Powered by Deep Web Technologies
Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

2

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

3

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

4

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

5

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

6

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

7

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

8

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

9

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

10

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

11

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

12

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

13

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

14

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

15

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

16

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security  

Broader source: Energy.gov (indexed) [DOE]

97: Google Chrome Prior to 13.0.782.107 Multiple Security 97: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities August 19, 2011 - 3:02pm Addthis PROBLEM: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. PLATFORM: Cross Platform: Google Chrome Prior to 13.0.782.107: Versions and Vulnerabilities (Details) ABSTRACT: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. The Chromium Projects Security Overview. reference LINKS: SecurityFocus: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

17

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

18

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

19

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

20

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

22

V-038: Google Chrome Two Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: Google Chrome Two Vulnerabilities 8: Google Chrome Two Vulnerabilities V-038: Google Chrome Two Vulnerabilities December 3, 2012 - 1:00am Addthis PROBLEM: Google Chrome Two Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 23.0.1271.95. ABSTRACT: Two vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA51447 CVE-2012-5137 CVE-2012-5138 IMPACT ASSESSMENT: High DISCUSSION: Two vulnerabilities have been reported in Google Chrome, where one has an unknown impact and the other can be exploited by malicious people to compromise a user's system. 1) An error exists when handling file paths. 2) A use-after-free error exists when handling media sources. The vulnerabilities are reported in versions prior to 23.0.1271.95. IMPACT:

23

T-604: Google Chrome updated version of the Adobe Flash player | Department  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome updated version of the Adobe Flash player 4: Google Chrome updated version of the Adobe Flash player T-604: Google Chrome updated version of the Adobe Flash player April 15, 2011 - 4:30am Addthis PROBLEM: Chrome Stable and Beta channels have been updated to 10.0.648.134 for Windows, Mac, Linux and Chrome Frame PLATFORM: Windows, Mac, Linux and Chrome Frame ABSTRACT: The Chrome Stable channel has been updated to 10.0.648.205 for Windows, Mac, Linux and Chrome Frame. This release contains a new version of Adobe Flash 0-Day CVE-2011-0611. Update also includes a fix for a security vulnerability Critical CVE-2011-1300: Off-by-three in GPU process, CVE-2011-1301: Use-after-free in the GPU process, and CVE-2011-1302: Heap overflow in the GPU process. OTHER LINKS: Google Chrome Releases - Google Chrome Browser

24

V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome Flash Plug-in Lets Remote Users Conduct 4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 - 12:56am Addthis PROBLEM: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks PLATFORM: Google Chrome prior to 27.0.1453.116 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028694 CVE-2013-2866 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted Flash content that, when loaded by the target user, will display the Flash settings in a transparent manner, which may allow the remote user to cause the target user to modify their Flash settings. This may allow the remote user to obtain potentially

25

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

09: Google Chrome WebKit Type Confusion Error Lets Remote Users 09: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code March 12, 2013 - 12:11am Addthis PROBLEM: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028266 CVE-2013-0912 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and execute arbitrary code on the target system. The code will run with the privileges

26

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users 1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November 18, 2011 - 9:00am Addthis PROBLEM: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Version(s) prior to 15.0.874.121 ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Stable Channel Update CVE-2011-3900 SecurityTracker Alert ID: 1026338 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user,

27

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

28

T-632: Google Chrome OS before R12 0.12.433.38 Beta Update | Department of  

Broader source: Energy.gov (indexed) [DOE]

32: Google Chrome OS before R12 0.12.433.38 Beta Update 32: Google Chrome OS before R12 0.12.433.38 Beta Update T-632: Google Chrome OS before R12 0.12.433.38 Beta Update May 31, 2011 - 2:00pm Addthis PROBLEM: Unspecified vulnerability in the dbugs package in Google Chrome OS before R12 0.12.433.38 Beta has unknown impact and attack vectors. The Chrome OS Beta channel has announced an updated to R12 release 0.12.433.38 features of Chrome 12 Beta include, new trackpad, new flash player and several stability and functional improvements over the previous releases. PLATFORM: Products Affected By CVE-2011-2171: Google Chrome OS (Previous Releases) ABSTRACT: CVE-2011-2171 addresses unspecified vulnerabilities in the dbugs package of Google Chrome OS. Prior versions of Google Chrome can be fixed by updating to the current release. Information and content related to this CVE was

29

V-035: Google Chrome Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

of the target user. An out-of-bounds read may occur in Skia CVE-2012-5130. A memory corruption error may occur in the Apple OSX driver for Intel GPUs CVE-2012-5131. A...

30

U-277: Google Chrome Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

A crash may occur in Skia text rendering CVE-2012-2900. A race condition may occur in audio device handling CVE-2012-5108. An out-of-bounds read may occur in ICU regex...

31

Google  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

settings Web History Google Google Search I'm Feeling Lucky Advanced search Language tools Advertising Programs Business Solutions +Google About Google 2013 - Privacy & Terms...

32

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

33

T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle  

Broader source: Energy.gov (indexed) [DOE]

711: Fraudulent Google Digital Certificates Could Allow 711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks September 7, 2011 - 9:30am Addthis PROBLEM: A fraudulent Google.com digital certificate was issued by a certificate authority. This certificate could allow an unauthenticated, remote attacker to access sensitive user data via a man-in-the-middle attack. PLATFORM: Most Microsoft Windows operating systems, DigiNotar is a CA in the Trusted Root Certification Authorities certificate store. Multiple browsers, including Microsoft Internet Explorer, Google Chrome, and Mozilla Firefox could also be configured with the compromised CA as one of their trusted issuers. ABSTRACT: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle

34

Success Story: Chrome Deposit Corporation  

Broader source: Energy.gov [DOE]

This case study describes how Chrome Deposit Corporation was able to reduce plant-wide energy use, minimize its environmental impact, and improve energy management practices amidst ongoing growth.

35

Low-Chrome/Chrome Free Refractories for Slagging Gasifiers  

SciTech Connect (OSTI)

Gasifiers are containment vessels used to react carbon-containing materials with oxygen and water, producing syngas (CO and H2) that is used in chemical and power production. It is also a potential source of H2 in a future hydrogen economy. Air cooled slagging gasifiers are one type of gasifier, operating at temperatures from 1275-1575º C and at pressures of 400 psi or higher. They typically use coal or petroleum coke as the carbon source, materials which contain ash impurities that liquefy at the gasification temperatures, producing liquid slag in quantities of 100 or more tons/day, depending on the carbon fed rate and the percent ash present in the feedstock. The molten slag is corrosive to refractory linings, causing chemical dissolution and spalling. The refractory lining is composed of chrome oxide, alumina, and zirconia; and is replaced every 3-24 months. Gasifier users would like greater on-line availability and reliability of gasifier liners, something that has impacted gasifier acceptance by industry. Research is underway at NETL to improve refractory service life and to develop a no-chrome or low-chrome oxide alternative refractory liner. Over 250 samples of no- or low-chrome oxide compositions have been evaluated for slag interactions by cup testing; with potential candidates for further studies including those with ZrO2, Al2O3, and MgO materials. The development of improved liner materials is necessary if technologies such as IGCC and DOE’s Near Zero Emissions Advanced Fossil Fuel Power Plant are to be successful and move forward in the marketplace.

Bennett, J.P.; Kwong, K.-S.; Powell, C.P.; Thomas, H.; Petty, A.V., Jr.

2007-01-01T23:59:59.000Z

36

Google Earth Gallery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Google Earth Gallery Google Earth Gallery Use Google Earth to view our efforts in cleaning the past, protecting the present, and creating a sustainable future. Tours Air Quality...

37

How To Setup EHSS Landing Page As Default Home Page For Google...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

in the far right of the top menu (the icon looks like a page with multiple horizontal lines on it). STEP 1: In Chrome enter the URL http:energy.govehss. Once the EHSS site...

38

How To Setup EA Landing Page As Default Home Page For Google...  

Energy Savers [EERE]

in the far right of the top menu (the icon looks like a page with multiple horizontal lines on it). STEP 1: In Chrome enter the URL http:energy.goviea. Once the EA site loads,...

39

GOOGLE EARTH QUICK GUIDE (1)Google Earth Features  

E-Print Network [OSTI]

GOOGLE EARTH QUICK GUIDE (1)Google Earth Features The Google Earth of the Google Earth window. Often when opening up the Google Earth program, the view screen will be a view of the entire Earth from space. Navigation bar

Smith-Konter, Bridget

40

Google Confidential and Proprietary Google Confidential and Proprietary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Google Confidential and Proprietary Google Confidential and Proprietary Google Confidential and Proprietary Google Confidential and Proprietary Google Inc. March 21, 2013 NREL Webinar How Google gets to "Zero" Google Confidential and Proprietary Industry Average Data Center PUE, 2011 = 1.83 DATA CENTER ENERGY USE IN CONTEXT Google Confidential and Proprietary GOOGLE'S CARBON FOOTPRINT In 2011, Google's electricity consumption was ~2.7M MWh, with a carbon footprint of ~1.7M metric tonnes of CO

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

T-554: Race condition in Google Chrome before 9.0.597.84 allows...  

Broader source: Energy.gov (indexed) [DOE]

9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio. reference LINKS: The Chromium Projects - Chromium Security Security Database -...

42

Google SOAP API Google API Teil II / berblick CVS  

E-Print Network [OSTI]

Google SOAP API CVS Google API Teil II / Ã?berblick CVS Projektgruppe 520 Rafael Koloch 12. Oktober 2007 Rafael Koloch Google API Teil II / Ã?berblick CVS #12;Google SOAP API CVS Webservice Denition Webservice Aufruf Webservice Ergebnis auswerten Demonstration Ã?berblick Google API: Denition des Web

Morik, Katharina

43

Chrome Deposit Corporation and the University of Delaware IAC: Another  

Broader source: Energy.gov (indexed) [DOE]

Chrome Deposit Corporation and the University of Delaware IAC: Chrome Deposit Corporation and the University of Delaware IAC: Another Energy Efficiency Success Story Chrome Deposit Corporation and the University of Delaware IAC: Another Energy Efficiency Success Story November 2, 2011 - 2:11pm Addthis Pictured left to right: University of Delaware students Joseph Camp and Nicole Suto; Keith Goossen, director of the Industrial Assessment Center; and Cesar Duarte, University of Delaware grad student. | Image courtesy of UD. Pictured left to right: University of Delaware students Joseph Camp and Nicole Suto; Keith Goossen, director of the Industrial Assessment Center; and Cesar Duarte, University of Delaware grad student. | Image courtesy of UD. April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs

44

Google as a bookmarking tool  

E-Print Network [OSTI]

In this thesis, a scheme is presented that harnesses the power of Google to locate previously visited webpages. Instead of bookmarking webpages by their URL, this process is based on addressing pages by their Google URL, ...

Jazayeri, Ryan, 1981-

2004-01-01T23:59:59.000Z

45

Chapter 11 - Google Hacking Showcase  

Science Journals Connector (OSTI)

Publisher Summary This chapter deals with the Google hacking showcase. As quoted by the founder of the Google hacking database, this chapter states that Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers access it at their disposal. It takes a look at some technical discoveries uncovered by Google hackers. It begins by various utilities that really have no business being online, unless of course one's goal is to aid hackers. Following this, it considers open network devices and open applications, neither of which requires any real hacking to gain access to. Through various examples, it describes what can go drastically wrong when the Google hacking threat is ignored, thus emphasizing the importance of knowledge of understanding of Google hacking, and online security measures.

Johnny Long

2008-01-01T23:59:59.000Z

46

Strategic Use of Information Technology - Google  

E-Print Network [OSTI]

Google Earth, and Google SketchUp do not. The only hardwarefor images online Google SketchUp 3-D model design tool

Chen, Rex; Lam, Oisze; Kraemer, Kenneth

2007-01-01T23:59:59.000Z

47

Virtual Fieldwork Using Google Earth  

E-Print Network [OSTI]

Buchanan-Dunlop © 2008 Google © 2008 Ricardo Sgrillo All rights reserved cover design by rob `at.3 Overlay Features 26 5.4 Terrain Integration 27 5.5 Creating an Image Overlay 28 Section 6 - Importing Links 74 Appendix 2 - Google Earth Quick Guide 75 Appendix 3 - Glossary 77 Appendix 4 - Rich Text

Smith-Konter, Bridget

48

Chapter 6 - Google Hacking Showcase  

Science Journals Connector (OSTI)

Publisher Summary This chapter focuses on what can go drastically wrong when the Google hacking threat is ignored. A decent no-tech hacker can accumulate a library of significant data just by observing the world around him. But often that data is completely useless on its own. Arguably the most well known of no-tech hacking techniques among hackers in the know, Google hacking has become a standard weapon in every attacker's arsenal. A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. Google Hacking Showcase consists of screenshots of wild Google hacks the author had witnessed. Borrowing from the pool of interesting Google queries he had created, along with scores of queries from the community. The author snagged screenshots and presented them one at a time, making smarmy comments along the way. It makes sense to include the showcase in the edition of Google Hacking.

Johnny Long; Scott Pinzon; Jack Wiles; Kevin D. Mitnick

2008-01-01T23:59:59.000Z

49

Chapter 10 - Hacking Google Services  

Science Journals Connector (OSTI)

Publisher Summary This chapter describes ways of hacking into Google services. It reveals tricks to recover interesting information from Google's vast indexes. AJAX Search API is one of the leading Google services on the AJAX front. This service is meant as a replacement of the older SOAP search service which support was discontinued some time ago. AJAX Search API is considered to be more powerful then the SOAP service and easier to work with. The primary goal of the service is to enable external websites to host Google supplied gadgets which provide searching facilities within or outside of the hosting website and also among video clips, maps, blogs, custom search engines, etc. The Google AJAX Search API is designed to be embedded within external pages. This is described in the study. Following this, it reveals the characteristics of AJAX search, using Firefox as the primary tool of development. Furthermore, it describes the ways of hacking into the AJAX search engine. It also discusses Google calendar, Google's blog search, and subversion version management system. Finally, the study demonstrates that that the search facility is quite fuzzy and queries need to be often refined in order to get better results.

Johnny Long

2008-01-01T23:59:59.000Z

50

Google Earth, den universale GIS-klienten?.  

E-Print Network [OSTI]

??Google has released a virtual three-dimensional model of the earth through the product Google Earth. This product gives us easy access to huge amounts of… (more)

Bøhn, Eivind

2006-01-01T23:59:59.000Z

51

IN-SPIRE: Creating a Visualization from a Google Search  

SciTech Connect (OSTI)

IN-SPIRE can harvest web pages from a Google search using the main site, Google News, or Google Scholar.

None

2011-05-01T23:59:59.000Z

52

IN-SPIRE: Creating a Visualization from a Google Search  

ScienceCinema (OSTI)

IN-SPIRE can harvest web pages from a Google search using the main site, Google News, or Google Scholar.

None

2012-12-31T23:59:59.000Z

53

Chapter 3 - Google Hacking Basics  

Science Journals Connector (OSTI)

Publisher Summary This chapter focuses on the basics of Google hacking and the functionality of the directory listings that can be used to locate specific files and directories. Google cache is a powerful tool in the hands of an advanced user. It can be used to locate old versions of pages that may expose information that normally would be unavailable to the casual user. The cache can be used to highlight terms in the cached version of a page, even if the terms were not used as part of the query to find that page. An advanced Google user will always pay careful attention to the details contained in the cached page's header, since there can be important information about the date the page was crawled, the terms that were found in the search, whether the cached page contains external images, links to the original page, and the text of the URL used to access the cached version of the page. Directory listings contain a great deal of information that is interesting from a security perspective. The directory listings can be used to determine specific information about the software installed on a server. Traversal techniques can be used to locate information that is often outside the piercing gaze of Google's crawlers. The chapter explores some specific techniques including directory traversal, incremental substitution, and extension walking.

2005-01-01T23:59:59.000Z

54

Machine Learning Applications for Data Center Optimization Jim Gao, Google  

E-Print Network [OSTI]

The modern data center (DC) is a complex interaction of multiple mechanical, electrical and controls systems improvements in hardware affordability and the exponential growth of Big Data, the modern Internet companyMachine Learning Applications for Data Center Optimization Jim Gao, Google Abstract

Cortes, Corinna

55

Strategic Use of Information Technology - Google  

E-Print Network [OSTI]

google/technology.pdf Barroso, L. A. , Dean, J. , & Holzle,Cost Query Source: Barroso, et al, 2003. Performance To

Chen, Rex; Lam, Oisze; Kraemer, Kenneth

2007-01-01T23:59:59.000Z

56

Adding STARFire Analysis Layers to Google Earth through a KML Network Link 1) Launch Google Earth  

E-Print Network [OSTI]

Adding STARFire Analysis Layers to Google Earth through a KML Network Link 1) Launch Google Earth 2) The network link will be added in the Places control within Google Earth. Select the node level in the tree layers for viewing within Google Earth. Double clicking on a layer will zoom you to the extent

57

Verified Boot in Chrome OS how to make it work for you  

E-Print Network [OSTI]

Verified Boot in Chrome OS and how to make it work for you Simon Glass Embedded Linux Conference Verified Boot Requirements Technology U-Boot + Linux Verified Boot Demos Doing More Resources #12 Boot? Reduced risk of malware Keeps users safe Permits safe software updates in the field Known

Tomkins, Andrew

58

Mobile Device Guide Google Android based devices  

E-Print Network [OSTI]

Mobile Device Guide ­ Google Android based devices CSUF Date Last Revised: 1/20/11 Page 1 of 3;Mobile Device Guide ­ Google Android based devices CSUF Date Last Revised: 1/20/11 Page 2 of 3 2. Under' with your campus username and enter your password (case sensitive). 4. Tap `next'. #12;Mobile Device Guide

de Lijser, Peter

59

CoastWatch Data in Google Earth  

E-Print Network [OSTI]

CoastWatch Data in Google Earth: A How-to Guide Peter Hollemans, Terrenus Earth Sciences Consultant for NOAA/NESDIS CoastWatch Operations Managers Meeting, June, 2007 #12;Peter Hollemans, Terrenus Earth Sciences Consultant for NOAA/NESDISJune, 2007 Talk Outline · About Google Earth · Preparing Data

60

Google Earth Tour: Waters LANL Protects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home > Clean the Past > What waters does LANL protect? PreviousNext Google Earth Tour: Waters LANL Protects Click here to load the tour...then click the play button below...

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Google Video (Text Version) | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

doing it for about two months and I really enjoy it, especially when I drive past all the gas stations. But I couldn't have made a decision to buy this car unless Google had put in...

62

Google Analytics | OpenEI Community  

Open Energy Info (EERE)

2012 - 13:58 OpenEI dashboard Google Analytics mediawiki OpenEI statistics wiki OpenEI web traffic from Bangalore, India Did you know that in the last month, 621 people in...

63

Video: Watch the Clean Cities Google+ Hangout | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Video: Watch the Clean Cities Google+ Hangout Video: Watch the Clean Cities Google+ Hangout June 21, 2013 - 4:15pm Addthis Miss the Clean Cities Google+ Hangout? Watch a recording...

64

Join a White House Google+ Hangout with Energy Secretary Moniz...  

Broader source: Energy.gov (indexed) [DOE]

Join a White House Google+ Hangout with Energy Secretary Moniz & EPA Administrator McCarthy Join a White House Google+ Hangout with Energy Secretary Moniz & EPA Administrator...

65

Making Google Maps A comprehensive user guide for creating and using your own online Google Maps  

E-Print Network [OSTI]

1 Making Google Maps A comprehensive user guide for creating and using your own online Google Maps Mashups! What are mashups? Like all maps, mashups display locations chosen by the map's creator, but unlike most maps, anybody with access to the internet can create a personalized mashup. Mashups live

Wright, Dawn Jeannine

66

T-711: Fraudulent Google Digital Certificates Could Allow Man...  

Broader source: Energy.gov (indexed) [DOE]

11: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks T-711: Fraudulent Google Digital Certificates Could Allow Man-in-the-Middle Attacks September 7,...

67

Widget:GoogleAreaMap | Open Energy Information  

Open Energy Info (EERE)

- The height of the map to display, in px. (default: 300) Dependencies Google Maps API v3 Usage Widget:GoogleAreaMap |titleSample Area |coordsNE36.2381, -117.6827...

68

Global Analysis of Snow Cover Changes Using Google Earth Engine  

E-Print Network [OSTI]

Global Analysis of Snow Cover Changes Using MODIS and Google Earth Engine By: Jim Coll Importance of This Project • To establish whether or not Google Earth Engine is a viable platform for this type of “big data” analysis • Depending... is Google Earth Engine? Google Earth Engine is a massive data warehouse (2+ petabytes) of remote sensing imagery including all past Landsat and MODIS data. The platform supports JavaScript and Python analysis of these data, and performs the calculations...

Coll, Jim

2014-11-19T23:59:59.000Z

69

Google Web APIs - an Instrument for Webometric Analyses?  

E-Print Network [OSTI]

Introduction The analysis of the Internet and its applications touches upon varied fields of research such as information science, computer science, economics, and psychology. One reason for the growing scientific interest in the Internet is the already high and still growing amount of web users, applications, contents, and web servers worldwide. Despite a variety of different search engines, there is no doubt about the predominance of Google search engine technology today. Among the factors that have added decisively to Google's success are that over a long period of time, Google has offered the largest index, innovative new services and highly optimized performance and usability. This poster introduces Google Web APIs (Google APIs) as an instrument and playground for webometric studies. Several examples of Google APIs implementations are given. Our examples show that this Google Web Service can be used successfully for informetric Internet based studies albeit with some restriction

Philipp Mayr; Fabio Tosques

2005-01-01T23:59:59.000Z

70

Update: Idaho National Laboratory Goes Google | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Update: Idaho National Laboratory Goes Google Update: Idaho National Laboratory Goes Google Update: Idaho National Laboratory Goes Google August 27, 2012 - 3:38pm Addthis In August, INL moved more than 4,000 employees to Google Apps for Government - a first step in our overall cloud integration strategy to support INL with enhanced communication and collaboration to meet mission needs. As part of INL's High Performance Workplace initiative, Google Apps for Government has been implemented at Idaho National Laboratory (INL). Located in southeastern Idaho on nearly 900 square miles of desert, INL supports the U.S. Department of Energy's mission in nuclear energy, energy and environment, and national and homeland security research. As part of INL's approach to invest in capability rather than a technology, Google Apps for Government is a FISMA moderate cloud solution

71

V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Google Picasa BMP and TIFF Images Processing Vulnerabilities 6: Google Picasa BMP and TIFF Images Processing Vulnerabilities V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities March 21, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been discovered in Google Picasa PLATFORM: Google Picasa Version 3.9.0 build 136.09 for Windows/3.9.14.34 for Mac ABSTRACT: Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system. REFERENCE LINKS: Secunia Advisory SA51652 Picasa Release Notes IMPACT ASSESSMENT: High DISCUSSION: 1) A sign extension error when processing the color table of a BMP image can be exploited to cause a heap-based buffer overflow via a BMP image with a specially crafted "biBitCount" field. 2) The application bundles a vulnerable version of LibTIFF.

72

Google Energy's Shift into Renewables case 1-429-226  

E-Print Network [OSTI]

With the green light from co-founder and CEO Larry Page to expand, the team from Google Energy, a recentlyGoogle Energy's Shift into Renewables case 1-429-226 April 3, 2012 Published by Globa Enterprise at the Ross School of Business at the University of Michigan, as the basis for class discussion

Edwards, Paul N.

