program (OCAP) (Ohio)

    Broader source: Energy.gov [DOE]

    The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business...

  10. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Pacific Ocean Science & Technology Kuykendall Annex Information Technology Center Krauss Hall Holmes HallStairs Pond UH Parking Access & Mid-Pacific Institute Exit Dole Street Offices Multipurpose

  11. Access Control for SAR Systems Stephen Quirolgico

    E-Print Network [OSTI]

    Access Control for SAR Systems Stephen Quirolgico Vincent Hu Tom Karygiannis NIST IR 7815 #12;NIST Systems Stephen Quirolgico Vincent Hu Tom Karygiannis Computer Security Division Information Technology

  12. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified...

  13. Molecular accessibility in oxidized and dried coals. Quarterly report

    SciTech Connect (OSTI)

    Kispert, L.D.

    1995-06-01T23:59:59.000Z

    The objective of this research project is to determine the molecular and structural changes that occur in swelled coal as a result of oxidation and moisture loss both in the presence and absence of light using the newly developed EPR spin probe method. The proposed study will make it possible to deduce the molecular accessibility distribution in swelled, oxidized APCS coal for each rank as a function of (1) size (up to 6 nm) and shape, (2) the relative acidic/basic reactive site distributions, and (3) the role of hydrogen bonding as a function of swelling solvents. The advantage of the EPR method is that it permits molecules of selected shape, size and chemical reactivity to be used as probes of molecular accessible regions of swelled coal. From such data an optimum catalyst can be designed to convert oxidized coal into a more convenient form and methods can be devised to lessen the detrimental weathering processes.

  14. Academic Libraries and Open Access: Policies, Services and Resources for Increasing Access to Scholarship

    E-Print Network [OSTI]

    Rosenblum, Brian

    2010-07-06T23:59:59.000Z

    This presentation will focus on emerging roles for academic libraries in supporting access to scholarship through open access policies and practices. The University of Kansas recently became the first public university in ...

  15. Web Accessibility Office of Diversity and Inclusion

    E-Print Network [OSTI]

    Jones, Michelle

    Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

  16. AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS

    E-Print Network [OSTI]

    Samarati, Pierangela

    - ever, XML-based graphics formats such as the Scalable Vector Graphics (SVG) standard are becoming by means of new XML-based standards such as the World Wide Web Consortium's Scalable Vector Graphics (SVG controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector

  17. A Hardware Approach for Trusted Access and

    E-Print Network [OSTI]

    Global is prohibited. IntroductIon In computer systems, access control models management in the database context, trying to ABStrAct ThischapteradvocatestheconvergencebetweenAccessControl(AC)models. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must

  18. Interactive Database Access with Statistics and Graphics

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    DbAccess The Manual Interactive Database Access with Statistics and Graphics Version 2.1.1 D. M and graphical needs of NSTX Physicists. Flexible views and joins are possible, including options for complex SQL General Atomics (GA Plot Objects) adds extensive graphical and interactive capabilities (and documentation

  19. Usability and Accessibility in Consumer Health Informatics

    E-Print Network [OSTI]

    Shneiderman, Ben

    Usability and Accessibility in Consumer Health Informatics Current Trends and Future Challenges, for innovative eHealth systems to have true value and impact, they must first and foremost be usable challenges in the usability and accessibility of consumer health informatics will be described. Consumer

  20. National Radiobiology Archives Distributed Access user's manual

    SciTech Connect (OSTI)

    Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

    1991-11-01T23:59:59.000Z

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

  1. University Library Fact Sheet Sconul Access

    E-Print Network [OSTI]

    Brierley, Andrew

    University Library Fact Sheet Sconul Access Opening Hours Please consult the library website for our current opening hours: http://www.st-andrews.ac.uk/library/ Library Cards To borrow books and access the Library you must bring your card with you to the library on each visit. Please notify

  2. Database Hints for Readex's AccessUN

    E-Print Network [OSTI]

    Stowell, Michael

    Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

  3. Locally Accessible Information and Distillation of Entanglement

    E-Print Network [OSTI]

    Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

    2004-03-18T23:59:59.000Z

    A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  4. Foreign National Access to DOE Cyber Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-01T23:59:59.000Z

    DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

  5. Structured wafer for device processing

    SciTech Connect (OSTI)

    Okandan, Murat; Nielson, Gregory N

    2014-11-25T23:59:59.000Z

    A structured wafer that includes through passages is used for device processing. Each of the through passages extends from or along one surface of the structured wafer and forms a pattern on a top surface area of the structured wafer. The top surface of the structured wafer is bonded to a device layer via a release layer. Devices are processed on the device layer, and are released from the structured wafer using etchant. The through passages within the structured wafer allow the etchant to access the release layer to thereby remove the release layer.

  6. Structured wafer for device processing

    DOE Patents [OSTI]

    Okandan, Murat; Nielson, Gregory N

    2014-05-20T23:59:59.000Z

    A structured wafer that includes through passages is used for device processing. Each of the through passages extends from or along one surface of the structured wafer and forms a pattern on a top surface area of the structured wafer. The top surface of the structured wafer is bonded to a device layer via a release layer. Devices are processed on the device layer, and are released from the structured wafer using etchant. The through passages within the structured wafer allow the etchant to access the release layer to thereby remove the release layer.

  7. DEC VAX remote access to Applicon AGS data

    SciTech Connect (OSTI)

    Harris, D.D.

    1986-03-01T23:59:59.000Z

    This package was developed to eliminate transfer of magnetic tapes between the Applicon CAD system and the VAX-based CAD data post-processor. This was accomplished using a DECnet link between the VAX and the Applicon machine. DEC net is used to transfer data under control of programs running on the VAX A server program, written in MACRO-11, runs on the Applicon to provide access to the specialized Applicon file structure. Using this software package, a VAX user can view a directory of the Applicon database and transfer selected files from the Applicon to the VAX. (WRL)

  8. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  9. Hybrid Access Control Mechanism in Two-Tier Femtocell Networks

    E-Print Network [OSTI]

    Mantravadi, Sirisha 1987-

    2012-08-21T23:59:59.000Z

    remains a challenge. Decentralized strategies such as femtocell access control have been identified as an effective means to mitigate cross-tier interference in two-tier networks. Femtocells can be configured to be either open access or closed access...

  10. ETSU College of Medicine Onity Door Access Authorization Form

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU College of Medicine Onity Door Access Authorization Form Please grant access to: 6 access. ____ ALL AREAS (ETSU Service Personnel Only) Medical School Research & Training, VA Bldg. #119-Mail: johnsodl@etsu.edu #12;

  11. A Dyslexic Perspective on e-Content Accessibility

    E-Print Network [OSTI]

    Brajnik, Giorgio

    an insight into the issues of web accessibility for users with Dyslexia (and/or other specific learning and accessibility issues of electronic educational content. Keywords: dyslexia, SLD, web accessibility, usability...................................................................................................2 2. Explaining Dyslexia

  12. ad libitum access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  13. Conjunctive Query Containment under Access Limitations

    E-Print Network [OSTI]

    Martinenghi, Davide

    2 both represent city names, and similarly the attributes named Artist represent artist names.1 to access r2. In turn, new tuples from r2 may provide new constants representing city names, that can

  14. Metadata Value Chain for Open Access Journals

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly communication lifecycle...

  15. COMMENTARY Open Access Effectively incorporating selected multimedia

    E-Print Network [OSTI]

    Hammerton, James

    COMMENTARY Open Access Effectively incorporating selected multimedia content into medical Schbel5 , Markus Sellerer6 , Andreas Ziegler1 Abstract Until fairly recently, medical publications have significantly profit from advances in electronic publishing that permit the inclusion of multimedia content

  16. Random access wireless networks with controlled mobility

    E-Print Network [OSTI]

    Modiano, Eytan H.

    This paper considers wireless networks where messages arriving randomly (in time and space) are collected by a mobile receiver. The messages are transmitted to the mobile receiver according to a random access scheme and ...

  17. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  18. Accessing MDS with IDL February 1993

    E-Print Network [OSTI]

    California at San Diego, University of

    Accessing MDS with IDL Reference Manual February 1993 Software Version: MDS 5.2 VAX/VMS Version 4 Equipment Corporation: CDD DECnet VAX DATATRIEVE DECUS VAXcluster DEC MicroVAX VAX Information Architecture

  19. JOBAID-ACCESSING AND MODIFYING TALENT PROFILE

    Broader source: Energy.gov [DOE]

    The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

  20. Metadata Value Chain for Open Access Journals

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly ...

  1. Decision Analysis of Dynamic Spectrum Access Rules

    SciTech Connect (OSTI)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01T23:59:59.000Z

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  2. North Carolina Capital Access Program (North Carolina)

    Broader source: Energy.gov [DOE]

    The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lenders usual standards. The average CAP loan is ...

  3. Radioactive hot cell access hole decontamination machine

    DOE Patents [OSTI]

    Simpson, William E. (Richland, WA)

    1982-01-01T23:59:59.000Z

    Radioactive hot cell access hole decontamination machine. A mobile housing has an opening large enough to encircle the access hole and has a shielding door, with a door opening and closing mechanism, for uncovering and covering the opening. The housing contains a shaft which has an apparatus for rotating the shaft and a device for independently translating the shaft from the housing through the opening and access hole into the hot cell chamber. A properly sized cylindrical pig containing wire brushes and cloth or other disks, with an arrangement for releasably attaching it to the end of the shaft, circumferentially cleans the access hole wall of radioactive contamination and thereafter detaches from the shaft to fall into the hot cell chamber.

  4. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her...

  5. LOCH: Open Access Facilitator Job Description (DRAFT)

    E-Print Network [OSTI]

    McMahon, Jacqueline

    2015-03-23T23:59:59.000Z

    DRAFT Job Description for an Open Access Facilitator job in the University of Edinburgh's College of Humanities and Social Sciences. This draft job description is being made available as part of the Jisc-funded LOCH Project....

  6. Rail Access to Yucca Mountain: Critical Issues

    SciTech Connect (OSTI)

    Halstead, R. J.; Dilger, F.; Moore, R. C.

    2003-02-25T23:59:59.000Z

    The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

  7. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  8. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

  9. NBP RFI: Data Access Honeywell Responses To Request for Information...

    Broader source: Energy.gov (indexed) [DOE]

    on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

  10. Bursting at the Seams: Water Access and Housing in Luanda

    E-Print Network [OSTI]

    Bulfin, Michael Patrick

    2009-01-01T23:59:59.000Z

    constructed areas. The lack of water access and properand how the lack of access to clean water, coupled withmost slum residents lack knowledge about the basics of water

  11. access control scheme: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  12. access control mac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  13. access control transportation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  14. access system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  15. Increasing Community Access to Solar: Designing and Developing...

    Broader source: Energy.gov (indexed) [DOE]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System (Fact Sheet), U.S. Department of Energy (DOE) Increasing Community Access to...

  16. Request Access to the PARSIIe Project Management Lessons Learned...

    Energy Savers [EERE]

    Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository PURPOSE...

  17. accessing integrated genomic: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 RESEARCH ARTICLE Open Access Integrating cytogenetics and genomics in Environmental Sciences and Ecology Websites Summary: RESEARCH ARTICLE Open Access...

  18. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  19. access control policies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Resiliency Policies in Access Control , Mahesh Tripunitara Computer Technologies and Information Sciences Websites Summary: Resiliency Policies in Access...

  20. Issues Affecting Access to Health Services in Northern, Rural and Remote Regions

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Reform Health care reform in Canada can be broadly defined as the structural changes needed to increase the effectiveness and efficiency of the health care system. Reform involves three broad initiatives: developing more by Annette Browne In Canada, access to health care reflects the strong social value of equality, defined

  1. Open Access Publishing in Particle Physics

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Particle Physics, often referred to as High Energy Physics (HEP), spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-Web era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peerreview system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs...

  2. Access Control Taxonomy for Social Networks Adnan Ahmad, Brian Whitworth

    E-Print Network [OSTI]

    Whitworth, Brian

    of access control models for social networks based on lattice taxonomy where axes represent the properties users should be allowed to perform certain action. There are few access control models for social-Anwar- Zhao [6], Distributed access control [7] and Tie-RBAC [8]. The lattice classifies access control models

  3. California State University, Fullerton Finance System Access Request Form

    E-Print Network [OSTI]

    de Lijser, Peter

    #12;California State University, Fullerton Finance System Access Request Form CISO Signature Employee

  4. ETSU College of Medicine CBORD Door Access Authorization Form

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU College of Medicine CBORD Door Access Authorization Form 6/13/2011 Please grant access to: This access will remain in effect until the individual is no longer an active ETSU faculty list areas this individual will need access to: ____ ALL AREAS - ETSU Service Personnel Only (i

  5. Security and Access Policy Security of and access to campus facilities, including campus residences

    E-Print Network [OSTI]

    Escher, Christine

    Security and Access Policy Security of and access to campus facilities, including campus residences facilities. Residence halls are secured 24 hours a day. Over extended breaks, the doors of all residence halls will be secured around the clock. Some facilities may have individual hours, which may vary

  6. Improving Data Access Efficiency by Using a Tagless Access Buffer (TAB)

    E-Print Network [OSTI]

    Whalley, David

    of the processor's energy expenditure. We describe the implemen- tation and use of a tagless access buffer (TAB University of Technology [perla/mckee/pers]@chalmers.se Abstract The need for energy efficiency continues) that greatly improves data access energy efficiency while slightly im- proving performance. The compiler

  7. The UCSB Access ID Card Application for Department Use Door Access will be needed

    E-Print Network [OSTI]

    Bigelow, Stephen

    of the University and must be returned to the department access controller (DAC) upon demand or when affiliation signature below asserts your identification information is correct and acknowledges your responsibility this or their own department's form/system to document approvals and record authorized access levels. Retention: One

  8. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  9. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    Review your system access with your company's Information Security Officer. Access and downloading of information from laptop computers. Beware that your conversations may not be private or secure to be someone you trust in order to obtain personal or sensitive information. Additional travel security tips

  10. CONSTRUCTION OF WEB-ACCESSIBLE MATERIALS HANDBOOK FORGENERATION IV NUCLEAR REACTORS

    SciTech Connect (OSTI)

    Ren, Weiju [ORNL

    2005-01-01T23:59:59.000Z

    The development of a web-accessible materials handbook in support of the materials selection and structural design for the Generation IV nuclear reactors is being planned. Background of the reactor program is briefly introduced. Evolution of materials handbooks for nuclear reactors over years is reviewed in light of the trends brought forth by the rapid advancement in information technologies. The framework, major features, contents, and construction considerations of the web-accessible Gen IV Materials Handbook are discussed. Potential further developments and applications of the handbook are also elucidated.

  11. Access Venture Partners | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDITCaliforniaWeifangwiki HomeASN Power ProjectsAbrahamAccess FundAccess

  12. ACCESS TO INFORMATION MANUAL NATIONAL RESEARCH FOUNDATION

    E-Print Network [OSTI]

    Jarrett, Thomas H.

    of poverty, wealth creation and knowledge generation and preservation. The NRF views the Promotion of Access an opportunity to deal with knowledge and information management in a holistic and integrated manner so, but rather an opportunity to deal with information management in a holistic and integrated manner. The NRF

  13. REVIEW Open Access Pulmonary arterial hypertension

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    REVIEW Open Access Pulmonary arterial hypertension David Montani1,2,3 , Sven Günther1,2,3 , Peter,2,3 and Olivier Sitbon1,2,3* Abstract Pulmonary arterial hypertension (PAH) is a chronic and progressive disease and designated as clinical group 1'. Group 2 'Pulmonary hypertension due to left heart diseases' is divided

  14. Revised 26 January2011 LCLS Access Policy

    E-Print Network [OSTI]

    Wechsler, Risa H.

    1 Revised 26 January2011 LCLS Access Policy Introduction and Goals As a national user facility, LCLS aims to attract diverse users and to enable a broad set of impor- tant science that takes advantage of its unique capabilities. With these aims in mind, LCLS has been designed to include six

  15. TRANSMISSION OPEN ACCESS IN CHILE Hugh Rudnick

    E-Print Network [OSTI]

    Catholic University of Chile (Universidad Catlica de Chile)

    considered or are considering deregulating their electric power sectors to allow for competition among implemented in Chilean electric power systems, the incorporation of an open access scheme, the application conditions in interconnected power systems. One line of thinking has viewed the third party use

  16. Special Access Program Policies, Responsibilities, and Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-07-11T23:59:59.000Z

    Special Access Program Policies, Responsibilities, and Procedures This Manual is for OFFICIAL USE ONLY and will not be distributed on the Directives Portal. For distribution, please contact the Director, Office of Security, at 202-586-6775. Cancels: DOE M 471.2-3

  17. Special Access Program Policies, Responsibilities, and Procedure

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-10-29T23:59:59.000Z

    This Manual is for OFFICIAL USE ONLY and will not be distributed on the Directives Portal. For distribution, please contact the Executive Secretary of the Special Access Program Oversight Committee at 202-586-6775. Cancels DOE M 471.2-3A. Canceled by DOE O 471.5.

