Sample records for hat kernel security

  1. T-700:Red Hat: kernel security, bug fix, and enhancement update...

    Broader source: Energy.gov (indexed) [DOE]

    processes to gather confidential information, such as the length of a password used in a process. (CVE-2011-2495, Low) Impact: Bug 690028 - CVE-2011-1182 kernel signal spoofing...

  2. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  3. T-667: Red Hat Enterprise Linux kernel security and bug fix update

    Broader source: Energy.gov [DOE]

    It was found that an mmap() call with the MAP_PRIVATE flag on "/dev/zero" would create transparent hugepages and trigger a certain robustness check. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2011-2479, Moderate)

  4. Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of

    E-Print Network [OSTI]

    Binder, Walter

    Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications Walter Binder and Bal´azs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 applications. Mobile code is used for application upload, as well as for remote configuration and maintenance

  5. Using a Secure Mobile Object Kernel as Operating System on Embedded Devices to

    E-Print Network [OSTI]

    Binder, Walter

    Upload of Applications Walter Binder and Bal´azs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 and maintenance. The autonomous station relies on resource accounting and control in order to prevent an overuse of the design and architecture of an autonomous station, which is able to securely and reliably execute

  6. Top Hat Pressure System Hyperbaric Test Analysis | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Top Hat Pressure System Hyperbaric Test Analysis Top Hat Pressure System Hyperbaric Test Analysis This file contains data from pressure measurements inside Top Hat 4....

  7. Acute promyelocytic leukemia: STATs, HATs,

    E-Print Network [OSTI]

    Ponder, Katherine P.

    Acute promyelocytic leukemia: STATs, HATs, and HDACs In this issue, both Dong and Tweardy (page of the Stat5b-RAR fusion protein, which was originally described in a patient with acute promyelocytic leukemia (APL) several years ago (Arnould et al, Hum Mol Genetics. 1999;8:1741-1749). Stat5b is one of 5

  8. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  9. hat does a group of 30 "sustainabil-

    E-Print Network [OSTI]

    Handy, Susan L.

    hat does a group of 30 "sustainabil- ity" professionals do when they run into a pair of two's greenest athledc facility. The group includes planners, environmental and sustainability directors a testament to humanity's constant threat to biodiversity. Eight pairs of sparrows were first released

  10. "(Operating System)" linux "(kernel)"

    E-Print Network [OSTI]

    kernel kernel shell (FIXME) shell (interface) (command line) shell ---(Command Interpreter line ""(word) (meta) command line () IFS shell #12;* (White Space) * (Tab) * (Enter) (command-name) * * (alias) * (function) * shell (built-in) * $PATH 3) echo echo echo command line echo --- command

  11. Long-term surveillance plan for the Mexican Hat disposal site Mexican Hat, Utah

    SciTech Connect (OSTI)

    NONE

    1997-06-01T23:59:59.000Z

    This long-term surveillance plan (LTSP) describes the U.S. Department of Energy`s (DOE) long-term care program for the Uranium Mill Tailings Remedial Action (UMTRA) Project Mexican Hat, Utah, disposal site. This LSTP describes the long-term surveillance program the DOE will implement to ensure the Mexican Hat disposal site performs as designed and is cared for in a manner that protects the public health and safety and the environment. Before each disposal site is licensed for custody and long-term care, the Nuclear Regulatory Commission (NRC) requires the DOE to submit such a site-specific LTSP.

  12. A dynamic kernel modifier for linux

    SciTech Connect (OSTI)

    Minnich, R. G. (Ronald G.)

    2002-09-03T23:59:59.000Z

    Dynamic Kernel Modifier, or DKM, is a kernel module for Linux that allows user-mode programs to modify the execution of functions in the kernel without recompiling or modifying the kernel source in any way. Functions may be traced, either function entry only or function entry and exit; nullified; or replaced with some other function. For the tracing case, function execution results in the activation of a watchpoint. When the watchpoint is activated, the address of the function is logged in a FIFO buffer that is readable by external applications. The watchpoints are time-stamped with the resolution of the processor high resolution timers, which on most modem processors are accurate to a single processor tick. DKM is very similar to earlier systems such as the SunOS trace device or Linux TT. Unlike these two systems, and other similar systems, DKM requires no kernel modifications. DKM allows users to do initial probing of the kernel to look for performance problems, or even to resolve potential problems by turning functions off or replacing them. DKM watchpoints are not without cost: it takes about 200 nanoseconds to make a log entry on an 800 Mhz Pentium-Ill. The overhead numbers are actually competitive with other hardware-based trace systems, although it has less 'Los Alamos National Laboratory is operated by the University of California for the National Nuclear Security Administration of the United States Department of Energy under contract W-7405-ENG-36. accuracy than an In-Circuit Emulator such as the American Arium. Once the user has zeroed in on a problem, other mechanisms with a higher degree of accuracy can be used.