73

Google+ Hangout Energy 101: Fuel Cells | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Google+ Hangout Energy 101: Fuel Cells Google+ Hangout Energy 101: Fuel Cells Google+ Hangout Energy 101: Fuel Cells Watch a Google+ Hangout on Energy 101: Fuel Cells on Thursday, January 16, at 2 p.m. ET. If the video doesn't start at 2 p.m., you might need to refresh your browser. Join us on Thursday, January 16, at 2 p.m. ET for a Google+ Hangout on Energy 101: Fuel Cells. Whether you want to know about how they work or when fuel cell electric vehicles will hit the road or how much fuel cells could reduce carbon pollution, now is your chance to ask the experts. Joining the live discussion will be: Dr. Sunita Satyapal, Director of the Energy Department's Fuel Cell Technologies Office. Satyapal can answer questions about how fuel cells work, growth in the marketplace and the Energy Department's role in

74

VIDEO: Watch the Solar Decathlon 2013 Google+ Hangout | Department of  

Broader source: Energy.gov (indexed) [DOE]

VIDEO: Watch the Solar Decathlon 2013 Google+ Hangout VIDEO: Watch the Solar Decathlon 2013 Google+ Hangout VIDEO: Watch the Solar Decathlon 2013 Google+ Hangout September 19, 2013 - 2:26pm Addthis Miss the Solar Decathlon 2013 Google+ Hangout? Watch a recording of it above. Rebecca Matulka Rebecca Matulka Digital Communications Specialist, Office of Public Affairs For two years, collegiate teams from around the world have been designing and building energy-efficient solar-powered houses for the U.S. Department of Energy Solar Decathlon 2013. With the competition just two weeks away, many teams are busy putting the final touches on their houses and preparing to transport them to the competition site in Irvine, California. Yesterday, team members from Arizona State University and the University of New Mexico, Santa Clara University, Team Alberta, Team Capitol DC and

75

Video: Watch the Open Data Google+ Hangout | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Watch the Open Data Google+ Hangout Watch the Open Data Google+ Hangout Video: Watch the Open Data Google+ Hangout February 21, 2013 - 5:10pm Addthis Did you miss our open data hangout? View it here. Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs Want more info? Check out these open data resources. Thank you to everyone who tuned in to our Google+ Hangout on the "Impact of Open Data." If you weren't able to attend, a recording of the discussion is available above. We hope to offer many more Hangouts with Energy Department and private sector energy experts, so check out Energy.gov/Live for upcoming events. In case you missed it, "open data" means data that is not only available, but also accessible. The value of open data is empowering building owners,

76

Google.org Invests $10 Million in Enhanced Geothermal Systems...  

Energy Savers [EERE]

of hot water or steam where none existed before or to extend and enhance an existing geothermal reservoir. Google.org will invest 4 million in Potter Drilling, Inc., which is...

77

Finding Alternative Water Sources for Power Plants with Google Earth |  

Broader source: Energy.gov (indexed) [DOE]

Finding Alternative Water Sources for Power Plants with Google Finding Alternative Water Sources for Power Plants with Google Earth Finding Alternative Water Sources for Power Plants with Google Earth May 29, 2013 - 12:07pm Addthis A sample image from the AWSIS system. A sample image from the AWSIS system. Gayland Barksdale Technical Writer, Office of Fossil Energy Sobering news from experts: Rising populations, regional droughts, and decreasing groundwater levels are draining the nation's fresh water supply. And it's not just that we're using that water for our personal consumption; even the electricity we rely on to power our society requires a lot of water. In fact, major energy producers - like coal-fired power plants, which produce about 40 percent of our electricity - require about 150 billion gallons of fresh water per day to produce the electricity we

78

Finding Alternative Water Sources for Power Plants with Google Earth |  

Broader source: Energy.gov (indexed) [DOE]

Finding Alternative Water Sources for Power Plants with Google Finding Alternative Water Sources for Power Plants with Google Earth Finding Alternative Water Sources for Power Plants with Google Earth May 29, 2013 - 12:07pm Addthis A sample image from the AWSIS system. A sample image from the AWSIS system. Gayland Barksdale Technical Writer, Office of Fossil Energy Sobering news from experts: Rising populations, regional droughts, and decreasing groundwater levels are draining the nation's fresh water supply. And it's not just that we're using that water for our personal consumption; even the electricity we rely on to power our society requires a lot of water. In fact, major energy producers - like coal-fired power plants, which produce about 40 percent of our electricity - require about 150 billion gallons of fresh water per day to produce the electricity we

79

Lateen EM: Unsupervised Training with Multiple Objectives, Applied to Dependency Grammar Induction  

E-Print Network [OSTI]

@cs.stanford.edu Hiyan Alshawi Google Inc. Mountain View, CA, 94043, USA hiyan@google.com Daniel Jurafsky DepartmentsLateen EM: Unsupervised Training with Multiple Objectives, Applied to Dependency Grammar Induction Valentin I. Spitkovsky Computer Science Department Stanford University and Google Inc. valentin

Tomkins, Andrew

80

Google's Deep-Web Crawl Jayant Madhavan David Ko Lucja Kot  

E-Print Network [OSTI]

Google's Deep-Web Crawl Jayant Madhavan David Ko Lucja Kot Google Inc. Google Inc. Cornell@cs.ucsd.edu halevy@google.com ABSTRACT The Deep Web, i.e., content hidden behind HTML forms, has long been of the structured data on the Web, accessing Deep-Web content has been a long-standing challenge for the database

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Advertising in Google Search Deriving a bidding strategy  

E-Print Network [OSTI]

Advertising in Google Search Deriving a bidding strategy in the biggest auction on earth. Anne the perspective of the advertiser. It presents a model for the expected profit per view, depending on either the bid or the obtained position of the advertiser. In a subsequent analysis, the position and bid

Boucherie, Richard J.

82

Characterizing Machines and Workloads on a Google Cluster  

E-Print Network [OSTI]

: rapidly changing workloads, building balanced systems with imbalanced commodity components, curbing energy Google cluster usage trace dataset and characterizes how the machines in the cluster are managed decade has seen a surge of interest and commercial developments in cloud computing (large

Cho, Sangyeun

83

Software Verification in the Google App-Engine Cloud  

E-Print Network [OSTI]

resources. In the last years, cloud services emerged as an inexpensive, flexible, and energy for verification. We chose the platform-as-a-service offer Google App Engine and ported the open are available on demand. This enables a verification process that is less expensive (only actual usage is paid

Beyer, Dirk

84

Google + Hangout: Women Leading STEM October 22, 2013 | Department of  

Broader source: Energy.gov (indexed) [DOE]

Google + Hangout: Women Leading STEM October 22, 2013 Google + Hangout: Women Leading STEM October 22, 2013 Google + Hangout: Women Leading STEM October 22, 2013 September 23, 2013 6:00PM EDT There's an old axiom that you can't be what you can't see. Perhaps if you think about what inspired you to enter into your current job, or line of study, you'll recognize a role model or two that inspired you to take your current path. That's why NASA and the Energy Department are teaming up on Tuesday October 22, 2013 at 4:30pm EST to host the Women Leading STEM Google+ Hangout, showcasing women in STEM at agencies that are changing the world and addressing the serious shortage of women and girls engaged in STEM fields in the United States. Join the White House Council on Women and Girls, Women @ Energy and Women @ NASA to hear from women leading the way in transformative science,

85

Federal Energy Management Program: Multiple Motivations Institutional  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

86

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

11 - 20520 of 28,905 results. 11 - 20520 of 28,905 results. Download Flash2010-72.pdf http://energy.gov/management/downloads/flash2010-72pdf Article V-019: Google Chrome Multiple Vulnerabilities Google Chrome Prior to 23.0.1271.64 Multiple Security Vulnerabilities http://energy.gov/cio/articles/v-019-google-chrome-multiple-vulnerabilities Article V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. http://energy.gov/cio/articles/v-214-mozilla-firefox-multiple-vulnerabilities Download Status Prospects of Green Data Center Information on energy-saving technology research of green data centers and the potential impacts. http://energy.gov/eere/downloads/status-prospects-green-data-center Download Independent Oversight Inspection, Richland Operations Office,

87

Business Under Threat, Technology Under Attack, Ethics Under Fire: The Experience of Google in China  

Science Journals Connector (OSTI)

The situation became substantially more complicated when the U.S. government reacted with strong political support for Google’s decision, leading to a series of high-level exchanges between Washington, DC, and Be...

Justin Tan; Anna E. Tan

2012-11-01T23:59:59.000Z

88

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

51 - 10960 of 29,416 results. 51 - 10960 of 29,416 results. Download CX-008767: Categorical Exclusion Determination Infrastructure Demolition, Replacement, and Related Activities at the Weldon Spring, Missouri, Site CX(s) Applied: B1.3, B1.7, B1.15, B1.23, B1.24, B1.26, B1.36, B3.1, B4.7 Date: 05/31/2012 Location(s): Missouri Offices(s): Legacy Management http://energy.gov/nepa/downloads/cx-008767-categorical-exclusion-determination Article V-224: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome. http://energy.gov/cio/articles/v-224-google-chrome-multiple-vulnerabilities Article V-233: Red Hat update for JBoss Fuse This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS.

89

Your Mission: To become familiar with the major plate boundaries through exploration of plate tectonic features using Google Earth.  

E-Print Network [OSTI]

boundaries through exploration of plate tectonic features using Google Earth. Your Supplies: (1) A computer with internet access and the Google Earth program of Earth's tectonic plates using Google Earth. To do this, login

Smith-Konter, Bridget

90

Mapping (USPTO) Patent Data using Overlays to Google Maps  

E-Print Network [OSTI]

The paper describes a technique to use patent information available online (at the US Patent and Trademark Office) for the generation of Google Maps that indicate both the quantity and quality of patents granted at the city level. The resulting maps are relevant for technological innovation policies and R&D management because the US market can be considered as the leading market for patenting and patent competition. Quantitative data is made available by the mapping routines for more detailed statistical analysis, and the non-parametric statistics for significance testing are specified. The new mapping approach is explored for the cases of the emerging technologies of "RNA interference" and "nanotechnology" as specific examples. Perspectives for further developments of this technique (other databases and network analysis of co-inventions) are specified.

Leydesdorff, Loet

2011-01-01T23:59:59.000Z

91

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91 - 19800 of 28,905 results. 91 - 19800 of 28,905 results. Article DOE to Unveil New Online Database of Oil and Natural Gas Research Results The U.S. Department of Energy plans to introduce a new, user-friendly online repository of oil and natural gas research results at the Society of Petroleum Engineers' Annual Technical Conference and Exhibition, to be held in New Orleans, La., October 4-7, 2009. http://energy.gov/fe/articles/doe-unveil-new-online-database-oil-and-natural-gas-research Article V-224: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome. http://energy.gov/cio/articles/v-224-google-chrome-multiple-vulnerabilities Page Protection of OUO What are the rules for protecting an OUO document or material when a person is using it?

92

8/1/14 Google Maps https://www.google.com/maps/dir/Golden+Gate+Bridge,+San+Francisco,+CA+94129/UCSF%2FMission+Bay,+San+Francisco,+CA/@37.7996107,-122.4363906,... 1/2  

E-Print Network [OSTI]

8/1/14 Google Maps https://www.google.com/maps/dir/Golden+Gate+Bridge,+San+Francisco,+CA+94129/UCSF has tolls. Directions from Golden Gate Bridge to UCSF/Mission Bay San Francisco, CA 94129 Golden Gate;8/1/14 Google Maps https://www.google.com/maps/dir/Golden+Gate+Bridge,+San+Francisco,+CA+94129/UCSF%2FMission

Derisi, Joseph

93

Join a White House Google+ Hangout with Energy Secretary Moniz & EPA  

Broader source: Energy.gov (indexed) [DOE]

a White House Google+ Hangout with Energy Secretary Moniz & a White House Google+ Hangout with Energy Secretary Moniz & EPA Administrator McCarthy Moderated by Grist Join a White House Google+ Hangout with Energy Secretary Moniz & EPA Administrator McCarthy Moderated by Grist September 20, 2013 - 1:20pm Addthis Join a White House Google+ Hangout with Energy Secretary Moniz & EPA Administrator McCarthy Moderated by Grist Marissa Newhall Marissa Newhall Managing Editor, Energy.gov How can I participate? Tune in Monday, September 23, at 12:15 p.m. EDT by visiting WhiteHouse.gov or the White House Google+ page. Submit your questions now or during the Hangout on Grist.org or on Twitter using the hashtag #ActOnClimate. Editor's note (Sept. 23, 2013): Unfortunately, due to a scheduling conflict, the Google+ Hangout with Secretary Moniz and Administrator

94

Join Us Thursday, Feb. 21 for a Google+ Hangout on the Impact of Open Data  

Broader source: Energy.gov (indexed) [DOE]

Thursday, Feb. 21 for a Google+ Hangout on the Impact of Thursday, Feb. 21 for a Google+ Hangout on the Impact of Open Data Join Us Thursday, Feb. 21 for a Google+ Hangout on the Impact of Open Data February 20, 2013 - 5:17pm Addthis Join Us Thursday, Feb. 21 for a Google+ Hangout on the Impact of Open Data Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs How can I participate? Sign up at the Google+ Event page. Tweet questions to @ENERGY with the hashtag #AskEnergy. Ask us on the Energy Department's Facebook and Google+ pages. Email questions to newmedia@hq.doe.gov. Last Friday, we launched an early version of Energy.gov/Data, a site that will become a central resource for developers, journalists, researchers, and citizens who are looking for energy data and resources, as well as

95

This Thursday: Google+ Hangout on Securing the Smart Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

This Thursday: Google+ Hangout on Securing the Smart Grid This Thursday: Google+ Hangout on Securing the Smart Grid This Thursday: Google+ Hangout on Securing the Smart Grid May 14, 2013 - 1:54pm Addthis April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs Sign up at the Google+ Event page. Tweet questions to @ENERGY with the hashtag #AskEnergy. Ask us on Facebook and Google+. Email questions to newmedia@hq.doe.gov. Happening now on energy.gov/live Join us this Thursday, May 16 at 2:00pm EDT for a Google+ Hangout on Securing the Smart Grid. Panelists from across the power systems industry will discuss a critical element of a secure and resilient electric power system, the smart grid cybersecurity workforce. Grid security professionals are the workers at the core of a secure and resilient national electric system. As part of the Energy Department's

96

Secretary Chu to Visit Google Headquarters During Trip to San Francisco |  

Broader source: Energy.gov (indexed) [DOE]

Google Headquarters During Trip to San Google Headquarters During Trip to San Francisco Secretary Chu to Visit Google Headquarters During Trip to San Francisco October 21, 2010 - 12:00am Addthis Washington, DC - During a visit to San Francisco tomorrow, Friday, Oct. 22, U.S. Energy Secretary Steven Chu will visit Google, Inc. headquarters to participate in a fireside chat with company employees to discuss the Obama Administration's vision for a clean and renewable energy economy. While at Google, Secretary Chu will also participate in a series of briefings with company researchers and scientists to learn more about the company's innovative ventures in the energy sector. WHAT: U.S. Energy Secretary Steven Chu to participate in fireside chat at Google, Inc. WHEN: Friday, October 22, 2010

97

Join Us Tuesday, Jan. 15 for a Google+ Hangout on Critical Materials |  

Broader source: Energy.gov (indexed) [DOE]

Us Tuesday, Jan. 15 for a Google+ Hangout on Critical Us Tuesday, Jan. 15 for a Google+ Hangout on Critical Materials Join Us Tuesday, Jan. 15 for a Google+ Hangout on Critical Materials January 14, 2013 - 3:23pm Addthis What are critical materials? We will be answering that question and more tomorrow during our first Google+ Hangout. | Infographic by Sarah Gerrity, Energy Department. What are critical materials? We will be answering that question and more tomorrow during our first Google+ Hangout. | Infographic by Sarah Gerrity, Energy Department. Rebecca Matulka Rebecca Matulka Digital Communications Specialist, Office of Public Affairs How can I participate? Tweet questions to @ENERGY with the hashtag #AskEnergy. Ask us on the Energy Department's Facebook and Google+ pages. Email questions to newmedia@hq.doe.gov.

98

T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

6: Google SketchUp v8.x - '.DAE' File Memory Corruption 6: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 14, 2011 - 9:28am Addthis PROBLEM: Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. PLATFORM: Google SketchUp 8 is vulnerable; other versions may also be affected. ABSTRACT: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability reference LINKS: Vulnerability-Lab SketchUp Downloads IMPACT ASSESSMENT: Medium Discussion: A Memory Corruption vulnerability is detected on the Google s SketchUp v8.x. The vulnerability is caused by an memory corruption when processing corrupt DAE files through the filter, which could be exploited by attackers

99

Development of an Interactive, Hands-on Learning Experience of the Google Maps API.  

E-Print Network [OSTI]

??The project is to design and implement a Web application for realizing an innovative, hands-on interactive learning experience for the Google Maps API. This learning… (more)

Kale, Rushikesh Digambar

2010-01-01T23:59:59.000Z

100

GOOGLE AND GIS INTEGRATED ON THE ARM WEBSITE: A WORK IN PROGRESS  

E-Print Network [OSTI]

GOOGLE AND GIS INTEGRATED ON THE ARM WEBSITE: A WORK IN PROGRESS A. Cialella and R. Wagener to zoom in at varying resolutions, with satellite images and/or street maps as backdrops. The ACRF GIS (ESRI ArcGIS) database was merged with Google to include markers for the SGP site facilities. A new SGP

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Energy Secretary Steven Chu to host DOE's first google hangout at 2 EST |  

Open Energy Info (EERE)

Energy Secretary Steven Chu to host DOE's first google hangout at 2 EST Energy Secretary Steven Chu to host DOE's first google hangout at 2 EST Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(1992) Super contributor 21 February, 2013 - 15:32 DOE energy secretary google hangout OpenEI Solar Power Steven Chu Sunshot Initiative The DOE Energy Secretary Steven Chu will be hosting a google hangout open to the public tomorrow afternoon to answer questions related to the Sunshot Initiative. More about the Google Hangout tomorrow: "InFebruary 2011, Energy Secretary Steven Chu launched the SunShot Initiative -- a national endeavor to get solar cost-competitive with fossil fuels and without subsidies by the end of the decade. Just two years later, we've made remarkable progress in accelerating the development of

102

Join Secretary Chu Tomorrow for a Google+ Hangout on America's Growing  

Broader source: Energy.gov (indexed) [DOE]

Join Secretary Chu Tomorrow for a Google+ Hangout on America's Join Secretary Chu Tomorrow for a Google+ Hangout on America's Growing Solar Industry Join Secretary Chu Tomorrow for a Google+ Hangout on America's Growing Solar Industry February 21, 2013 - 3:06pm Addthis Join Secretary Chu Tomorrow for a Google+ Hangout on America's Growing Solar Industry Niketa Kumar Niketa Kumar Public Affairs Specialist, Office of Public Affairs How can I participate? Sign up at the Google+ Event page. Email questions to newmedia@hq.doe.gov, and tweet questions to @ENERGY using #AskEnergy. Tune in at 2pm ET on energy.gov/live. Over the past four years, solar energy generation in the U.S. has more than doubled. At the same time, the cost of solar power continues to fall each year and American companies and workers are helping to lead the way with

103

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

104

Join Secretary Chu Tomorrow for a Google+ Hangout on America's Growing  

Broader source: Energy.gov (indexed) [DOE]

Secretary Chu Tomorrow for a Google+ Hangout on America's Secretary Chu Tomorrow for a Google+ Hangout on America's Growing Solar Industry Join Secretary Chu Tomorrow for a Google+ Hangout on America's Growing Solar Industry February 21, 2013 - 3:06pm Addthis Join Secretary Chu Tomorrow for a Google+ Hangout on America's Growing Solar Industry Niketa Kumar Niketa Kumar Public Affairs Specialist, Office of Public Affairs How can I participate? Sign up at the Google+ Event page. Email questions to newmedia@hq.doe.gov, and tweet questions to @ENERGY using #AskEnergy. Tune in at 2pm ET on energy.gov/live. Over the past four years, solar energy generation in the U.S. has more than doubled. At the same time, the cost of solar power continues to fall each year and American companies and workers are helping to lead the way with

105

New Visualization Tools for Environmental Sensor Networks: Using Google Earth as an Interface to Micro-Climate and Multimedia Datasets  

E-Print Network [OSTI]

of the layer I used Google Sketchup to create realistic 3Dstyled with simple colors, Sketchup models support photo-Figure 5.2: Google Sketchup “Collada” models of equipment

Sean Askay

2006-01-01T23:59:59.000Z

106

Submit Your Home Energy Efficiency Questions Now for Earth Day Google+  

Broader source: Energy.gov (indexed) [DOE]

Submit Your Home Energy Efficiency Questions Now for Earth Day Submit Your Home Energy Efficiency Questions Now for Earth Day Google+ Hangout Submit Your Home Energy Efficiency Questions Now for Earth Day Google+ Hangout April 2, 2013 - 10:40am Addthis Submit a video question now for our Earth Day Google+ Hangout on home energy efficiency. | Graphic courtesy of Sarah Gerrity, Energy Department. Submit a video question now for our Earth Day Google+ Hangout on home energy efficiency. | Graphic courtesy of Sarah Gerrity, Energy Department. Rebecca Matulka Rebecca Matulka Digital Communications Specialist, Office of Public Affairs How can I participate? Submit a video question in advance. All you need to do is create a 30-second video, upload it to YouTube before April 16 and tag it with #askEnergy. Email your questions to newmedia@hq.doe.gov.

107

Secretary Chu Announces New Funding and Partnership with Google to Promote  

Broader source: Energy.gov (indexed) [DOE]

Secretary Chu Announces New Funding and Partnership with Google to Secretary Chu Announces New Funding and Partnership with Google to Promote Electric Vehicles Secretary Chu Announces New Funding and Partnership with Google to Promote Electric Vehicles April 19, 2011 - 12:00am Addthis Washington, DC - As part of the Obama Administration's efforts to reduce U.S. oil imports by one-third by 2025, Energy Secretary Steven Chu today announced new steps underway at the Department of Energy to accelerate the deployment of electric vehicles. This includes the availability of $5 million in new funding for community-based efforts to deploy electric vehicle (EV) infrastructure and charging stations. He also outlined a partnership with Google Inc. and more than 80 EV stakeholders to help consumers find charging stations nationwide. Secretary Chu and

108

Comments from Google Inc. on DOE Request for Information-Implementing the  

Broader source: Energy.gov (indexed) [DOE]

Comments from Google Inc. on DOE Request for Comments from Google Inc. on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments from Google Inc. on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Google is pleased to offer these comments in response to the Department of Energy's Request for Information (RFI) regarding consumers and the smart grid. We applaud the Administration's efforts to date to ensure the smart grid benefits consumers directly and delivers transformational change to our aging electricity system. We stand ready to assist the Department as it works with the Federal Communications Commission (FCC) and other agencies

109

Comments from Google Inc. on DOE Request for Information-Implementing the  

Broader source: Energy.gov (indexed) [DOE]

from Google Inc. on DOE Request for from Google Inc. on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments from Google Inc. on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Google is pleased to offer these comments in response to the Department of Energy's Request for Information (RFI) regarding consumers and the smart grid. We applaud the Administration's efforts to date to ensure the smart grid benefits consumers directly and delivers transformational change to our aging electricity system. We stand ready to assist the Department as it works with the Federal Communications Commission (FCC) and other agencies

110

Secretary Chu Announces New Funding and Partnership with Google to Promote  

Broader source: Energy.gov (indexed) [DOE]

New Funding and Partnership with Google to New Funding and Partnership with Google to Promote Electric Vehicles Secretary Chu Announces New Funding and Partnership with Google to Promote Electric Vehicles April 19, 2011 - 12:00am Addthis Washington, DC - As part of the Obama Administration's efforts to reduce U.S. oil imports by one-third by 2025, Energy Secretary Steven Chu today announced new steps underway at the Department of Energy to accelerate the deployment of electric vehicles. This includes the availability of $5 million in new funding for community-based efforts to deploy electric vehicle (EV) infrastructure and charging stations. He also outlined a partnership with Google Inc. and more than 80 EV stakeholders to help consumers find charging stations nationwide. Secretary Chu and Transportation Secretary Ray LaHood made the announcement on a conference

111

Join a White House Google+ Hangout with Energy Secretary Moniz & EPA Administrator McCarthy  

Broader source: Energy.gov [DOE]

Join us on Monday, May 19, 2014, at 1 p.m. ET for a live White House Google+ Hangout with Secretary Moniz and EPA Administrator Gina McCarthy about the state of our climate.