  18. Example School Communications Email about Open Access

    E-Print Network [OSTI]

    Tate, Dominic

    2015-03-23T23:59:59.000Z

    This is an example text for an email to be sent to the School of Mathematics as part of preparations for implementing Open Access requirements for the post-2014 REF. This is made available here as part of the Jisc-funded LOCH Project....

  19. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Hall Keller Hall Physical Science Building Pacific Ocean Science & Technology Kuykendall AnnexStairs Pond UH Parking Access & Mid-Pacific Institute Exit Manoa Innovation Center and Kau Auxiliary Services Pacific Biomedical Warehouse Agricultural Science Shops Campus Security n Landscaping

  20. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Hall Keller Hall Physical Science Building Pacific Ocean Science & Technology Kuykendall Annex44 44 Stairs Pond UH Parking Access & Mid-Pacific Institute Exit Manoa Innovation Center and Kau Auxiliary Services Pacific Biomedical Warehouse Agricultural Science Shops Campus Security n Landscaping

  1. RESEARCH Open Access Reconciling taxonomy and phylogenetic

    E-Print Network [OSTI]

    Matsen, Frederick A. "Erick"

    RESEARCH Open Access Reconciling taxonomy and phylogenetic inference: formalism and algorithms: Although taxonomy is often used informally to evaluate the results of phylogenetic inference and the root that solves a "subcoloring" problem to express the difference between a taxonomy and a phylogeny at a given

  2. Top Tips for Accessing Oxford's Information Resources

    E-Print Network [OSTI]

    Oxford, University of

    Top Tips for Accessing Oxford's Information Resources And How Brasenose College Library Fits In #12, electronic journals and books Top Tip 1: Attend the induction session in your departmental library #12;Oxford departmental, faculty, college Top Tip 2: Explore smaller libraries www

  3. Top Tips for Accessing Oxford's Information Resources

    E-Print Network [OSTI]

    Oxford, University of

    Top Tips for Accessing Oxford's Information Resources And How Brasenose College Library Fits In #12, electronic journals and books Top Tip 1: Attend the Bodleian induction sessions for your subject #12;Oxford departmental, faculty, college Top Tip 2: Explore smaller libraries www

  4. Characterizing Open Access Publishing at Your Institution

    E-Print Network [OSTI]

    Hubbard, David E.; Li, Yu

    2014-11-03T23:59:59.000Z

    access scholarly communication in Tanzanian public universities. 76th IFLA General Conference and Assembly, Gothenburg, Sweden. Retrieved March 3, 2014, from http://conference.ifla.org/past-wlic/2010/138-dulle-en.pdf. Gul, S., Shah, T. A., & Bhagwan, T. A...

  5. RESEARCH Open Access The Being of Leadership

    E-Print Network [OSTI]

    Myers, Lawrence C.

    RESEARCH Open Access The Being of Leadership Wiley W Souba Abstract The ethical foundation that a realigned leadership framework - one that distinguishes being a leader as the ontological basis for what pillars of leadership - awareness, commitment, integrity, and authenticity - are proposed as fundamental

  6. OFC'13 Summary ---Access Networks-I

    E-Print Network [OSTI]

    California at Davis, University of

    They Be A Blueprint for Optical Networks? Ali Khayrallah Ericsson Research USA Spectrum crunch, Feedback from receiver's residential network model to a converged access/aggregation platform based on SDN. Network convergence to reduce number of devices such as PON for residential, business as well as mobile backhauling ­ Long reach

  7. Bonus points The National Access Scheme

    E-Print Network [OSTI]

    Chen, Ying

    Bonus points The National Access Scheme ANU offers bonus points for nationally strategic senior secondary subjects, and in recognition of difficult circumstances that students face in their studies. Bonus) will be awarded. Bonus points to do not apply to programs with an ATAR cut-off of 98 or higher. Bonus Points

  8. REVIEW Open Access Micro computed tomography for

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    REVIEW Open Access Micro computed tomography for vascular exploration Lyubomir Zagorchev1 studies. Micro Computed Tomography (micro-CT) has emerged in recent years as the preferred modality and suggestions aimed at making micro-CT more accurate, replicable, and robust. Introduction Micro Computed

  9. Access to Solar: Designing and Developing a

    E-Print Network [OSTI]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System Updated guide highlights project models, policies, and financing Community shared solar programs enable members of a neighborhood or community to pool resources and share the benefits of a single solar

  10. Accessibility Application Blue Badge Car Park UK

    E-Print Network [OSTI]

    Painter, Kevin

    i Accessibility Application Blue Badge Car Park UK Konstantinos Grassos H00113751 August 2012. In this project, Blue Badge Car Park (BBCP) is presented which is actually a mobile-based park finder application. It specifically focuses on finding parking spaces for wheelchair users, which are indicated by the blue badge

  11. Distributed Random Access Algorithm: Scheduling and Congesion Control

    E-Print Network [OSTI]

    Jiang, Libin

    This paper provides proofs of the rate stability, Harris recurrence, and ?-optimality of carrier sense multiple access (CSMA) algorithms where the random access (or backoff) parameter of each node is adjusted dynamically. ...

  12. Auctions to gas transmission access : the British experience

    E-Print Network [OSTI]

    McDaniel, Tanga

    2002-01-01T23:59:59.000Z

    When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

  13. Sensing-based Opportunistic Channel Access Department of Computer Science

    E-Print Network [OSTI]

    Liu, Xin

    and adapt to appropriate frequency, power, and transmission schemes. They can opportunistically access initiatives and advanced radio technology, more flexible opportunistic spectrum access has great potential initiatives towards flexible and dynamic spectrum policies, including regulation recommendations [7

  14. agreement databases access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

  15. amigo online access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

  16. accession medical standards: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

  17. Evaluation of Jumboframes Feasibility in LTE Access Networks

    E-Print Network [OSTI]

    Gesbert, David

    Evolution (LTE) represents the cutting- edge broadband wireless access technology in providing ubiqui- tous, such as video. A typical assessment factor of the performance of an access network is its throughput capability

  18. RESEARCH Open Access Impact of physical incompatibility on drug mass

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    RESEARCH Open Access Impact of physical incompatibility on drug mass flow rates: example drugs simultaneously but through limited venous accesses. Several intravenous therapies have rates of drugs infused simultaneously to the patient, through an in vitro study. Methods: Furosemide

  19. Dynamic Optimal Random Access for Vehicle-to-Roadside Communications

    E-Print Network [OSTI]

    Huang, Jianwei

    significant momentum in recent years, especially after the Federal Communications Commission (FCCDynamic Optimal Random Access for Vehicle-to-Roadside Communications Man Hon Cheung, Fen Hou access, efficient resource allocation schemes are required to fully utilize the limited communication

  20. LOCH/ARMA Open Access Good Practice - University of Edinburgh

    E-Print Network [OSTI]

    Tate, Dominic

    2015-03-19T23:59:59.000Z

    Presentation delivered by Dominic Tate at ARMA Open Access Good Practice event (London 19-03-2015). These slides detail the University of Edinbugh's approach to implementing Open Access requirements for the post-2014 REF....

  1. LOCH/ARMA Open Access Good Practice - St Andrews University

    E-Print Network [OSTI]

    Aucock, Janet

    2015-03-19T23:59:59.000Z

    Presentation delivered by Janet Aucock at ARMA Open Access Good Practice event (London 19-03-2015). These slides detail St Andrews University's approach to implementing Open Access requirements for the post-2014 REF....

  2. access site bleeding: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project Granger Morgan 5 TouchNet's Terms and Conditions By accessing and using this web site, you agree that your access to and use of this site is subject to the...

  3. The Human Right to Access Electricity

    SciTech Connect (OSTI)

    Tully, Stephen

    2006-04-15T23:59:59.000Z

    Electricity access is already well established within the framework of human rights, either as an implicit attribute of a pre-existing right (such as non-discrimination or sustainable development) or explicitly in the context of eliminating discrimination against women. There is also broad acknowledgement by states of the desirability of eliminating energy poverty - for all, but particularly for the rural poor, and women. (author)

  4. Industrial engineering study of tank farm access qualifications and validations

    SciTech Connect (OSTI)

    Sterling, S.G., Westinghouse Hanford

    1996-07-01T23:59:59.000Z

    Engineering study of alternatives to reduce costs of validation worker`s qualification prior to Tank Farm area access.

  5. LOCH: Planning for Open Access in REF - Discussion Points

    E-Print Network [OSTI]

    Tate, Dominic; Aucock, Janet

    2015-03-19T23:59:59.000Z

    Slides and checklist from facilitated discussion session from ARMA Open Access Good Practice event (London 19-03-2015)....

  6. Structuring Structural Operational

    E-Print Network [OSTI]

    Mousavi, Mohammad

    aan de Technische Universiteit Eindhoven, op gezag van de Rector Magnificus, prof.dr.ir. C.J. van.A. Reniers CIPDATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Mousavi, MohammadReza Structuring Structural Operational Semantics / MohammadReza Mousavi. Eindhoven : Technische Universiteit Eindhoven, 2005

  7. Structuring Structural Operational

    E-Print Network [OSTI]

    Reniers, Michel

    aan de Technische Universiteit Eindhoven, op gezag van de Rector Magnificus, prof.dr.ir. C.J. van.A. Reniers CIP-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Mousavi, MohammadReza Structuring Structural Operational Semantics / MohammadReza Mousavi. - Eindhoven : Technische Universiteit Eindhoven, 2005

  8. Statler College Research Data Center Access and Usage Policy

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    Statler College Research Data Center Access and Usage Policy Objective Access to the Statler under WVU and federal guidelines. Scope This policy applies to all Statler staff, faculty, administrators, officers, contractors and students. Policy Access to the RDC shall be limited to those authorized

  9. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  10. Analyzing and Developing Role-Based Access Control Models

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Analyzing and Developing Role-Based Access Control Models by Liang Chen A thesis submitted-based access control (RBAC) has become today's dominant access control model, and many of its theoretical and practical aspects are well understood. However, certain aspects of more advanced RBAC models

  11. A Provenance-based Access Control Model Jaehong Park

    E-Print Network [OSTI]

    Sandhu, Ravi

    A Provenance-based Access Control Model Jaehong Park Institute for Cyber Security University of protecting provenance data. In this paper, we propose a novel provenance-based access control model additional capabilities beyond those available in traditional access control models. We utilize a notion

  12. USING PARAMETERIZED UML TO SPECIFY AND COMPOSE ACCESS CONTROL MODELS

    E-Print Network [OSTI]

    Ray, Indrakshi

    USING PARAMETERIZED UML TO SPECIFY AND COMPOSE ACCESS CONTROL MODELS Indrakshi Ray, Na Li, Dae is to model the access control frameworks, compose the models, and analyze the resulting model to identify problems. In this pa- per we outline a technique for modeling and composing access control policy

  13. Comparing the Expressive Power of Access Control Mahesh V. Tripunitara

    E-Print Network [OSTI]

    Li, Ninghui

    Comparing the Expressive Power of Access Control Models Mahesh V. Tripunitara tripunit the expressive power of access control models is rec- ognized as a fundamental problem in computer security the expressive power of access control models into a single context and to compare such models to one another

  14. Benefits of Location-Based Access Control: A Literature Study

    E-Print Network [OSTI]

    Wieringa, Roel

    Benefits of Location-Based Access Control: A Literature Study Andre van Cleeff, Wolter Pieters.pieters, r.j.wieringa}@utwente.nl Abstract--Location-based access control (LBAC) has been suggested-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and (iii

  15. CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE

    E-Print Network [OSTI]

    Foltz, Jeremy D.

    CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE Abstract This work develops an econometric model that links credit access with agricultural profitability and investment. Using data. Econometric estimates are run for agricultural investment and profitability as a function of credit access

  16. CONTENT ADAPTION FOR A STREAMING ENVIRONMENT UNIVERSAL MULTIMEDIA ACCESS

    E-Print Network [OSTI]

    Perkis, Andrew

    CONTENT ADAPTION FOR A STREAMING ENVIRONMENT ENABLING UNIVERSAL MULTIMEDIA ACCESS Andrew Perkis Multimedia Access (UMA) is about how users can access the same media resources with different terminal developed taking advantage of some of the possibilities in the upcoming Multimedia Framework, MPEG-21 A test

  17. Access Control Policies and Languages in Open Environments

    E-Print Network [OSTI]

    Samarati, Pierangela

    systems is specifying and enforcing access control security policies regulating interactions between languages and coming from different systems can be combined. 1 Introduction Access control is the process should be granted or denied. Access control plays an important role in overall system security

  18. Harvard Open Access Project Good Practices For University

    E-Print Network [OSTI]

    Chen, Yiling

    Talking about a policy 66 Revising this guide 67 Additional resources 71 (Endnotes) #12;Good Practices Practices for University Open-Access Policies Preface This is a guide to good practices for university open2013-09-30 Harvard Open Access Project Good Practices For University Open-Access Policies Edited

  19. A Smart Energy System with Distributed Access Control

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    systems to date support remote control and automation but not access control, making them applicable to HVAC (heating, ventilation, and air conditioning) systems. SE has the potential of significantly access from a remote site over the Internet, in which case access control in the form of a shared key

  20. Invited Viewer Invited Viewer iSIS Portal Access

    E-Print Network [OSTI]

    Dennett, Daniel

    1 Invited Viewer Invited Viewer iSIS Portal Access Tufts "Invited Viewers" such as parents and spouses can be granted view-only access to a student's iSIS secure personal information. Students previously registered by another student or you do not have a Tufts Username and active iSIS access (most

  1. IBM Human Ability and Accessibility Center Executive brief

    E-Print Network [OSTI]

    to making products and services accessible, to its commitment to research, IBM has been an industry leader graduated from New York's Pace University with a Master's degree in computer science. A skilled and highlyIBM Human Ability and Accessibility Center Executive brief Accessibility at IBM: An integrated

  2. PeopleSoft (ERP) Finance Access Request Form User Guide

    E-Print Network [OSTI]

    de Lijser, Peter

    PeopleSoft (ERP) Finance Access Request Form User Guide Last Revised: 3/22/11 #12;PeopleSoft ERP Finance Access Request Form User Guide FINAL Last Revised: 3/22/11 Page ii REVISION CONTROL Document Title: PeopleSoft ERP Finance Access Request Form User Guide Author: IT Training & Support File Reference

  3. UC SANTA BARBARA POLICY AND PROCEDURE Physical Access Control

    E-Print Network [OSTI]

    Bigelow, Stephen

    property. A successful program is dependent on every member of the community being diligent access controls are to enhance the personal safety of the campus community and to secure University physical access controls for all facilities managed by UCSB (University facilities). Physical access

  4. accurate web accessible: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accurate web accessible First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility...

  5. Measuring Accessibility by Automobile Report # 11 in the series

    E-Print Network [OSTI]

    Levinson, David M.

    Measuring Accessibility by Automobile Report # 11 in the series Access to Destinations Study Report by Automobile March 2010 6. 7. Author(s) 8. Performing Organization Report No. David Levinson, Bernadette Marion measures for the Twin Cities region that measure accessibility by the automobile mode over the period from

  6. Historical Population Structure of Central Valley Steelhead and its Alteration by Dams

    E-Print Network [OSTI]

    May, Bernie

    Historical Population Structure of Central Valley Steelhead and its Alteration by Dams STEVEN T. Pres- ently, impassable dams block access to 80% of historically available habitat, and block access Steelhead, O. mykiss, endangered species, population structure, dispersal, habitat model, dams, Central

  7. Design of Accelerator Online Simulator Server Using Structured Data

    SciTech Connect (OSTI)

    Shen, Guobao; /Brookhaven; Chu, Chungming; /SLAC; Wu, Juhao; /SLAC; Kraimer, Martin; /Argonne

    2012-07-06T23:59:59.000Z

    Model based control plays an important role for a modern accelerator during beam commissioning, beam study, and even daily operation. With a realistic model, beam behaviour can be predicted and therefore effectively controlled. The approach used by most current high level application environments is to use a built-in simulation engine and feed a realistic model into that simulation engine. Instead of this traditional monolithic structure, a new approach using a client-server architecture is under development. An on-line simulator server is accessed via network accessible structured data. With this approach, a user can easily access multiple simulation codes. This paper describes the design, implementation, and current status of PVData, which defines the structured data, and PVAccess, which provides network access to the structured data.

  8. Electrochemical Double-Layer Capacitors Using Carbon Nanotube Electrode Structures

    E-Print Network [OSTI]

    Schindall, Joel E.

    The structure and behavior of the electrical double-layer capacitor (EDLC) are described. The use of activated carbon electrodes is discussed and the limitations on voltage and accessible surface area are presented. Metrics ...

  9. Fusion Tables : new ways to collaborate on structured data

    E-Print Network [OSTI]

    Kidon, Jonathan Goldberg

    2010-01-01T23:59:59.000Z

    Fusion Tables allows data collaborators to create, merge, navigate and set access control permissions on structured data. This thesis focuses on the collaboration tools that were added to Googles Fusion Tables. The ...