  13. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  14. Multi-view kernel construction

    E-Print Network [OSTI]

    Sa, Virginia R.; Gallagher, Patrick W.; Lewis, Joshua M.; Malave, Vicente L.

    2010-01-01T23:59:59.000Z

    5157-z Multi-view kernel construction Virginia R. de Sa ·multiple different graph construction algorithms. The Ng et

  15. Intel's Math Kernel Library (MKL) at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes | National Nuclear Security AdministrationIntegratingIntelVTuneKernel

  16. Long-term surveillance plan for the Mexican Hat disposal site Mexican Hat, Utah

    SciTech Connect (OSTI)

    NONE

    1997-05-01T23:59:59.000Z

    This long-term surveillance plan (LTSP) describes the U.S. Department of Energy`s (DOE) long-term care program for the Uranium Mill Tailings Remedial Action (UMTRA) Project Mexican Hat, Utah, disposal site. The U.S. Nuclear Regulatory Commission (NRC) has developed regulations for the issuance of a general license for the custody and long-term care of UMTRA Project disposal sites in 10 CFR Part 40. The purpose of this general license is to ensure that the UMTRA Project disposal sites will be cared for in a manner that protects the public health and safety and the environment. Before each disposal site is licensed, the NRC requires the DOE to submit a site-specific LTSP. The DOE prepared this LTSP to meet this requirement for the Mexican Hat disposal site. The general license becomes effective when the NRC concurs with the DOE`s determination of completion of remedial action for the disposal site and the NRC formally accepts this LTSP. This LTSP describes the long-term surveillance program the DOE will implement to ensure that the Mexican Hat disposal site performs as designed. The program is based on two distinct types of activities: (1) site inspections to identify potential threats to disposal cell integrity, and (2) monitoring of selected seeps to observe changes in flow rates and water quality. The LTSP is based on the UMTRA Project long-term surveillance program guidance and meets the requirements of 10 CFR {section}40.27(b) and 40 CFR {section}192.03. 18 refs., 6 figs., 1 tab.

  17. Long-term surveillance plan for the Mexican Hat disposal site, Mexican Hat, Utah

    SciTech Connect (OSTI)

    NONE

    1996-01-01T23:59:59.000Z

    This plan describes the long-term surveillance activities for the Uranium Mill Tailings Remedial Action (UMTRA) Project disposal site at Mexican Hat, Utah. The US Department of Energy (DOE) will carry out these activities to ensure that the disposal site continues to function as designed. This long-term surveillance plan (LTSP) was prepared as a requirement for acceptance under the US Nuclear Regulatory Commission (NRC) general license for custody and long-term care of residual radioactive material (RRM). This LTSPC documents the land ownership interests and details how the long-term care of the disposal site will be accomplished.

  18. KALMAN FILTERING REPRODUCING KERNEL HILBERT SPACES

    E-Print Network [OSTI]

    Slatton, Clint

    KALMAN FILTERING IN REPRODUCING KERNEL HILBERT SPACES Pingping Zhu #12;Outline · Introduction · Related Work · A Novel Extended Kernel Recursive Least Squares · Kernel Kalman Filter based on Conditional · Develop a Kalman filter in the Reproducing kernel Hilbert space (RKHS) Motivation · Kernel methods can

  19. Long-term surveillance plan for the Mexican Hat Disposal Site, Mexican Hat, Utah

    SciTech Connect (OSTI)

    NONE

    1996-02-01T23:59:59.000Z

    This plan describes the long-term surveillance activities for the Uranium Mill Tailings Remedial Action (UMTRA) Project disposal site at Mexican Hat, Utah. The U.S. Department of Energy (DOE) will carry out these activities to ensure that the disposal site continues to function as designed. This long-term surveillance plan (LTSP) was prepared as a requirement for acceptance under the U.S. Nuclear Regulatory Commission (NRC) general license for custody and long-term care of residual radioactive material (RRM). This LTSP (based on the DOE`s Guidance for Implementing the UMTRA Project Long-term Surveillance Program), documents the land ownership interests and details how the long-term care of the disposal site will be accomplished.