112

Flying across Galaxy Clusters with Google Earth: additional imagery from SDSS co-added data  

SciTech Connect (OSTI)

Galaxy clusters are spectacular. We provide a Google Earth compatible imagery for the deep co-added images from the Sloan Digital Sky Survey and make it a tool for examing galaxy clusters. Google Earth (in sky mode) provides a highly interactive environment for visualizing the sky. By encoding the galaxy cluster information into a kml/kmz file, one can use Google Earth as a tool for examining galaxy clusters and fly across them freely. However, the resolution of the images provided by Google Earth is not very high. This is partially because the major imagery google earth used is from Sloan Digital Sky Survey (SDSS) (SDSS collaboration 2000) and the resolutions have been reduced to speed up the web transferring. To have higher resolution images, you need to add your own images in a way that Google Earth can understand. The SDSS co-added data are the co-addition of {approx}100 scans of images from SDSS stripe 82 (Annis et al. 2010). It provides the deepest images based on SDSS and reach as deep as about redshift 1.0. Based on the co-added images, we created color images in a way as described by Lupton et al. (2004) and convert the color images to Google Earth compatible images using wcs2kml (Brewer et al. 2007). The images are stored at a public server at Fermi National Accelerator Laboratory and can be accessed by the public. To view those images in Google Earth, you need to download a kmz file, which contains the links to the color images, and then open the kmz file with your Google Earth. To meet different needs for resolutions, we provide three kmz files corresponding to low, medium and high resolution images. We recommend the high resolution one as long as you have a broadband Internet connection, though you should choose to download any of them, depending on your own needs and Internet speed. After you open the downloaded kmz file with Google Earth (in sky mode), it takes about 5 minutes (depending on your Internet connection and the resolution of images you want) to get some initial images loaded. Then, additional images corresponding to the region you are browsing will be loaded automatically. So far, you have access to all the co-added images. But you still do not have the galaxy cluster position information to look at. In order to see the galaxy clusters, you need to download another kmz file that tell Google Earth where to find the galaxy clusters in the co-added data region. We provide a kmz file for a few galaxy clusters in the stripe 82 region and you can download and open it with Google Earth. In the SDSS co-added region (stripe 82 region), the imagery from Google Earth itself is from the Digitized Sky Survey (2007), which is in very poor quality. In Figure1 and Figure2, we show screenshots of a cluster with and without the new co-added imagery in Google Earth. Much more details have been revealed with the deep images.

Hao, Jiangang; Annis, James; /Fermilab

2010-10-01T23:59:59.000Z

113

Google lends support to the software behind OpenEI.org | OpenEI Community  

Open Energy Info (EERE)

Google lends support to the software behind OpenEI.org Google lends support to the software behind OpenEI.org Home > Groups > OpenEI Community Central Graham7781's picture Submitted by Graham7781(2002) Super contributor 8 March, 2010 - 14:10 imported OpenEI Thanks! The Wikimedia Foundation recently announced that they'll be using a $2M grant from Google to turn the MediaWiki Usability Initiative into a permanent effort. That's great news for OpenEI, as the MediaWiki software is a key component in our system (along with various additions, including Semantic MediaWiki). So when MediaWiki gets better, we get better. Groups: OpenEI Community Central Graham7781's blog Latest blog posts Jweers New Robust References! Posted: 7 Aug 2013 - 18:23 by Jweers 1 comment(s) Graham7781 Geothermal Regulatory Roadmap featured on NREL Now

114

Microsoft Word - Google DOE comments DRAFT 7-12-10.doc  

Broader source: Energy.gov (indexed) [DOE]

Comments of Google Inc. U.S. Department of Energy Request for Information: Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid July 12, 2010 Google is pleased to offer these comments in response to the Department of Energy's Request for Information (RFI) regarding consumers and the smart grid. We applaud the Administration's efforts to date to ensure the smart grid benefits consumers directly and delivers transformational change to our aging electricity system. We stand ready to assist the Department as it works with the Federal Communications Commission (FCC) and other agencies on implementation of the National Broadband Plan and other efforts to empower energy consumers. Google's mission is to organize the world's information and make it universally accessible

115

Google+ virtual field trip: "Vehicle Electrification" (11/18/13) | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Google+ virtual field trip: "Vehicle Electrification" (11/18/13) Google+ virtual field trip: "Vehicle Electrification" (11/18/13) Share Topic Energy Energy efficiency Vehicles Electric drive technology Browse By - Any - Energy -Energy efficiency --Vehicles ---Alternative fuels ---Automotive engineering ---Diesel ---Electric drive technology ---Hybrid & electric vehicles ---Powertrain research --Building design ---Construction --Manufacturing -Energy sources --Renewable energy ---Bioenergy ---Solar energy --Fossil fuels ---Natural Gas --Nuclear energy ---Nuclear energy modeling & simulation ---Nuclear fuel cycle ---Reactors -Energy usage --Energy storage ---Batteries ----Lithium-ion batteries ----Lithium-air batteries --Electricity transmission --Smart Grid Environment -Biology --Computational biology --Environmental biology

116

A User Study Comparing 3D Modeling with Silhouettes and Google SketchUp  

E-Print Network [OSTI]

We describe a user study comparing 3D Modeling with Silhouettes and Google SketchUp. In the user study, ten users were asked to create 3D models of three different objects, using either 3D Modeling with Silhouettes or ...

Igarashi, Takeo

2010-05-05T23:59:59.000Z

117

Google, ou comment s'imposer comme un point de passage oblig 1. Introduction  

E-Print Network [OSTI]

, sur le livre de John Battelle « The Search » pour les aspects économiques et stratégiques de la of a large-scale hypertextual web search engine » qui traite du fonctionnement de Google sur le plan d'un projet de recherche pour travailler sur un moteur d'analyse des liens hypertextes qu

Paris-Sud XI, Université de

118

Video Telephony for End-consumers: Measurement Study of Google+, iChat, and Skype  

E-Print Network [OSTI]

1 Video Telephony for End-consumers: Measurement Study of Google+, iChat, and Skype Yang Xu@poly.edu ABSTRACT Video telephony requires high-bandwidth and low-delay voice and video transmissions between geographically distributed users. It is challenging to deliver high-quality video tele- phony to end

Liu, Yong

119

Google Earth  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home > Home > Long-Term Environmental Stewardship & Sustainability Strategy › Home About the Strategy Environmental Grand Challenges Vision & Mission Contacts | Information Environment at LANL Clean the Past › Introduction Tour: Environmental Cleanup Protections: Cleanup › Protections: Cleanup Cleanup 101 Protections = Defenses in Depth Protection #1: Remove the Source Example Cleanup: Hillside 140 American Recovery and Reinvestment Act Example Demolition: TA-21 Example Excavation: MDA B What waters does LANL protect? › What waters does LANL protect? Tour: Waters LANL Protects Jemez Mountains Headwaters Watersheds Rio Grande Buckman Direct Diversion Groundwater in the Regional Aquifer How did contaminants get there? › How did contaminants get there? Tour: How contaminants got there

120

Predicting the performance of local seismic networks using Matlab and Google Earth.  

SciTech Connect (OSTI)

We have used Matlab and Google Earth to construct a prototype application for modeling the performance of local seismic networks for monitoring small, contained explosions. Published equations based on refraction experiments provide estimates of peak ground velocities as a function of event distance and charge weight. Matlab routines implement these relations to calculate the amplitudes across a network of stations from sources distributed over a geographic grid. The amplitudes are then compared to ambient noise levels at the stations, and scaled to determine the smallest yield that could be detected at each source location by a specified minimum number of stations. We use Google Earth as the primary user interface, both for positioning the stations of a hypothetical local network, and for displaying the resulting detection threshold contours.

Chael, Eric Paul

2009-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Google:[Leonid http://w3.pppl.gov/~zakharov  

E-Print Network [OSTI]

Google:[Leonid Zakharov] # http://w3.pppl.gov/~zakharov LiWall Fusion and its 3 step R&D program­70s (``The Bib b le of the 70s'') LiWF # NBI heating/fueling + Lithium Pumping PFC. No cold particles except He. vskip1em Issue LiWF Current BBBL­70s concept of ``fusion'' The target RDF (Reactor Dev

Zakharov, Leonid E.

122

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

123

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

February 22, 2013 February 22, 2013 V-097: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. February 21, 2013 V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. February 20, 2013 V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Oracle Java.

124

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4, 2011 4, 2011 T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. March 11, 2011 T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 10, 2011 T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. March 9, 2011 T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Windows Remote Desktop Client. A remote

125

A Mirror of Our World: Google Earth and the History of Cartography  

E-Print Network [OSTI]

Hak Saeng, preface to his untitled manuscript atlas of China during the Ming Dynasty, dated 1721. Quoted on Library of Congress, Geography and Map Division, Atlas page: http://www.loc.gov/rr/geogmap/ guide/gmillatl.html. file...Coordinates Series B, No. 12 A Mirror of Our World: Google Earth and the History of Cartography Persistent URL for citation: http://purl.oclc.org/ coordinates/b12.pdf Date of Publication: 08/20/09 David Y. Allen David Y. Allen (e...

Allen, David Y.

2009-08-20T23:59:59.000Z

126

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 28, 2012 November 28, 2012 V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Google Chrome. November 22, 2012 V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service Several vulnerabilities were reported in IBM WebSphere DataPower. November 21, 2012 V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service Adobe ColdFusion Denial of Service Vulnerability November 21, 2012 V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Multiple vulnerabilities were reported in Mozilla Firefox November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice

127

Next generation input-output data format for HEP using Google's protocol buffers  

E-Print Network [OSTI]

We propose a data format for Monte Carlo (MC) events, or any structural data, including experimental data, in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the so-called ProMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in ProMC files can be written, read and manipulated in a number of programming languages, such C++, Java and Python.

Chekanov, S V

2013-01-01T23:59:59.000Z

128

Next generation input-output data format for HEP using Google's protocol buffers  

E-Print Network [OSTI]

We propose a data format for Monte Carlo (MC) events, or any structural data, including experimental data, in a compact binary form using variable-size integer encoding as implemented in the Google's Protocol Buffers package. This approach is implemented in the so-called ProMC library which produces smaller file sizes for MC records compared to the existing input-output libraries used in high-energy physics (HEP). Other important features are a separation of abstract data layouts from concrete programming implementations, self-description and random access. Data stored in ProMC files can be written, read and manipulated in a number of programming languages, such C++, Java and Python.

S. V. Chekanov

2013-06-27T23:59:59.000Z

129

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

26, 2013 26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command August 24, 2013 V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability A vulnerability has been reported in HP StoreOnce D2D Backup Systems. August 23, 2013 V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service A vulnerability was reported in McAfee Email Gateway. August 22, 2013 V-224: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome. August 21, 2013 V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts A remote user can make unlimited login attempts

130

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

29, 2012 29, 2012 U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. March 28, 2012 U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data. March 27, 2012 U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. March 26, 2012 U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can

131

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

April 9, 2012 April 9, 2012 U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. April 6, 2012 U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks A remote user can obtain potentially sensitive information. April 2, 2012 U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. March 30, 2012 U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes

132

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8, 2011 8, 2011 T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. August 5, 2011 T-685: Cisco Warranty CD May Load Malware From a Remote Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. August 3, 2011 T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. August 2, 2011 T-682:Double free vulnerability in MapServer MapServer developers have discovered flaws in the OGC filter support in

133

Towards Comprehensible and Effective Permission Systems  

E-Print Network [OSTI]

4] “Content Security Policy (CSP),” Google Chrome Extensionsecurity-policy/raw-file/tip/csp-specification.dev.html [Content Security Policy (CSP) for extensions. CSP allows an

Felt, Adrienne Porter

2012-01-01T23:59:59.000Z

134

Google:[Leonid Zakharov] http://w3.pppl.gov/~zakharov Three Step Program toward the Reactor  

E-Print Network [OSTI]

Google:[Leonid Zakharov] http://w3.pppl.gov/~zakharov Three Step Program toward the Reactor by US DoE contract No. DE­AC020­76­CHO­3073. PRINCETON PLASMA PHYSICS LABORATORY PPPL #12;Contents 1PRINCETON PLASMA PHYSICS LABORATORY PPPL 2 #12;1 Three-step RDF program The mission of 3-step RDF program

Zakharov, Leonid E.

135

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

27, 2013 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 26, 2013 V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability A security issue and a vulnerability have been reported in the Login Security module for Drupal June 25, 2013 V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability Apache has acknowledged a vulnerability in Apache OpenOffice SDK June 24, 2013 V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks A vulnerability was reported in Google Chrome.

136

Using Google Flu Trends data in forecasting influenza-like–illness related ED visits in Omaha, Nebraska  

Science Journals Connector (OSTI)

AbstractIntroduction Emergency department (ED) visits increase during the influenza seasons. It is essential to identify statistically significant correlates in order to develop an accurate forecasting model for ED visits. Forecasting influenza-like–illness (ILI)-related ED visits can significantly help in developing robust resource management strategies at the EDs. Methods We first performed correlation analyses to understand temporal correlations between several predictors of ILI-related ED visits. We used the data available for Douglas County, the biggest county in Nebraska, for Omaha, the biggest city in the state, and for a major hospital in Omaha. The data set included total and positive influenza test results from the hospital (ie, Antigen rapid (Ag) and Respiratory Syncytial Virus Infection (RSV) tests); an Internet-based influenza surveillance system data, that is, Google Flu Trends, for both Nebraska and Omaha; total ED visits in Douglas County attributable to ILI; and ILI surveillance network data for Douglas County and Nebraska as the predictors and data for the hospital's ILI-related ED visits as the dependent variable. We used Seasonal Autoregressive Integrated Moving Average and Holt Winters methods with3 linear regression models to forecast ILI-related ED visits at the hospital and evaluated model performances by comparing the root means square errors (RMSEs). Results Because of strong positive correlations with ILI-related ED visits between 2008 and 2012, we validated the use of Google Flu Trends data as a predictor in an ED influenza surveillance tool. Of the 5 forecasting models we have tested, linear regression models performed significantly better when Google Flu Trends data were included as a predictor. Regression models including Google Flu Trends data as a predictor variable have lower RMSE, and the lowest is achieved when all other variables are also included in the model in our forecasting experiments for the first 5 weeks of 2013 (with RMSE = 57.61). Conclusions Google Flu Trends data statistically improve the performance of predicting ILI-related ED visits in Douglas County, and this result can be generalized to other communities. Timely and accurate estimates of ED volume during the influenza season, as well as during pandemic outbreaks, can help hospitals plan their ED resources accordingly and lower their costs by optimizing supplies and staffing and can improve service quality by decreasing ED wait times and overcrowding.

Ozgur M. Araz; Dan Bentley; Robert L. Muelleman

2014-01-01T23:59:59.000Z

137

Web browser security update effectiveness  

Science Journals Connector (OSTI)

We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome's silent update mechanism to Opera's update requiring a full re-installation. We use anonymized logs from Google's world wide distributed ...

Thomas Duebendorfer; Stefan Frei

2009-09-01T23:59:59.000Z

138

1/23/13 14:22Patent EP1276411B1 -Computer-based 3d visual field test system and analysis -Google Patents Page 1 of 7http://www.google.com/patents/EP1276411B1?cl=en  

E-Print Network [OSTI]

1/23/13 14:22Patent EP1276411B1 - Computer-based 3d visual field test system and analysis - Google Patents Page 1 of 7http://www.google.com/patents/EP1276411B1?cl=en Patents Publication number EP1276411 B1 published as EP1276411A1 Inventors Wolfgang Fink A. Alfredo Sadun Applicant California Institute

Arizona, University of

139

Nowcasting economic and social data: when and why search engine data fails, an illustration using Google Flu Trends  

E-Print Network [OSTI]

Obtaining an accurate picture of the current state of the economy is particularly important to central banks and finance ministries, and of epidemics to health ministries. There is increasing interest in the use of search engine data to provide such 'nowcasts' of social and economic indicators. However, people may search for a phrase because they independently want the information, or they may search simply because many others are searching for it. We consider the effect of the motivation for searching on the accuracy of forecasts made using search engine data of contemporaneous social and economic indicators. We illustrate the implications for forecasting accuracy using four episodes in which Google Flu Trends data gave accurate predictions of actual flu cases, and four in which the search data over-predicted considerably. Using a standard statistical methodology, the Bass diffusion model, we show that the independent search for information motive was much stronger in the cases of accurate prediction than in...

Ormerod, Paul; Bentley, R Alexander

2014-01-01T23:59:59.000Z

140

AgNIC Pre-conference 2009 “If It’s Digital and In Google – Then They Will Come”  

E-Print Network [OSTI]

Uncompressed raw image files Bitmap (.bmp) Tagged Image File Format (TIFF) (.tif) Digitization Concepts -- Image Quality Compressed derivative files Used for easier transmission over the web due to smaller size Joint Photographic Experts Group (JPEG) (.jpg... or nothing Image too skewed, not straight Too much dark page gutter Adobe Acrobat Professional: Create New PDF from Multiple Files Browse to File Folder Select Multiple Files Using Control Key Added File List Processing into PDF File Save New File as Bull...

McGeachin, Robert B.

2009-04-21T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Google Maths Philip Knight  

E-Print Network [OSTI]

and Googleplex · Web as a graph · Link Analysis · Search 3.0, 4.0, 5.0, . . . 1 #12;History · Archie (1990), Veronica and Jughead (1993) · WWW Wanderer, ALIWEB(1993) · WWW Worm, JumpStation, RBSE (1993) · Web. · Properly ordered results. 4 #12;Web As A Graph · Think of web as a collection of vertices and edges

Mottram, Nigel

142

Introduction To Google  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

boot loader(s) Fastest path to loading and executing the Linux kernel My Chromebox boots faster than my flat screen monitor can sync a signal. Zero configuration BIOS:...

143

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

144

Pyrochemical multiplicity counter development  

SciTech Connect (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

145

Google:[Leonid Zakharov] http://w3.pppl.gov/~zakharov LiWall Fusion and its 3 step R&D program  

E-Print Network [OSTI]

Google:[Leonid Zakharov] http://w3.pppl.gov/~zakharov LiWall Fusion and its 3 step R&D program Bibble of the 70s") LiWF NBI heating/fueling + Lithium Pumping PFC. No cold particles except He. vskip1em Issue LiWF Current BBBL-70s concept of "fusion" The target RDF (Reactor Dev.Facility, neutron

Zakharov, Leonid E.

146

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

147

Multiple Rankine topping cycles  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and rejection. However, no working fluid has been identified which will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids. This paper gives a history of Rankine topping cycles, presents an analysis for the calculation of the overall efficiency of a three-module multiple Rankine cycle, and presents results from a case study for a sodium-mercury-water cycle.

McWhirter, J.D. [Argonne National Lab., Idaho Falls, ID (United States). Engineering Div.]|[Idaho State Univ., Pocatello, ID (United States). Coll. of Engineering

1995-07-01T23:59:59.000Z

148

Multiple gap photovoltaic device  

DOE Patents [OSTI]

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

149

Multiple System Rate Process  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

150

Multiple sclerosis and interferon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

151

Multiple layer insulation cover  

DOE Patents [OSTI]

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

152

Traits and Multiple Genes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

153

AM with Multiple Merlins  

E-Print Network [OSTI]

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

154

Hadron multiplicities at the LHC  

E-Print Network [OSTI]

We present the predictions for hadron multiplicities in pp, pA and AA collisions at the LHC based on our approach to the Color Glass Condensate.

D. Kharzeev; E. Levin; M. Nardi

2007-07-05T23:59:59.000Z

155

Google Doc projects 1.2: Exploring NCEP atmospheric reanalysis data GFD-1 Winter 2011 1 Feb 2011 to be revised frequently (stay tuned). We will load some ocean data and  

E-Print Network [OSTI]

Google Doc projects 1.2: Exploring NCEP atmospheric reanalysis data GFD-1 Winter 2011 1 Feb 2011 ideas related to NCEP atmospheric data. The idea is to explore this data with Matlab (or other plotting increase right up to the stratosphere (look here at a map view over the North Pole..with Matlab

156

OpenEI Community - Google  

Open Energy Info (EERE)

Ideas from the New York Energy Data Jam http:en.openei.orgcommunityblogtop-innovation-ideas-new-york-energy-data-jam

 

157

Introducing the Google Maps API  

Science Journals Connector (OSTI)

On today’s Web, mapping solutions are a natural ingredient. We use them to see the location of things, to search for the position of an address, to get driving directions, and to do numerous other things. Most...

Gabriel Svennerberg

2010-01-01T23:59:59.000Z

158

Parallel progressive multiple sequence alignment  

Science Journals Connector (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

159

Multiple Motivations Institutional Change Principle  

Broader source: Energy.gov [DOE]

The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

160

Multiple hypothesis evaluation in auditing  

E-Print Network [OSTI]

In many audit tasks, auditors evaluate multiple hypotheses to diagnose the situation. Research suggests this is a complex task that individuals have difficulty performing. Further, there is little guidance in professional ...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized pattern matching [Proc. 25th Annual STOC, 1993, pp. 71–80] to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed a...

Ramana M. Idury; Alejandro A. Schäffer

1994-01-01T23:59:59.000Z

162

The INEL beryllium multiplication experiment  

SciTech Connect (OSTI)

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

163

Fair capacity sharing of multiple aperiodic servers  

E-Print Network [OSTI]

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

164

Failure Mechanisms in High Chrome Oxide Gasifier Refractories  

Science Journals Connector (OSTI)

As a process, gasification converts a carbon feedstock (typically methane, coal, or by-products from petroleum processing such as petcoke) into CO and H2 (called synthesis gas or syngas). The process of gasificat...

James P. Bennett; Kyei-Sing Kwong

2011-04-01T23:59:59.000Z

165

Recovery of Energy and Chrome from Leather Waste  

E-Print Network [OSTI]

compounds can result in a saving of some 25 million dollars per year for the industry. The paper presents a pyrolysis method for handling leather tanning wastes to recover energy and chromium compounds for use in the tanning process. Energy and cost savings...

Muralidhara, H. S.; Maggin, B.

1979-01-01T23:59:59.000Z

166

Chrome Deposit Corporation and the University of Delaware IAC...  

Broader source: Energy.gov (indexed) [DOE]

of Delaware students Joseph Camp and Nicole Suto; Keith Goossen, director of the Industrial Assessment Center; and Cesar Duarte, University of Delaware grad student. | Image...

167

Modularization to Support Multiple Brand Platforms  

E-Print Network [OSTI]

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

168

Multiple smart weapons employment mechanism  

SciTech Connect (OSTI)

A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

McGlynn, M.P.; Meiklejohn, W.D.