  10. File: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Remote Access Service

    E-Print Network [OSTI]

    Jiang, Huiqiang

    to connecting. You must be approved by your Responsibility Center Administrator to access Network ConnectFile: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Restricted University Online Resources Using Network Connect on the Secure Remote Access Service Table

  11. AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND My signature on the "Mobile Technology Access and Payment Option Request"

    E-Print Network [OSTI]

    Oregon, University of

    AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

  12. Improving Access to Foundational Energy Performance Data

    SciTech Connect (OSTI)

    Studer, D.; Livingood, W.; Torcellini, P.

    2014-08-01T23:59:59.000Z

    Access to foundational energy performance data is key to improving the efficiency of the built environment. However, stakeholders often lack access to what they perceive as credible energy performance data. Therefore, even if a stakeholder determines that a product would increase efficiency, they often have difficulty convincing their management to move forward. Even when credible data do exist, such data are not always sufficient to support detailed energy performance analyses, or the development of robust business cases. One reason for this is that the data parameters that are provided are generally based on the respective industry norms. Thus, for mature industries with extensive testing standards, the data made available are often quite detailed. But for emerging technologies, or for industries with less well-developed testing standards, available data are generally insufficient to support robust analysis. However, even for mature technologies, there is no guarantee that the data being supplied are the same data needed to accurately evaluate a product?s energy performance. To address these challenges, the U.S. Department of Energy funded development of a free, publically accessible Web-based portal, the Technology Performance Exchange(TM), to facilitate the transparent identification, storage, and sharing of foundational energy performance data. The Technology Performance Exchange identifies the intrinsic, technology-specific parameters necessary for a user to perform a credible energy analysis and includes a robust database to store these data. End users can leverage stored data to evaluate the site-specific performance of various technologies, support financial analyses with greater confidence, and make better informed procurement decisions.

  13. Open Access: From Myth to Paradox

    ScienceCinema (OSTI)

    Paul Ginsparg

    2010-01-08T23:59:59.000Z

    True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculate on the sociology of the next generation of users.

  14. Access to OUO | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you0 ARRA Newsletters 20103-03 AUDIT REPORT:Patricia DaviesEnergyAccess to

  15. 2e Carbon Access | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 Wind ProjectsourceInformationColorado School20090:Access

  16. UF Access List | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence may bedieselsummer gasoline price to averageUF Access

  17. Access Fund Partners LP | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDITCaliforniaWeifangwiki HomeASN Power ProjectsAbrahamAccess Fund

  18. DTEVISUAL: A VISUALIZATION SYSTEM FOR TEACHING ACCESS CONTROL USING DOMAIN TYPE ENFORCEMENT *

    E-Print Network [OSTI]

    Wang, Chaoli

    of these modern systems. This paper presents DTEvisual, a visualization system for teaching access control usingDTEVISUAL: A VISUALIZATION SYSTEM FOR TEACHING ACCESS CONTROL USING DOMAIN TYPE ENFORCEMENT * Yifei access control and modern models of access control. DTEvisual facilitatesgraphicaldepiction

  19. Managed Access by Controlled Sensing (MACS)

    SciTech Connect (OSTI)

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01T23:59:59.000Z

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  20. Accessing TRANSP Output: A User's Guide Accessing TRANSP Output: A User's Guide

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    of such TRANSP analyses are stored on magnetic and laser disk on a VMS VAX cluster. The purpose of this User's . Guide is to describe how to access these analysis results in graphical form on a VAX system. The reader is not expected to have specialized VAX knowledge, although familiarity with fundamentals (e.g. how to log in

  1. EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel

    E-Print Network [OSTI]

    Kirschner, Denise

    EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel access device. In order to obtain fuel from for access. Employee access is not required for the U-M fleet vehicle equipped with an automated fuel device

  2. Law-Aware Access Control and its Information Model

    E-Print Network [OSTI]

    Stieghahn, Michael

    2010-01-01T23:59:59.000Z

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  3. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-07-27T23:59:59.000Z

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  4. Instruction sets for Parallel Random Access Machines

    SciTech Connect (OSTI)

    Trahan, J.L.

    1988-01-01T23:59:59.000Z

    The computational powers of time-bounded Parallel Random Access Machines (PRAMs) with different instruction sets are compared. A basic PRAM can perform the following operations in unit-time: addition, subtraction, Boolean operations, comparisons, and indirect addressing. Multiple processors may concurrently read and concurrently write a single cell. This thesis establishes that the class of languages accepted in polynomial time on a PRAM(*, {up arrow}, {down arrow}) contains the class of languages accepted in exponential time on a nondeterministic Turing machine (NEXPTIME) and is contained in the class of languages accepted in exponential space on a Turing machine. Efficient simulations are presented of PRAMs with enhanced instruction sets by sequential RAMs with the same instruction sets; also simulations of probabilistic PRAMs by deterministic PRAMs, using parallelism to replace randomness. Also given are simulations of PRAM(op)s by PRAMs, where both the simulated machine and the simulating machine are exclusive-read, exclusive-write machines.

  5. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02T23:59:59.000Z

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  6. Public Roundtable- Data Access and Privacy Issues Related to...

    Broader source: Energy.gov (indexed) [DOE]

    to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies More Documents & Publications Testimony Public Meeting Transcript:...

  7. access spatial methods: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 The mqr-tree: improving upon a 2-dimensional spatial access method Marc Moreau, Wendy Osborn Mathematics Websites Summary: , overcoverage and overlap than is necessary. The...

  8. access policies tutela: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    os estudantes lembraram a Jos Ferreira Gomes Instituto de Sistemas e Robotica 3 Policy 3507 Information Technology Accessibility 1 OLD DOMINION UNIVERSITY Computer...

  9. Boyer-Tillamook Access Road Improvement Project 1 Finding of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    dangerous. In addition, improvements to access road stream crossings would facilitate fish passage. Construction is expected to last from 2 to 4 months, although work may need to...

  10. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  11. access industry profile: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hired can help you build a career Access information about713 Complete Your Profile -- Logging into Huskies Get Hired Log into your Huskies Get Hired account...

  12. access communication datac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Open learner models, communication, multiple users. 1 Introduction Open learner models (OLM) are learner models that are accessible Bull, Susan 111 Channel modelling and relay for...

  13. access memory devices: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Information Sciences Websites Summary: magnetic disks, such as lower access latency, lower power consumption, lack of noise, and shock resistance of traditional...

  14. access devices evaluation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    unnecessarily long query processing times, since web accesses exhibit high and variable latency. Fortunately, web sources can be probed in parallel, and each source can typically...

  15. NBP RFI: Data Access, Third Party Use, and Privacy- Comments...

    Energy Savers [EERE]

    Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC Oncor...

  16. Accessing Low-Cost Capital Through Securitization (Poster)

    SciTech Connect (OSTI)

    Mendelsohn, M.

    2014-10-01T23:59:59.000Z

    Poster for Solar Power International conference presents information on NREL's effort to open capital markets through securitization via Solar Access to Public Capital (SAPC) working group's efforts.

  17. accessible surface area: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  18. access program eap: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  19. accessible surface areas: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  20. access programs evidence: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  1. Using Digital Technology to Access And Store African Art

    E-Print Network [OSTI]

    Blake, Edwin

    Using Digital Technology to Access And Store African Art Gary Marsden, Katherine Malan & Edwin Blake Collaborative Visual Computing Group, Department of Computer Science, University of Cape Town +27

  2. Microsoft Word - Accessing Gulf Resources article.doc

    Office of Environmental Management (EM)

    necessary to efficiently access and support this very significant amount of energy production, given the growing challenges that coastal areas are facing?" My prediction is...

  3. accessible sites application: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web and directly access device resources....

  4. access control framework: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web and directly access device resources....

  5. access delay applications: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web and directly access device resources....

  6. access to information: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Protocol of Corporate Governance in the Public Sector (1997), the Public Finance Management Act of 1999 Jarrett, Thomas H. 2 Access to Geographic Information: Openness versus...

  7. aps collaborative access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Model for Shared Virtual Environments Steve Pettifer and James Marsh of computer graphics techniques, and evolve more meaningful content, issues such as ownership' or...

  8. accelerating access initiative: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuovo database 12;26-04-2010 2 7 programma di gestione di database (cio un DBMS) Access offre: un supporto transazionale limitato Anselma, Luca 455 Dynamical...

  9. accessibility global gateway: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuovo database 12;26-04-2010 2 7 programma di gestione di database (cio un DBMS) Access offre: un supporto transazionale limitato Anselma, Luca 389 RESEARCH...

  10. arterial access site: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuovo database 12;26-04-2010 2 7 programma di gestione di database (cio un DBMS) Access offre: un supporto transazionale limitato Anselma, Luca 225 Site: a...

  11. University of Utah Registrar's Office Security Access Deletion Form

    E-Print Network [OSTI]

    Feschotte, Cedric

    Access Student Records Web Reports DARS (Class rolls, picture rosters, etc.) Comments/Additional Information FOR REGISTRAR'S OFFICE USE ONLY ACS Administrator Date Student Systems Administrator Date DARS

  12. Application for Permit to Construct Access Driveway Facilities...

    Open Energy Info (EERE)

    Application for Permit to Construct Access Driveway Facilities on Highway Right of Way DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link...

  13. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    user's cookies (including authentication cookies), if any, associated with the site running the VPN management interface, access data recently submitted by the target user via...

  14. FACT SHEET: SOLAR AND LED ENERGY ACCESS PROGRAM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    billion people current lacking access to modern energy - simultaneously alleviating poverty, improving human health, and reducing emissions of greenhouse gases. The Solar and...

  15. Increasing Community Access to Solar: Designing and Developing...

    Broader source: Energy.gov (indexed) [DOE]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System Updated guide highlights project models, policies, and financing Community shared...

  16. access ad hoc: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...

  17. access control mechanism: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...

  18. arabidopsis thaliana accessions: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    occurring variation is an important alternative resource for functional genetics and genomics research.; In a well-characterized collection of Arabidopsis thaliana accessions, we...

  19. A Utility Regulator's Guide to Data Access for Commercial Building...

    Broader source: Energy.gov (indexed) [DOE]

    This guide offers policy options and considerations to state utility commissions in providing access to energy use data to help commercial customers manage energy costs through...

  20. access health corp: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Request Broker Architecture specifies a system which - provides interoperability 6 Health Care Access to and Utilization of Health Care CiteSeer Summary: Core item-...

  1. Microsoft Word - CX-Ross-Lexington_access_road_WEB.doc

    Broader source: Energy.gov (indexed) [DOE]

    Darin Bowman Project Manager - TELF-TPP-3 Proposed Action: Access road repair including reconstructing, grading, and shaping of roads, placing and compacting of rock surfacing,...

  2. City of Santa Cruz- Solar Access Ordinance

    Broader source: Energy.gov [DOE]

    Before a development plan can be approved in the City of Santa Cruz, it must be found that the orientation and location of buildings, structures, open spaces and other features of the site plan...

  3. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  4. Access Control in Publicly Verifiable Outsourced Computation James Alderman

    E-Print Network [OSTI]

    Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted re- sources to delegate. Thus there is a need to apply access control mechanisms in PVC environments. In this work, we define a new framework for Publicly Verifiable Outsourced Computation with Access Control (PVC-AC) that applies

  5. Capacity Building on Access to Energy in Africa: Final Report

    E-Print Network [OSTI]

    Capacity Building on Access to Energy in Africa: Final Report Danish Support to EUEI Facilitation from African partner organisations and individuals Title: Capacity Building on Access to Energy (Danish Ministry of Foreign Affairs) Cover: Solar home system installed at house near Chipata, Eastern

  6. Towards an Accessible Web through Semantic Web Standards

    E-Print Network [OSTI]

    Watt, Stephen M.

    1 Towards an Accessible Web through Semantic Web Standards Clare M. So, Mark Perry and Stephen M Abstract-- Making information on the Web accessible to all people, including to those having special needs than actual semantic content that is rendered by alternative technologies. To make the Web more

  7. Towards an Accessible Web through Semantic Web Standards

    E-Print Network [OSTI]

    Perry, Mark

    Towards an Accessible Web through Semantic Web Standards Clare M. So, Mark Perry and Stephen M Abstract-- Making information on the Web accessible to all people, including to those having special needs than actual semantic content that is rendered by alternative technologies. To make the Web more

  8. POLICY REGARDING SERVICE ANIMAL ACCESS TO UNIVERSITY OF GEORGIA FACILITIES,

    E-Print Network [OSTI]

    Arnold, Jonathan

    POLICY REGARDING SERVICE ANIMAL ACCESS TO UNIVERSITY OF GEORGIA FACILITIES, PROGRAMS, SERVICES AND ACTIVITIES This policy ("Policy") is to implement federal and state laws regarding access for service animals, for purposes of this Policy, "Service Animals" are collectively defined to include those that are defined

  9. access control policy: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    access control policy First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Resiliency Policies in Access...

  10. Regulating Wireless Access Pricing Kwanfong Leung and Jianwei Huang

    E-Print Network [OSTI]

    Huang, Jianwei

    user prices change with network's market shares and bandwidth costs. When such direct control change with the network costs and market shares. · Social optimal access pricing: We showRegulating Wireless Access Pricing Kwanfong Leung and Jianwei Huang Department of Information

  11. access hiv-1 test: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    access hiv-1 test First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 REVIEW Open Access The macrophage in...

  12. Papers from the 2008 Joint Session Phenomenal and Access Consciousness

    E-Print Network [OSTI]

    Block, Ned

    Papers from the 2008 Joint Session Phenomenal and Access Consciousness Ned Block and Cynthia Mac.1111/j.1467-9264.2008.00247.x CONSCIOUSNESS AND COGNITIVE ACCESS NED BLOCK This article concerns presented here derives from Block (2007a, 2007b, forthcoming). #12;NED BLOCK290 ©2008 The Aristotelian

  13. UNLV OFFICE OF INFORMATION TECHNOLOGY NETWORK ACCESS COMPLIANCE POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    UNLV OFFICE OF INFORMATION TECHNOLOGY NETWORK ACCESS COMPLIANCE POLICY RESPONSIBLE ADMINISTRATOR: Create a secure network environment for UNLV's computer and network resources by establishing different levels of network access to meet the needs of UNLV staff and students as well as the general public

  14. Announced Dynamic Access Probability protocol for next generation wireless networks

    E-Print Network [OSTI]

    Levy, Hanoch

    Announced Dynamic Access Probability protocol for next generation wireless networks Z. NAOR #3; H probability. Keywords: wireless networks, multiple access, MAC #3; naorz@post.tau.ac.il y hanoch@cs.tau.ac.il 1 #12; 1 Introduction Wireless networks are rapidly expanding. Future satellite-based networks

  15. Negotiating Multichannel Sensing and Access In Cognitive Radio Wireless Networks

    E-Print Network [OSTI]

    Islam, M. Saif

    Negotiating Multichannel Sensing and Access In Cognitive Radio Wireless Networks Hua Liu, Bhaskar the coordination among secondary users on channel sensing strategy in cognitive wireless networks. In this problem and potentially access in a cognitive radio network? If users may have a potentially different valuation of each

  16. Iterative Water-filling for Gaussian Vector Multiple Access Channels

    E-Print Network [OSTI]

    Li, Tiffany Jing

    Iterative Water-filling for Gaussian Vector Multiple Access Channels W. Yu, W. Rhee, S. Boyd, and J. Cioffi Zhenlei Shen Lehigh University March 29, 2005 Zhenlei Shen (Lehigh) Iterative Water-filling for Gaussian Vector Multiple Access ChannelsMarch 29, 2005 1 / 13 #12;1 Quick Review 2 Iterative Water

  17. The Energy Harvesting Multiple Access Channel with Energy Storage Losses

    E-Print Network [OSTI]

    Yener, Aylin

    The Energy Harvesting Multiple Access Channel with Energy Storage Losses Kaya Tutuncuoglu and Aylin considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting

  18. Test Access Mechanism Optimization, Test Scheduling, and Tester Data Volume

    E-Print Network [OSTI]

    Chakrabarty, Krishnendu

    Test Access Mechanism Optimization, Test Scheduling, and Tester Data Volume Reduction for System Marinissen, Senior Member, IEEE Abstract--We describe an integrated framework for system-on-chip (SOC) test automation. Our framework is based on a new test access mechanism (TAM) architecture consisting of flexible

  19. A Framework for Flexible Access Control in Digital Library Systems

    E-Print Network [OSTI]

    Ray, Indrajit

    A Framework for Flexible Access Control in Digital Library Systems Indrajit Ray and Sudip. Traditional access control models are often found to be inadequate for digital libraries. This is because the user population for digital libraries is very dynamic and not completely known in advance. In addition

  20. OSU-Tulsa Helmerich Research Center Card Access Request Form

    E-Print Network [OSTI]

    Veiga, Pedro Manuel Barbosa

    OSU-Tulsa Helmerich Research Center Card Access Request Form *Please submit form to the University that it will NOT be loaned or transferred to any person. If this access card is lost or stolen, OSU-Tulsa University Police: ________________________ OSU-Tulsa University Police 2/4/13 University Police use only Date: _____________ Processed by

  1. A Modular Approach to Composing Access Control Policies

    E-Print Network [OSTI]

    Samarati, Pierangela

    access control are all based on monolithic and com- plete specifications. This results limiting when these proposals, while based on powerful languages able to express different policies, assume a single monolithic specification of the en- tire policy. Such an assumption does not fit many real world situations, where access

  2. UNBC LIBRARY CARD AND BORROWER ACCESS APPLICATION FORM

    E-Print Network [OSTI]

    Northern British Columbia, University of

    UNBC LIBRARY CARD AND BORROWER ACCESS APPLICATION FORM For Faculty Authorized Users UNBC FACULTY: 20020_________________ Please issue a Faculty Authorized Library card to the following person so that s/he may borrow Library materials and access services in my name for my UNBC academic use. Please extend

  3. ISSN:2155-6199 The International Open Access

    E-Print Network [OSTI]

    Doty, Sharon Lafferty

    ISSN:2155-6199 The International Open Access Journal of Bioremediation & Biodegradation Special, S7 http://dx.doi.org/10.4172/2155-6199.S7-001 Research Article Open Access Bioremediation towards bioremediation of these contaminants via in situ application of bacteria that have the capacity

  4. Defining and Measuring Policy Coverage in Testing Access Control Policies

    E-Print Network [OSTI]

    Young, R. Michael

    Defining and Measuring Policy Coverage in Testing Access Control Policies Evan Martin, Tao Xie a study on the policy coverage achieved by manually generated requests. 1 Introduction Access control is one of the most fundamental and widely used security mechanisms. It controls which princi- pals (users

  5. A Fault Model and Mutation Testing of Access Control Policies

    E-Print Network [OSTI]

    Xie, Tao

    A Fault Model and Mutation Testing of Access Control Policies Evan Martin and Tao Xie Dept (responses) against expected ones. Unfortunately, manual testing is tedious and few tools exist for automated in web applications. It controls which principals such as users or processes have access to which re

  6. Defining and Measuring Policy Coverage in Testing Access Control Policies

    E-Print Network [OSTI]

    Xie, Tao

    Defining and Measuring Policy Coverage in Testing Access Control Policies Evan Martin, Tao Xie loss on fault detection. We also conduct a study on the policy coverage achieved by manually generated. It controls which principals (users, processes, etc.) have access to which resources in a system. To better

  7. accessing cereal genomics: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accessing cereal genomics First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 RESEARCH ARTICLE Open Access...