  20. Robotic intelligence kernel

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID)

    2009-11-17T23:59:59.000Z

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes a robot intelligence kernel (RIK) that includes a multi-level architecture and a dynamic autonomy structure. The multi-level architecture includes a robot behavior level for defining robot behaviors, that incorporate robot attributes and a cognitive level for defining conduct modules that blend an adaptive interaction between predefined decision functions and the robot behaviors. The dynamic autonomy structure is configured for modifying a transaction capacity between an operator intervention and a robot initiative and may include multiple levels with at least a teleoperation mode configured to maximize the operator intervention and minimize the robot initiative and an autonomous mode configured to minimize the operator intervention and maximize the robot initiative. Within the RIK at least the cognitive level includes the dynamic autonomy structure.

  1. Oil and Gas Flow Data from the Top Hat and from the Choke Line...

    Broader source: Energy.gov (indexed) [DOE]

    Flow Data from the Top Hat and from the Choke Line - XLS Oil and Gas Flow Data from the Top Hat and from the Choke Line - XLS Updated through 12:00 AM on July 10, 2010...

  2. BP Oil Spill Footage (High Def) - Top Hat Procedure at 4850'...

    Broader source: Energy.gov (indexed) [DOE]

    Top Hat Procedure at 4850' - June 3 2010 (4 of 4) BP Oil Spill Footage (High Def) - Top Hat Procedure at 4850' - June 3 2010 (4 of 4) Addthis Description Footage of the BP Oil...

  3. Ksplice: Automatic Rebootless Kernel Updates

    E-Print Network [OSTI]

    Kaashoek, M. Frans

    2009-01-01T23:59:59.000Z

    Ksplice allows system administrators to apply patches to their operating system kernels without rebooting. Unlike previous hot update systems, Ksplice operates at the object code layer, which allows Ksplice to transform ...

  4. Hypoelliptic heat kernel inequalities on H-type groups

    E-Print Network [OSTI]

    Eldredge, Nathaniel Gilbert Bartsch

    2009-01-01T23:59:59.000Z

    Hypoelliptic heat kernel inequalities on the HeisenbergHypoelliptic heat kernel inequalities on Lie groups. PhDHypoelliptic heat kernel inequalities on H-type groups A

  5. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server...

  6. HAT-P-28b and HAT-P-29b: Two Sub-Jupiter Mass Transiting Planets

    E-Print Network [OSTI]

    Buchhave, L A; Hartman, J D; Torres, G; Latham, D W; Andersen, J; Kovacs, G; Noyes, R W; Shporer, A; Esquerdo, G A; Fischer, D A; Johnson, J A; Marcy, G W; Howard, A W; Beky, B; Sasselov, D D; Furesz, G; Quinn, S N; Stefanik, R P; Szklenar, T; Berlind, P; Calkins, M L; Lazar, J; Papp, I; Sari, P

    2011-01-01T23:59:59.000Z

    We present the discovery of two transiting exoplanets. HAT-P-28b orbits a V=13.03 G3 dwarf star with a period P = 3.2572 d and has a mass of 0.63 +- 0.04 MJ and a radius of 1.21 + 0.11 -0.08 RJ yielding a mean density of 0.44 +- 0.09 g cm-3. HAT-P-29b orbits a V=11.90 F8 dwarf star with a period P = 5.7232 d and has a mass of 0.78 +0.08 -0.04 MJ and a radius of 1.11 +0.14 -0.08 RJ yielding a mean density of 0.71 +- 0.18 g cm-3. We discuss the properties of these planets in the context of other known transiting planets.

  7. Bayesian Kernel Shaping for Learning Control 

    E-Print Network [OSTI]

    Ting, Jo-Anne; Kalakrishnan, Mrinal; Vijayakumar, Sethu; Schaal, Stefan

    2008-01-01T23:59:59.000Z

    In kernel-based regression learning, optimizing each kernel individually is useful when the data density, curvature of regression surfaces (or decision boundaries) or magnitude of output noise varies spatially. Previous ...