1993-07-20T23:59:59.000Z

169

Information transfer at multiple scales  

Science Journals Connector (OSTI)

In the study of complex systems a fundamental issue is the mapping of the networks of interaction between constituent subsystems of a complex system or between multiple complex systems. Such networks define the web of dependencies and patterns of continuous and dynamic coupling between the system’s elements characterized by directed flow of information spanning multiple spatial and temporal scales. Here, we propose a wavelet-based extension of transfer entropy to measure directional transfer of information between coupled systems at multiple time scales and demonstrate its effectiveness by studying (a) three artificial maps, (b) physiological recordings, and (c) the time series recorded from a chaos-controlled simulated robot. Limitations and potential extensions of the proposed method are discussed.

Max Lungarella; Alex Pitti; Yasuo Kuniyoshi

2007-11-27T23:59:59.000Z

170

Interactive Multiple Scale Small Multiples Andrew S. Forsberg  

E-Print Network [OSTI]

-dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

Laidlaw, David

171

Multiple resonant railgun power supply  

DOE Patents [OSTI]

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

172

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

19, 2012 19, 2012 U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in HP StorageWorks File Migration Agent. July 18, 2012 U-215: Oracle Critical Patch Update Advisory - July 2012 Critical Patch Updates are the primary means of releasing security fixes for Oracle products to customers with valid support contracts. They are released on the Tuesday closest to the 17th day of January, April, July and October. July 17, 2012 U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). July 16, 2012 U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

173

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

174

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized string matching (1993) to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed and preprocessed once, and then the case where the pattern set can change by insertions and deletions. Baker's algorithms are based on suffix trees, whereas ours are based on pattern matching automata.

Ramana M. Idury; Alejandro A. Schäffer

1996-01-01T23:59:59.000Z

175

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1  

E-Print Network [OSTI]

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1 2012 INTERNAL USER GUIDE A Guide to the Multiple Sclerosis Society Grant Tracker Society web page: http://www.mssociety.org.uk/ #12;Multiple Sclerosis Society (Grant Tracker) Multiple

176

The proliferation of functions: multiple systems playing multiple roles in multiple super systems  

E-Print Network [OSTI]

 played by any given system are represented by the  function analysis diagram (Aurisicchio, Bracewell, & Armstrong, 2013;  Devoino et al., 1997). Here, components of a system are connected to each  other through the effect that one has on the other. Components can affect  multiple...

Crilly, Nathan

2014-07-14T23:59:59.000Z

177

A NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS  

Science Journals Connector (OSTI)

...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS 10.1126...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS. | Journal...maturity, variety and treatment on the iodine value...CHICAGO, ILLINOIS WATER SOLUBLE MAGNESIUM...NEW MULTIPLE-UNIT ELECTRODIALYSIS ous fields of science...

Aasulv Löddesöl

1932-07-22T23:59:59.000Z

178

Recirculation in multiple wave conversions  

SciTech Connect (OSTI)

A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

Kaufman, A. N.; Brizard, A.J.; Kaufman, A.N.; Tracy, E.R.

2008-07-30T23:59:59.000Z

179

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

61 - 10570 of 28,905 results. 61 - 10570 of 28,905 results. Download portfolioJan2006_final_v2.pdf http://energy.gov/cio/downloads/portfoliojan2006finalv2pdf-1 Article V-038: Google Chrome Two Vulnerabilities Two vulnerabilities have been reported in Google Chrome http://energy.gov/cio/articles/v-038-google-chrome-two-vulnerabilities Download EIS-0379- Final Environmental Impact Statement Rebuild of the Libby (FEC) to Troy Section of BPA's Libby to Bonners Ferry 115-kilovolt Transmission Line, Libby, Lincoln County, Montana http://energy.gov/nepa/downloads/eis-0379-final-environmental-impact-statement Download CX-000242: Categorical Exclusion Determination Recovery Act: 20 Percent Wind by 2030: Overcoming the Challenges CX(s) Applied: A9 Date: 12/17/2009 Location(s): Montana Office(s): Energy Efficiency and Renewable Energy, Golden Field Office

180

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Inverse scattering series for multiple attenuation: An example with surface and internal multiples  

SciTech Connect (OSTI)

A multiple attenuation method derived from an inverse scattering series is described. The inversion series approach allows a separation of multiple attenuation subseries from the full series. The surface multiple attenuation subseries was described and illustrated in Carvalho et al. (1991, 1992). The internal multiple attenuation method consists of selecting the parts of the odd terms that are associated with removing only multiply reflected energy. The method, for both types of multiples, is multidimensional and does not rely on periodicity or differential moveout, nor does it require a model of the reflectors generating the multiples. An example with internal and surface multiples will be presented.

Araujo, F.V. [PPPG/Federal Univ. of Bahia, Salvador (Brazil); Weglein, A.B. [Schlumberger Cambridge Research (United Kingdom); Carvalho, P.M. [Petrobras SA, Rio de Janeiro (Brazil); Stolt, R.H.

1994-12-31T23:59:59.000Z

182

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7, 2011 7, 2011 U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. October 6, 2011 U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers A remote user can access internal servers. October 5, 2011 U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. October 4, 2011 U-003:RPM Package Manager security update RPM Package Manager Header Validation Flaws Let Remote Users Execute

183

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

184

Hereditary Multiple Exostoses with Pseudoaneurysm  

SciTech Connect (OSTI)

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

185

Inverted and multiple nematic emulsions  

Science Journals Connector (OSTI)

We investigate experimentally the structures that form when small colloidal particles are suspended in a nematic solvent. These structures are anisotropic, and their formation is driven by interactions arising from the orientational elasticity of the nematic solvent. By using inverted and multiple nematic emulsions composed of water droplets dispersed in a thermotropic liquid crystal, we identify the nature of these interactions, and demonstrate that they can be controlled by the anchoring of the liquid crystal molecules at the surfaces of the droplets. When the anchoring is normal, the droplets form linear chains, suggesting a long-range dipole-dipole attraction between the particles. By contrast, the interactions are repulsive at short range, and prevent contact of the droplets, thereby stabilizing them against coalescence. When the anchoring is planar, the droplets generate distortions that have a quadrupolar character. The resultant elastic interactions lead to more compact, but still anisotropic, clusters.

P. Poulin and D. A. Weitz

1998-01-01T23:59:59.000Z

186

Multiple acousto-optic q-switch  

DOE Patents [OSTI]

An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

Deason, Vance A. (Idaho Falls, ID)

1993-01-01T23:59:59.000Z

187

Multiplicity of investment equilibria when pollution permits are not tradable  

E-Print Network [OSTI]

Paper ???? Multiplicity of investment equilibria whenauthor. Multiplicity of investment equilibria when pollutionon aggregate levels of investment in abatement capital.

Karp, Larry

2006-01-01T23:59:59.000Z

188

Systems analysis of multiple regulator perturbations allows discoveryo...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

189

Multiple Layer Graphene Optical Modulator - Energy Innovation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Advanced Materials Find More Like This Return to Search Multiple Layer Graphene Optical Modulator Lawrence Berkeley National Laboratory Contact LBL About This...

190

Code design for multiple-input multiple-output broadcast channels  

E-Print Network [OSTI]

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

191

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang  

E-Print Network [OSTI]

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

Jiang, Anxiao "Andrew"

192

Analysis of Variance (ANOVA) Multiple Comparisons  

E-Print Network [OSTI]

Analysis of Variance (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA Stat 491 The Kruskal-Wallis Test Two-Way ANOVA Introduction We are interested in testing equality of k population means (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA ANOVA: Simulated Data (k = 4; µ1 = 5

Bardsley, John

193

Multiple Point Schemes for Corank 1 Maps  

Science Journals Connector (OSTI)

......Multiple Point Schemes for Corank 1 Maps Washington Luiz Marar David Mond...MULTIPLE POINT SCHEMES FOR CORANK 1 MAPS WASHINGTON LUIZ MARAR AND DAVID...1). Finally, denote the map Cn "1+fc -> C*~m defined...g:(Cn -1+k ,0) *C\\gis G-invariant}. Then

Washington Luiz Marar; David Mond

1989-06-01T23:59:59.000Z

194

Charged track multiplicity in B meson decay  

Science Journals Connector (OSTI)

We have used the CLEO II detector to study the multiplicity of charged particles in the decays of B mesons produced at the ?(4S) resonance. Using a sample of 1.5×106 B meson pairs, we find the mean inclusive charged particle multiplicity to be 10.71±0.02-0.15+0.21 for the decay of the pair. This corresponds to a mean multiplicity of 5.36±0.01-0.08+0.11 for a single B meson. Using the same data sample, we have also extracted the mean multiplicities in semileptonic and nonleptonic decays. We measure a mean of 7.82±0.05-0.19+0.21 charged particles per BB¯ decay when both mesons decay semileptonically. When neither B meson decays semileptonically, we measure a mean charged particle multiplicity of 11.62±0.04-0.18+0.24 per BB¯ pair.

G. Brandenburg et al. (CLEO Collaboration)

2000-03-07T23:59:59.000Z

195

Modeling Multiple Causes of Carcinogenesis  

SciTech Connect (OSTI)

An array of epidemiological results and databases on test animal indicate that risk of cancer and atherosclerosis can be up- or down-regulated by diet through a range of 200%. Other factors contribute incrementally and include the natural terrestrial environment and various human activities that jointly produce complex exposures to endotoxin-producing microorganisms, ionizing radiations, and chemicals. Ordinary personal habits and simple physical irritants have been demonstrated to affect the immune response and risk of disease. There tends to be poor statistical correlation of long-term risk with single agent exposures incurred throughout working careers. However, Agency recommendations for control of hazardous exposures to humans has been substance-specific instead of contextually realistic even though there is consistent evidence for common mechanisms of toxicological and carcinogenic action. That behavior seems to be best explained by molecular stresses from cellular oxygen metabolism and phagocytosis of antigenic invasion as well as breakdown of normal metabolic compounds associated with homeostatic- and injury-related renewal of cells. There is continually mounting evidence that marrow stroma, comprised largely of monocyte-macrophages and fibroblasts, is important to phagocytic and cytokinetic response, but the complex action of the immune process is difficult to infer from first-principle logic or biomarkers of toxic injury. The many diverse database studies all seem to implicate two important processes, i.e., the univalent reduction of molecular oxygen and breakdown of aginuine, an amino acid, by hydrolysis or digestion of protein which is attendant to normal antigen-antibody action. This behavior indicates that protection guidelines and risk coefficients should be context dependent to include reference considerations of the composite action of parameters that mediate oxygen metabolism. A logic of this type permits the realistic common-scale modeling of multiple causes of carcinogenesis and shifts the risk-assessment logic to considerations of ?what dose does?? in contrast to the current process of the substance-specific question of ?what dose is?? Whether reactive oxygen is the proximate or contributing cause of disease or simply a better estimate of biologically effective dose, it has enormous advantages for improved risk- and policy-based decisions. Various estimates of immune system modulation will be given based on radiobiology.

Jones, T.D.

1999-01-24T23:59:59.000Z

196

PJM Interconnection (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

197

A Study of Multiplicities in Hadronic Interactions  

SciTech Connect (OSTI)

Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

Estrada Tristan, Nora Patricia; /San Luis Potosi U.

2006-02-01T23:59:59.000Z

198

The MARVEL assembly for neutron multiplication  

SciTech Connect (OSTI)

A new multiplying test assembly is under development at Idaho National Laboratory to support research, validation, evaluation, and learning. The item is comprised of three stacked, highly-enriched uranium (HEU) cylinders, each 11.4 cm in diameter and having a combined height of up to 11.7 cm. The combined mass of all three cylinders is 20.3 kg of HEU. Calculations for the bare configuration of the assembly indicate a multiplication level of >3.5 (keff=0.72). Reflected configurations of the assembly, using either polyethylene or tungsten, are possible and have the capability of raising the assembly's multiplication level to greater than 10. This paper describes simulations performed to assess the assembly's multiplication level under different conditions and describes the resources available at INL to support the use of these materials. We also describe some preliminary calculations and test activities using the assembly to study neutron multiplication.

David L. Chichester; Mathew T. Kinlaw

2013-10-01T23:59:59.000Z

199

Multiple Vehicle Routing Problem with Fuel Constraints  

E-Print Network [OSTI]

In this paper, a Multiple Vehicle Routing Problem with Fuel Constraints (MVRPFC) is considered. This problem consists of a field of targets to be visited, and a collection of vehicles with fuel tanks that may visit the targets. Consideration...

Levy, David

2013-06-26T23:59:59.000Z

200

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic grid–adaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Nonparametric estimation of multiple structures with outliers  

E-Print Network [OSTI]

Nonparametric estimation of multiple structures with outliers Wei Zhang and Jana Kosecka George outliers (pseudo outliers) to it in addition to the true outliers (gross outliers). The problem of robust

Kosecka, Jana

202

Algorithms for Multiple Vehicle Routing Problems  

E-Print Network [OSTI]

Surveillance and monitoring applications require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental routing problems involving multiple vehicles that arise in these applications. The main...

Bae, Jung Yun

2014-06-02T23:59:59.000Z

203

Friction and the Multiplicity of Equilibria  

E-Print Network [OSTI]

but large, the measure of the ROM is therefore non-monotonicTherefore the measure of the ROM is positive. However, as ?region of multiplicity” (ROM) is the intersection of two or

Karp, Larry

2005-01-01T23:59:59.000Z

204

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect (OSTI)

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

205

An analysis of multiple component mooring lines  

E-Print Network [OSTI]

AN ANALYSIS OF MULTIPLE COMPONENT MOORING LINES A Thesis by THOMAS ROBERT NALTERS Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1977 Major...'595 ABSTRACT An Analysis Of Multiple Component Mooring Lines (December 1977) Thomas Robert Walters, B. E. , Vanderbilt University Co-Chai rman of Advisory Committee: Dr. Ts ung- Chow Su Co- Chai rman of Advisory Committee: Dr. Richard Domi nguez...

Walters, Thomas Robert

2012-06-07T23:59:59.000Z

206

T-597: WordPress Multiple Security Vulnerabilities | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

7: WordPress Multiple Security Vulnerabilities T-597: WordPress Multiple Security Vulnerabilities April 7, 2011 - 5:42am Addthis PROBLEM: WordPress is prone to multiple security...

207

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...  

Energy Savers [EERE]

V-041: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple...

208

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Broader source: Energy.gov (indexed) [DOE]

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 -...

209

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA Aptamers and Graphene Oxide Nanosheets. In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA...

210

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

211

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy Savers [EERE]

32: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 -...

212

Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bonded Arrays: The Power of Multiple Hydrogen Bonds. Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds. Abstract: Hydrogen bond interactions in small covalent model...

213

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen K-edge Spectroscopy and Electronic Structure Theory . Covalency in Metal-Oxygen Multiple Bonds Evaluated Using...

214

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network [OSTI]

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

215

Immunochromatographic Diagnostic Test Analysis Using Google Glass  

Science Journals Connector (OSTI)

The same server also provides a dynamic spatiotemporal map and real-time statistics for uploaded RDT results accessible through Internet browsers. ... RDT technologies have since provided various advantages for tackling public health problems including, but not limited to, more effective tracking/monitoring of chronic conditions, infectious diseases and drugs of abuse in at-risk areas, and widespread medical testing by minimally trained medical personnel or community healthcare workers. ... Ozcan Research Group at UCLA gratefully acknowledges the support of the Presidential Early Career Award for Scientists and Engineers (PECASE), Army Research Office (ARO) Life Sciences Division, ARO Young Investigator Award, National Science Foundation (NSF) CAREER Award, NSF CBET Division Biophotonics Program, NSF Emerging Frontiers in Research and Innovation (EFRI) Award, Office of Naval Research (ONR), and National Institutes of Health (NIH) Director’s New Innovator Award DP2OD006427 from the Office of the Director, National Institutes of Health. ...

Steve Feng; Romain Caire; Bingen Cortazar; Mehmet Turan; Andrew Wong; Aydogan Ozcan

2014-02-27T23:59:59.000Z

216

Incorporating video into Google Mobile Street View  

E-Print Network [OSTI]

Mobile Street View is a compelling application but suffers from significant latency problems, especially in limited bandwidth circumstances. Currently, the application uses static images to display street level information. ...

Wright, Christina (Christina E.)

2010-01-01T23:59:59.000Z

217

Charged-particle multiplicity at LHC energies  

ScienceCinema (OSTI)

The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited. 

None

2011-10-06T23:59:59.000Z

218

Erratum: Formation Control of Multiple Mobile Robots Systems  

Science Journals Connector (OSTI)

The paper entitled “Formation Control of Multiple Mobile Robots Systems” by Zhanfeng Li, Youliang Ma...

Zhanfeng Li; Youliang Ma; Tong Ren

2008-01-01T23:59:59.000Z

219

Multiple Triclosan Targets in Trypanosoma brucei  

Science Journals Connector (OSTI)

...Microbiology ARTICLE ARTICLES Multiple Triclosan Targets in Trypanosoma brucei Kimberly...It was therefore not surprising that triclosan, an inhibitor of type II enoyl-acyl...EC50s) of 10 and 13 muM, respectively. Triclosan also inhibited cell-free fatty acid...

Kimberly S. Paul; Cyrus J. Bacchi; Paul T. Englund

2004-08-01T23:59:59.000Z

220

Wind direction modelling using multiple observation points  

Science Journals Connector (OSTI)

...gains in the produced output power. chaos engineering|wind forecasting|multiple measurements...realized that the modelling of power output in wind turbines needs to be performed...region; in region 3, for high winds, the power output is subject to a threshold...

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Quasi Multiplication and K-groups  

E-Print Network [OSTI]

We give a negative answer to the question raised by Mart Abel about whether his proposed definition of K0 and K1 groups in terms of quasi multiplication is indeed equivalent to the established ones in algebraic K-theory....

Lee, Tsiu-Kwen; Sheu, Albert Jeu-Liang

2013-02-28T23:59:59.000Z

222

A Survey of Multiplicity Fluctuations in PHENIX  

E-Print Network [OSTI]

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the charged particle multiplicity as a function of collision energy, centrality, collision species, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

Jeffery T. Mitchell

2005-10-27T23:59:59.000Z

223

Computer Simulations Reveal Multiple Functions for Aromatic  

E-Print Network [OSTI]

Computer Simulations Reveal Multiple Functions for Aromatic Residues in Cellulase Enzymes NREL researchers use high-performance computing to demonstrate fundamental roles of aromatic residues in cellulase enzyme tunnels. National Renewable Energy Laboratory (NREL) computer simulations of a key indus- trial

224

Gene prediction by multiple spliced alignment  

Science Journals Connector (OSTI)

With recent advances in sequencing technologies, a huge amount of DNA sequences become available year after year. In order to obtain useful information on these sequences, we need to process them in search of biologically meaningful regions. The genes ... Keywords: comparative genomics, gene prediction, multiple spliced alignment

Rodrigo Mitsuo Kishi; Ronaldo Fiorilo dos Santos; Said Sadique Adi

2011-08-01T23:59:59.000Z

225

Medical image classification with multiple kernel learning  

Science Journals Connector (OSTI)

Nowadays, medical images are generated by hospitals and medical centers rapidly. The large volume of medical image data produces a strong need to effective medical image retrieval. The visual characteristic of medical image, such as modality, anatomical ... Keywords: feature fusion, image classification, medical imaging, multiple kernel learning

Hong Wu; Hao Zhang; Chao Li

2010-12-01T23:59:59.000Z

226

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;MATLAB Parallel MATLAB sets up one special agent called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

227

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;Matlab Parallel ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 67 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

228

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff: Advanced Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 69 #12;Matlab ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 69 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

229

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 66 #12;MATLAB Parallel MATLAB sets up one special worker called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

230

The multiple vortex nature of tropical cyclogenesis  

E-Print Network [OSTI]

) __________________________ __________________________ John Nielsen-Gammon Craig Epifanio (Chair of Committee) (Member) __________________________ __________________________ Fuqing Zhang Hongxing Liu (Member) (Member) December 2004 Major Subject: Atmospheric Sciences... iii ABSTRACT The Multiple Vortex Nature of Tropical Cyclogenesis. (December 2004) Jason Allen Sippel, B.S., Texas A&M University Chair of Advisory Committee: Dr. John Nielsen-Gammon This thesis contains an observational analysis...

Sippel, Jason Allen

2005-02-17T23:59:59.000Z

231

Experimental Verification of Carrier Multiplication in Graphene  

Science Journals Connector (OSTI)

By this method, we obtain occupation probabilities at eight distinct energies, enabling a safe reconstruction of the time-dependent carrier distribution in the relevant range in momentum space, assuming quasi-instantaneous thermalization of the excited carriers. ... Schaller, R. D.; Klimov, V. I.High Efficiency Carrier Multiplication in PbSe Nanocrystals: Implications for Solar Energy Conversion Phys. ...

T. Plötzing; T. Winzer; E. Malic; D. Neumaier; A. Knorr; H. Kurz

2014-08-21T23:59:59.000Z

232

Jet multiplicities as the QGP thermometer  

E-Print Network [OSTI]

It is proposed to use the energy behavior of mean multiplicities of jets propagating in a nuclear medium as the thermometer of this medium during the collision phases. The qualitative effects are demonstrated in the framework of the fixed coupling QCD with account of jet quenching.

I. M. Dremin; O. S. Shadrin

2006-02-10T23:59:59.000Z

233

Monitoring voltage collapse margin with synchrophasors across transmission corridors with multiple lines and multiple contingencies  

E-Print Network [OSTI]

We use synchrophasor measurements of the complex voltage and current at both ends of multiple transmission lines that connect areas of a power system to monitor the online voltage collapse margin. A new reduction is used to reduce the multiple transmission lines to a single line equivalent and determine how to combine the synchrophasor measurements. Generator reactive power limits can be accommodated. The results show that this methodology can capture the effect of multiple contingencies inside the transmission corridors, giving awareness to the operators about the severity of contingencies with respect to voltage stability.

Ramirez, Lina

2014-01-01T23:59:59.000Z

234

A material's multiple personalities | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

235

Multiple Scattering Measurements in the MICE Experiment  

SciTech Connect (OSTI)

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

236

Weak multiplicativity for random quantum channels  

E-Print Network [OSTI]

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

237

Method for High Accuracy Multiplicity Correlation Measurements  

E-Print Network [OSTI]

Multiplicity correlation measurements provide insight into the dynamics of high energy collisions. Models describing these collisions need these correlation measurements to tune the strengths of the underlying QCD processes which influence all observables. Detectors, however, often possess limited coverage or reduced efficiency that influence correlation measurements in obscure ways. In this paper, the effects of non-uniform detection acceptance and efficiency on the measurement of multiplicity correlations between two distinct detector regions (termed forward-backward correlations) are derived. This result is transformed into a correction method. Verification of the presented correction method is provided through simulations using different event generators. The result of the method allows one to correct measurements in a simulation independent manner with high accuracy and thereby shed light on the underlying processes.

Gulbrandsen, K

2014-01-01T23:59:59.000Z

238

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

Jordon, H.F.

1984-01-01T23:59:59.000Z

239

Multiple Rankine topping cycles offer high efficiency  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and heat rejection. However, no working fluid has been identified that will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids to span larger temperature ranges.

McWhirter, J.D. [Idaho State Univ., Pocatello, ID (United States)

1997-10-01T23:59:59.000Z

240

Neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

This paper continues, with respect to the transplutonium nuclides, earlier efforts to collate and evaluate data from the scientific literature on the prompt neutron multiplicity distribution from fission and its first moment = ..sigma..nuPnu. The isotopes considered here for which P/sub nu/ and or data (or both) were found in the literature are of americium (Am), curium (Cm), berkelium (Bk), californium (Cf), einsteinium (Es), fermium (Fm), and nobelium (No).