  8. TRINITY ACCESS PROGRAMMES (TAP) HIGHLIGHTS OF 2009-10

    E-Print Network [OSTI]

    O'Mahony, Donal E.

    TRINITY ACCESS PROGRAMMES (TAP) HIGHLIGHTS OF 2009-10 Trinity Access Programmes #12;INTRODUCTION Trinity is a university that strives to eliminate barriers and create opportunity; we want the best and brightest to know that Trinity is the university for them, regardless of socio-economic background

  9. Human Resources Department Procedure: Public Records Access, Document

    E-Print Network [OSTI]

    Human Resources Department Procedure: Public Records Access, Document Page 1 of 2 Printing of benefits, medical, and FMLA records; and the Payroll Manager is the custodian of payroll records Department Procedure: Public Records Access, Document Printing and Copying Page 2 of 2 Issued: October 3

  10. 85CanCer InformatICs 2014:13(s5) Open Access: Full open access to

    E-Print Network [OSTI]

    Yu, Haiyuan

    85CanCer InformatICs 2014:13(s5) Open Access: Full open access to this and thousands of other sets. Cancer Informatics 2014:13(s5) 8588 doi: 10.4137/CIn.s14064. RECEIvED: June 29, 2014. RESUb

  11. 61CanCer InformatICs 2014:13(s5) Open Access: Full open access to

    E-Print Network [OSTI]

    Geman, Donald

    61CanCer InformatICs 2014:13(s5) Open Access: Full open access to this and thousands of other papers at http://www.la-press.com. Cancer Informatics Supplementary Issue: Network and Pathway Analysis of Cancer Susceptibility (A) Introduction Cellular signaling generates a chain of protein

  12. Efficient Indexing Data Structures for Flash-Based Sensor Devices *

    E-Print Network [OSTI]

    Najjar, Walid A.

    index structures, MicroHash and MicroGF (Micro Grid Files), exploit the asymmetric read/write and wear GUNOPULOS, WALID A. NAJJAR University of California, Riverside Flash Memory is the most prevalent storage behind these index structures is that expensive random access deletions are completely eliminated. Micro

  13. Efficient Indexing Data Structures for Flash-Based Sensor Devices

    E-Print Network [OSTI]

    Jiang, Anxiao "Andrew"

    structures, MicroHash and MicroGF (micro grid files), exploit the asymmetric read/write and wear, and WALID A. NAJJAR University of California, Riverside Flash memory is the most prevalent storage medium behind these index structures is that expensive random access deletions are completely eliminated. Micro

  14. Efficient Memory Access with NumPy Global Arrays using Local Memory Access

    SciTech Connect (OSTI)

    Daily, Jeffrey A.; Berghofer, Dan C.

    2013-08-03T23:59:59.000Z

    This paper discusses the work completed working with Global Arrays of data on distributed multi-computer systems and improving their performance. The tasks completed were done at Pacific Northwest National Laboratory in the Science Undergrad Laboratory Internship program in the summer of 2013 for the Data Intensive Computing Group in the Fundamental and Computational Sciences DIrectorate. This work was done on the Global Arrays Toolkit developed by this group. This toolkit is an interface for programmers to more easily create arrays of data on networks of computers. This is useful because scientific computation is often done on large amounts of data sometimes so large that individual computers cannot hold all of it. This data is held in array form and can best be processed on supercomputers which often consist of a network of individual computers doing their computation in parallel. One major challenge for this sort of programming is that operations on arrays on multiple computers is very complex and an interface is needed so that these arrays seem like they are on a single computer. This is what global arrays does. The work done here is to use more efficient operations on that data that requires less copying of data to be completed. This saves a lot of time because copying data on many different computers is time intensive. The way this challenge was solved is when data to be operated on with binary operations are on the same computer, they are not copied when they are accessed. When they are on separate computers, only one set is copied when accessed. This saves time because of less copying done although more data access operations were done.

  15. Method and apparatus for globally-accessible automated testing

    DOE Patents [OSTI]

    Layne, Scott P. (Los Angeles, CA); Beugelsdijk, Tony J. (Los Alamos, NM)

    1998-01-01T23:59:59.000Z

    A method and apparatus for sharing integrated testing services with a plurality of autonomous remote clients is disclosed. In the disclosed method, in response to an access request message, a process controller transmits an access enabling message to the remote client. The access enabling message includes instructions performable by a remote client to generate test equipment commands. A process controller interprets and transforms these commands into automated test instrument suite commands, which are provided to laboratory modules to perform the indicated tests. Test data results are then obtained and transmitted to the remote client.

  16. Symmetrical Multilevel Diversity Coding with an All-Access Encoder

    E-Print Network [OSTI]

    Marukala, Neeharika

    2012-07-16T23:59:59.000Z

    and L randomly accessible en- coders 1 to L. A total of L + 1 independent discrete memoryless sources (S0, S1, . . . , SL) are to be encoded at the encoders. The decoder, which has access to encoder 0 and a subset U of the ran- domly accessible... encoders, needs to nearly perfectly reconstruct the sources (S0, S1, . . . , S|U |) no matter what the realization of U is. . 6 2 An illustration of the (R0, Rs) admissible rate region R?. In gen- eral, the region is a (two-dimensional) polyhedron...

  17. Vacuum Structure and Potential

    E-Print Network [OSTI]

    J. X. Zheng-Johansson

    2007-04-02T23:59:59.000Z

    Based on overall experimental observations, especially the pair processes, I developed a model structure of the vacuum along with a basic-particle formation scheme begun in 2000 (with collaborator P-I Johansson). The model consists in that the vacuum is, briefly, filled of neutral but polarizable vacuuons, consisting each of a p-vaculeon and n- vaculeon of charges $+e$ and $-e$ of zero rest masses but with spin motions, assumed interacting each other with a Coulomb force. The model has been introduced in full in a book (Nova Sci, 2005) and referred to in a number of journal/E-print papers. I outline in this easier accessible paper the detailed derivation of the model and a corresponding quantitative determination of the vacuuon size.

  18. Grid Data Access on Widely Distributed Worker Nodes Using Scalla and SRM

    SciTech Connect (OSTI)

    Jakl, Pavel; /Prague, Inst. Phys.; Lauret, Jerome; /Brookhaven; Hanushevsky, Andrew; /SLAC; Shoshani, Arie; /LBL, Berkeley; Sim, Alex; /LBL, Berkeley; Gu, Junmin; /LBL, Berkeley

    2011-11-10T23:59:59.000Z

    Facing the reality of storage economics, NP experiments such as RHIC/STAR have been engaged in a shift of the analysis model, and now heavily rely on using cheap disks attached to processing nodes, as such a model is extremely beneficial over expensive centralized storage. Additionally, exploiting storage aggregates with enhanced distributed computing capabilities such as dynamic space allocation (lifetime of spaces), file management on shared storages (lifetime of files, pinning file), storage policies or a uniform access to heterogeneous storage solutions is not an easy task. The Xrootd/Scalla system allows for storage aggregation. We will present an overview of the largest deployment of Scalla (Structured Cluster Architecture for Low Latency Access) in the world spanning over 1000 CPUs co-sharing the 350 TB Storage Elements and the experience on how to make such a model work in the RHIC/STAR standard analysis framework. We will explain the key features and approach on how to make access to mass storage (HPSS) possible in such a large deployment context. Furthermore, we will give an overview of a fully 'gridified' solution using the plug-and-play features of Scalla architecture, replacing standard storage access with grid middleware SRM (Storage Resource Manager) components designed for space management and will compare the solution with the standard Scalla approach in use in STAR for the past 2 years. Integration details, future plans and status of development will be explained in the area of best transfer strategy between multiple-choice data pools and best placement with respect of load balancing and interoperability with other SRM aware tools or implementations.

  19. A New Dimension in Access Control: Studying Maintenance Engineering across Organizational

    E-Print Network [OSTI]

    A New Dimension in Access Control: Studying Maintenance Engineering across Organizational Inter-organizational cooperation has specific requirements for access control. The paper presents be extended to realize additional mechanisms for access control with little efforts. Keywords inter-organizational

  20. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticat...

    Broader source: Energy.gov (indexed) [DOE]

    11: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users Access FilesDirectories U-211: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users...

  1. NMDOT Application for Permit to Construct an Access or Median...

    Open Energy Info (EERE)

    Reference LibraryAdd to library Legal Document- OtherOther: NMDOT Application for Permit to Construct an Access or Median Opening on Public Right of WayLegal Published NA...

  2. Control of Substrate Access to the Active Site and Catalytic...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Control of Substrate Access to the Active Site and Catalytic Mechanism of Methane and Toluene Monooxygenases Friday, June 22, 2012 - 3:30pm SSRL Main Conference Room 137-322 Prof....

  3. METHOD Open Access Rapid haplotype inference for nuclear families

    E-Print Network [OSTI]

    Gifford, David K.

    METHOD Open Access Rapid haplotype inference for nuclear families Amy L Williams1* , David E-recombinant and maximum likelihood haplotypes. When applied to a dataset con- taining 103 families, Hapi performs 3

  4. Accessing Future Flashpoints in the South China Sea

    E-Print Network [OSTI]

    KAPLAN, Brad

    2013-01-01T23:59:59.000Z

    and D. MacDonald, U.S. -China Relations: Policy Is- sues,Bilateral consultations with China which stress both U.S.other regional actors, including China. Increased access to

  5. Does anyone have access to 2012 average residential rates by...

    Open Energy Info (EERE)

    Does anyone have access to 2012 average residential rates by utility company? I'm seeing an inconsistency between the OpenEI website and EIA 861 data set. Home > Groups > Utility...

  6. The role of accessibility in a universal web

    E-Print Network [OSTI]

    Henry, Shawn Lawton

    "Universal design" is the process of creating products that are usable by people with the widest possible range of abilities, operating within the widest possible range of situations; whereas "accessibility" primarily ...

  7. A Calculus for Access Control in Distributed Systems

    E-Print Network [OSTI]

    Abadi, Martin; Burrows, Michael; Lampson, Butler; Plotkin, Gordon

    1993-01-01T23:59:59.000Z

    We study some of the concepts, protocols, and algorithms for access control in distributed systems, from a logical perspective. We account for how a principal may come to believe that another principal is making a request, ...

  8. RESEARCH ARTICLE Open Access Noninvasive ventilation reduces energy

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    RESEARCH ARTICLE Open Access Noninvasive ventilation reduces energy expenditure in amyotrophic with a shift of the burden of ventilation to extradiaphragmatic inspiratory muscles, including neck muscles prognostic value. We hypothesized that noninvasive ventilation (NIV) would relieve inspiratory neck muscles

  9. RESEARCH Open Access In vivo gene transfer targeting in pancreatic

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    transfer of a bicistronic transgene bearing a luciferase gene and the herpes simplex virus thymidine kinase of the article 2012 Lafitte et al.; licensee BioMed Central Ltd. This is an Open Access article distributed

  10. RESEARCH Open Access Cellular transcriptional profiling in human lung

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    RESEARCH Open Access Cellular transcriptional profiling in human lung epithelial cells infected expression profiles of human lung A549 cells infected by five different subtypes of human and avian influenza

  11. Engineering a campus-wide accessible music library

    E-Print Network [OSTI]

    Winstein, Keith J

    2005-01-01T23:59:59.000Z

    The Library Access to Music Project has created a new kind of music library at the Massachusetts Institute of Technology. The library is always open and available in dormitory rooms and classrooms, because it transmits ...

  12. Spectral engineering of coupled open-access microcavities

    E-Print Network [OSTI]

    Flatten, L C; Smith, J M

    2015-01-01T23:59:59.000Z

    Open-access microcavities are emerging as a new approach to confine and engineer light down to the {\\lambda}^3 regime. Indeed, they offer direct access to a highly confined electromagnetic field while maintaining tunability of the system and flexibility on the light emitter studied. In this article, we present the first development beyond the single open-access cavity design using a Focused Ion Beam fabrication method. Based on experimental and theoretical investigation, we demonstrate the engineering of the coupling between two open-access microcavities with radius of curvature of 6 {\\mu}m. We study the evolution of spectral, spatial and polarisation properties through a transition from isolated to coupled cavities. Normal mode splittings up to 20 meV are observed for total mode volumes around 10 {\\lambda}^3 . This work is of importance for future development of photonic circuits for quantum computation, optical meta-materials and lab-on-a-chip sensing.

  13. access options approaches: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Zhang, Xin 2007-08-28 35 Accessibility analysis for telecommuting: a GIS-based approach Texas A&M University - TxSpace Summary: . This paper attempts to evaluate telecommuting's...

  14. Recommendations concerning energy information model documentation, public access, and evaluation

    E-Print Network [OSTI]

    Wood, David O.

    1979-01-01T23:59:59.000Z

    In this study we provide an analysis of the factors underlying Congressional concern regarding model documentation, policies for public access, and evaluation procedures of the Energy Information Administration (EIA) and ...

  15. Drive-access transit : a regional analytical framework

    E-Print Network [OSTI]

    Sorensen, James B

    2005-01-01T23:59:59.000Z

    A framework for analyzing drive-access transit at a regional level is developed in this research. This framework is intended primarily for in-house use by regional transit agencies, yet has implications for the regional ...

  16. architectural accessibility: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Decoupled Access DRAM Architecture CiteSeer Summary: This paper discusses an approach to reducing memory latency in...

  17. Electrifying the bottom of the pyramid : improving access in slums

    E-Print Network [OSTI]

    Scott, Cecilia (Cecilia Lauren)

    2010-01-01T23:59:59.000Z

    Slums are expanding in Latin America, Asia, and Africa, and as a result, the lack of safe, reliable electricity access in these regions is expanding. Addressing this issue will require a comprehensive strategy that caters ...

  18. PROCEEDINGS Open Access Recent advances in standards for collaborative

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    PROCEEDINGS Open Access Recent advances in standards for collaborative Digital Anatomic Pathology. Collaborative Digital Anatomic Pathology can only be fully achieved using medical informatics standards specifying how medical informatics standards should be implemented to meet specific health care needs

  19. Introduction Access to sanitation services in Ethiopia is currently

    E-Print Network [OSTI]

    Walter, M.Todd

    Introduction Access to sanitation services in Ethiopia is currently reported at 43% (WaterAid, 2010 of the factors that cause 80 percent of all sickness and disease in the world (WHO, 1997). In Ethiopia, it has

  20. Building Access Policy Responsible Administrative Unit: Finance & Administration

    E-Print Network [OSTI]

    Page 1 of 5 1.0 BACKGROUND AND PURPOSE This policy establishes guidelines for facilitating access and thoughtfully controlled as a campus security measure. The desired outcomes for this policy are to streamline

  1. RESEARCH Open Access A survey on biometric cryptosystems and

    E-Print Network [OSTI]

    Uhl, Andreas

    RESEARCH Open Access A survey on biometric cryptosystems and cancelable biometrics Christian biometrics represent emerging technologies of biometric template protection addressing these concerns technologies have been published. A comprehensive survey of biometric cryptosystems and cancelable biometrics

  2. Transpiring purging access probe for particulate laden or hazardous environments

    DOE Patents [OSTI]

    VanOsdol, John G

    2013-12-03T23:59:59.000Z

    An access probe for remote-sensing access through a viewing port, viewing volume, and access port into a vessel. The physical boundary around the viewing volume is partially formed by a porous sleeve lying between the viewing volume and a fluid conduit. In a first mode of operation, a fluid supplied to the fluid conduit encounters the porous sleeve and flows through the porous material to maintain the viewing volume free of ash or other matter. When additional fluid force is needed to clear the viewing volume, the pressure of the fluid flow is increased sufficiently to slidably translate the porous sleeve, greatly increasing the flow into the viewing volume. The porous sleeve is returned to position by an actuating spring. The access probe thereby provides for alternate modes of operation based on the pressure of an actuating fluid.