  8. Frequent Pattern Mining for Kernel Trace Data Christopher LaRosa, Li Xiong, Ken Mandelberg

    E-Print Network [OSTI]

    Xiong, Li

    , application programmers, operating systems engineers, and security analysts. In the systems area, data miningFrequent Pattern Mining for Kernel Trace Data Christopher LaRosa, Li Xiong, Ken Mandelberg patterns and other recurring runtime execution patterns in operating system trace logs, we employ data

  9. Adaptive wiener image restoration kernel

    DOE Patents [OSTI]

    Yuan, Ding (Henderson, NV)

    2007-06-05T23:59:59.000Z

    A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

  10. DOE - Office of Legacy Management -- MexHat

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling CorpNew MexicoUtah Mexican Hat, Utah, Disposal

  11. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...

    Broader source: Energy.gov (indexed) [DOE]

    potentially sensitive information. The vulnerability resides in the Qpid Python client library for AMQP. IMPACT: Security Bypass SOLUTION: Vendor recommends applying current update...

  12. Learning Kernels -Tutorial Part IV: Software Solutions

    E-Print Network [OSTI]

    Mohri, Mehryar

    Kernel.org http://www.openkernel.org · DOGMA (online alg: UFO) http://dogma.sourceforge.net/index.html · MKL

  13. 'ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON

    E-Print Network [OSTI]

    'ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON Abstract.We clarify the relationship between higher 'etale wild kernels * *of a number- cyclotomic tower of the field. We also determine the relationship betwee* *n the 'etale wild kernel

  14. T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates...

    Broader source: Energy.gov (indexed) [DOE]

    5: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection...

  15. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  16. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and...

    Energy Savers [EERE]

    user could also use this to, depending on the defined ACLs of the broker, manipulate message queues and other privileged operations. Impact: Cumin writes broker authentication...

  17. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtainupdate |

  18. U-200: Red Hat Directory Server Information Disclosure Security Issue and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of Energy A

  19. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis SuccessEnergyupdate |

  20. HAT-P-34b-HAT-P-37b: FOUR TRANSITING PLANETS MORE MASSIVE THAN JUPITER ORBITING MODERATELY BRIGHT STARS

    SciTech Connect (OSTI)

    Bakos, G. A.; Hartman, J. D.; Csubry, Z.; Penev, K. [Department of Astrophysical Sciences, Princeton University, Princeton, NJ 08544 (United States); Torres, G.; Beky, B.; Latham, D. W.; Bieryla, A.; Quinn, S.; Szklenar, T.; Esquerdo, G. A.; Noyes, R. W. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA (United States); Buchhave, L. A. [Niels Bohr Institute, University of Copenhagen, DK-2100, Denmark, and Centre for Star and Planet Formation, Natural History Museum of Denmark, DK-1350 Copenhagen (Denmark); Kovacs, G. [Konkoly Observatory, Budapest (Hungary); Shporer, A. [LCOGT, 6740 Cortona Drive, Santa Barbara, CA (United States); Fischer, D. A. [Astronomy Department, Yale University, New Haven, CT (United States); Johnson, J. A. [California Institute of Technology, Department of Astrophysics, MC 249-17, Pasadena, CA (United States); Howard, A. W.; Marcy, G. W. [Department of Astronomy, University of California, Berkeley, CA (United States); Sato, B., E-mail: gbakos@astro.princeton.edu [Department of Earth and Planetary Sciences, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551 (Japan); and others

    2012-07-15T23:59:59.000Z

    We report the discovery of four transiting extrasolar planets (HAT-P-34b-HAT-P-37b) with masses ranging from 1.05 to 3.33 M{sub J} and periods from 1.33 to 5.45 days. These planets orbit relatively bright F and G dwarf stars (from V = 10.16 to V = 13.2). Of particular interest is HAT-P-34b which is moderately massive (3.33 M{sub J}), has a high eccentricity of e = 0.441 {+-} 0.032 at a period of P = 5.452654 {+-} 0.000016 days, and shows hints of an outer component. The other three planets have properties that are typical of hot Jupiters.

  1. Supplement to the UMTRA Project water sampling and analysis plan, Mexican Hat, Utah

    SciTech Connect (OSTI)

    NONE

    1995-09-01T23:59:59.000Z

    This water sampling and analysis plan (WSAP) supplement supports the regulatory and technical basis for water sampling at the Mexican Hat, Utah, Uranium Mill Tailings Remedial Action (UMTRA) Project site, as defined in the 1994 WSAP document for Mexican Hat (DOE, 1994). Further, the supplement serves to confirm our present understanding of the site relative to the hydrogeology and contaminant distribution as well as our intention to continue to use the sampling strategy as presented in the 1994 WSAP document for Mexican Hat. Ground water and surface water monitoring activities are derived from the US Environmental Protection Agency regulations in 40 CFR Part 192 (1991) and 60 FR 2854 (1995). Sampling procedures are guided by the UMTRA Project standard operating procedures (JEG, n.d.), the Technical Approach Document (DOE, 1989), and the most effective technical approach for the site. Additional site-specific documents relevant to the Mexican Hat site are the Mexican Hat Long-Term Surveillance Plan (currently in progress), and the Mexican Hat Site Observational Work Plan (currently in progress).