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

[0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,  

E-Print Network [OSTI]

, multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

Tam, Tin-Yau

242

Alternatives for Helium-3 in Multiplicity Counters  

SciTech Connect (OSTI)

Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

2013-04-01T23:59:59.000Z

243

Exponential smoothing with a damped multiplicative trend  

Science Journals Connector (OSTI)

Multiplicative trend exponential smoothing has received very little attention in the literature. It involves modelling the local slope by smoothing successive ratios of the local level, and this leads to a forecast function that is the product of level and growth rate. By contrast, the popular Holt method uses an additive trend formulation. It has been argued that more real series have multiplicative trends than additive. However, even if this is true, it seems likely that the more conservative forecast function of the Holt method will be more robust when applied in an automated way to a large batch of series with different types of trend. In view of the improvements in accuracy seen in dampening the Holt method, in this paper we investigate a new damped multiplicative trend approach. An empirical study, using the monthly time series from the M3-Competition, gave encouraging results for the new approach at a range of forecast horizons, when compared to the established exponential smoothing methods.

James W. Taylor

2003-01-01T23:59:59.000Z

244

MPACT Fast Neutron Multiplicity System Prototype Development  

SciTech Connect (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

245

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2008-01-03T23:59:59.000Z

246

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2007-02-15T23:59:59.000Z

247

Design of globally optimal multiple description scalar quantizers  

E-Print Network [OSTI]

This thesis investigates the design of globally optimal multiple description scalar quantizers. The design of multiple description scalar quantizers is formulated as a combinatorial optimization problem due to the index assignment issue. The first...

Desilva, Buveneka Kanishka

2012-06-07T23:59:59.000Z

248

Multiple Steady States in Ideal Two-Product Distillation  

E-Print Network [OSTI]

Multiple Steady States in Ideal Two-Product Distillation Elling W. Jacobsen and Sigurd Skogestad Chemical Engineering Dept., University of Trondheim-NTH, N-7034 Trondheim, Norway Simple distillation and compositions in the column. Introduction Multiple steady states (multiplicity) in distillation columns have

Skogestad, Sigurd

249

New multiplicativity results for qubit maps  

E-Print Network [OSTI]

Let $\\Phi$ be a trace-preserving, positivity-preserving (but not necessarily completely positive) linear map on the algebra of complex $2 \\times 2$ matrices, and let $\\Omega$ be any finite-dimensional completely positive map. For $p=2$ and $p \\geq 4$, we prove that the maximal $p$-norm of the product map $\\Phi \\ot \\Omega$ is the product of the maximal $p$-norms of $\\Phi$ and $\\Omega$. Restricting $\\Phi$ to the class of completely positive maps, this settles the multiplicativity question for all qubit channels in the range of values $p \\geq 4$.

Christopher King; Nilufer Koldan

2006-03-09T23:59:59.000Z

250

Multiple volume compressor for hot gas engine  

DOE Patents [OSTI]

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

251

Multiple frequency method for operating electrochemical sensors  

DOE Patents [OSTI]

A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

Martin, Louis P. (San Ramon, CA)

2012-05-15T23:59:59.000Z

252

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

Jordan, H.F.

1984-01-01T23:59:59.000Z

253

Multiplicative cascades and seismicity in natural time  

Science Journals Connector (OSTI)

Natural time ? enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance ?1(???2?????2) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

N. V. Sarlis; E. S. Skordas; P. A. Varotsos

2009-08-11T23:59:59.000Z

254

Multiple gamma lines from semi-annihilation  

SciTech Connect (OSTI)

Hints in the Fermi data for a 130 GeV gamma line from the galactic center have ignited interest in potential gamma line signatures of dark matter. Explanations of this line based on dark matter annihilation face a parametric tension since they often rely on large enhancements of loop-suppressed cross sections. In this paper, we pursue an alternative possibility that dark matter gamma lines could arise from ''semi-annihilation'' among multiple dark sector states. The semi-annihilation reaction ?{sub i}?{sub j} ? ?{sub k}? with a single final state photon is typically enhanced relative to ordinary annihilation ?{sub i}?-bar {sub i} ? ?? into photon pairs. Semi-annihilation allows for a wide range of dark matter masses compared to the fixed mass value required by annihilation, opening the possibility to explain potential dark matter signatures at higher energies. The most striking prediction of semi-annihilation is the presence of multiple gamma lines, with as many as order N{sup 3} lines possible for N dark sector states, allowing for dark sector spectroscopy. A smoking gun signature arises in the simplest case of degenerate dark matter, where a strong semi-annihilation line at 130 GeV would be accompanied by a weaker annihilation line at 173 GeV. As a proof of principle, we construct two explicit models of dark matter semi-annihilation, one based on non-Abelian vector dark matter and the other based on retrofitting Rayleigh dark matter.

D'Eramo, Francesco [Department of Physics, University of California, Berkeley, CA 94720 (United States); McCullough, Matthew; Thaler, Jesse, E-mail: fraderamo@berkeley.edu, E-mail: mccull@mit.edu, E-mail: jthaler@mit.edu [Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

2013-04-01T23:59:59.000Z

255

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

256

Prompt neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

The direct determination of the average prompt neutron emission values is reviewed, and a method of comparing different sites of neutron emission multiplicity distribution values is described. Measured and recommended values are tabulated for these nuclides: /sup 241/Am, /sup 242/Am, /sup 242/Cm, /sup 243/Cm, /sup 244/Cm, /sup 246/Cm, /sup 247/Cm, /sup 248/Cm, /sup 250/Cm, /sup 245/Cm, /sup 249/Bk, /sup 246/Cf, /sup 249/Cf, /sup 250/Cf, /sup 252/Cf, /sup 254/Cf, /sup 251/Cf, /sup 253/Es, /sup 254/Es, /sup 244/Fm, /sup 246/Fm, /sup 255/Fm, /sup 252/No, /sup 254/Fm, /sup 256/Fm, /sup 257/Fm. 59 refs., 24 tabs. (LEW)

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

257

Free Energy of Multiple Overlapping Chains  

Science Journals Connector (OSTI)

How accurate is pair additivity in describing interactions between soft polymer-based nanoparticles? Using numerical simulations we compute the free energy cost required to overlap multiple chains in the same region of space, and provide a quantitative measure of the effectiveness of pair additivity as a function of chain number and length. Our data suggest that pair additivity can indeed become quite inadequate as the chain density in the overlapping region increases. We also show that even a scaling theory based on polymer confinement can only partially account for the complexity of the problem. In fact, we unveil and characterize an isotropic to star-polymer crossover taking place for large number of chains, and propose a revised scaling theory that better captures the physics of the problem.

Katherine Klymko and Angelo Cacciuto

2011-12-27T23:59:59.000Z

258

Multiple crossbar network: Integrated supercomputing framework  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, site of one of the world's most powerful scientific supercomputing facilities, a prototype network for an environment that links supercomputers and workstations is being developed. Driven by a need to provide graphics data at movie rates across a network from a Cray supercomputer to a Sun scientific workstation, the network is called the Multiple Crossbar Network (MCN). It is intended to be coarsely grained, loosely coupled, general-purpose interconnection network that will vastly increase the speed at which supercomputers communicate with each other in large networks. The components of the network are described, as well as work done in collaboration with vendors who are interested in providing commercial products. 9 refs.

Hoebelheinrich, R. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

259

Multiple predictor smoothing methods for sensitivity analysis.  

SciTech Connect (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

260

Analysis of the causes of failure in high chrome oxide refractory materials from slagging gasifiers  

SciTech Connect (OSTI)

High Cr2O3 refractory materials are used to line the hot face of slagging gasifiers. Gasifiers are reaction chambers that convert water, oxygen, and a carbon feedstock into CO, H2, and methane at temperatures as high as 1575oC and pressures up to 1000 psi. Ash in the carbon feedstock liquefies, erodes and corrodes the gasifier’s refractory liner, contributing to liner failure within a few months to two years. The failure of a refractory liner decreases a gasifier’s on-line availability and causes costly system downtime and repairs. Many factors contribute to refractory lining failure, including slag penetration and corrosion, thermal cycling, gasifier environment, and mechanical loads. The results of refractory post-mortem failure analysis and how observations relate to gasifier service life will be discussed.

Bennett, J.P.; Kwong, K.-S.; Powell, C.A.; Thomas, H.; Krabbe, R.A.

2006-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

E-Print Network 3.0 - acid chrome dyes Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

which uniquely identifies each particle. The ... Source: Zheludev, Nikolay - Optoelectronics Research Centre & School of Physics and Astronomy, University of Southampton...

262

An analysis of the causes of failure in high chrome oxide refractory materials from slagging gasifiers  

SciTech Connect (OSTI)

High Cr2O3 refractory materials are used to line the hot face of slagging gasifiers. Gasifiers are reaction chambers that convert water, oxygen, and a carbon feedstock into CO, H2, and methane at temperatures as high as 1575DGC and pressures up to 1000 psi. Ash in the carbon feedstock liquefies, erodes and corrodes the gasifier's refractory liner, contributing to liner failure within a few months to two years. The failure of a refractory liner decreases a gasifier's on-line availability and causes costly system downtime and repairs. Many factors contribute to refractory lining failure, including slag penetration and corrosion, thermal cycling, gasifier environment, and mechanical loads. The results of refractory post-mortem failure analysis and how observations relate to gasifier service life will be discussed.

Bennett, James P.; Kwong, Kyei-Sing; Powell, Cynthia A.; Thomas, Hugh; Krabbe, Rick

2006-01-01T23:59:59.000Z

263

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

264

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

265

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

266

Organic light emitting device having multiple separate emissive layers  

DOE Patents [OSTI]

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

267

Measuring multiple residual-stress components using the contour method and multiple cuts  

SciTech Connect (OSTI)

The conventional contour method determines one component of stress over the cross section of a part. The part is cut into two, the contour of the exposed surface is measured, and Bueckner's superposition principle is analytically applied to calculate stresses. In this paper, the contour method is extended to the measurement of multiple stress components by making multiple cuts with subsequent applications of superposition. The theory and limitations are described. The theory is experimentally tested on a 316L stainless steel disk with residual stresses induced by plastically indenting the central portion of the disk. The stress results are validated against independent measurements using neutron diffraction. The theory has implications beyond just multiple cuts. The contour method measurements and calculations for the first cut reveal how the residual stresses have changed throughout the part. Subsequent measurements of partially relaxed stresses by other techniques, such as laboratory x-rays, hole drilling, or neutron or synchrotron diffraction, can be superimposed back to the original state of the body.

Prime, Michael B [Los Alamos National Laboratory; Swenson, Hunter [Los Alamos National Laboratory; Pagliaro, Pierluigi [U. PALERMO; Zuccarello, Bernardo [U. PALERMO

2009-01-01T23:59:59.000Z

268

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Broader source: Energy.gov (indexed) [DOE]

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

269

Building multiple adsorption sites in porous polymer networks...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Building multiple adsorption sites in porous polymer networks for carbon capture applications Previous Next List Weigang Lu, Wolfgang M. Verdegaal, Jiamei Yu, Perla B Balbuena,...

270

ALS Capabilities Reveal Multiple Functions of Ebola Virus  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its...

271

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network [OSTI]

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple… (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

272

Smoothing of the cosmic background radiation by multiple gravitational scattering  

Science Journals Connector (OSTI)

We investigated the smoothing of the cosmic background radiation (CBR) ... rays increases exponentially through multiple scatterings. This exponential growth occurs if the distance is smaller...

Junichiro Making

1994-01-01T23:59:59.000Z

273

Multiplex Chaos Synchronization in Semiconductor Lasers with Multiple Optoelectronic Feedbacks  

E-Print Network [OSTI]

Secure chaos based multiplex communication system scheme is proposed utilizing globally coupled semiconductor lasers with multiple variable time delay optoelectronic feedbacks.

E. M. Shahverdiev; K. A. Shore

2011-11-06T23:59:59.000Z

274

Carrier Multiplication in Nanocrystal Quantum Dots and Solar Energy Conversion  

Science Journals Connector (OSTI)

This paper discusses aspects of carrier multiplication (multiexciton generation by single photons) in semiconductor nanocrystals such as its mechanism, competing relaxation channels,...

Klimov, Victor I

275

Project Profile: CSP Energy Storage Solutions - Multiple Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings, under the Thermal Storage FOA, is aiming to demonstrate commercial,...

276

Multiple frequency electron cyclotron heating for the Levitated Dipole Experiment .  

E-Print Network [OSTI]

??The use of multiple frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX) is an important tool that will tailor the… (more)

Mahar, Scott B

2005-01-01T23:59:59.000Z

277

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

278

Multiple phase estimation in quantum cloning machines  

E-Print Network [OSTI]

Since the initial discovery of the Wootters-Zurek no-cloning theorem, a wide variety of quantum cloning machines have been proposed aiming at imperfect but optimal cloning of quantum states within its own context. Remarkably, most previous studies have employed the Bures fidelity or the Hilbert-Schmidt norm as the figure of merit to characterize the quality of the corresponding cloning scenarios. However, in many situations, what we truly care about is the relevant information about certain parameters encoded in quantum states. In this work, we investigate the multiple phase estimation problem in the framework of quantum cloning machines, from the perspective of quantum Fisher information matrix (QFIM). Focusing on the generalized d-dimensional equatorial states, we obtain the analytical formulas of QFIM for both universal quantum cloning machine (UQCM) and phase-covariant quantum cloning machine (PQCM), and prove that PQCM indeed performs better than UQCM in terms of QFIM. We highlight that our method can be generalized to arbitrary cloning schemes where the fidelity between the single-copy input and output states is input-state independent. Furthermore, the attainability of the quantum Cramer-Rao bound is also explicitly discussed.

Yao Yao; Li Ge; Xing Xiao; Xiao-guang Wang; Chang-pu Sun

2014-07-22T23:59:59.000Z

279

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network [OSTI]

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

280

Coordinated Output Regulation of Multiple Heterogeneous Linear Systems  

E-Print Network [OSTI]

, the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

Dimarogonas, Dimos

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A Multiple Criteria Decision Analysis (MCDA) Software Selection Framework  

Science Journals Connector (OSTI)

With the gaining popularity of multiple criteria decision analysis (MCDA) among researchers and practitioners, a variety of software that implements sophisticated MCDA methods and techniques is now available. To address the issue of the missing methodological ... Keywords: Multiple Criteria Decision Analysis, MCDA, Software evaluation, multicriteria aggregation procedures

Yan Li; Manoj A. Thomas

2014-01-01T23:59:59.000Z

282

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network [OSTI]

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

283

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods  

E-Print Network [OSTI]

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods Judith E. Devaney, John G plaster over multiple time periods. We use three dimensional data obtained through X-ray microtomography of the plaster datasets that had been labeled with their autoclass predictions. The rules were found to have both

Fernandez, Thomas

284

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location  

E-Print Network [OSTI]

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

285

Generalized quadratic multiple knapsack problem and two solution approaches  

Science Journals Connector (OSTI)

The Quadratic Knapsack Problem (QKP) is one of the well-known combinatorial optimization problems. If more than one knapsack exists, then the problem is called a Quadratic Multiple Knapsack Problem (QMKP). Recently, knapsack problems with setups have ... Keywords: Combinatorial optimization, F-MSG, Generalized Quadratic Multiple Knapsack Problem (G-QMKP), Genetic Algorithm (GA), Production with plastic injection

Tugba Saraç; Aydin Sipahioglu

2014-03-01T23:59:59.000Z

286

Model Reduction for Power Electronics Systems with Multiple Heat Sources  

E-Print Network [OSTI]

Model Reduction for Power Electronics Systems with Multiple Heat Sources A. Augustin, T. Hauck, B demonstrates the model order re- duction procedures applied to semiconductor devices with multiple heat sources. The approach is demonstrated for a device with nine heat sources where some of them are perma- nently active

Paris-Sud XI, Université de

287

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a  

E-Print Network [OSTI]

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a Single Fiber. In this work, we demonstrate the successful fabrication of an eight-device cascaded optoelectronic fiber of integrating multiple optoelectronic components into a single fiber cross-section. This is in fact a common

California at Irvine, University of

288

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment  

E-Print Network [OSTI]

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment by Scott B. Mahar on Graduate Students #12;2 #12;Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX

289

Complex multiplication, rationality and mirror symmetry for abelian varieties  

E-Print Network [OSTI]

We show that complex multiplication on abelian varieties is equivalent to the existence of a constant rational K\\"ahler metric. We give a sufficient condition for a mirror of an abelian variety of CM-type to be of CM-type as well. We also study the relationship between complex multiplication and rationality of a toroidal lattice vertex algebra.

Meng Chen

2005-12-20T23:59:59.000Z

290

Cooperative target convergence using multiple agents  

SciTech Connect (OSTI)

This work considers the problem of causing multiple (100`s) autonomous mobile robots to converge to a target and provides a follow-the-leader approach to the problem. Each robot has only a limited-range sensor for sending the target and also larger but also limited-range robot-to-robot communication capability. Because of the small amount of information available to the robots, a practical approach to improve convergence to the target is to have a robot follow the robot with the best quality of information. Specifically, each robot emits a signal that informs in-range robots what its status is. A robot has a status value of 0 if it is itself in range of the target. A robot has a status of 1 if it is not in range of the target but is in communication range of a robot that is in range of the target. A robot has a status of 2 if it is not in range of the target but is within range of another robot that has status 1, and so on. Of all the mobile robots that any given robot is in range of, it follows the one with the best status. The emergent behavior is the ant-like trails of robots following each other toward the target. If the robot is not in range of another robot that is either in range of the target or following another robot, the robot will assign-1 to its quality-of-information, and will execute an exhaustive search. The exhaustive search will continue until it encounters either the target or another robot with a nonnegative quality-of-information. The quality of information approach was extended to the case where each robot only has two-bit signals informing it of distance to in-range robots.

Kwok, K.S.; Driessen, B.J.

1997-10-01T23:59:59.000Z

291

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

292

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

293

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

294

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

295

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

296

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

297

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

298

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

299

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

300

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

302

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Broader source: Energy.gov (indexed) [DOE]

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

303

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

304

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

305

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

306

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

307

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Broader source: Energy.gov (indexed) [DOE]

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

308

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

309

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

310

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

311

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Broader source: Energy.gov (indexed) [DOE]

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

312

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

313

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

314

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

315

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

316

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents [OSTI]

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN) [Knoxville, TN; David, Stan A. (Knoxville, TN) [Knoxville, TN; Frederick, David Alan (Harriman, TN) [Harriman, TN

2010-07-27T23:59:59.000Z

317

Midwest Independent System Operator (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Independent System Operator (Multiple States) Independent System Operator (Multiple States) Midwest Independent System Operator (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Interconnection Provider Midwest Independent System Operator Midwest Independent Transmission System Operator (MISO) is a Regional Transmission Organization, which administers wholesale electricity markets in all or parts of 11 U.S. states and the Canadian province of Manitoba. MISO administers electricity transmission grids across the Midwest and into Canada, and provides tools, transmission planning strategies, and integration for utilities in those markets.

318

Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) |  

Broader source: Energy.gov (indexed) [DOE]

Western Interstate Nuclear Compact State Nuclear Policy (Multiple Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Nonprofit Retail Supplier Rural Electric Cooperative State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Arizona Program Type Siting and Permitting Provider Western Interstate Energy Board Legislation authorizes states' entrance into the Western Interstate Nuclear Compact, which aims to undertake the cooperation of participating states in

319

Southern States Energy Compact (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alabama Program Type Environmental Regulations Industry Recruitment/Support Provider Southern States Energy Board

320

Delaware River Basin Commission (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) < Back Eligibility Utility Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Systems Integrator Savings Category Water Buying & Making Electricity Home Weatherization Program Info Start Date 1961 State Delaware Program Type Environmental Regulations Siting and Permitting Provider Project Review Section The Delaware River Basin Commission (DRBC) is a federal-interstate compact government agency that was formed by concurrent legislation enacted in 1961 by the United States and the four basin states (Pennsylvania, New York, New

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Exceeding the Limit in Solar Energy Conversion with Multiple Excitons  

Science Journals Connector (OSTI)

The former comes from the transparence of the semiconductor material to solar radiation with photon energies below the bandgap (Eg), while the latter results from the cooling of hot carriers, initially generated by photon energies above Eg, to the band edges before they are extracted to do work. ... Carrier multiplication or singlet fission can be used to decrease the thermalization loss by converting part of the excess photon energy to multiple electron–hole pairs, thus increasing photocurrent. ... (9) However, such enhancement has little effect on the power conversion efficiency because significant carrier multiplication only occurs at photon energies as high as 4Eg. ...

Xiaoyang Zhu

2013-06-18T23:59:59.000Z

322

Interstate Commission on the Potomac River Basin (Multiple States) |  

Broader source: Energy.gov (indexed) [DOE]

Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Systems Integrator Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State District of Columbia Program Type Environmental Regulations Siting and Permitting Provider Interstate Commission on the Potomac River Basin The Interstate Commission on the Potomac River Basin's (ICPRB) mission is to enhance, protect, and conserve the water and associated land resources of the Potomac River and its tributaries through regional and interstate

323

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

July 2, 2013 July 2, 2013 V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue A a security issue in ASUS RT-N66U Router has been reported July 1, 2013 V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host A vulnerability was reported in Oracle VirtualBox. June 26, 2013 V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability A security issue and a vulnerability have been reported in the Login Security module for Drupal June 25, 2013 V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability Apache has acknowledged a vulnerability in Apache OpenOffice SDK June 24, 2013 V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks A vulnerability was reported in Google Chrome.

324

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

325

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

326

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

327

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

328

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

329

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

330

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

331

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

332

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

333

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

334

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

335

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

336

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

337

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

338

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

339

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

340

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

342

Multiple time scale based reduction scheme for nonlinear chemical dynamics  

Science Journals Connector (OSTI)

A chemical reaction is often characterized by multiple time scales governing the kinetics of reactants, products and intermediates. We eliminate the fast relaxing intermediates in autocatalytic reaction by tra...

D. Das; D. S. Ray

2013-07-01T23:59:59.000Z

343

Probabilistic Multiple-Linear Regression Modeling for Tropical Cyclone Intensity  

Science Journals Connector (OSTI)

The authors describe the development and verification of a statistical model relating tropical cyclone intensity to the local large-scale environment. A multiple linear regression framework is used to estimate the expected intensity of a tropical ...

Chia-Ying Lee; Michael K. Tippett; Suzana J. Camargo; Adam H. Sobel

344

The Effects of Multiple Green Factors on Condominium Prices  

Science Journals Connector (OSTI)

This paper analyzes the transaction prices of green buildings assessed on the basis of multiple green factors. Our theoretical model demonstrates that the initial green premium can be negative but becomes positiv...

Jiro Yoshida; Ayako Sugiura

2014-04-01T23:59:59.000Z

345

Development of neutron multiplicity counters for safeguards assay  

SciTech Connect (OSTI)

This paper reports on the development of a new generation of neutron multiplicity counters for assaying impure plutonium. The new counters will be able to obtain three measured parameters from the neutron multiplicity distribution and will be able to determine sample mass, multiplication, and (..cap alpha..,n) reaction rate, making it possible to obtain a more matrix-independent assay of moist or impure materials. This paper describes the existing prototype multiplicity counters and evaluates their performance using assay variance as a figure of merit. The best performance to date is obtained with a high-efficiency, low die-away-time thermal neutron counter with shift-register electronics. 10 refs., 2 figs., 4 tabs.

Ensslin, N.