  3. ntroduction The issue of access to scientific work

    E-Print Network [OSTI]

    Berry, R. Stephen

    of that transition, as we learn to use elec- tronic mail, the world wide web, and other means to communicateI ntroduction The issue of access to scientific work can be expressed succinctly in the words

  4. RESEARCH Open Access Impact of routine percutaneous coronary

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RESEARCH Open Access Impact of routine percutaneous coronary intervention after out Introduction: Since 2003, we have routinely used percutaneous coronary intervention (PCI) and mild therapeutic angiography associated with percuta- neous coronary intervention (PCI) has been recommended in the presence

  5. Packing efficiency and accessible surface area of crumpled graphene

    E-Print Network [OSTI]

    Cranford, Steven Wayne

    Graphene holds promise as an ultracapacitor due to its high specific surface area and intrinsic capacitance. To exploit both, a maximum surface area must be accessible while the two-dimensional (2D) graphene is deformed ...

  6. T-701: Citrix Access Gateway Enterprise Edition Input Validation...

    Broader source: Energy.gov (indexed) [DOE]

    to be executed by the target user's browser. The code will originate from the site running the Citrix Access Gateway software and will run in the security context of that site....

  7. A .NET ASSEMBLY FOR EPICS SIMPLE CHANNEL ACCESS

    E-Print Network [OSTI]

    Timossi, Christopher A.

    2009-01-01T23:59:59.000Z

    Application Development Using .NET, PCAPAC [5] H. NishimuraA .NET ASSEMBLY FOR EPICS SIMPLE CHANNEL ACCESS* C. Timossi,interface software using the .NET platform and the C#

  8. achieving universal access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    principles and guidance detailed in the W3C's Web Content Accessibility Guidelines (WCAG) 2.0 - www.w3.org Levi, Ran 166 Education Goals at the University of New Mexico Below is...

  9. Competitive ability not kinship affects growth of Arabidopsis thaliana accessions

    E-Print Network [OSTI]

    Alvarez, Nadir

    accessions that originated from local populations throughout Europe. We measured the biomass of one focal of siliques produced per pot by one focal plant surrounded by four kin or non-kin neighbours. The biomass

  10. City of Kansas City- Solar Easements and Geothermal Access

    Broader source: Energy.gov [DOE]

    Owners of accessory solar energy systems are responsible for negotiating with other property owners for any desired solar easements to protect access to sunlight. An easements must be recorded in...

  11. Solar access of residential rooftops in four California cities

    E-Print Network [OSTI]

    Levinson, Ronnen

    2010-01-01T23:59:59.000Z

    and/or thermal collection by rooftop solar-energy equipment.and/or thermal collection by rooftop solar-energy equipment.solar access of rooftop solar-energy systems, including photovoltaic panels and thermal

  12. Access to Medical and Exposure Records 1.0 Reference

    E-Print Network [OSTI]

    de Lijser, Peter

    : A. Any hazardous waste regulated by the Solid Waste Disposal Act, amended by the Resource for medical/exposure records access is to improve the detection, treatment and prevention of occupational

  13. Energy-Efficient Management of UMTS Access Networks

    E-Print Network [OSTI]

    Energy-Efficient Management of UMTS Access Networks Luca Chiaraviglio, Delia Ciullo, Michela Meo by the telecommunication sector in Italy in the next ten years, the main culprit being customer premises networking

  14. Accessibility of Computer Science: A Reflection for Faculty Members

    E-Print Network [OSTI]

    O'Leary, Dianne P.

    Accessibility of Computer Science: A Reflection for Faculty Members Dianne P. O'Leary http O'Leary. Copyright Dianne P. O'Leary, 1999 Version 1: June 1999 1 Picture Yourself: You are male

  15. access care diagnosis: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Access to Urgent Medical Care among CiteSeer Summary: While the overall quality of health care in America shows signs of progress, improving this system remains an issue of...

  16. accessing aids care: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 Access to Urgent Medical Care among CiteSeer Summary: While the overall quality of health care in America shows signs of progress, improving this system remains an issue of...

  17. accessible electronic health: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    independent scholars or Oregon citizens. 2. Most licensed Chapman, Michael S. 4 ACCESS TO HEALTH CARE CiteSeer Summary: All rights reserved. Individuals may photocopy all or parts...

  18. A System for Open-Access 3 He Human Lung

    E-Print Network [OSTI]

    Walsworth, Ronald L.

    A System for Open-Access 3 He Human Lung Imaging at Very Low Field I.C. RUSET,1 L.L. TSAI,2,3 R describe a prototype system built to allow open-access very-low-field MRI of human lungs using laser images of human lungs. We include discussion on challenges unique to imaging at 50200 kHz, including

  19. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in Apache. A remote user can access internal servers. PLATFORM: Apache HTTP Server Service ABSTRACT: Apache modproxymodrewrite Bug Lets Remote Users Access Internal...

  20. U.S. Department of Energy Increases Access to Results of DOE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    free public access to accepted peer-reviewed manuscripts or published scientific journal articles within 12 months of publication. "Increasing access to the results of...

  1. A Cycle of Dependence: Automobiles, Accessibility, and the Evolution of the Transportation and Retail Hierarchies

    E-Print Network [OSTI]

    Handy, Susan

    1993-01-01T23:59:59.000Z

    Los Angeles and the Automobile: The Making of the ModernA Cycle of Dependence: Automobiles, Accessibility, and theA CYCLE OF DEPENDENCE: Automobiles, Accessibility, and the

  2. Fundamental study of structural features affecting enzymatic hydrolysis of lignocellulosic biomass

    E-Print Network [OSTI]

    Zhu, Li

    2006-10-30T23:59:59.000Z

    Lignocellulose is a promising and valuable alternative energy source. Native lignocellulosic biomass has limited accessibility to cellulase enzyme due to structural features; therefore, pretreatment is an essential prerequisite to make biomass...

  3. Fundamental study of structural features affecting enzymatic hydrolysis of lignocellulosic biomass

    E-Print Network [OSTI]

    Zhu, Li

    2006-10-30T23:59:59.000Z

    Lignocellulose is a promising and valuable alternative energy source. Native lignocellulosic biomass has limited accessibility to cellulase enzyme due to structural features; therefore, pretreatment is an essential prerequisite to make biomass...

  4. Selectively dispersed isotope labeling for protein structure determination by magic angle spinning NMR

    E-Print Network [OSTI]

    Eddy, Matthew T.

    The power of nuclear magnetic resonance spectroscopy derives from its site-specific access to chemical, structural and dynamic information. However, the corresponding multiplicity of interactions can be difficult to tease ...

  5. Ninebrane structures

    E-Print Network [OSTI]

    Hisham Sati

    2015-01-16T23:59:59.000Z

    String structures in degree four are associated with cancellation of anomalies of string theory in ten dimensions. Fivebrane structures in degree eight have recently been shown to be associated with cancellation of anomalies associated to the NS5-brane in string theory as well as the M5-brane in M-theory. We introduce and describe "Ninebrane structures" in degree twelve and demonstrate how they capture some anomaly cancellation phenomena in M-theory. Along the way we also define certain variants, considered as intermediate cases in degree nine and ten, which we call "2-Orientation" and "2-Spin structures", respectively. As in the lower degree cases, we also discuss the natural twists of these structures and characterize the corresponding topological groups associated to each of the structures, which likewise admit refinements to differential cohomology.

  6. Establishing a Secure Data Center with Remote Access: Preprint

    SciTech Connect (OSTI)

    Gonder, J.; Burton, E.; Murakami, E.

    2012-04-01T23:59:59.000Z

    Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

  7. Scalable Database Access Technologies for ATLAS Distributed Computing

    E-Print Network [OSTI]

    A. Vaniachine; for the ATLAS Collaboration

    2009-10-02T23:59:59.000Z

    ATLAS event data processing requires access to non-event data (detector conditions, calibrations, etc.) stored in relational databases. The database-resident data are crucial for the event data reconstruction processing steps and often required for user analysis. A main focus of ATLAS database operations is on the worldwide distribution of the Conditions DB data, which are necessary for every ATLAS data processing job. Since Conditions DB access is critical for operations with real data, we have developed the system where a different technology can be used as a redundant backup. Redundant database operations infrastructure fully satisfies the requirements of ATLAS reprocessing, which has been proven on a scale of one billion database queries during two reprocessing campaigns of 0.5 PB of single-beam and cosmics data on the Grid. To collect experience and provide input for a best choice of technologies, several promising options for efficient database access in user analysis were evaluated successfully. We present ATLAS experience with scalable database access technologies and describe our approach for prevention of database access bottlenecks in a Grid computing environment.

  8. Secure Access Control for Location-Based Applications in WLAN Systems

    E-Print Network [OSTI]

    Goodrich, Michael T.

    (ACL) is commonly used for access control by modern operating systems [4]. However, identificationSecure Access Control for Location-Based Applications in WLAN Systems YounSun Cho, Lichun Bao in WLAN systems is to exercise network access control to authenticate network access according to various

  9. DTEvisual: A Visualization System for Teaching Access Control using Domain Type Enforcement

    E-Print Network [OSTI]

    Shene, Ching-Kuang

    Control [12]. These modern systems are very complex. A strict Type Enforcement access control policy1 DTEvisual: A Visualization System for Teaching Access Control using Domain Type Enforcement Yifei of least privilege, mandatory access control and modern models of access control. DTEvisual facilitates

  10. Virtual venue management users manual : access grid toolkit documentation, version 2.3.

    SciTech Connect (OSTI)

    Judson, I. R.; Lefvert, S.; Olson, E.; Uram, T. D.; Mathematics and Computer Science

    2007-10-24T23:59:59.000Z

    An Access Grid Venue Server provides access to individual Virtual Venues, virtual spaces where users can collaborate using the Access Grid Venue Client software. This manual describes the Venue Server component of the Access Grid Toolkit, version 2.3. Covered here are the basic operations of starting a venue server, modifying its configuration, and modifying the configuration of the individual venues.

  11. Policies, Models, and Languages for Access Sabrina De Capitani di Vimercati1

    E-Print Network [OSTI]

    Samarati, Pierangela

    must be regulated. An access control model provides a formal representation of the access controlPolicies, Models, and Languages for Access Control Sabrina De Capitani di Vimercati1 , Pierangela model, and security mechanism. A policy defines the (high-level) rules according to which access control

  12. Layout Guidelines for Web Text and a Web Service to Improve Accessibility for Dyslexics

    E-Print Network [OSTI]

    service that presents Web texts in a more more accessible way to people with dyslexia. The layout. Keywords Dyslexia, Web accessibility, usability tests, browsing web service, accessibility guidelines texts more accessible to people with dyslexia. The guidelines for developing this service are based

  13. Access Control Hygiene and the Empathy Gap in Medical IT Yifei Wang Sean Smith Andrew Gettinger

    E-Print Network [OSTI]

    Smith, Sean W.

    Access Control Hygiene and the Empathy Gap in Medical IT Yifei Wang Sean Smith Andrew Gettinger). Access Control Hygiene In computer security, access control addresses the problem of who can do what this the access control hygiene problem [2]. As literature reports (e.g., [8]) and as we have seen in our own

  14. Subscriber access provided by -Access paid by the | UCSB Libraries The Journal of Physical Chemistry C is published by the American Chemical

    E-Print Network [OSTI]

    Fygenson, Deborah Kuchnir

    Subscriber access provided by - Access paid by the | UCSB Libraries The Journal of Physical between fluorescence and mass spectroscopy of the 9C hairpin emitters link Ag11:DNA with green

  15. Subscriber access provided by -Access paid by the | UCSB Libraries The Journal of Physical Chemistry C is published by the American Chemical

    E-Print Network [OSTI]

    Buratto, Steve

    Subscriber access provided by - Access paid by the | UCSB Libraries The Journal of Physical emitters link Ag11:DNA with green fluorescence and Ag13:DNA with red fluorescence. Introduction Few

  16. Opportunities for Process Monitoring Techniques at Delayed Access Facilities

    SciTech Connect (OSTI)

    Curtis, Michael M.; Gitau, Ernest TN; Johnson, Shirley J.; Schanfein, Mark; Toomey, Christopher

    2013-09-20T23:59:59.000Z

    Except for specific cases where the International Atomic Energy Agency (IAEA) maintains a continuous presence at a facility (such as the Japanese Rokkasho Reprocessing Plant), there is always a period of time or delay between the moment a State is notified or aware of an upcoming inspection, and the time the inspector actually enters the material balance area or facility. Termed by the authors as delayed access, this period of time between inspection notice and inspector entrance to a facility poses a concern. Delayed access also has the potential to reduce the effectiveness of measures applied as part of the Safeguards Approach for a facility (such as short-notice inspections). This report investigates the feasibility of using process monitoring to address safeguards challenges posed by delayed access at a subset of facility types.

  17. Access to Special Nuclear Material at the Idaho National Laboratory

    SciTech Connect (OSTI)

    R. Bean; J. Barrett; D. Gerts; B. Brush

    2010-07-01T23:59:59.000Z

    Access to special nuclear material (SNM) such as enriched uranium or plutonium is critical to the experimental validation of measurement techniques for nuclear nonproliferation applications. It is especially important that realistic quantities be available for measurements in the field. Security and safety requirements have made such access nearly impossible at many U.S. facilities. The Idaho National Laboratory (INL) has been able to provide kilogram quantities of SNM for in situ measurements ranging from testing of equipment in laboratory facilities, to outdoor measurements simulating real conditions, to transfer of the SNM to the customers facility and back for measurements in the field. The INL will be working to make SNM more widely accessible for measurements by nuclear nonproliferation projects, including those with international researchers.

  18. A review of "Charles II and the Politics of Access" by Brian Weiser.

    E-Print Network [OSTI]

    Ty M. Reese

    2004-01-01T23:59:59.000Z

    REVIEWS 257 Brian Weiser. Charles II and the Politics of Access. Suffolk: The Boydell Press, 2003. xii + 208 pp. Review by TY M. REESE, UNIVERSITY OF NORTH DAKOTA. The English Civil War and subsequent restoration of Charles II to the English... Charles II and the Politics of Access, Brian Weiser successfully challenges this idea of continual access by arguing that Charles II skillfully con- trolled access for political reasons. The book?s main argument, that access was one of the ?most...

  19. Equal Access Initiative HIV/AIDS Information Resources from NLM

    SciTech Connect (OSTI)

    Templin-Branner W. and N. Dancy

    2010-09-11T23:59:59.000Z

    The Equal Access Initiative: HIV/AIDS Information Resources from the National Library of Medicine training is designed specifically for the National Minority AIDS Council 2010 Equal Access Initiative (EAI) Computer Grants Program awardees to provide valuable health information resources from the National Library of Medicine and other reliable sources to increase awareness of the wealth of treatment information and educational materials that are available on the Internet and to improve prevention and treatment education for their clients. These resources will also meet the needs of community-based

  20. Commencement Accessibility for People with Disabilities The Rose Garden Arena allows for the ease of access for people with disabilities to fully enjoy

    E-Print Network [OSTI]

    Bertini, Robert L.

    companion sit with them in the accessible seating section, to allow as many people with disabilitiesCommencement Accessibility for People with Disabilities The Rose Garden Arena allows for the ease of access for people with disabilities to fully enjoy the commencement ceremonies

  1. IPAC -An Interactive Approach to Access Control for Semi-Structured Data

    E-Print Network [OSTI]

    Wu, Yuqing Melanie

    Research Support Program (IU FRSP) 2006. Permission to copy without fee all or part of this material

  2. Deployable structures

    E-Print Network [OSTI]

    Hernndez Merchan, Carlos Henrique

    1987-01-01T23:59:59.000Z

    This thesis has the purpose of describing the meaning and applications of deployable structures (making emphasis in the scissor-hinged and sliding mechanisms.) and the development of new geometries, details, and mechanisms ...