  2. Kernelization and Enumeration: New Approaches to Solving Hard Problems

    E-Print Network [OSTI]

    Meng, Jie

    2011-08-08T23:59:59.000Z

    their sizes. We present a 2k kernel for the cluster editing problem, which improves the previous best kernel of size 4k; We also present a linear kernel of size 7k 2d for the d-cluster editing problem, which is the first linear kernel for the problem...

  3. Remedial Action Plan for the codisposal and stabilization of the Monument Valley and Mexican Hat uranium mill tailings at Mexican Hat, Utah: Appendices C--E. Final report

    SciTech Connect (OSTI)

    NONE

    1993-02-01T23:59:59.000Z

    This document provides appendices C, D, and E this Remedial Action Plan (RAP) which is a revision of the original Mexican Hat Remedial Action Plan and RAP Modification submitted in July 1988 and January 1989, respectively, along with updated design documents. Appendix C provide the Radiological Support Plan, Appendix D provides the Site Characterization, and Appendix E provides the Water Resources Protection Strategy.

  4. Heat kernel asymptotics for magnetic Schrödinger operators

    SciTech Connect (OSTI)

    Bolte, Jens, E-mail: jens.bolte@rhul.ac.uk [Department of Mathematics, Royal Holloway, University of London, Egham TW20 0EX (United Kingdom)] [Department of Mathematics, Royal Holloway, University of London, Egham TW20 0EX (United Kingdom); Keppeler, Stefan, E-mail: stefan.keppeler@uni-tuebingen.de [Mathematisches Institut, Universität Tübingen, Auf der Morgenstelle 10, 72076 Tübingen (Germany)] [Mathematisches Institut, Universität Tübingen, Auf der Morgenstelle 10, 72076 Tübingen (Germany)

    2013-11-15T23:59:59.000Z

    We explicitly construct parametrices for magnetic Schrödinger operators on R{sup d} and prove that they provide a complete small-t expansion for the corresponding heat kernel, both on and off the diagonal.

  5. Fractal Weyl law for Linux Kernel Architecture

    E-Print Network [OSTI]

    L. Ermann; A. D. Chepelianskii; D. L. Shepelyansky

    2010-09-16T23:59:59.000Z

    We study the properties of spectrum and eigenstates of the Google matrix of a directed network formed by the procedure calls in the Linux Kernel. Our results obtained for various versions of the Linux Kernel show that the spectrum is characterized by the fractal Weyl law established recently for systems of quantum chaotic scattering and the Perron-Frobenius operators of dynamical maps. The fractal Weyl exponent is found to be $\

  6. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  7. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

  8. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    update Red Hat: kernel security, bug fix, and enhancement update. August 23, 2011 T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code EMC AutoStart Buffer...

  9. HATS-1b: THE FIRST TRANSITING PLANET DISCOVERED BY THE HATSouth SURVEY

    SciTech Connect (OSTI)

    Penev, K.; Bakos, G. A.; Hartman, J. D.; Csubry, Z. [Department of Astrophysical Sciences, Princeton University, NJ 08544 (United States); Bayliss, D.; Zhou, G.; Conroy, P. [Australian National University, Canberra (Australia); Jordan, A.; Suc, V.; Rabus, M.; Brahm, R.; Espinoza, N. [Departamento de Astronomia y Astrofisica, Pontificia Universidad Catolica de Chile, Av. Vicuna Mackenna 4860, 7820436 Macul, Santiago (Chile); Mohler, M.; Mancini, L.; Henning, T.; Nikolov, N.; Csak, B. [Max Planck Institute for Astronomy, Heidelberg (Germany); Beky, B.; Noyes, R. W. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA (United States); Buchhave, L., E-mail: kpenev@astro.princeton.edu [Niels Bohr Institute, Copenhagen University (Denmark); and others

    2013-01-01T23:59:59.000Z

    We report the discovery of HATS-1b, a transiting extrasolar planet orbiting the moderately bright V = 12.05 G dwarf star GSC 6652-00186, and the first planet discovered by HATSouth, a global network of autonomous wide-field telescopes. HATS-1b has a period of P Almost-Equal-To 3.4465 days, mass of M{sub p} Almost-Equal-To 1.86 M{sub J}, and radius of R{sub p} Almost-Equal-To 1.30 R{sub J}. The host star has a mass of 0.99 M{sub Sun} and radius of 1.04 R{sub Sun }. The discovery light curve of HATS-1b has near-continuous coverage over several multi-day timespans, demonstrating the power of using a global network of telescopes to discover transiting planets.