1989-01-01T23:59:59.000Z

346

Depression during exacerbations in multiple sclerosis: the importance of uncertainty  

E-Print Network [OSTI]

The following correlates of depression were examined in a sample of 166 patients with clinically definite relapsing-remitting (n=140) or secondary progressive (n=26) multiple sclerosis: (a) the present state of the patients' ...

Kroencke, Dawn C.; Denney, Douglas R.; Lynch, Sharon G.

2001-08-01T23:59:59.000Z

347

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network [OSTI]

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

Lestone, J P

2014-01-01T23:59:59.000Z

348

Identification of critical locations across multiple infrastructures for terrorist actions  

E-Print Network [OSTI]

This paper discusses a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their ...

Patterson, Sean A. (Sean Albert), 1981-

2005-01-01T23:59:59.000Z

349

Robust Optimization with Multiple Ranges: Theory and Application ...  

E-Print Network [OSTI]

While Metan and Thiele [25] introduces multiple ranges for product demand in a simple two-stage robust ..... the market response to the new product. ...... certainty sets. Technical report, Massachusetts Institute of Technology, Cambridge, MA,.

2010-09-23T23:59:59.000Z

350

Competitive behavior of airlines at multiple airport systems  

E-Print Network [OSTI]

The way passenger traffic is distributed at multiple airport systems continues to intrigue air transportation planners, urban planners, and policy-makers as researchers attempt to unravel how airlines, air travelers and ...

Chen, Edmund

1995-01-01T23:59:59.000Z

351

A simulation environment for multiple project resource optimization  

E-Print Network [OSTI]

This thesis develops a numerical simulation environment as a management support tool applicable to the selection and scheduling of multiple, concurrent research and development projects under conditions of constrained ...

Sharkey, John Patrick, 1954-

2004-01-01T23:59:59.000Z

352

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets  

E-Print Network [OSTI]

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets Vadeerat spatial datasets. This capability is important for change analysis and contrast mining. In this paper spatial datasets by maximizing cluster interestingness and correspondence between clusters derived from

Eick, Christoph F.

353

A Bayesian hierarchical method for multiple-event seismic location  

Science Journals Connector (OSTI)

......demonstrate BAYHLoc using the set of Nevada Test Site nuclear explosions, for which...location|multiple-event|Nevada Test Site|seismic|stochastic| INTRODUCTION...The Walter (2004) data set of Nevada Test Site (NTS) explosions (Fig. 2a......

Stephen C. Myers; Gardar Johannesson; William Hanley

2007-12-01T23:59:59.000Z

354

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network [OSTI]

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

J. P. Lestone

2014-09-17T23:59:59.000Z

355

Effects of Single versus Multiple Warnings on Driver Performance  

E-Print Network [OSTI]

Objective: To explore how a single master alarm system affects drivers’ responses when compared to multiple, distinct warnings. Background: Advanced driver warning systems are intended to improve safety, yet inappropriate ...

Cummings, M. L.

2007-01-01T23:59:59.000Z

356

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

SciTech Connect (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

357

Volume Visualization of Multiple Alignment of Large Genomic DNA  

E-Print Network [OSTI]

. Another approach to understanding genetic code is through comparison of genomes, or parts of genomes/conservation between positions (http://www.cryst.bbk.ac.uk/BCD/bcdgloss.html). Figure 1 shows an example of a multiple

Utah, University of

358

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Broader source: Energy.gov (indexed) [DOE]

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

359

An instruction issue mechanism for superscalar processors supporting multiple threads  

E-Print Network [OSTI]

An instruction issue mechanism for superscalar processors supporting multiple threads is presented. This mechanism offers the advantages of two of the most popular dynamic scheduling mechanisms: Tomasulo's algorithm and the Dispatch Stack scheme...

Kumar, Salil

1994-01-01T23:59:59.000Z

360

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

362

Multiple Motivations Institutional Change Principle | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

363

Lenalidomide plus Dexamethasone for High-Risk Smoldering Multiple Myeloma  

Science Journals Connector (OSTI)

...with lenalidomide, in patients with high-risk smoldering multiple myeloma significantly delayed the time to progression to symptomatic disease and resulted in an overall survival benefit. The orally administered treatment regimen was associated with an acceptable toxicity profile. Certain clinical features predict progression from smoldering to overt multiple myeloma. Patients with high-risk features who were treated with lenalidomide and dexamethasone were less likely to have disease progression and had a higher rate of survival than untreated patients.

Mateos M.-V.; Hernández M.-T.; Giraldo P.

2013-08-01T23:59:59.000Z

364

Jaloro': A New Multiple Virus Resistant Hot Yellow Jalapeno Pepper.  

E-Print Network [OSTI]

, with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas..., with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas...

Villalon, Benigno

1992-01-01T23:59:59.000Z

365

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network [OSTI]

Analysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time Scales

Coughlin, Katie

2011-01-01T23:59:59.000Z

366

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network [OSTI]

2007. Analysis of Wind Power and Load Data at Multiple Timesd- Analysis of Wind Power and Load Data at Multiple Time35   v Analysis of Wind Power and Load Data at Multiple Time

Coughlin, Katie

2011-01-01T23:59:59.000Z

367

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection...  

Broader source: Energy.gov (indexed) [DOE]

28: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities January 5,...

368

Combining frequency and time domain approaches to systems with multiple spike train input and output  

E-Print Network [OSTI]

between neuronal spike trains. Prog Biophys Mol Biol Vapnikto systems with multiple spike train input and output D. R.Keywords Multiple spike trains · Neural coding · Maximum

Brillinger, D. R.; Lindsay, K. A.; Rosenberg, J. R.

2009-01-01T23:59:59.000Z

369

V-099: Honeywell Multiple Products ActiveX Control Remote Code...  

Broader source: Energy.gov (indexed) [DOE]

9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February...

370

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

371

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

372

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

373

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

374

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

375

Enabling a Systems Biology Knowledgebase with Gaggle and Firegoose  

SciTech Connect (OSTI)

The overall goal of this project was to extend the existing Gaggle and Firegoose systems to develop an open-source technology that runs over the web and links desktop applications with many databases and software applications. This technology would enable researchers to incorporate workflows for data analysis that can be executed from this interface to other online applications. The four specific aims were to (1) provide one-click mapping of genes, proteins, and complexes across databases and species; (2) enable multiple simultaneous workflows; (3) expand sophisticated data analysis for online resources; and enhance open-source development of the Gaggle-Firegoose infrastructure. Gaggle is an open-source Java software system that integrates existing bioinformatics programs and data sources into a user-friendly, extensible environment to allow interactive exploration, visualization, and analysis of systems biology data. Firegoose is an extension to the Mozilla Firefox web browser that enables data transfer between websites and desktop tools including Gaggle. In the last phase of this funding period, we have made substantial progress on development and application of the Gaggle integration framework. We implemented the workspace to the Network Portal. Users can capture data from Firegoose and save them to the workspace. Users can create workflows to start multiple software components programmatically and pass data between them. Results of analysis can be saved to the cloud so that they can be easily restored on any machine. We also developed the Gaggle Chrome Goose, a plugin for the Google Chrome browser in tandem with an opencpu server in the Amazon EC2 cloud. This allows users to interactively perform data analysis on a single web page using the R packages deployed on the opencpu server. The cloud-based framework facilitates collaboration between researchers from multiple organizations. We have made a number of enhancements to the cmonkey2 application to enable and improve the integration within different environments, and we have created a new tools pipeline for generating EGRIN2 models in a largely automated way.

Baliga, Nitin S. [Institute for Systems Biology

2014-12-12T23:59:59.000Z

376

CHOS in Production - Multiple Linux Environments on PDSF at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CHOS CHOS in Production Multiple Linux Environments on PDSF at NERSC Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory April 2012 A commodity Linux cluster at NERSC serving HEP and NS projects 1GbE and 10GbE interconnect In continuous operation since 1996 ~1500 compute cores on ~200 nodes Over 750 TB shared GPFS storage in 17 filesystems Over 650 TB of XRootD storage Supports SL5 and SL6 environments Projects "buy in" to PDSF and the UGE share tree is adjusted accordingly PDSF at NERSC 2 PDSF has a broad user base (including non-CERN and non-LHC projects) Current projects include ALICE, ATLAS, CUORE, Daya Bay, IceCube, KamLAND, Majorana, and STAR Prior projects include BaBaR, CDF, Planck, SNO, and SNFactory PDSF Workloads 3 PDSF must support multiple applications for multiple projects Many are only tested

377

Chesapeake Bay Preservation Programs (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maryland Program Type Siting and Permitting Provider Chesapeake Bay Program The Chesapeake Bay Program is a unique regional partnership that has led

378

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic  

Open Energy Info (EERE)

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Details Activities (1) Areas (1) Regions (0) Abstract: Despite several episodes of ground deformation and intense seismic activity starting in 1978, the Long Valley, California, volcanic area has not produced clearly recognized volcanic tremor. Instead, a variety of atypical microearthquakes have been recorded during these episodes, including events dominated by low-frequency (long-period) or mixed high and low-frequency (hybrid) signals. During a 1997 episode, a number of unusual microearthquakes occurred within a temporary 40-station

379

New England Power Pool (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

England Power Pool (Multiple States) England Power Pool (Multiple States) New England Power Pool (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maine Program Type Interconnection Independent System Operator (ISO) New England helps protect the health of New England's economy and the well-being of its people by ensuring the constant availability of electricity, today and for future generations. ISO New England meets this obligation in three ways: by ensuring the day-to-day reliable operation of New England's bulk power generation and transmission system, by overseeing and ensuring the fair administration of the region's wholesale electricity markets, and by managing comprehensive, regional

380

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

North American Renewables Registry (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

American Renewables Registry (Multiple States) American Renewables Registry (Multiple States) North American Renewables Registry (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State North Carolina Program Type Green Power Purchasing Provider APX The North American Renewables Registry (NAR) provides a Web-based platform trusted to create, track, and manage renewable energy certificate (REC) origination for clean generation facilities and states not covered by one of the existing APX-powered, regional systems. All market participants are able to take advantage of a trusted infrastructure to help manage their role in the market. With the ability to create unique, serialized records

382

Interstate Oil and Gas Conservation Compact (Multiple States) | Department  

Broader source: Energy.gov (indexed) [DOE]

Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) < Back Eligibility Commercial Developer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Alabama Program Type Environmental Regulations Provider Interstate Oil and Gas Compact Commission The Interstate Oil and Gas Compact Commission assists member states efficiently maximize oil and natural gas resources through sound regulatory practices while protecting the nation's health, safety and the environment. The Commission serves as the collective voice of member governors on oil and gas issues and advocates states' rights to govern petroleum resources within their borders. The Commission formed the Geological CO2 Sequestration Task Force, which

383

Midwest Renewable Energy Tracking System (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Renewable Energy Tracking System (Multiple States) Renewable Energy Tracking System (Multiple States) Midwest Renewable Energy Tracking System (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Illinois Program Type Green Power Purchasing Provider MidWest ISO The Midwest Renewable Energy Tracking System (M-RETS®) tracks renewable energy generation in participating States and Provinces and assists in verifying compliance with individual state/provincial or voluntary Renewable Portfolio Standards (RPS) and objectives. M-RETS® is a tool to keep track of all relevant information about renewable energy produced and delivered in the region. Currently, several States and Provinces participate in M-RETS®: Illinois,

384

Sabine River Compact (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Texas Program Type Siting and Permitting Provider Sabine River Compact Commission The Sabine River Compact Commission administers the Sabine River Compact to ensure that Texas receives its equitable share of quality water from the

385

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

386

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

387

Tunable Multiple Layered Dirac Cones in Optical Lattices  

SciTech Connect (OSTI)

We show that multiple layered Dirac cones can emerge in the band structure of properly addressed multicomponent cold fermionic gases in optical lattices. The layered Dirac cones contain multiple copies of massless spin-1/2 Dirac fermions at the same location in momentum space, whose different Fermi velocity can be tuned at will. On-site microwave Raman transitions can further be used to mix the different Dirac species, resulting in either splitting of or preserving the Dirac point (depending on the symmetry of the on-site term). The tunability of the multiple layered Dirac cones allows us to simulate a number of fundamental phenomena in modern physics, such as neutrino oscillations and exotic particle dispersions with E{approx}p{sup N} for arbitrary integer N.

Lan, Z.; Lu, W.; Oehberg, P. [SUPA, Department of Physics, Heriot-Watt University, EH14 4AS, Edinburgh (United Kingdom); Celi, A. [ICFO - Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); Lewenstein, M. [ICFO - The Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); ICREA-Institucio Catalana de Recerca i Estudis Avancats, 08010 Barcelona (Spain)

2011-12-16T23:59:59.000Z

388

Multiple X-ray reflection from ionized slabs  

E-Print Network [OSTI]

Multiple reflection of X-rays may be important when an accretion disc and its hot corona have a complicated geometry, or if returning radiation due to gravitational light bending is important, or in emission from a funnel such as proposed in some gamma-ray burst models. We simulate the effects of multiple reflection by modifying the boundary condition for an X-ray illuminated slab. Multiple reflection makes the soft X-ray spectrum steeper (softer) and strengthens broad emission and absorption features, especially the K-shell features of iron. This may be important in explaining the spectra of sources such as the Narrow-Line Seyfert 1 galaxy 1H0707-495.

R. R. Ross; A. C. Fabian; D. R. Ballantyne

2002-06-11T23:59:59.000Z

389

Multiple mobile robots system with network-based subsumption architecture  

Science Journals Connector (OSTI)

In this paper, a unique multiple mobile robots system is proposed to enable engineering students and engineers in the field to efficiently learn subsumption architecture and develop swarm intelligence. The subsumption architecture is known as one of the behaviour-based artificial intelligence. Each of multiple mobile robots within the system has three wheels driven by DC motors and six position sensitive detector (PSD) sensors. Network-based subsumption architecture is considered to realise a schooling behaviour by using only information from the PSD sensors. Further, a server supervisory control is introduced for poor hardware platforms with limitations of software development, i.e., the mobile robots can only behave based on the most simply subdivided reaction behaviours, i.e., reflex actions, generated from agents. Experimental results show interesting behaviour among the multiple mobile robots, such as following, avoidance and schooling.

Fusaomi Nagata; Akimasa Otsuka; Keigo Watanabe; Maki K. Habib

2013-01-01T23:59:59.000Z

390

Effect of multiple scattering on Cerenkov radiation from energetic electrons  

SciTech Connect (OSTI)

Cerenkov radiation can be used as a diagnostic tool to study energetic electrons generated in ultra-intense laser matter interactions. However, electrons suffer scattering with nuclei as they move in a medium. In this article, we theoretically study the effect of multiple scattering on Cerenkov radiation, and obtain analytical formulas under some circumstances. The results show that when the speed of an energetic electron is not close to the light speed in the medium, Cerenkov radiation is just slightly decreased due to multiple scattering. In the case that the electron speed is very close to the light speed in the medium, the effect of multiple scattering becomes significant, and the radiation is dominated by bremsstrahlung.

Zheng Jian [CAS Key Laboratory of Basic Plasma Physics and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

2013-01-15T23:59:59.000Z

391

Dynamic force spectroscopy on multiple bonds: experiments and model  

E-Print Network [OSTI]

We probe the dynamic strength of multiple biotin-streptavidin adhesion bonds under linear loading using the biomembrane force probe setup for dynamic force spectroscopy. Measured rupture force histograms are compared to results from a master equation model for the stochastic dynamics of bond rupture under load. This allows us to extract the distribution of the number of initially closed bonds. We also extract the molecular parameters of the adhesion bonds, in good agreement with earlier results from single bond experiments. Our analysis shows that the peaks in the measured histograms are not simple multiples of the single bond values, but follow from a superposition procedure which generates different peak positions.

T. Erdmann; S. Pierrat; P. Nassoy; U. S. Schwarz

2007-12-18T23:59:59.000Z

392

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Broader source: Energy.gov (indexed) [DOE]

Multiple Multiple Title: Third Party Services for SPR Workovers Description: Subcontractor shall furnish all labor, supervision, tools, materials, equipment, supplies, transportation and facilities required to perform remediation workovers of SPR cavern wellbores and brine disposal wells. Typical remediation workovers include cementing a steel liner inside existing cased wellbore, and permanently plugging and abandoning wells. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment ( categorical exclusions).

393

Influence of Multiple Scattering on High-energy Deuteron Quasi-optical Birefringence Effect  

E-Print Network [OSTI]

Influence of multiple scattering on high-energy deuteron quasi-optical birefringence effect is discussed.

V. G. Baryshevsky; A. R. Shyrvel

2011-01-12T23:59:59.000Z

394

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

395

Acceleration of the matrix multiplication of Radiance three phase  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Acceleration of the matrix multiplication of Radiance three phase Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Title Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Publication Type Journal Article LBNL Report Number LBNL-6461E Year of Publication 2013 Authors Zuo, Wangda, Andrew McNeil, Michael Wetter, and Eleanor S. Lee Journal Journal of Building Performance Simulation Keywords daylighting simulation, graphics processing unit, multicore central processing unit, OpenCL, parallel computing Abstract Building designers are increasingly relying on complex fenestration systems to reduce energy consumed for lighting and HVAC in low energy buildings. Radiance, a lighting simulation program, has been used to conduct daylighting simulations for complex fenestration systems. Depending on the configurations, the simulation can take hours or even days using a personal computer. This paper describes how to accelerate the matrix multiplication portion of a Radiance three-phase daylight simulation by conducting parallel computing on heterogeneous hardware of a personal computer. The algorithm was optimized and the computational part was implemented in parallel using OpenCL. The speed of new approach was evaluated using various daylighting simulation cases on a multicore central processing unit and a graphics processing unit. Based on the measurements and analysis of the time usage for the Radiance daylighting simulation, further speedups can be achieved by using fast I/O devices and storing the data in a binary format.

396

SIC (MUltiple SIgnal Classification) CSP (Cross-power Spectrum Phase)  

E-Print Network [OSTI]

2ch CSP ( ) 1 MU- SIC (MUltiple SIgnal Classification) CSP (Cross- power Spectrum Phase) [1, 2, 3, 4] [5, 6] [7, 8, 9, 10] [7] CSP CSP [8] [9] CSP [10] Estimation of talker's head orientation based (Kobe univ.) [11] 2ch CSP CSP CSP CSP 2 CSP GCC-PHAT (Generalized Cross- Correlation PHAse Transform

Takiguchi, Tetsuya

397

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and  

E-Print Network [OSTI]

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and developmental processes China Received 26 January 2006; Accepted 20 April 2006 Abstract The scaffold protein RACK1 (Receptor. The Arabidopsis ge- nome contains three RACK1 orthologues, however, little is known about their functions

Jones, Alan M.

398

MULTIPLE CLASSIFIERS FOR ELECTRONIC NOSE DATA M. Pardo, G. Sberveglieri  

E-Print Network [OSTI]

of two groups of coffees (blends and monovarieties). The main idea of boosting is to produce a sequence for combining the predictions of multiple classifiers (briefly called ensembles) to produce a single classifier Certified Espresso (ICE)) and of 6 single varieties (SV) plus the ICE. The food manufacturing sector is one

Masulli, Francesco

399

Multiple Non-Thermal Reaction Steps for the Photooxidation CO...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110). Multiple Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110)....

400

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network [OSTI]

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict- ing the occupancy of a building using networks of people-counting sensors-sensor probabilistic model for building occupancy. Inference for the oc- cupancy model follows in Section 4

Smyth, Padhraic

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network [OSTI]

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict­ ing the occupancy of a building using networks of people­counting sensors­sensor probabilistic model for building occupancy. Inference for the oc­ cupancy model follows in Section 4

Ihler, Alexander

402

Instability of single-phase natural circulation under multiple loops  

SciTech Connect (OSTI)

Natural circulation loop passively conveys heat from heat sources to heat sinks without mechanical pump. Various plants have natural circulation systems, e.g., solar heaters, Light Water Reactor (LWR) and Liquid Metal Fast Breeder Reactor (LMFBR). The core of LMFBR is cooled by forced convection of single-phase liquid sodium in normal operation. After the accident, the decay heat of the core is designed to be cooled by the natural circulation of the liquid sodium. The natural circulation cooling is very important from a viewpoint of passive safety concept. Here, the natural circulation in single loop system had been studied by many researchers. In a multiple loop system, the instability of natural circulation was more complicated because of the interaction between the loops. In this study, the effects of the multiple loop on the natural circulation instability were investigated numerically. The multiple loops system with one heating tube and two cooling tubes were evaluated. The one-dimensional energy and momentum equations were solved using Finite Difference Method. The flow regimes of the instability were evaluated with varying the heat flux. In multiple loop system, the observed flow was classified into five regimes including chaotic regime. The flow regimes were qualitatively explained by the stability of the attractor in the phase space.

Satoh, A.; Okamoto, K.; Madarame, H. [Univ. of Tokyo, Tokai, Ibaraki (Japan). Nuclear Engineering Research Lab.

1996-08-01T23:59:59.000Z

403

Distributed event notification in VANET with multiple service providers  

Science Journals Connector (OSTI)

Many future applications in vehicular networks will be event-driven and will require events generated at different parts of a city to be delivered to moving vehicles in time. We propose a distributed framework for efficient event dissemination with multiple ... Keywords: VANET, distributed event notification, publish-subscribe

Joy Chandra Mukherjee, Saurabh Agarwal, Arobinda Gupta

2014-05-01T23:59:59.000Z

404

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs  

E-Print Network [OSTI]

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs Kiran Kumar Matam, prasanna}@usc.edu Abstract--Energy efficiency has emerged as one of the key performance metrics in scientific computing. In this work, we evaluate the energy efficiency of floating point matrix multipli

Prasanna, Viktor K.

405

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Officers' Training Corps experience...unmanned vehicle operating environments...multiple personnel responsible...impact of training on boredom...domains, personnel selection is of practical...personnel selection considerations...stimulate personnel, such as...on-the-job training or possibly......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

406

Tunnel junction multiple wavelength light-emitting diodes  

DOE Patents [OSTI]

A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect. 5 figs.

Olson, J.M.; Kurtz, S.R.

1992-11-24T23:59:59.000Z

407

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences  

E-Print Network [OSTI]

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences Roman R. Stocsits1 , Ivo L Fe Institute, 1399 Hyde Park Rd., Santa Fe NM 87501, USA Email: Roman R. Stocsits - roman of the available sequence data was pre- sented very recently [12]. SARGLSSTVSLGQFEHWSPR NARNLSDTVS

Stadler, Peter F.

408

Fast Machine Code for Modular Multiplication Michael Scott  

E-Print Network [OSTI]

Fast Machine Code for Modular Multiplication Michael Scott School of Computer Applications Dublin, that is the calculation of a = b e mod n where for acceptable levels of security a, b, e, and n are large multiprecision will be not much larger than the number of bits in the binary representation of e. Therefore fast modular

Bernstein, Daniel

409

Predicting Operator Capacity for Supervisory Control of Multiple UAVs  

E-Print Network [OSTI]

Predicting Operator Capacity for Supervisory Control of Multiple UAVs M.L. Cummings, C. E. Nehme, J, uninhabited (also known as unmanned) ae- rial vehicles (UAVs) have become indispensable assets to militarized forces. UAVs require human guidance to varying degrees and often through several operators. However

Cummings, Mary "Missy"

410

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs  

E-Print Network [OSTI]

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs Brett Bethke, Mario Valenti. Unmanned aerial vehicles (UAVs) are excellent platforms for detecting and tracking objects of interest to give better results than could be achieved with a single UAV, while being robust to failures. In addi

How, Jonathan P.