  3. PROCEEDINGS Open Access Developing a kidney and urinary pathway

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    relatively small, but questions remain about scalability, maintenance and availability of the knowledge for further analysis by data mining. Data integration in the life science is still a struggle, and many groups itself. Availability: The KUPKB may be accessed via http://www.e-lico.eu/kupkb. Introduction The early

  4. RESEARCH Open Access Functional impact of Aurora A-mediated

    E-Print Network [OSTI]

    Boyer, Edmond

    RESEARCH Open Access Functional impact of Aurora A-mediated phosphorylation of HP1 at serine 83 division, HP1 colocalizes and is phosphorylated at serine 83 (Ser83 ) in G2/M phase by Aurora A. Since Aurora A regulates both cell proliferation and mitotic aberrations, we evaluated the role of HP1

  5. Including Blind Students in Computer Science Through Access to Graphs

    E-Print Network [OSTI]

    Young, R. Michael

    Including Blind Students in Computer Science Through Access to Graphs Suzanne Balik, Sean Mealin SKetching tool, GSK, to provide blind and sighted people with a means to create, examine, and share graphs (node-link diagrams) in real-time. GSK proved very effective for one blind computer science student

  6. REVIEW Open Access Toxic marine microalgae and shellfish poisoning

    E-Print Network [OSTI]

    Hays, Graeme

    REVIEW Open Access Toxic marine microalgae and shellfish poisoning in the British isles: history The relationship between toxic marine microalgae species and climate change has become a high profile and well examine the current state of toxic microalgae species around the UK, in two ways: first we describe

  7. OSU WEBVIEWER PROVIDING WEB BASED ACCESS TO ROOM SCHEDULING INFORMATION

    E-Print Network [OSTI]

    Escher, Christine

    also search for an event name. For example, entering ANTH will display all of the Anthropology classes Filters 13 o Viewing More Than One Day 13 · "Lookup" or "Quick Search" 14 o Events Quick Search 15 o Space Quick Search 16 · Special Event Coding 16 The OSU WebViewer provides access to view classes and other

  8. RESEARCH Open Access Quantifying and understanding carbon storage

    E-Print Network [OSTI]

    RESEARCH Open Access Quantifying and understanding carbon storage and sequestration within: The carbon stored in vegetation varies across tropical landscapes due to a complex mix of climatic: We produce a map of carbon storage across the watershed of the Tanzanian Eastern Arc Mountains (33

  9. Web Service Access Management for Integration with Agent Systems

    E-Print Network [OSTI]

    Web Service Access Management for Integration with Agent Systems B.J. Overeinder, P.D. Verkaik, from the perspective of agent systems (and not as is gen- erally the case by web service providers). Mediating between web service requests from (virtual) organizations of agents, the web ser- vice gateway

  10. POSTER PRESENTATION Open Access Compressed sensing with stochastic spikes

    E-Print Network [OSTI]

    Kreiter, Andreas K.

    POSTER PRESENTATION Open Access Compressed sensing with stochastic spikes David Rotermund* , Klaus of a high dimensional state can be possible also from much lower dimensional sam- ples provided the state for non- negative activities can efficiently exploit the information contained in stochastic spike events

  11. RESEARCH Open Access Helicobacter pylori interferes with an embryonic

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RESEARCH Open Access Helicobacter pylori interferes with an embryonic stem cell micro RNA cluster. In this work we report that Helicobacter pylori, a human stomach-colonizing bacterium responsible for severe defense mechanism against bacterial infections. Keywords: microRNAs, cell cycle, Helicobacter pylori

  12. ACCESS Coin F. Guevara Vasquez and C. Hohenegger

    E-Print Network [OSTI]

    Guevara-Vasquez, Fernando

    ACCESS Coin F. Guevara Vasquez and C. Hohenegger July 3, 2014 1 Bitcoin Bitcoin was created exactly how this is done!). All the details are in the original paper: https://bitcoin.org/bitcoin.pdf. The security features built in to Bitcoin, make the system extremely time consuming to game, and people

  13. Improving Access to Environmental Data using Context Information

    E-Print Network [OSTI]

    Zimmerman, John

    , governments have recognized that environmental information could have a pro- found impact on our abilityImproving Access to Environmental Data using Context Information Anthony Tomasic INRIA Rocquencourt they want to search and use environmental information. In this paper, we analyze these problems. We describe

  14. RESEARCH Open Access Does epilepsy in multiplex autism pedigrees

    E-Print Network [OSTI]

    settings depending on simplex or multiplex autism. The aim of this study was to assess: 1) the prevalence Paris, France Full list of author information is available at the end of the article © 2013 Amiet et al.; licensee BioMed Central Ltd. This is an open access article distributed under the terms of the Creative

  15. Remote Access to Large Spatial Databases Egemen Tanin

    E-Print Network [OSTI]

    Samet, Hanan

    --Spatial databases and GIS This work was supported in part by the National Sci- ence Foundation under Grants EIA-99Remote Access to Large Spatial Databases Egemen Tanin Frantisek Brabec Hanan Samet Computer--Client/server, Distributed applications, Distributed databases; H.2.8 [Database Management]: Database Applications

  16. RESEARCH ARTICLE Open Access Computational modelling elucidates the

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    to the digestive, reproductive and respiratory systems of vertebrates [1]. Mobile or immotile cilia exist on everyRESEARCH ARTICLE Open Access Computational modelling elucidates the mechanism of ciliary regulation, nephronophthisis, situs inversus pathology or infertility. The mechanism of cilia beating regulation is complex

  17. OECD Internet Economy Outlook 2012 Access the complete publication at

    E-Print Network [OSTI]

    Weske, Mathias

    From: OECD Internet Economy Outlook 2012 Access the complete publication at: http://dx.doi.org/10 and development", in OECD Internet Economy Outlook 2012, OECD Publishing. http://dx.doi.org/10 of international law. #12;OECD Internet Economy Outlook © OECD 2012 63 Chapter 2 Internet trends and development

  18. Accessing biology's toolbox for the mesoscale biofabrication of soft matter

    E-Print Network [OSTI]

    Raghavan, Srinivasa

    Accessing biology's toolbox for the mesoscale biofabrication of soft matter Gregory F. Payne,bf James N. Culverag and William E. Bentley*ab Biology is a master of mesoscale science, possessing will provide a biocompatible approach to mesoscale science and yield products that are safe, sustainable

  19. RESEARCH ARTICLE Open Access Compliance and treatment satisfaction of post

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    practicing in France. Investigators included post- menopausal women with a diagnosis of osteoporosis significantly the risk of osteoporotic fracture in women with post-menopausal osteoporosis [1]. NonethelessRESEARCH ARTICLE Open Access Compliance and treatment satisfaction of post menopausal women treated

  20. Ergonomic accessibility standards D. W. Fourney, J. A. Carter

    E-Print Network [OSTI]

    Carter, Jim

    Ergonomic accessibility standards D. W. Fourney, J. A. Carter a a Department of Computer Science to be used in calls-for-proposal for personal computer systems [1]. The Human Factors and Ergonomics Society committee submitted their work to date to ISO committee TC159/SC4/WG5 Software Ergonomics and Human Computer

  1. RESEARCH ARTICLE Open Access Mutation accumulation in Tetrahymena

    E-Print Network [OSTI]

    Gordo, Isabel

    RESEARCH ARTICLE Open Access Mutation accumulation in Tetrahymena Patrcia H Brito1* , Elsa are estimated in mutation accumulation experiments where replicate lines are propagated in conditions that allow mutations to randomly accumulate without the purging effect of natural selection. These experiments have

  2. Accessibility analysis for telecommuting: a GIS-based approach

    E-Print Network [OSTI]

    Chen, Chun

    2001-01-01T23:59:59.000Z

    and policy-makers. Research on telecommuting as one solution to reducing travel demand has been active in the past few years. However, most research focuses on analysis of the impact of telecommuting on vehicle-mobility rather than on individual accessibility...

  3. School Open Access Implementation Plan with Risk Register

    E-Print Network [OSTI]

    McMahon, Jacqueline

    2015-03-23T23:59:59.000Z

    This is a draft School Implementation Plan for Open Access in the post-2014 REF. This draft is tailored for a School in the College of Humanities and Social Sciences, and is reproduced here as an example only, as part of the Jisc-funded LOCH...

  4. A Comparative Test of Web Accessibility Evaluation Methods

    E-Print Network [OSTI]

    Brajnik, Giorgio

    for usability evaluation methods is likely to re- peat for accessibility: that there is uncertainty about, teams involved in qual- ity assessment, developers) could: 1) optimize resources ex- pended in assessing different levels of qual- ity, require different levels of resources, and differ for their applicability

  5. ORIGINAL RESEARCH Open Access Optimizing statistical parametric mapping

    E-Print Network [OSTI]

    ORIGINAL RESEARCH Open Access Optimizing statistical parametric mapping analysis of 18 F-FDG PET is an objective tool to analyze 18F-fluoro-2-deoxy-D- glucose-positron-emission tomography (FDG-PET) images, Epilepsy Background Visual inspection of 18F-fluoro-2-deoxy-D-glucose- positron-emission tomography (FDG

  6. NANO EXPRESS Open Access Multiscale investigation of graphene layers on

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    NANO EXPRESS Open Access Multiscale investigation of graphene layers on 6H-SiC(000-1) Antoine , Cecile Naud2 , Jean-Yves Veuillen2* Abstract In this article, a multiscale investigation of few graphene, the authors show that the UHV growth yields few layer graphene (FLG) with an average thickness given by Auger

  7. CASE REPORT Open Access Mycobacterial infection of breast prosthesis a

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    CASE REPORT Open Access Mycobacterial infection of breast prosthesis a conservative treatment of infected breast prosthesis by Mycobacterium canariasense. One year after thoroughly follow-up, appropriate antibiotherapy and the change of the infected prosthesis, the patient presented no signs of reinfection

  8. METHODOLOGY Open Access An improved pyrite pretreatment protocol for

    E-Print Network [OSTI]

    Halevy, Itay

    METHODOLOGY Open Access An improved pyrite pretreatment protocol for kinetic and isotopic studies, therefore, desirable. A robust standardized pretreatment protocol for removal of fine particles. Results: Our data demonstrate the presence of large fractions of S0 on untreated pyrite particle surfaces

  9. RESEARCH Open Access Pavement crack characteristic detection based

    E-Print Network [OSTI]

    Joensuu, University of

    RESEARCH Open Access Pavement crack characteristic detection based on sparse representation Xiaoming Sun1 , Jianping Huang1 , Wanyu Liu1* and Mantao Xu2 Abstract Pavement crack detection plays an important role in pavement maintaining and management. The three- dimensional (3D) pavement crack detection

  10. Directoryless Shared Memory Architecture using Thread Migration and Remote Access

    E-Print Network [OSTI]

    Gifford, David K.

    , Mieszko Lis, Omer Khan and Srinivas Devadas Massachusetts Institute of Technology, Cambridge, MA: the data must be brought to the core where the thread is running, incurring delays and energy costs, a database request might result in a series of phases, each consisting of many accesses to contiguous

  11. RESEARCH Open Access Transient receptor potential genes, smoking,

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    RESEARCH Open Access Transient receptor potential genes, smoking, occupational exposures and cough chemicals and may play an important role in the pathogenesis of cough. The aim was to study the influence of single nucleotide polymorphisms (SNPs) in TRP genes and irritant exposures on cough. Methods: Nocturnal

  12. SHORT REPORT Open Access Nuclear lipid droplets identified by electron

    E-Print Network [OSTI]

    Boyer, Edmond

    SHORT REPORT Open Access Nuclear lipid droplets identified by electron microscopy of serial that nuclear lipid droplets (LDs) are organized into domains similar to those of cytoplasmic LDs with the nuclear envelope, it could be suggested however that nuclear LDs are cytoplamic LDs trapped within

  13. RESEARCH Open Access Supplementation with xylanase and b-xylosidase

    E-Print Network [OSTI]

    California at Riverside, University of

    is available at the end of the article Qing and Wyman Biotechnology for Biofuels 2011, 4:18 http.wyman@ucr.edu 1 Center for Environmental Research and Technology, Bourns College of Engineering, University://www.biotechnologyforbiofuels.com/content/4/1/18 2011 Qing and Wyman; licensee BioMed Central Ltd. This is an Open Access article

  14. RESEARCH Open Access Comparison of enzymatic reactivity of corn stover

    E-Print Network [OSTI]

    California at Riverside, University of

    , USA 2 Department of Chemical and Environmental Engineering, Bourns College of Engineering, University of the article 2014 Gao et al.; licensee BioMed Central Ltd. This is an Open Access article distributed under is properly credited. Gao et al. Biotechnology for Biofuels 2014, 7:71 http

  15. PRIMARY RESEARCH Open Access Anticonvulsant and analgesic activities of crude

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    PRIMARY RESEARCH Open Access Anticonvulsant and analgesic activities of crude extract and its with anticonvulsant and analgesic activities. We investigated the efficacy of crude extract and its semi in mice. Among the series the crude extract exhibited interesting analgesic activity in a dose dependent

  16. REVIEW Open Access Climate change, air pollution and extreme events

    E-Print Network [OSTI]

    REVIEW Open Access Climate change, air pollution and extreme events leading to increasing dramatically during the past few decades not only in industrialized countries. Urban air pollution from motor be explained only in changes occurred in the environment. Despite some differences in the air pollution profile

  17. RESEARCH Open Access Autonomous exoskeleton reduces metabolic cost

    E-Print Network [OSTI]

    Herr, Hugh

    phase. We measured the metabolic energy consumption of seven subjects walking on a level treadmill at 1RESEARCH Open Access Autonomous exoskeleton reduces metabolic cost of human walking during load. In this study, the design and testing of an autonomous leg exoskeleton is presented. The aim of the device

  18. LHAPDF6: parton density access in the LHC precision era

    E-Print Network [OSTI]

    Andy Buckley; James Ferrando; Stephen Lloyd; Karl Nordstrom; Ben Page; Martin Ruefenacht; Marek Schoenherr; Graeme Watt

    2015-03-05T23:59:59.000Z

    The Fortran LHAPDF library has been a long-term workhorse in particle physics, providing standardised access to parton density functions for experimental and phenomenological purposes alike, following on from the venerable PDFLIB package. During Run 1 of the LHC, however, several fundamental limitations in LHAPDF's design have became deeply problematic, restricting the usability of the library for important physics-study procedures and providing dangerous avenues by which to silently obtain incorrect results. In this paper we present the LHAPDF 6 library, a ground-up re-engineering of the PDFLIB/LHAPDF paradigm for PDF access which removes all limits on use of concurrent PDF sets, massively reduces static memory requirements, offers improved CPU performance, and fixes fundamental bugs in multi-set access to PDF metadata. The new design, restricted for now to interpolated PDFs, uses centralised numerical routines and a powerful cascading metadata system to decouple software releases from provision of new PDF data and allow completely general parton content. More than 200 PDF sets have been migrated from LHAPDF 5 to the new universal data format, via a stringent quality control procedure. LHAPDF 6 is supported by many Monte Carlo generators and other physics programs, in some cases via a full set of compatibility routines, and is recommended for the demanding PDF access needs of LHC Run 2 and beyond.

  19. RESEARCH ARTICLE Open Access Vaccination with human anti-trastuzumab

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    viability of SK-OV-3 cells, a HER2-positive cancer cell line, in nude mice. MMTV.f.huHER2(Fo5) transgenicRESEARCH ARTICLE Open Access Vaccination with human anti-trastuzumab anti-idiotype scFv reverses relapses in HER2-expressing breast cancer. Here, we tested whether trastuzumab-selected single-chain Fv (sc

  20. REVIEW Open Access Assessing environmental impacts of offshore wind

    E-Print Network [OSTI]

    Aberdeen, University of

    REVIEW Open Access Assessing environmental impacts of offshore wind farms: lessons learned offshore wind farm, Horns Rev 1 (160 MW with 80 turbines of 2 MW), became operational in 2002. The aver- age capacity of turbines and size of offshore wind farms have been increasing since then

  1. Diesel: Applying Privilege Separation to Database Access Adrienne Porter Felt

    E-Print Network [OSTI]

    Wagner, David

    Diesel: Applying Privilege Separation to Database Access Adrienne Porter Felt UC Berkeley apf reviewers. We construct a system called Diesel, which implements data sep- aration by intercepting database queries and applying mod- ules' restrictions to the queries. We evaluate Diesel on three widely

  2. RESEARCH Open Access Economic instruments for obesity prevention

    E-Print Network [OSTI]

    LaFrance, Jeffrey T.

    RESEARCH Open Access Economic instruments for obesity prevention: results of a scoping review: Comprehensive, multi-level approaches are required to address obesity. One important target for intervention of economic policies targeting obesity and its causal behaviours (diet, physical activity), and to make

  3. RESEARCH ARTICLE Open Access Survival advantages conferred to colon cancer

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RESEARCH ARTICLE Open Access Survival advantages conferred to colon cancer cells by E Klinck5 , François A Auger4 and Jacques Huot1* Abstract Background: Extravasation of circulating cancer cells is a key event of metastatic dissemination that is initiated by the adhesion of cancer cells

  4. RESEARCH ARTICLE Open Access A fungal endophyte induces transcription of

    E-Print Network [OSTI]

    Raizada, Manish N.

    RESEARCH ARTICLE Open Access A fungal endophyte induces transcription of genes encoding a redundant trees, proposed ecologically to act as a fungicide. Taxus is host to fungal endophytes, defined as organisms that inhabit plants without causing disease. The Taxus endophytes have been shown to synthesize

  5. Legal Access to Geographic Information: Measuring Losses or Developing Responses?

    E-Print Network [OSTI]

    Onsrud, Harlan J.

    are obvious and a focus on measuring losses in such situations seems misplaced when energies might be better and measurements those in power positions are often able to divert attention and energy away from the goals digital data environments. As a result, widespread loss of access to information and works of knowledge

  6. Error Exponent for Discrete Memoryless Multiple-Access Channels

    E-Print Network [OSTI]

    Anastasopoulos, Achilleas

    Error Exponent for Discrete Memoryless Multiple-Access Channels by Ali Nazari A dissertation Bayraktar Associate Professor Jussi Keppo #12;c Ali Nazari 2011 All Rights Reserved #12;To my parents. ii Becky Turanski, Nancy Goings, Michele Feldkamp, Ann Pace, Karen Liska and Beth Lawson for efficiently

  7. EDITORIAL Open Access Focused ultrasound development and clinical

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    EDITORIAL Open Access Focused ultrasound development and clinical adoption: 2013 update sector investments into the field, all within a multi-stakeholder environment. We present here a snapshot of acoustic energy into the brain was an in- vasive procedure because of the reflection, absorption

  8. RESEARCH Open Access Patient-reported outcomes among patients using

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    with those for clinical outcomes. Conclusions: These data from a clinical practice study support those from, Injectable therapy, Patient-reported outcomes * Correspondence: mtheod@ebie.gr 8 Department of ClinicalRESEARCH Open Access Patient-reported outcomes among patients using exenatide twice daily

  9. Database tool ASGARD: an open-access database of

    E-Print Network [OSTI]

    Extavour, Cassandra

    Database tool ASGARD: an open-access database of annotated transcriptomes for emerging model database, the Assembled Searchable Giant Arthropod Read Database (ASGARD). This database is a repository include search term auto-completion sug- gestions based on database content, the ability to download

  10. RESEARCH Open Access Half-molar sodium lactate infusion improves

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    RESEARCH Open Access Half-molar sodium lactate infusion improves cardiac performance in acute heart for the myocardium at rest and during stress. We tested the effects of half-molar sodium lactate infusion on cardiac by 1 ml/kg/h continuous infusion for 24 hours. The control group received only a 3 ml/kg bolus

  11. POSTER PRESENTATION Open Access Spatiotemporal dynamics in the human brain

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    POSTER PRESENTATION Open Access Spatiotemporal dynamics in the human brain during rest: a virtual brain study Andreas Spiegler* , Enrique Hansen, Viktor K Jirsa From Twenty Second Annual Computational Neuroscience Meeting: CNS*2013 Paris, France. 13-18 July 2013 Over the past years the ongoing human brain

  12. Interactive open access publishing and public peer review: The effectiveness

    E-Print Network [OSTI]

    Cambridge, University of

    are clearly demonstrated by the highly successful interactive open access journal Atmospheric Chemistry and Physics (ACP, www.atmos- chem-phys.net) and a growing number of sister journals launched by the publisher Copernicus (www.copernicus.org) and the European Geosciences Union (EGU, www.egu.eu). These journals

  13. Searching Instructions "How do I access the rental listings?"

    E-Print Network [OSTI]

    California at Santa Cruz, University of

    from any page on our web site to access the Housing Registry program. Follow the instructions to your UCSC e-mail account as they are posted on the Community Rentals' web site. You must search through yourself from the mailing list at any time through the "Waiting List Removal" web page on the Housing

  14. Distributed Medium Access Control for Next Generation CDMA Wireless Networks

    E-Print Network [OSTI]

    Zhuang, Weihua

    Distributed Medium Access Control for Next Generation CDMA Wireless Networks Hai Jiang, Princeton wireless networks are expected to have a simple infrastructure with distributed control. In this article, we consider a generic distributed network model for future wireless multi- media communications

  15. MEDIUM ACCESS CONTROL LAYER FOR UNDERWATER SENSOR NETWORKS*

    E-Print Network [OSTI]

    Chen, Min

    sensor networks, energy-efficient reliable MAC protocol, and slotted FAMA MAC protocol and low1 CHAPTER 1 MEDIUM ACCESS CONTROL LAYER FOR UNDERWATER SENSOR NETWORKS* Yanping Zhang* , Yang Xiao of Alabama Tuscaloosa, AL 35487-0290 USA E-mail: yangxiao@ieee.org + Dept. of Electrical and Computer

  16. RESEARCH ARTICLE Open Access Intratracheally administered titanium dioxide or

    E-Print Network [OSTI]

    Boyer, Edmond

    RESEARCH ARTICLE Open Access Intratracheally administered titanium dioxide or carbon black,2,5,6* Abstract Background: Titanium dioxide (TiO2) and carbon black (CB) nanoparticles (NPs) have biological a particle's size to the nanometric dimension can greatly modify its properties for applications

  17. RESEARCH Open Access Ecotypic variation for seed dormancy, longevity

    E-Print Network [OSTI]

    Snow, Allison A.

    and persistence Asfaw Adugna Abstract Seed dispersal is one of the vehicles of gene flow in plants. If a seedCorrespondence: asfaw123@rediffmail.com Melkassa Agricultural Research Center, P.O. Box 1085, Adama, Ethiopia a SpringerOpen Journal 2013 Adugna; licensee Springer. This is an Open Access article distributed under the terms

  18. Automated Mutation Testing of Access Control Policies Evan Martin

    E-Print Network [OSTI]

    Young, R. Michael

    North Carolina State University Raleigh, NC 27695 eemartin@ncsu.edu Tao Xie Department of Computer checking test outputs (responses) against ex- pected ones. Unfortunately, manual testing is tedious and few used security mechanisms. It controls which prin- cipals such as users or processes have access

  19. Automated Test Generation for Access Control Policies Evan Martin

    E-Print Network [OSTI]

    Xie, Tao

    North Carolina State University Raleigh, NC 27695 eemartin@ncsu.edu Tao Xie Department of Computer of responses) against expected ones. Unfortunately, manual test generation is tedious and manually generated mechanisms control which principals such as users and processes have access to which resources in a system

  20. CASE REPORT Open Access Prognostic value of cortically induced motor

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    CASE REPORT Open Access Prognostic value of cortically induced motor evoked activity by TMS) showing total absence of motor activity evoked by transcranial magnetic stimulation (TMS) of spared regions of the left motor cortex, but near-to-complete recovery of motor abilities in the affected hand

  1. Random Access Compressed Sensing over Fading and Noisy Communication Channels

    E-Print Network [OSTI]

    Stojanovic, Milica

    of the climate change. Such applications require the least control and intervention as well as minimum energy1 Random Access Compressed Sensing over Fading and Noisy Communication Channels Fatemeh Fazel on integrating random sensing with the communication architecture, and achieves overall efficiency in terms

  2. CASE REPORT Open Access Etanercept may induce neurosarcoidosis in a

    E-Print Network [OSTI]

    Boyer, Edmond

    of etanercept in the development of neurosarcoidosis. Neurological symptoms onset in patients on TNF blockersCASE REPORT Open Access Etanercept may induce neurosarcoidosis in a patient treated for rheumatoid (etanercept) for seven years, and who developed a severe neurosarcoidosis. She had lymphocytic meningitis

  3. Dynamic access policies for unconditionally secure secret sharing schemes

    E-Print Network [OSTI]

    Martin, Keith

    Dynamic access policies for unconditionally secure secret sharing schemes Keith M. Martin.martin@rhul.ac.uk Abstract--- Secret sharing schemes are cryptographic primitives that can be employed in any situation where it is desirable to distribute information relating to secret data amongst a number of entities. Following a secure

  4. RESEARCH Open Access Multi-non-binary turbo codes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RESEARCH Open Access Multi-non-binary turbo codes Horia Balta1,2 , Catherine Douillard3 and Radu Lucaciu1* Abstract This paper presents a new family of turbo codes called multi-non-binary turbo codes (MNBTCs) that generalizes the concept of turbo codes to multi-non-binary (MNB) parallel concatenated

  5. www.nasa.gov WHITE SANDS MISSILE RANGE ACCESS CAPABILITIES

    E-Print Network [OSTI]

    and missile launch, tracking, and recovery · Nuclear effects testing · High-speed sled track · Directed energy weapons testing · Climatic and dynamic environments testing · Atmospheric research · Electronicwww.nasa.gov WHITE SANDS MISSILE RANGE ACCESS CAPABILITIES SUMMARY White Sands Test Facility (WSTF

  6. REVIEW Open Access Engineering microbes for tolerance to next-

    E-Print Network [OSTI]

    Dunlop, Mary

    REVIEW Open Access Engineering microbes for tolerance to next- generation biofuels Mary J Dunlop. This review highlights recent targeted approaches towards improving microbial tolerance to next-generation be engineered to produce biologically- derived replacements for gasoline, diesel, and aviation fuel. Although

  7. Goal-oriented Access Control Model for Ambient Assisted Living

    E-Print Network [OSTI]

    Boyer, Edmond

    interdisciplinary field aim- ing at supporting senior citizens in their home by means of embedded technologies not get notified of an emergency, the entire system would be useless. In this paper we present an access (AAL) [25, 24, 7] is a home environment enhanced with embedded technologies (sensors, cameras

  8. The Albany Particle Tower: Online Access for High School Students

    E-Print Network [OSTI]

    Cinabro, David

    The Albany Particle Tower: Online Access for High School Students Kristen Melnyk­Elsner Kimball education outreach program, the Albany Particle Tower (APT) has been made available online to students who to run the detector and analyze real time data. Introduction The Albany Particle Tower is a Cosmic Ray

  9. Accessibility of Computer Science: A Reflection for Faculty Members

    E-Print Network [OSTI]

    O'Leary, Dianne P.

    Accessibility of Computer Science: A Reflection for Faculty Members Dianne P. O'Leary \\Lambda June. This document benefitted from helpful advice and references from Nora Sleumer and Timothy O'Leary. Copyright Dianne P. O'Leary, 1999 Version 1: June 1999 1 Picture Yourself: You are male, almost 20 years old, naive

  10. Channel Access over Path Segments for Ultra Low Latency MANETs

    E-Print Network [OSTI]

    Ramanathan, Ram

    ranges foretell MANETs with very large diameters. Indeed, an architecture where dense low-cost relays Cambridge, MA 02138 Email: ramanath@bbn.com Fabrice Tchakountio BBN Technologies Cambridge, MA 02138 Email and CTS frames that acquire the access rights for an entire segment toward the destination, with virtual

  11. Share this with The number of employees accessing enterprise

    E-Print Network [OSTI]

    Fisher, Kathleen

    devices continues to grow. Employees want access to corporate information from their personal devices when separate personal and corporate workspaces on the same device to provide visibility and control for IT their own devices as they normally would when away from work, sending personal texts and emails or keeping

  12. RESEARCH ARTICLE Open Access Occupational exposure to asbestos and lung

    E-Print Network [OSTI]

    Boyer, Edmond

    RESEARCH ARTICLE Open Access Occupational exposure to asbestos and lung cancer in men: evidence consistently demonstrated that workplace exposure to it increases the risk of developing lung cancer. Few of lung cancer, and 2,053 controls recruited from 8 Canadian provinces between 1994 and 1997. Self

  13. RESEARCH Open Access Simultaneous cell growth and ethanol production

    E-Print Network [OSTI]

    Chen, Wilfred

    RESEARCH Open Access Simultaneous cell growth and ethanol production from cellulose steps to their practical usage for ethanol production. Ideally, a recombinant microorganism, possessing the capability to utilize cellulose for simultaneous growth and ethanol production, is of great interest. We have

  14. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    DOE Patents [OSTI]

    Musick, Charles R. (Castro Valley, CA); Critchlow, Terence (Livermore, CA); Ganesh, Madhaven (San Jose, CA); Slezak, Tom (Livermore, CA); Fidelis, Krzysztof (Brentwood, CA)

    2006-12-19T23:59:59.000Z

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  15. Duopoly Interaction and Expected Price for Local Access Running Heading: Duopoly Interaction and Expected Price for Local Access

    E-Print Network [OSTI]

    capital costs of access and, using U.S. Census data, compute an average network cost per subscriber for a household and compute the future expected value to the providers. #12;3 2 Replacement Cost Data For this study, we developed our own cost data so that we could explicitly link these data to data from the U

  16. Structured Databases on the Web: Observations and Implications

    E-Print Network [OSTI]

    Li, Chengkai

    interfaces, this "deep Web" of searchable databases is clearly an important frontier for data access exploring and integrating structured Web sources. On one hand, our "macro" study surveys the deep Web is the deep Web? How is it covered by current directory services?) On the other hand, our "micro" study

  17. Invited Editorial Manually structured digital abstracts: A scaffold for automatic

    E-Print Network [OSTI]

    Gerstein, Mark

    of machine-readable as well as hu- man-readable access and integration to large published data sets publishing into the database age [1,2]. An increasing number of projects are bring- ing us toward the reality. The final structured abstract a machine-readable snapshot of the soon-to-be-published data is subject

  18. Structured Finance

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solid ... Strengthening aStructure ofof the CompleteStructure

  19. Nanocrystal structures

    DOE Patents [OSTI]

    Eisler, Hans J. (Stoneham, MA); Sundar, Vikram C. (Stoneham, MA); Walsh, Michael E. (Everett, MA); Klimov, Victor I. (Los Alamos, NM); Bawendi, Moungi G. (Cambridge, MA); Smith, Henry I. (Sudbury, MA)

    2008-12-30T23:59:59.000Z

    A structure including a grating and a semiconductor nanocrystal layer on the grating, can be a laser. The semiconductor nanocrystal layer can include a plurality of semiconductor nanocrystals including a Group II-VI compound, the nanocrystals being distributed in a metal oxide matrix. The grating can have a periodicity from 200 nm to 500 nm.

  20. Nanocrystal structures

    DOE Patents [OSTI]

    Eisler, Hans J.; Sundar, Vikram C.; Walsh, Michael E.; Klimov, Victor I.; Bawendi, Moungi G.; Smith, Henry I.

    2006-12-19T23:59:59.000Z

    A structure including a grating and a semiconductor nanocrystal layer on the grating, can be a laser. The semiconductor nanocrystal layer can include a plurality of semiconductor nanocrystals including a Group IIVI compound, the nanocrystals being distributed in a metal oxide matrix. The grating can have a periodicity from 200 nm to 500 nm.

  1. Modeling access to wind resources in the United States

    SciTech Connect (OSTI)

    Short, W.D.

    1999-10-20T23:59:59.000Z

    To project the US potential to meet future electricity demands with wind energy, estimates of available wind resource and costs to access that resource are critical. The US Department of Energy (DOE) Energy Information Administration (EIA) annually estimates the US market penetration of wind in its Annual Energy Outlook series. For these estimates, the EIA uses wind resource data developed by the Pacific Northwest National Laboratory for each region of the country. However, the EIA multiplies the cost of windpower by several factors, some as large as 3, to account for resource quality, market factors associated with accessing the resource, electric grid impacts, and rapid growth in the wind industry. This paper examines the rationale behind these additional costs and suggests alternatives.

  2. Evaluation of the Tellabs 1150 GPON multiservice access platform.

    SciTech Connect (OSTI)

    Brenkosh, Joseph Peter; Wolf, Jimmie V.

    2014-11-01T23:59:59.000Z

    For over two years, Sandia National Laboratories has been using a Gigabit Passive Optical Network (GPON) access layer for selected networks. The GPON equipment includes the Tellabs 1150 Multiservice Access Platform (MSAP) Optical Line Terminal (OLT), the Tellabs ONT709 and ONT709GP Optical Network Terminals (ONTs), and the Panorama PON Network Manager. In late 2013, the Tellabs equipment was updated to Software Release FP27.1_015130. Because a new software release has the potential to affect performance and functionality, it needed to be thoroughly tested. This report documents that testing. It also provides a comparison between the current release and the previous Software Release FP25.5.1_013274 that was being used.

  3. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    E-Print Network [OSTI]

    Yu, Hong

    2012-01-01T23:59:59.000Z

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  4. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerabilit...

    Office of Environmental Management (EM)

    0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis...

  5. access-network association policies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    policies and authentication. Keywords: ANDSF, WiFi, WLAN, Untrusted access, non-3GPP, Policy with better choice. B. Untrusted Access is set to grow WiFi has recently re-gained...

  6. Architecting Dependable Access Control Systems for Multi-Domain Computing Environments

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    COMPUTING SCIENCE Architecting Dependable Access Control Systems for Multi-Domain Computing Modern computing systems are built based on Service Oriented Architectures and are made up of multiple interoperability in a heterogeneous computing environment. Access control systems ensure that services

  7. U.S. Wind Manufacturing: Taller Hub Heights to Access Higher...

    Broader source: Energy.gov (indexed) [DOE]

    U.S. Wind Manufacturing: Taller Hub Heights to Access Higher Wind Resources and Lower Cost of Energy U.S. Wind Manufacturing: Taller Hub Heights to Access Higher Wind Resources and...

  8. Mini-Robot Group User's Guide Part 2: Access From ITS

    E-Print Network [OSTI]

    Billmers, Meyer A.

    Part 2 of the MINI-ROBOT USER'S GUIDE describes those devices attached to the mini-robot system which may be accessed from ITS, and describes the appropriate software for accessing them. Specifically, the photowriter, ...