411

Multiple Field of View MR Fluoroscopy Pelin Aksit,1  

E-Print Network [OSTI]

Multiple Field of View MR Fluoroscopy Pelin Aksit,1 J. Andrew Derbyshire,2 Jean-Michel Serfaty,1 by several investigators (1� 8). Intravascular MR compares favorably with other clini- cal diagnostic methods and Ergin Atalar1* This work describes a real-time imaging and visualization tech- nique that allows

Atalar, Ergin

412

Coordination of multiple appendages in drag-based swimming  

Science Journals Connector (OSTI)

...appendages for multi-oared propulsion. The typical Reynolds number...another example of drag-based propulsion with multiple appendages...of Bill Peterson, Hatfield Marine Center, Newport, OR...of a body with drag-based propulsion. The model provides a quantitative...

2010-01-01T23:59:59.000Z

413

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network [OSTI]

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

414

Demo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer  

E-Print Network [OSTI]

to install especially on existing vehicles and exhibit a tradeoff between accuracy and cost. Similarly, usingDemo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer Dong Li , Tarun Bansal , Zhixue Lu and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Sinha, Prasun

415

Method and system of integrating information from multiple sources  

DOE Patents [OSTI]

A system and method of integrating information from multiple sources in a document centric application system. A plurality of application systems are connected through an object request broker to a central repository. The information may then be posted on a webpage. An example of an implementation of the method and system is an online procurement system.

Alford, Francine A. (Livermore, CA); Brinkerhoff, David L. (Antioch, CA)

2006-08-15T23:59:59.000Z

416

Multiple copy distillation and purification of phase diffused squeezed states  

E-Print Network [OSTI]

We provide a detailed theoretical analysis of multiple copy purification and distillation protocols for phase diffused squeezed states of light. The standard iterative distillation protocol is generalized to a collective purification of an arbitrary number of N copies. We also derive a semi-analytical expression for the asymptotic limit of the iterative distillation and purification protocol and discuss its properties.

Petr Marek; Jaromir Fiurasek; Boris Hage; Alexander Franzen; James DiGugliemo; Roman Schnabel

2007-08-10T23:59:59.000Z

417

Quantitative crystal structure descriptors from multiplicative congruential generators  

Science Journals Connector (OSTI)

Certain number-theoretic relations, known as multiplicative congruential generators, are developed into quantitative crystal structure descriptors, facilitating a linearization procedure that eventually allows for a concise, fully reconstructable representation of structural information. Potential applications are related to the computational storage, retrieval and analysis of crystal structures, their algorithmic generation in the first place, and their combinatorial enumeration and classification.

Hornfeck, W.

2012-01-12T23:59:59.000Z

418

Multiple Whole Genome Alignments Without a Reference Organism  

SciTech Connect (OSTI)

Multiple sequence alignments have become one of the most commonly used resources in genomics research. Most algorithms for multiple alignment of whole genomes rely either on a reference genome, against which all of the other sequences are laid out, or require a one-to-one mapping between the nucleotides of the genomes, preventing the alignment of recently duplicated regions. Both approaches have drawbacks for whole-genome comparisons. In this paper we present a novel symmetric alignment algorithm. The resulting alignments not only represent all of the genomes equally well, but also include all relevant duplications that occurred since the divergence from the last common ancestor. Our algorithm, implemented as a part of the VISTA Genome Pipeline (VGP), was used to align seven vertebrate and sixDrosophila genomes. The resulting whole-genome alignments demonstrate a higher sensitivity and specificity than the pairwise alignments previously available through the VGP and have higher exon alignment accuracy than comparable public whole-genome alignments. Of the multiple alignment methods tested, ours performed the best at aligning genes from multigene families?perhaps the most challenging test for whole-genome alignments. Our whole-genome multiple alignments are available through the VISTA Browser at http://genome.lbl.gov/vista/index.shtml.

Dubchak, Inna; Poliakov, Alexander; Kislyuk, Andrey; Brudno, Michael

2009-01-16T23:59:59.000Z

419

Robust Retrospective Multiple Change-point for Multivariate Data  

E-Print Network [OSTI]

on a test statistic that generalizes the well- known Kruskal-Wallis procedure to the multivariate setting noise levels and/or high-dimensional data. Keywords: Change-point estimation, multivariate data, Kruskal-Wallis as to deal with multiple change-points (in analogy with the way the classical Kruskal-Wallis test generalizes

Paris-Sud XI, Université de

420

Anatomy of High-Performance Many-Threaded Matrix Multiplication  

Science Journals Connector (OSTI)

BLIS is a new framework for rapid instantiation of the BLAS. We describe how BLIS extends the "GotoBLAS approach" to implementing matrix multiplication (GEMM). While GEMM was previously implemented as three loops around an inner kernel, BLIS exposes ... Keywords: linear algebra, libraries, high-performance, matrix, BLAS, multicore

Tyler M. Smith, Robert van de Geijn, Mikhail Smelyanskiy, Jeff R. Hammond, Field G. Van Zee

2014-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

A simple model of multiple climate regimes Kerry Emanuel  

E-Print Network [OSTI]

, and Climate, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA Received 28 June 2001 to a roughly 30% increase in solar insolation over the life of the planet. To this enigma may be added to produce multiple equilibrium states for the same solar forcing. Here we present a simple model

Emanuel, Kerry A.

422

Climate determinism revisited: multiple equilibria in a complex climate model  

E-Print Network [OSTI]

Marshall and Brian Rose Department of Earth, Atmospheric and Planetary Science, Massachusetts Institute of Technology, Cambridge, Massachusetts June 17th, 2010 Submitted to Journal of Climate Corresponding author by incoming solar radiation at the top of the atmosphere. We demonstrate that the multiple equilibria owe

Marshall, John

423

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network [OSTI]

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

424

Extending wordnets by learning from multiple resources Benot Sagot+  

E-Print Network [OSTI]

Extending wordnets by learning from multiple resources Benoît Sagot+ , Darja Fiser* + Alpage, INRIA In this paper we present an automatic, language-independent approach to extend an existing wordnet by recycling existing freely available bilingual resources, such as machine-readable dictionaries and on

Paris-Sud XI, Université de

425

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE  

E-Print Network [OSTI]

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE Peter Cariani Eaton Peabody Laboratory@epl.meei.harvard.edu; www.cariani.com ABSTRACT One aspect of tonal consonance relevant to the pitch stability of chords and harmonic tension concerns the degree to which a collection of notes produces a unified, strong low pitch

Cariani, Peter

426

Social Choice Theory Decision Models with Multiple Criteria  

E-Print Network [OSTI]

Social Choice Theory Decision Models with Multiple Criteria Elise Bonzon 2013-2014 LIPADE / 39 Social Choice Theory #12;Social choice theory Social choice theory Research of a mechanism Choice Theory #12;Social choice theory Social choice theory Research of a mechanism (electoral system

Bonzon, Elise

427

Gary Feldman 1 Fermilab Workshop Multiple Measurements and  

E-Print Network [OSTI]

Gary Feldman 1 Fermilab Workshop Multiple Measurements and Parameters in the Unified Approach Gary Feldman Workshop on Confidence Limits Fermilab March 28, 2000 #12;Gary Feldman 2 Fermilab Workshop Origins Feldman 3 Fermilab Workshop Lack of Uniformly Most Powerful Test · Error of the first kind: Rejecting

Feldman, Gary

428

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci  

E-Print Network [OSTI]

An Evolutionary Reduction Principle for Mutation Rates at Multiple Loci Lee Altenberg altenber of the reduction principle is found: reduction results at individual loci combine topologically to produce to the reduction principle, and under fine tuning of mutation rates would be expected to have higher mutation rates

Altenberg, Lee

429

Development of a Public Key Infrastructure across Multiple Enterprises  

Science Journals Connector (OSTI)

Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infra-structure among multiple ...

B. J. Desind; T. M. Sharick; J. P. Long; B. J. Wood

1997-06-01T23:59:59.000Z

430

Nonlinear voltages in multiple-lead coherent conductors  

Science Journals Connector (OSTI)

We use the generalized S-matrix approach to study multiple-lead coherent conductors in the case of finite applied voltages. In this framework we discuss the transverse voltage arising in a four-lead conductor with two symmetric biased leads.

Gordey B. Lesovik and Carlo Presilla

1993-01-15T23:59:59.000Z

431

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Impact in Multiple Unmanned Vehicle Supervisory Control. IEEE...Inverting the Operator/Vehicle Ratio: Approaches to Next...the Association for Unmanned Vehicle Systems International and Flight...592-600. Gibson J.J. The Ecological Approach to Visual Perception......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

432

Environmental Boundary Tracking and Estimation Using Multiple Autonomous Vehicles  

E-Print Network [OSTI]

and Andrea L. Bertozzi Abstract-- In this paper, we develop a framework for envi- ronmental boundary tracking from multiple sensing vehicles. For each vehicle, a tracking algorithm is developed based on Page, harmful algae blooms, wild fire spreading, temperature and salinity distribution in the ocean

Soatto, Stefano

433

RECENT FIELD EXPERIENCE WITH MULTIPLE COOPERATING SOLAR-POWERED AUVS  

E-Print Network [OSTI]

, the operator would typically observe which SAUV had the most energy reserve based on its acoustic status packets and decide to employ the one with the most energy reserve. The operator would then go through a set of enabling tools and technologies which allow us to test and evaluate multiple cooperating AUVs

434

Fast Implementation of Multiple Oriented Filters Jeffrey E. Boyd  

E-Print Network [OSTI]

Fast Implementation of Multiple Oriented Filters Jeffrey E. Boyd Dept. of Computer Science University of Calgary Calgary AB T2N 1N4 boyd@cpsc.ucalgary.ca Jean Meloche Department of StatisticsDonald and Owen [8] and Hall and Tit­ terington [6]. Similarly, Meloche and Zamar [9] and Boyd and Meloche [3

Boyd, Jeffrey E.

435

Digital Sun Sensor Using Multiple Pinholes Charlie Hersom  

E-Print Network [OSTI]

Digital Sun Sensor Using Multiple Pinholes Charlie Hersom President Spectral Applied Research (905 with CRESTech and the University of Waterloo, has developed a low-cost digital sun sensor for satellite attitude each field-of-view. The Sun is a nearly collimated source and produces a spot on the array via

Hornsey, Richard

436

Optimal sequencing of a cooling tower with multiple cells  

E-Print Network [OSTI]

This paper evaluates the energy savings potential of multi-cell cooling tower optimal sequencing control methods. Annual tower fan energy usage is calculated for a counter-flow tower with multiple variable-speed fans. Effectiveness-NTU tower model...

Zhang, Z.; Liu, J.

2012-01-01T23:59:59.000Z

437

THE PRESENTATION OF MULTIPLE EARCONS IN A SPATIALISED AUDIO SPACE  

E-Print Network [OSTI]

THE PRESENTATION OF MULTIPLE EARCONS IN A SPATIALISED AUDIO SPACE David K McGookin Department://www.dcs.gla.ac.uk/~mcgookdk ABSTRACT In this paper work to improve upon the design of structured audio messages called Earcons for use in a concurrent spatialised audio environment is described. Issues involving the limitations of current Earcon

McGookin, David

438

Googling Ourselves — What Physicians Can Learn from Online Rating Sites  

Science Journals Connector (OSTI)

...-maintenance consumers; they simply want doctors who care, will listen, and know what they're doing. Far from being antagonistic or depressing, the stories renew my commitment to healing and reinforce my belief in the power of caring. What I find most striking, though, is the democratizing potential of the Internet... After reading physician-rating sites, Dr. Shaili Jain is reassured that what patients want from their physicians is not all that different from what good physicians want to offer their patients.

Jain S.

2010-01-07T23:59:59.000Z

439

Find Your STEM Role Model: Google+ Hangout | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

recognize a role model or two that inspired you to take your current path. That's why NASA and the Energy Department are teaming up on Wednesday, March 5, 2014 at 1pm EST to host...

440

Bikash Koley on behalf of Google Technical Infrastructure  

E-Print Network [OSTI]

Plane BGP IGP TE Optical Restoration OpenFlow/PCE-P/... Config Workflow Control Plane Management Plane Restoration OpenFlow/PCE-P/... Config Workflow Control Plane Management PlaneAnalytics Telemetry Config Model and Proprietary Good progress in control plane -> dataplane APIs and protocols (OpenFlow, PCE-P.. ) Limited

Cortes, Corinna

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Secretary Chu Announces New Funding and Partnership with Google...  

Energy Savers [EERE]

locations. More information is available on the Alternative Fuels and Advanced Vehicles Data Center (AFDC). The Clean Cities Program is a public-private partnership that brings...

442

Google Search Web www.nanotech-now.com  

E-Print Network [OSTI]

: Researchers at the University of Illinois are the first to achieve optical waveguiding of near-infrared light Research Office, National Science Foundation and the U.S. Department of Energy. #### About University of Illinois at Urbana-Champaign At Illinois, research shapes the campus identity, stimulates classroom

Braun, Paul

443

Read Comments (1 ) | Post a comment Ads by Google  

E-Print Network [OSTI]

Scientific Sales Jobs Looking for a New Opportunity? Penny Warren Recruitment can help! w w w .pennyw arren.] People swing their arms when they walk. But did y ou ev er wonder why ? Does it help us keep our balance? Is it a relic from our ev olutionary past? Is it because we look like doofuses if we don't? Now, a report

Collins, Steven H.

444

First Google.Org-Funded Geothermal Mapping Report Confirms Vast...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

capture that heat are expected to grow substantially as we improve upon the energy conversion and exploitation factors through technological advances and improved techniques."...

445

Join Secretary Chu Tomorrow for a Google+ Hangout on America...  

Energy Savers [EERE]

solar energy industry, including: Jeffery Halsey -- Broward County, Florida's Director of Pollution Prevention, Remediation and Air Quality division Jeffrey Halsey will share how...

446

ARM - Publications: Science Team Meeting Documents: Single and Multiple  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Single and Multiple scattering in optically thick multifractal clouds Single and Multiple scattering in optically thick multifractal clouds Grosdidier, Yves McGill University Lovejoy, Shaun McGill University Watson, Brian St. Lawrence University, Physics Department Schertzer, Daniel Ecole Nationale des Ponts et Chauss'es Satellite studies have shown that cloud radiances (at both visible and infra red wavelengths) are scale invariant over scales spanning much of the meteorologically significant range, and airborne lidar data have shown that vertical cross sections of passive scalar clouds are also scaling but with quite different exponents in the horizontal and vertical directions (quantified by an "elliptical dimension" = Del-23/9 close to the empirical value 2.55±0.02). This multifractality is the result of huge

447

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Drilling Large Diameter Holes in Rocks Using Multiple Laser Beams (504) Richard Parker,. Parker Geoscience Consulting, LLC, Arvada, Colorado, USA; Zhiyue Xu and Claude Reed, Argonne National Laboratory, Argonne, Illinois, USA; Ramona Graves, Department of Petroleum Engineering, Colorado School of Mines, Golden, Colorado, USA; Brian Gahan and Samih Batarseh, Gas Technology Institute, Des Plaines, Illinois, USA ABSTRACT Studies on drilling petroleum reservoir rocks with lasers show that modern infrared lasers have the capability to spall (thermally fragment), melt and vaporize natural earth materials with the thermal spallation being the most efficient rock removal mechanism. Although laser irradiance as low as 1000 W/cm 2 is sufficient to spall rock, firing the

448

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Broader source: Energy.gov (indexed) [DOE]

Multiple Multiple Title: ADAS System Life Cycle Support, 2012-2015 Description: Subcontractor shall provide annual telephone support and hardware/software update support for the ARINC AIM alarm display and annunciation system (ADAS) security systems used at the SPR from 2012-2015. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment (categorical exclusions). (b) To find that a proposal is categorically excluded, DOE shall determine the following: (1) The proposed action fits within a class of actions that is listed in Appendix A or B of Subpart D;

449

Benefits of the Multiple Echo Technique for Ultrasonic Thickness Testing  

SciTech Connect (OSTI)

Much effort has been put into determining methods to make accurate thickness measurements, especially at elevated temperatures. An accuracy of +/- 0.001 inches is typically noted for commercial ultrasonic thickness gauges and ultrasonic thickness techniques. Codes and standards put limitations on many inspection factors including equipment, calibration tolerance and temperature variations. These factors are important and should be controlled, but unfortunately do not guarantee accurate and repeatable measurements in the field. Most technicians long for a single technique that is best for every situation, unfortunately, there are no 'silver bullets' when it comes to nondestructive testing. This paper will describe and discuss some of the major contributors to measurement error as well as some advantages and limitations of multiple echo techniques and why multiple echo techniques should be more widely utilized for ultrasonic thickness measurements.

Elder, J.; Vandekamp, R.

2011-02-10T23:59:59.000Z

450

Phenomenology from SIDIS and $e^+e^-$ multiplicities  

E-Print Network [OSTI]

This study is part of a project to investigate the transverse momentum dependence in parton distribution and fragmentation functions, analyzing (semi-)inclusive high-energy processes within a proper QCD framework. We calculate the transverse-momentum-dependent (TMD) multiplicities for $e^+e^-$ annihilation into two hadrons (considering different combinations of pions and kaons) aiming to investigate the impact of intrinsic and radiative partonic transverse momentum and their mixing with flavor. Different descriptions of the non-perturbative evolution kernel are available on the market and there are 200 sets of flavor configurations for the unpolarized TMD fragmentation functions (FFs) resulting from a Monte Carlo fit of Semi-Inclusive Deep-Inelastic Scattering (SIDIS) data at Hermes. We build our predictions of $e^+e^-$ multiplicities relying on this rich phenomenology. The comparison of these calculations with future experimental data (from Belle and Babar collaborations) will shed light on non-perturbative ...

Bacchetta, Alessandro; Radici, Marco; Signori, Andrea

2014-01-01T23:59:59.000Z

451

Self-organizing traffic lights at multiple-street intersections  

E-Print Network [OSTI]

Summary: Traffic light coordination is a complex problem. In this paper, we extend previous work on an abstract model of city traffic to allow for multiple street intersections. We test a self-organizing method in our model, showing that it is close to theoretical optima and superior to a traditional method of traffic light coordination. Abstract: The elementary cellular automaton following rule 184 can mimic particles flowing in one direction at a constant speed. This automaton can therefore model highway traffic. In a recent paper, we have incorporated intersections regulated by traffic lights to this model using exclusively elementary cellular automata. In such a paper, however, we only explored a rectangular grid. We now extend our model to more complex scenarios employing an hexagonal grid. This extension shows first that our model can readily incorporate multiple-way intersections and hence simulate complex scenarios. In addition, the current extension allows us to study and evaluate the behavior of two...

Gershenson, Carlos

2011-01-01T23:59:59.000Z

452

Grouping Parts for Multiple Parts Production in Additive Manufacturing  

Science Journals Connector (OSTI)

Abstract Rapid prototyping (RP) has evolved to Additive Manufacturing (AM) in recent years. It can produce functional or end-use parts with small or even medium quantities. And further, due to its unique layer-by-layer construction principle, it can produce different parts at the same time in a same AM machine. To improve the productivity and machine utilization of AM processes under multiple parts production context, this paper propose the conception of ‘Grouping parts’. Based on the Group Technology (GT) used in traditional processing technologies, a modified Group Technology for AM under multiple parts manufacturing context is presented. To group parts, a set of key attributes affecting the AM production time, cost, quality and work preparation are identified to represent the parts, and then a Grey Clustering method is adopted to conduct the similarity analysis. A simple case study is presented in the end to illustrate the proposed conception and its methodology.

Yicha Zhang; Alain Bernard

2014-01-01T23:59:59.000Z

453

An efficient parallel algorithm for matrix-vector multiplication  

SciTech Connect (OSTI)

The multiplication of a vector by a matrix is the kernel computation of many algorithms in scientific computation. A fast parallel algorithm for this calculation is therefore necessary if one is to make full use of the new generation of parallel supercomputers. This paper presents a high performance, parallel matrix-vector multiplication algorithm that is particularly well suited to hypercube multiprocessors. For an n x n matrix on p processors, the communication cost of this algorithm is O(n/[radical]p + log(p)), independent of the matrix sparsity pattern. The performance of the algorithm is demonstrated by employing it as the kernel in the well-known NAS conjugate gradient benchmark, where a run time of 6.09 seconds was observed. This is the best published performance on this benchmark achieved to date using a massively parallel supercomputer.

Hendrickson, B.; Leland, R.; Plimpton, S.

1993-03-01T23:59:59.000Z

454

Herbig AeBe stars: Multiplicity and consequences  

E-Print Network [OSTI]

By virtue of their young age and intermediate mass, Herbig AeBe stars represent a cornerstone for our understanding of the mass-dependency of both the stellar and planetary formation processes. In this contribution, I review the current state-of-the-art multiplicity surveys of Herbig AeBe stars to assess both the overall frequency of companions and the distribution of key orbital parameters (separation, mass ratio and eccentricity). In a second part, I focus on the interplay between the multiplicity of Herbig AeBe stars and the presence and properties of their protoplanetary disks. Overall, it appears that both star and planet formation in the context of intermediate-mass stars proceeds following similar mechanisms as lower-mass stars.

Duchene, Gaspard

2014-01-01T23:59:59.000Z

455

Dynamic evolutions of multiple toroidal Alfvén eigenmodes with energetic particles  

SciTech Connect (OSTI)

Kinetic simulations based on a reduced model are carried out to study dynamic evolutions of multiple toroidicity-induced shear Alfvén eigenmodes driven by energetic particles. It is found that passing and trapped particles play quite different roles on the mode evolution. For cases without background damping, passing particles lead to a longer linear growth phase and subsequent enhancement of the nonlinear saturation level when resonant regions with two modes are closely overlapped. On the other hand, trapped particles are mainly responsible for the persistent mode growth in the nonlinear phase. By comparing the results from anisotropic and isotropic simulations, it is suggested that passing particles have a negative impact on the mode development in the nonlinear phase. For the near marginal stability cases with large background damping, the upward and downward frequency chirping in multiple branches are significantly affected by the multi-mode interaction due to overlapping of hole and clump in the distribution function.

Zhu, J.; Ma, Z. W. [Institute for Fusion Theory and Simulation, Zhejiang University, Hangzhou, Zhejiang 310027 (China)] [Institute for Fusion Theory and Simulation, Zhejiang University, Hangzhou, Zhejiang 310027 (China); Fu, G. Y. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543-0451 (United States)] [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543-0451 (United States)

2013-12-15T23:59:59.000Z

456

Identification of Severe Multiple Contingencies in Electric PowerSystems  

SciTech Connect (OSTI)

In this work, we propose a computationally feasible approachtodetect severe multiple contingencies. We pose a contingency analysisproblem using a nonlinear optimization framework, which enables ustodetect the fewest possible transmission line outages resulting ina systemfailure of specified severity, and the most severe system failure causedby removing a specified number of transmission lines from service.Illustrations using a three bus system and the IEEE ~;30 bus system aimto exhibit the effectiveness of the proposed approach.

Donde, Vaibhav; Lopez, Vanessa; Lesieutre, Bernard; Pinar, Ali; Yang, Chao; Meza, Juan

2006-06-14T23:59:59.000Z

457

Multiple-state quantum Otto engine, 1D box system  

SciTech Connect (OSTI)

Quantum heat engines produce work using quantum matter as their working substance. We studied adiabatic and isochoric processes and defined the general force according to quantum system. The processes and general force are used to evaluate a quantum Otto engine based on multiple-state of one dimensional box system and calculate the efficiency. As a result, the efficiency depends on the ratio of initial and final width of system under adiabatic processes.