  9. Guidelines for left-turn bays at unsignalized access locations on arterial roadways

    E-Print Network [OSTI]

    Hawley, Patrick Emmett

    1994-01-01T23:59:59.000Z

    It has long been recognized that effective access management along arterial streets can alleviate traffic congestion. A major goal within access management is to limit the speed differential between turning and through vehicles. Left-turn bays...

  10. Citizen's Attitudes About Privacy: Results Citizen's Attitudes about Privacy While Accessing Government Websites

    E-Print Network [OSTI]

    Yang, Junfeng

    Citizen's Attitudes About Privacy: Results 1 Citizen's Attitudes about Privacy While Accessing 10027 March 3, 2003 Abstract This paper reports the results of an investigation on citizens' attitudes Private Portal that protects citizen's personally identifying information when accessing government

  11. E-Print Network 3.0 - access hiv services Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HIV Summary: on the prevention of HIV and STIs to women who do not frequently access health care services. Although prenatal care... fees. Mother-infant pairs had access to...

  12. Estimating solar access of typical residential rooftops: A case study in San Jose, CA

    E-Print Network [OSTI]

    Levinson, Ronnen M

    2008-01-01T23:59:59.000Z

    and/or thermal collection by rooftop solar-energy equipment.solar access of rooftop solar-energy systems, including photovoltaic panels and thermalsolar access of rooftop solar-energy systems, including photovoltaic panels and thermal

  13. VIDEO TRANSCODING GATEWAY FOR WIRELESS VIDEO ACCESS Zhijun Lei, Nicolas D. Georganas

    E-Print Network [OSTI]

    Ottawa, University of

    -000 - VIDEO TRANSCODING GATEWAY FOR WIRELESS VIDEO ACCESS Zhijun Lei, Nicolas D. Georganas several typical video transcoding architectures and major applications of video transcoding. We identify issues involved in access video streams through handheld devices and wireless networks. To handle

  14. Techniques to Access Databases and Integrate Data for Hydrologic Modeling

    SciTech Connect (OSTI)

    Whelan, Gene; Tenney, Nathan D.; Pelton, Mitchell A.; Coleman, Andre M.; Ward, Duane L.; Droppo, James G.; Meyer, Philip D.; Dorow, Kevin E.; Taira, Randal Y.

    2009-06-17T23:59:59.000Z

    This document addresses techniques to access and integrate data for defining site-specific conditions and behaviors associated with ground-water and surface-water radionuclide transport applicable to U.S. Nuclear Regulatory Commission reviews. Environmental models typically require input data from multiple internal and external sources that may include, but are not limited to, stream and rainfall gage data, meteorological data, hydrogeological data, habitat data, and biological data. These data may be retrieved from a variety of organizations (e.g., federal, state, and regional) and source types (e.g., HTTP, FTP, and databases). Available data sources relevant to hydrologic analyses for reactor licensing are identified and reviewed. The data sources described can be useful to define model inputs and parameters, including site features (e.g., watershed boundaries, stream locations, reservoirs, site topography), site properties (e.g., surface conditions, subsurface hydraulic properties, water quality), and site boundary conditions, input forcings, and extreme events (e.g., stream discharge, lake levels, precipitation, recharge, flood and drought characteristics). Available software tools for accessing established databases, retrieving the data, and integrating it with models were identified and reviewed. The emphasis in this review was on existing software products with minimal required modifications to enable their use with the FRAMES modeling framework. The ability of four of these tools to access and retrieve the identified data sources was reviewed. These four software tools were the Hydrologic Data Acquisition and Processing System (HDAPS), Integrated Water Resources Modeling System (IWRMS) External Data Harvester, Data for Environmental Modeling Environmental Data Download Tool (D4EM EDDT), and the FRAMES Internet Database Tools. The IWRMS External Data Harvester and the D4EM EDDT were identified as the most promising tools based on their ability to access and retrieve the required data, and their ability to integrate the data into environmental models using the FRAMES environment.

  15. AmiGO: online access to ontology and annotation data

    SciTech Connect (OSTI)

    Carbon, Seth; Ireland, Amelia; Mungall, Christopher J.; Shu, ShengQiang; Marshall, Brad; Lewis, Suzanna

    2009-01-15T23:59:59.000Z

    AmiGO is a web application that allows users to query, browse, and visualize ontologies and related gene product annotation (association) data. AmiGO can be used online at the Gene Ontology (GO) website to access the data provided by the GO Consortium; it can also be downloaded and installed to browse local ontologies and annotations. AmiGO is free open source software developed and maintained by the GO Consortium.

  16. The Scale of Population Structure in Arabidopsis thaliana Alexander Platt1

    E-Print Network [OSTI]

    Weigel, Detlef

    The Scale of Population Structure in Arabidopsis thaliana Alexander Platt1 , Matthew Horton2. , Yu. Citation: Platt A, Horton M, Huang YS, Li Y, Anastasio AE, et al. (2010) The Scale of Population Structure, 2010; Published February 12, 2010 Copyright: 2010 Platt et al. This is an open-access article

  17. A JEE RESTful service to access Conditions Data in ATLAS

    E-Print Network [OSTI]

    Formica, Andrea; The ATLAS collaboration

    2015-01-01T23:59:59.000Z

    Usage of Conditions Data in ATLAS is extensive for offline reconstruction and analysis (for example: alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemas (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemas at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of an intermediate java application server (JBoss), where an application delivering access to the DB via RESTful services has been deployed. The services allow navigation over multiple schema content, via simple URLs. The queried data can be retrieved either in XML or JSON formats, vi...

  18. A JEE RESTful service to access Conditions Data in ATLAS

    E-Print Network [OSTI]

    Formica, Andrea; The ATLAS collaboration

    2015-01-01T23:59:59.000Z

    Usage of Conditions Data in ATLAS is extensive for offline reconstruction and analysis (e.g.: alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemata (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemata at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of a Java application providing DB access via RESTful services, deployed inside an application server (JBoss WildFly). The services allow navigation over multiple schemata via simple URLs. The data can be retrieved either in XML or JSON formats, via simple clients (like curl or Web browser...

  19. Development of a statistically based access delay timeline methodology.

    SciTech Connect (OSTI)

    Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane; Hendrickson, Stacey M. Langfitt

    2013-02-01T23:59:59.000Z

    The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversary's task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significant funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.

  20. Data access in a heterogeneous environment: Case study

    SciTech Connect (OSTI)

    Gencer, S.; Mosher, D.J.; Shields, R.S. [Mobil E and P Technical Center, Dallas, TX (United States); Sciretta, R.P. [Mobil New Business Development Group, Dallas, TX (United States); Tidemann, T.K. [Mobil Exploration, Stavanger (Norway)

    1994-12-31T23:59:59.000Z

    A pilot test was recently completed at Mobil`s Dallas offices to validate the capabilities of a commercially available set of rapid development tools. The object of the pilot was to build a system for the simultaneous access of E and P data from a variety of networked database systems on various hardware platforms utilizing PC frontends. The test involved Mobil technical support and business unit personnel working with Hewlett Packard implementation specialists familiar with the Open Environment Corporation development tools. The case study involved building a system to permit general access to the following data sources commonly used within one of Mobil`s business units; CARS (an indexing system residing on IBM tapes), RIM (an indexing system residing on a VAX cluster), and a Technical Library database (library listings residing on a MicroVAX). The test was completed in two phases over a seven week period involving 20 person/days of HP development effort. Mobil personnel commitment was comparable consisting of data administration tasks, conversion of the CARS system to a relational implementation, and development of VAX based server systems. The Pilot Test was considered successful and achieved basic data access functionality. The system provided a uniform user frontend and reduced search time from days to minutes for the data sources targeted. The technique and tools used in the test facilitated rapid developments of value added resources for the geoscientist.

  1. A Role-Based Access Control (RBAC) Schema for REAP Web App

    SciTech Connect (OSTI)

    Klasky, Hilda B [ORNL; Tadinada, Sashi [ORNL; Williams, Paul T [ORNL; Bass, Bennett Richard [ORNL

    2013-09-01T23:59:59.000Z

    This document describes a Role-Based Access Control (RBAC) Schema for Reactor Embrittlement Archive Project Web App.

  2. Banner/DSD Finance & Human Resources Security Access Questionnaire User Name (print): ____

    E-Print Network [OSTI]

    Pantaleone, Jim

    Banner/DSD Finance & Human Resources Security Access Questionnaire User Name (print): ____ First ____Temp____ Student Emp ____ ____ If this is your first Finance/Human Resources access request: To help training may be required for some access groups. _____ If this request is to update existing Finance

  3. Equality and Diversity E-training Guidance How do I access the training?

    E-Print Network [OSTI]

    Levi, Ran

    Equality and Diversity E-training Guidance How do I access the training? You are already registered as a user on the system. You can access the training and save your progress in four quick steps. 1. Firstly, access the training through the following link: https://abdn.marshallacmtraining.co.uk/courselist. 2

  4. PHYSICS DIVISION ESH BULLETIN 2008-1 Access Requirements for HRIBF Controlled-Entry Areas

    E-Print Network [OSTI]

    beam is present: Dosimeters are always required in Building 6000. Facility-specific training (Building 6000 Access Training) is required for unescorted access to Building 6000. Facility-specific training (HRIBF Radiological Safety) is required for unescorted access to HRIBF Controlled-Entry Areas when

  5. Recent Advances in Access Control S. De Capitani di Vimercati, S. Foresti, and P. Samarati

    E-Print Network [OSTI]

    Samarati, Pierangela

    by a system and determining whether the request should be granted or denied. Traditional access control models control model, and access control mechanism. A policy defines the high level rules used to verify whether in the access control policy does not require any changes in the mechanism. Also, the separation between model

  6. On the Formal Analysis of a Spatio-Temporal Role-Based Access Control Model

    E-Print Network [OSTI]

    Ray, Indrakshi

    On the Formal Analysis of a Spatio-Temporal Role-Based Access Control Model Manachai Toahchoodee. For crit- ical applications, a model for spatio-temporal-based access control is needed that increases. Consequently, researchers have proposed various spatio-temporal access control models that are useful

  7. A Theory for Comparing the Expressive Power of Access Control Mahesh V. Tripunitara Ninghui Li

    E-Print Network [OSTI]

    Li, Ninghui

    A Theory for Comparing the Expressive Power of Access Control Models Mahesh V. Tripunitara Ninghui,ninghui}@cerias.purdue.edu Abstract Comparing the expressive power of access control models is recognized as a fundamental problem it im- possible to put results and claims about the expressive power of access control models

  8. Attribute-based Mining Process for the Organization-Based Access Control Model

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    to analyze and evaluate the access control systems. A model is a formal presentation of the security policyAttribute-based Mining Process for the Organization-Based Access Control Model Ahmad Samer Wazan}@telecom-sudparis.eu Abstract--Since the late 60's, different security access control models have been proposed. Their rationale

  9. Access Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina De Capitani di Vimercati2

    E-Print Network [OSTI]

    Samarati, Pierangela

    : it defines the (high-level) rules according to which access control must be regulated.1 Security modelAccess Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina De Capitani di. In this chapter we investigate the basic concepts behind access control design and enforcement, and point out

  10. Model-checking Access Control Policies Dimitar P. Guelev Mark Ryan Pierre Yves Schobbens

    E-Print Network [OSTI]

    Ryan, Mark

    of sophisticated access control systems, such as those which can be described using our model, is indirect pathsModel-checking Access Control Policies Dimitar P. Guelev Mark Ryan Pierre Yves Schobbens July 9, 2004 Abstract We present a model of access control which provides fine-grained data-dependent control

  11. Clustering of Web Users Based on Access Patterns Yongjian Fu Kanwalpreet Sandhu MingYi Shih

    E-Print Network [OSTI]

    Fu, Yongjian

    Clustering of Web Users Based on Access Patterns Yongjian Fu Kanwalpreet Sandhu MingYi Shih The clustering of the Web users based on their access patterns is studied. Access patterns of the Web users are extracted from Web servers' log files, and then organized into sessions which represent episodes

  12. Access Control Hygiene and the Empathy Gap in Medical IT Yifei Wang Sean Smith Andrew Gettinger

    E-Print Network [OSTI]

    Access Control Hygiene and the Empathy Gap in Medical IT Yifei Wang Sean Smith Andrew Gettinger the enterprise and clinicians to regulatory and legal punishments). Access Control Hygiene In computer security passwords, post-it notes, and other circumvention. One researcher termed this the access control hygiene

  13. Access Regulation to Hot-Modules in Wormhole NoCs Isask'har Walter1

    E-Print Network [OSTI]

    Kolodny, Avinoam

    Access Regulation to Hot-Modules in Wormhole NoCs Isask'har Walter1 , Israel Cidon2 , Ran Ginosar2 low-cost credit based distributed access regulation technique that fairly allocates access rights and destination in a pipeline fashion. The main drawback of wormhole switching is its sensitivity to packet

  14. Access Regulation to Hot-Modules in Wormhole NoCs

    E-Print Network [OSTI]

    Ginosar, Ran

    1 Access Regulation to Hot-Modules in Wormhole NoCs I. Walter1 , I. Cidon2 , R. Ginosar2 , A low-cost credit based distributed access regulation technique that fairly allocates access rights between the source and destination in a pipeline fashion. The main drawback of wormhole switching is its

  15. A Remote Access Training System for the Detection of Colorectal Polyps at Computed

    E-Print Network [OSTI]

    Whelan, Paul F.

    A Remote Access Training System for the Detection of Colorectal Polyps at Computed Tomography that have the relevant CTC training. We have developed a novel remote access system for CTC training. Our of our remote access CTC training system. The evaluation of the system is also discussed

  16. Mining Likely Properties of Access Control Policies via Association Rule Mining

    E-Print Network [OSTI]

    Xie, Tao

    Mining Likely Properties of Access Control Policies via Association Rule Mining JeeHyun Hwang1 Tao.hu@nist.gov maltunay@fnal.gov Abstract. Access control mechanisms are used to control which princi- pals (such as users Introduction Access control mechanisms are used to control which principals (such as users or processes) have

  17. BASIC UNIX COMMANDS 2 man -Accessing On-Line Manual Pages 1

    E-Print Network [OSTI]

    BASIC UNIX COMMANDS Contents 1 Intro 1 2 man - Accessing On-Line Manual Pages 1 3 pwd - Print will be available from their on-line manual pages (accessed through the man command described below). Each command). Note that your prompt may be different. 2 man - Accessing On-Line Manual Pages The man command looks up

  18. Superconducting structure

    DOE Patents [OSTI]

    Kwon, Chuhee (Los Alamos, NM); Jia, Quanxi (Los Alamos, NM); Foltyn, Stephen R. (Los Alamos, NM)

    2003-04-01T23:59:59.000Z

    A superconductive structure including a dielectric oxide substrate, a thin buffer layer of a superconducting material thereon; and, a layer of a rare earth-barium-copper oxide superconducting film thereon the thin layer of yttrium-barium-copper oxide, the rare earth selected from the group consisting of samarium, gadolinium, ytterbium, erbium, neodymium, dysprosium, holmium, lutetium, a combination of more than one element from the rare earth group and a combination of one or more elements from the rare earth group with yttrium, the buffer layer of superconducting material characterized as having chemical and structural compatibility with the dielectric oxide substrate and the rare earth-barium-copper oxide superconducting film is provided.

  19. Terminal structure

    DOE Patents [OSTI]

    Schmidt, Frank (Langenhagen, DE); Allais, Arnaud (Hannover, DE); Mirebeau, Pierre (Villebon sur Yvette, FR); Ganhungu, Francois (Vieux-Reng, FR); Lallouet, Nicolas (Saint Martin Boulogne, FR)

    2009-10-20T23:59:59.000Z

    A terminal structure (2) for a superconducting cable (1) is described. It consists of a conductor (2a) and an insulator (2b) that surrounds the conductor (2a), wherein the superconducting cable (1) has a core with a superconducting conductor (5) and a layer of insulation that surrounds the conductor (5), and wherein the core is arranged in such a way that it can move longitudinally in a cryostat. The conductor (2a) of the terminal structure (2) is electrically connected with the superconducting conductor (5) or with a normal conductor (6) that is connected with the superconducting conductor (5) by means of a tubular part (7) made of an electrically conductive material, wherein the superconducting conductor (5) or the normal conductor (6) can slide in the part (7) in the direction of the superconductor.

  20. Superconducting Structure

    DOE Patents [OSTI]

    Kwon, Chuhee (Los Alamos, NM); Jia, Quanxi (Los Alamos, NM); Foltyn, Stephen R. (Los Alamos, NM)

    2005-09-13T23:59:59.000Z

    A superconductive structure including a dielectric oxide substrate, a thin buffer layer of a superconducting material thereon; and, a layer of a rare earth-barium-copper oxide superconducting film thereon the thin layer of yttrium-barium-copper oxide, the rare earth selected from the group consisting of samarium, gadolinium, ytterbium, erbium, neodymium, dysprosium, holmium, lutetium, a combination of more than one element from the rare earth group and a combination of one or more elements from the rare earth group with yttrium, the buffer layer of superconducting material characterized as having chemical and structural compatibility with the dielectric oxide substrate and the rare earth-barium-copper oxide superconducting film is provided.