Latifah, E., E-mail: enylatifah@um.ac.id [Laboratory of Theoretical Physics and Natural Philosophy, Physics Department, Institut Teknologi Sepuluh Nopember, ITS, Surabaya, Indonesia and Physics Department, Malang State University (Indonesia); Purwanto, A. [Laboratory of Theoretical Physics and Natural Philosophy, Physics Department, Institut Teknologi Sepuluh Nopember, ITS, Surabaya (Indonesia)

2014-03-24T23:59:59.000Z

458

Code division multiple access signaling for modulated reflector technology  

DOE Patents [OSTI]

A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

Briles, Scott D. (Los Alamos, NM)

2012-05-01T23:59:59.000Z

459

Multiple-well testing in low permeability gas sands  

SciTech Connect (OSTI)

The purpose of this work was to determine the effect of various reservoir and well parameters in order to design a multiple-well pressure transient test to be conducted in low permeability, porosity, gas saturation, net pay thickness and well spacing. Long test times were found to be required for interference or pulse testing in low permeability gas reservoirs; however, the well spacing has been optimized. These calculations were made using two techniques: interference testing and pulse testing.

Bixel, H.; Carroll, H.B. Jr.; Crawley, A.

1980-10-01T23:59:59.000Z

460

Lenalidomide after Stem-Cell Transplantation for Multiple Myeloma  

Science Journals Connector (OSTI)

...survival. Lenalidomide maintenance may increase the time to progression in patients who do not have complete remission after induction therapy and transplantation, thus generating outcomes similar to those for patients with complete remission. Although the response criteria of the International Myeloma... A goal of therapy for multiple myeloma, to induce complete remission and prolong survival, is usually accomplished with combination therapy.1,2 Autologous hematopoietic stem-cell transplantation is often used after induction chemotherapy to improve the ...

McCarthy P.L.; Owzar K.; Hofmeister C.C.

2012-05-10T23:59:59.000Z

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Multiple-scattering effects on smooth neutron-scattering spectra  

Science Journals Connector (OSTI)

Elastic and inelastic incoherent neutron-scattering experiments are simulated for simple models: a rigid solid (as used for normalization), a glass (with a smooth distribution of harmonic vibrations), and a viscous liquid (described by schematic mode-coupling equations). In cases where the input scattering law factorizes into a wave-number-dependent amplitude and a frequency-dependent spectral distribution, the latter is only weakly affected by multiple scattering, whereas the former is severely distorted.

Joachim Wuttke

2000-11-01T23:59:59.000Z

462

Optimal Power Sharing for Microgrid with Multiple Distributed Generators  

Science Journals Connector (OSTI)

Abstract This paper describes the active power sharing of multiple distributed generators (DGs) in a microgrid. The operating modes of a microgrid are 1) a grid-connected mode and 2) an autonomous mode. During islanded operation, one DG unit should share its output power with other DG units in exact accordance with the load. Unit output power control (UPC) is introduced to control the active power of DGs. The viability of the proposed power control mode is simulated by MATLAB/SIMULINK.

V. Logeshwari; N. Chitra; A. Senthil Kumar; Josiah Munda

2013-01-01T23:59:59.000Z

463

Multiple Compressions in the Middle Energy Plasma Focus Device  

Science Journals Connector (OSTI)

This paper reports some of the results that are aimed to investigate the neutron emission from the middle energy Mather?type plasma focus. These results indicated that with increase the pressure compression time is increase but there is not any direct relation between the compression time and neutron yield. Also it seems that multiple compression regimes is occurred in low pressure and single compression is appeared at higher pressure where is the favorable to neutron production.

H. R. Yousefi; Y. Ejiri; H. Ito; K. Masugata

2006-01-01T23:59:59.000Z

464

Multiple-energy Techniques in Industrial Computerized Tomography  

DOE R&D Accomplishments [OSTI]

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

465

Multiple Reference Fourier Transform Holography: Five Images for the Price  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple Reference Fourier Transform Multiple Reference Fourier Transform Holography: Five Images for the Price of One Improving the quality of a high magnification image on an optical microscope is simply a matter of cranking up the intensity of the illumination lamp. The same is true for x-ray microscopes, but complications arise when there just aren't enough x-rays or even worse when the sample is susceptible to damage caused by the intense x-ray beam. To address these challenges we have demonstrated a novel technique for improving the quality of a microscopic image without increasing the x-ray exposure to the specimen. This affords new opportunities to explore materials prone to soft x-ray damage, like polymer or biological samples. Our technique uses coherent x-ray scattering to simultaneously acquire multiple images of a specimen, which can easily be combined later to enhance the image quality. Applying our technique in the weak illumination limit we imaged a nanoscale test object by detecting only 2500 photons.

466

Multiple reheat helium Brayton cycles for sodium fast reactors  

SciTech Connect (OSTI)

Sodium fast reactors (SFR) traditionally adopt the steam Rankine cycle for power conversion. The resulting potential for water-sodium reaction remains a continuing concern which at least partly delays the SFR technology commercialization and is a contributor to higher capital cost. Supercritical CO2 provides an alternative, but is also capable of sustaining energetic chemical reactions with sodium. Recent development on advanced inert-gas Brayton cycles could potentially solve this compatibility issue, increase thermal efficiency, and bring down the capital cost close to light water reactors. In this paper, helium Brayton cycles with multiple reheat and intercooling states are presented for SFRs with reactor outlet temperatures in the range of 510°C to 650°C. The resulting thermal efficiencies range from 39% and 47%, which is comparable with supercritical recompression CO2 cycles (SCO2 cycle). A systematic comparison between multiple reheat helium Brayton cycle and the SCO2 cycle is given, considering compatibility issues, plant site cooling temperature effect on plant efficiency, full plant cost optimization, and other important factors. The study indicates that the multiple reheat helium cycle is the preferred choice over SCO2 cycle for sodium fast reactors.

Haihua Zhao; Per F. Peterson

2008-07-01T23:59:59.000Z

467

Visualisering och informationshantering i Google SketchUp; Visualization and information handling in Google SketchUp.  

E-Print Network [OSTI]

?? Det har alltid varit ett mål att uppnå god kommunikation mellan olika parter i ett byggprojekt. Ett sätt att underlätta detta kan vara att… (more)

Gunnarsson, Erik

2009-01-01T23:59:59.000Z

468

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls...

469

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am...

470

Modeling Multiple Ecosystem Services, Biodiversity Conservation, Commodity Production, and Tradeoffs at Landscape Scales  

E-Print Network [OSTI]

Modeling Multiple Ecosystem Services, Biodiversity Conservation, Commodity Production ECOSYSTEM SERVICES_ 4 o Modeling multiple ecosystem services, biodiversity conservation, commodity tradeoff between biodiversity conservation and J?l ecosystem services. Scenarios involving more development

Vermont, University of

471

Distribution of Four-Momentum Transfer in Multiple Meson Productions by High Energy Muons  

Science Journals Connector (OSTI)

......Multiple Meson Productions by High Energy Muons S. Higashi T. Kitamura Y. Mishima...Multiple Meson Productions by High Energy Muons S. Higashi, T. Kitamura, Y...production. Provided that the high energy muon-nucleon inter- actions occur......

S. Higashi; T. Kitamura; Y. Mishima; S. Miyamoto; H. Shibata; Y. Watase; K. Daiyasu; K. Kobayakawa; T. Murota; T. Nakano

1964-01-01T23:59:59.000Z

472

Analysis of oil-pipeline distribution of multiple products subject to delivery time-windows  

E-Print Network [OSTI]

This dissertation defines the operational problems of, and develops solution methodologies for, a distribution of multiple products into oil pipeline subject to delivery time-windows constraints. A multiple-product oil pipeline is a pipeline system...

Jittamai, Phongchai

2006-04-12T23:59:59.000Z

473

Supersymmetric and Kaluza-Klein Particles Multiple Scattering in the Earth  

E-Print Network [OSTI]

http://en.wikipedia.org/wiki/Earth#Chemical composition [12]Multiple Scattering in the Earth The IceCube CollaborationMultiple Scattering in the Earth Ivone F. M. Albuquerque

Albuquerque, Ivone

2009-01-01T23:59:59.000Z

474

Automated metal-free multiple-column nanoLC for improved phosphopeptid...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

metal-free multiple-column nanoLC for improved phosphopeptide analysis sensitivity and throughput. Automated metal-free multiple-column nanoLC for improved phosphopeptide analysis...

475

Propagation models for multiple-antenna systems : methodology, measurements and statistics  

E-Print Network [OSTI]

The trend in wireless communications is towards utilization of multiple antenna systems. While techniques such as beam-forming and spatial diversity have been implemented for some time, the emergence of Multiple-Input ...

Herring, Keith, 1981-

2008-01-01T23:59:59.000Z

476

Low-coherence doppler lidar with multiple time coherence of reference and probe waves  

Science Journals Connector (OSTI)

The notion of multiple time coherence of optical beams is introduced and mathematically ... pulses (MFPs), which exhibit multiple time coherence, and the possibility of their application for ... is based on nanos...

G. G. Matvienko; S. N. Polyakov; V. K. Oshlakov

2007-11-01T23:59:59.000Z

477

GenomeCons: a web server for manipulating multiple genome sequence alignments and their consensus sequences  

Science Journals Connector (OSTI)

......December 2014 brief-report Applications Note GenomeCons: a web server for manipulating multiple genome sequence alignments and...molecular biological processes. In this study, we developed a web server, GenomeCons, for manipulating multiple genome sequence......

Tetsuya Sato; Mikita Suyama

2014-12-01T23:59:59.000Z

478

Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor AreA  

Science Journals Connector (OSTI)

...Reserved. April 2014 research-article Articles Multiple Nuclear Localization Signals...multiple conserved nuclear localization signals...sequence was analyzed for nuclear localization signals using the PSORTII program (51), which identifies...

Cameron C. Hunter; Kendra S. Siebert; Damien J. Downes; Koon Ho Wong; Sara D. Kreutzberger; James A. Fraser; David F. Clarke; Michael J. Hynes; Meryl A. Davis; Richard B. Todd

2014-02-21T23:59:59.000Z

479

Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor AreA  

Science Journals Connector (OSTI)

...April 2014 research-article Articles Multiple Nuclear Localization Signals Mediate Nuclear Localization of the GATA Transcription Factor...Sequence analysis of AreA revealed multiple nuclear localization signals (NLSs), five putative...

Cameron C. Hunter; Kendra S. Siebert; Damien J. Downes; Koon Ho Wong; Sara D. Kreutzberger; James A. Fraser; David F. Clarke; Michael J. Hynes; Meryl A. Davis; Richard B. Todd

2014-02-21T23:59:59.000Z

480

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

Note: This page contains sample records for the topic "google chrome multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

U.S. Scientific Team Draws on New Data, Multiple Scientific Methodolog...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well U.S. Scientific Team Draws on New Data, Multiple Scientific...

482

E-Print Network 3.0 - aplastic anaemia multiple Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

multiple organ systems, especially in immunosuppressed patients. We Source: Steinbach, Joe Henry - Washington University Pain Center & Department of Anesthesiology, Washington...

483

Linear demultiple solution based on bottom-multiple generator (BMG) approximation: subsalt example  

E-Print Network [OSTI]

convolution of bpa with a0 ......................................... 29 3.7 An illustration of free-surface multiples not predicted in the two steps of the BMG demultiple technique. Note that these types of free-surface multiples are usually............................ 42 4.8 An example of the field of predicted free-surface multiples obtained from the multidimensional convolution of bpa with a 0...

Oladeinde, Abiola Omobolaji

2006-10-30T23:59:59.000Z

484

Microfluidic device for delivery of multiple inks for dip pen nanolithography  

E-Print Network [OSTI]

Microfluidic device for delivery of multiple inks for dip pen nanolithography Juan Alberto Rivas of a microfluidic ink delivery device for delivering multiple species of inks to an array of multiple pens, as well as for maximizing the number of inks for simulta- neous patterning by DPN. The microfluidic device called "Centiwell

Banerjee, Debjyoti

485

Fire-Balls in Pion Multiple Production: Brasil-Japan Collaboration of Chacaltaya Emulsion Chamber Experiment  

Science Journals Connector (OSTI)

......disc-shaped dense gas of mutually interacting...Fire-Balls zn Pion Multiple Production 3 dose not immediately...mechanism of multiple production of mesons is kept essentially...in comparison to its cost. Already in 1968...events of multiple pion production--into the two types......

Jose A. Chinellato; Carola Dobrigkeit; J. Bellandi Filho; Cesar M. G. Lattes; Marcio J. Menon; Carlos E. Navia O.; Ammiraju Pemmaraju; Kotaro Sawayanagi; Edison H. Shibuya; Armando Turtelli; Jr.; Neuza M. Amato; Naoyuki Arata; F. M. Oliveira Castro; Regina H. C. Maldonado; Hiroshi Aoki; Yoichi Fujimoto; Shunichi Hasegawa; Hiroshi Semba; Masanobu Tamada; Kojiro Tanaka; Seibun Yamashita; Toru Shibata; Kei Yokoi; Hiroshi Kumano; Akinori Ohsawa; Takaaki Tabuki

1983-03-01T23:59:59.000Z

486

DOE Designated User Facilities Multiple Laboratories * ARM Climate Research Facility  

Broader source: Energy.gov (indexed) [DOE]

Designated User Facilities Designated User Facilities Multiple Laboratories * ARM Climate Research Facility Argonne National Laboratory * Advanced Photon Source (APS) * Electron Microscopy Center for Materials Research * Argonne Tandem Linac Accelerator System (ATLAS) * Center for Nanoscale Materials (CNM) * Argonne Leadership Computing Facility (ALCF) * Brookhaven National Laboratory * National Synchrotron Light Source (NSLS) * Accelerator Test Facility (ATF) * Relativistic Heavy Ion Collider (RHIC) * Center for Functional Nanomaterials (CFN) * National Synchrotron Light Source II (NSLS-II ) (under construction) Fermi National Accelerator Laboratory * Fermilab Accelerator Complex Idaho National Laboratory * Advanced Test Reactor ** * Wireless National User Facility (WNUF)

487

Multiple piece turbine engine airfoil with a structural spar  

DOE Patents [OSTI]

A multiple piece turbine airfoil having an outer shell with an airfoil tip that is attached to a root with an internal structural spar is disclosed. The root may be formed from first and second sections that include an internal cavity configured to receive and secure the one or more components forming the generally elongated airfoil. The internal structural spar may be attached to an airfoil tip and place the generally elongated airfoil in compression. The configuration enables each component to be formed from different materials to reduce the cost of the materials and to optimize the choice of material for each component.

Vance, Steven J. (Orlando, FL)

2011-10-11T23:59:59.000Z

488

Muon multiplicity at high energy proton-nuclei collisions  

E-Print Network [OSTI]

Estimation of multiplicity of muons and pions production at high energy proton-nuclei collisions is given. Both QED and QCD contributions are considered for peripheral kinematics of muon pair and $\\sigma$-meson production, keeping in mind it's final conversion to muons. An attempt to explain the excess of positive charged muons compared to negative one in cosmic muon showers is given. We derive the dependence of cross-section of $n$ pairs as a function of $n$ at large n as $d^n(n!n^2)^{-1}$.

E. A. Kuraev; S. Bakmaev; V. Bytev; E. Kokoulina

2007-06-29T23:59:59.000Z

489

Multiple thresholds in a model system of noisy ion channels  

Science Journals Connector (OSTI)

Voltage-activated ion channels vary randomly between open and closed states, influenced by the membrane potential and other factors. Signal transduction is enhanced by noise in a simple ion channel model. The enhancement occurs in a finite range of signals; the range can be extended using populations of channels. The range increases more rapidly in multiple-threshold channel populations than in single-threshold populations. The diversity of ion channels may thus be present as a strategy to reduce the metabolic costs of handling a broad class of electrochemical signals.

Michael J. Barber and Manfred L. Ristig

2006-10-19T23:59:59.000Z

490

Probing Aerogels by Multiple Quantum Filtered 131Xe NMR Spectroscopy  

Science Journals Connector (OSTI)

This is demonstrated in Figure 1 where four pulse sequences using multiple quantum filters are shown. ... Pyrex tube at 7.4 T, 1.2 MPa, and 298 K:? (a) double-quantum filtered pulse sequence, (b) magic-angle double-quantum filter which is a T2,±1 pulse sequence, (c) triple-quantum filtered sequence, and (d) triple-quantum filtered inversion recovery pulse sequence. ... 14-16 The tubes have been filled with aerogel fragments of a few millimeter diameter and were pressurized with xenon to about 6.9 MPa at 298 K to create supercritical conditions. ...

Thomas Meersmann; Michaël Deschamps; Geoffrey Bodenhausen

2001-01-13T23:59:59.000Z

491

Multiple Energy Exciton Shelves in Quantum-Dot–DNA Nanobioelectronics  

Science Journals Connector (OSTI)

The DNA molecules joining the QDs form an energetic bridge that provides an efficient conduction pathway for the different energy carriers, capturing the hot electron before it can cool to the bandedge via nonradiative relaxation. ... Interband optical excitation of PbSe NCs at low pump intensities, for which less than one exciton is initially generated per NC on average, results in the formation of two or more excitons (carrier multiplication) when pump photon energies are more than 3 times the NC band gap energy. ...

Samuel M. Goodman; Vivek Singh; Josep Casamada Ribot; Anushree Chatterjee; Prashant Nagpal

2014-10-24T23:59:59.000Z

492

Multiple scattering approach to one?dimensional potential problems  

Science Journals Connector (OSTI)

By calculating the reflection and transmission coefficients for a square potential barrier in terms of a series of scatterings at step potential discontinuities a multiple scattering approach to potential problems is presented. This approach is applied to WKB potential problems by interpreting the WKB connection formulas in terms of reflection and transmission coefficients at each turning point. An algorithm for the systematic construction of the energy Green’s function is given. The significance of complex coordinate turning points is demonstrated. The equivalence of this approach and that of the Gaussian approximation of the path integral is mentioned briefly.

Arlen Anderson

1989-01-01T23:59:59.000Z

493

Magazine system for multiple sample transport from air into UHV  

Science Journals Connector (OSTI)

The time required to exchange specimens in a UHV system can be reduced considerably by a sample airlock. A low-cost sample exchange system is described which was originally constructed for an Auger spectrometer, but may be applied to other UHV systems as well. The essential parts are a magnetically coupled transfer rod, a magazine for the simultaneous transport of six samples, a bayonet clip to fix the samples sequentially to a carousel sample holder and a tilting mechanism in the specimen stage to bring the transferred samples into an optimum position for the further experiment. The system can be adapted to the multiple sample transport between two completely separated UHV systems.

W Pamler; W Reill; S Dorfner; K Roll

1985-01-01T23:59:59.000Z

494

Subdiffusive fluctuations of “pulled” fronts with multiplicative noise  

Science Journals Connector (OSTI)

We study the propagation of a “pulled” front with multiplicative noise that is created by a local perturbation of an unstable state. Unlike a front propagating into a metastable state, where a separation of time scales for sufficiently large t creates a diffusive wandering of the front position about its mean, we predict that for so-called pulled fronts, the fluctuations are subdiffusive with root mean square wandering ?(t)?t1/4, not t1/2. The subdiffusive behavior is confirmed by numerical simulations: For t<~600, these yield an effective exponent slightly larger than 1/4.

Andrea Rocco, Ute Ebert, and Wim van Saarloos

2000-07-01T23:59:59.000Z

495

Fine and Ultrafine Particle Decay Rates in Multiple Homes  

Science Journals Connector (OSTI)

All homes exchange indoor air with outdoor air at a certain base rate dependent on the construction quality of the home and on indoor–outdoor temperature and pressure differences. ... A number of multiple-home studies have measured indoor particle concentrations, but few have been able to determine the rates of particle removal for individual homes under normal living conditions. ... Therefore continuous measurements from this study of FP and UFP in 74 homes in Edmonton Canada were analyzed to determine these rates of removal in each home during week-long measurement periods in summer and winter. ...

Lance Wallace; Warren Kindzierski; Jill Kearney; Morgan MacNeill; Marie-Ève Héroux; Amanda J. Wheeler

2013-10-21T23:59:59.000Z

496

Multiple Time Scales in Diffraction Measurements of Diffusive Surface Relaxation  

Science Journals Connector (OSTI)

We grew SrTiO3 on SrTiO3(001) by pulsed laser deposition, using x-ray scattering to monitor the growth in real time. The time-resolved small-angle scattering exhibits a well-defined length scale associated with the spacing between unit-cell high surface features. This length scale imposes a discrete spectrum of Fourier components and rate constants upon the diffusion equation solution, evident in multiple exponential relaxation of the “anti-Bragg” diffracted intensity. An Arrhenius analysis of measured rate constants confirms that they originate from a single activation energy.

Aaron Fleet; Darren Dale; A. R. Woll; Y. Suzuki; J. D. Brock

2006-02-09T23:59:59.000Z

497

Formation control of multiple mobile robots utilising synchronisation approach  

Science Journals Connector (OSTI)

In this paper, a new synchronous control rule is proposed for multiple mobile robot trajectories tracking while maintaining time varying formation. Each robot is controlled to track the desired path while its motion is synchronised with the two neighbouring robots to perform and maintain a desired time-varying formation. The dynamic model of the wheeled mobile robot is derived and divided into a translational and rotational dynamic model. A new synchronous translational controller is proposed to guarantee the asymptotic stability of both position and synchronisation errors. A simulation result of 20 robots has been conducted to validate the effectiveness of the proposed synchronous controller in the time-varying formation tasks.

Ibrahim M.H. Sanhoury; Shamsudin H.M. Amin; Abdul Rashid Husain

2013-01-01T23:59:59.000Z

498

Development of a public key infrastructure across multiple enterprises  

SciTech Connect (OSTI)

Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infrastructure among multiple enterprises when different applications and standards must be supported. This discussion chronicles the efforts by a team within the US Department of Energy`s Nuclear Weapons Complex to build a public key infrastructure and deploy applications that use it. The emphasis of this talk will be on the lessons learned during this effort and an assessment of the overall impact of this technology.

Sharick, T.M.; Long, J.P.; Desind, B.J. [and others

1997-05-01T23:59:59.000Z

499

Multiple description transform codes with an application to packetized speech  

E-Print Network [OSTI]

) and for 8 = 3. Comparison of the simulation and the theoretical results. 25 10 Multiple Description Transform Coder. Er, Ez, . . . , Et are ECMDSQ encoders for the transform coefficients, Dr, Dz, . . . , Dc are ECMDSQ decoders. 27 12 Slope A... of the location at which 21 lies). 7 11 10 12 13 15 16 17 21 14 18 20 22 26 19 23 25 27 31 24 28 29 30 32 33 34 Fig. 2. Example of index assignment, 2k + 1 = 5, As previously stated, the central encoder is described by a vector of thresholds (tp, tr...

Batllo, Jean-Christophe Claude

2012-06-07T23:59:59.000Z

500

Effects of the Spatial Extent of Multiple Harmonic Layers  

SciTech Connect (OSTI)

An analytic model for single particle motion in the presence of a wave field and multiple cyclotron harmonics is developed and investigated. The model suggests that even in the absence of Doppler broadening, cyclotron harmonic layers have finite spatial extent. This allows for particles to interact with more than one harmonic layer simultaneously, provided the layers are tightly packed. The latter phenomenon is investigated in the context of the model using symplectic mapping techniques. Then the model behavior is compared with numerical simulations of neutral beam particle trajectories in NSTX using the full-orbit code SPIRAL.

Burby, J. W.; Kramer, G. J.; Phillips, C. K.; Valeo, E. J. [Princeton Plasma Physics Laboratory, Princeton University, Princeton, NJ 08543 (United States)

2011-12-23T23:59:59.000Z