  10. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  11. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  12. Remedial Action Plan for the codisposal and stabilization of the Monument Valley and Mexican Hat uranium mill tailings at Mexican Hat, Utah

    SciTech Connect (OSTI)

    NONE

    1993-02-01T23:59:59.000Z

    This document is a revision of the original Mexiacan Hat Remedial Action Plan (RAP) and RAP Modification submitted in July 1988 and January 1989, respectively, along with updated design documents. This RAP has been developed to serve a two-fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley, Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. This document has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action. Pertinent information and data are included with reference given to the supporting documents. Section 2.0 presents the EPA standards, including a discussion of their objectives. Section 3. 0 summarizes the present site characteristics and provides a definition of site-specific problems. Section 4.0 is the site design for the proposed action. Section 5.0 presents the water resources protection strategy. Section 6.0 summarizes the plan for ensuring health and safety protection for the surrounding community and the on- site workers. Section 7.0 lists the responsibilities of the project participants. Section 8.0 describes the features of the long-term surveillance and maintenance plan.

  13. Accuracy of Reduced and Extended Thin-Wire Kernels

    SciTech Connect (OSTI)

    Burke, G J

    2008-11-24T23:59:59.000Z

    Some results are presented comparing the accuracy of the reduced thin-wire kernel and an extended kernel with exact integration of the 1/R term of the Green's function and results are shown for simple wire structures.

  14. On fusion kernel in Liouville theory

    E-Print Network [OSTI]

    Nikita Nemkov

    2014-09-29T23:59:59.000Z

    We study fusion kernel for non-degenerate conformal blocks in Liouville theory as a solution to the difference equations originating from the pentagon identity. We suggest an approach to these equations based on 'non-perturbative' series expansion which allows to calculate the fusion kernel iteratively. We also find the exact solutions for the cases when the central charge is $c=1+6(b-b^{-1})^2$ and $b~\\in \\mathbb{N}$. For $c = 1$ our result reproduces the formula, obtained earlier from analytical continuation via Painlev\\'e equation. However, in our case it appears in a significantly simplified form.

  15. Multivariate wavelet kernel regression method Samir Touzani, Daniel Busbya

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Multivariate wavelet kernel regression method Samir Touzani, Daniel Busbya a IFP Energies nouvelles multivariate nonparametric regression method, in the framework of wavelet decomposition. We call this method the wavelet kernel ANOVA (WK-ANOVA), which is a wavelet based reproducing kernel Hilbert space (RKHS) method

  16. ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON

    E-Print Network [OSTI]

    #19; ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON Abstract. We clarify the relationship between higher #19;etale wild kernels of a number #12;eld at the prime 2 and the Galois between the #19;etale wild kernel and the group of in#12;nitely divisible elements of H 2 (F; Z 2 (j + 1

  17. ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON

    E-Print Network [OSTI]

    ´ETALE WILD KERNELS OF EXCEPTIONAL NUMBER FIELDS KEVIN HUTCHINSON Abstract. We clarify the relationship between higher ´etale wild kernels of a number field at the prime 2 and the Galois between the ´etale wild kernel and the group of infinitely divisible elements of H2 (F, Z2(j + 1)){2}. 1

  18. ORBITAL PHASE VARIATIONS OF THE ECCENTRIC GIANT PLANET HAT-P-2b

    E-Print Network [OSTI]

    Knutson, Heather A.

    We present the first secondary eclipse and phase curve observations for the highly eccentric hot Jupiter HAT-P-2b in the 3.6, 4.5, 5.8, and 8.0 ?m bands of the Spitzer Space Telescope. The 3.6 and 4.5 ?m data sets span an ...

  19. COMMUNICATIONS OF THE ACM September 1997/Vol. 40, No. 9 101 hat is a process? A

    E-Print Network [OSTI]

    Fayad, Mohamed

    COMMUNICATIONS OF THE ACM September 1997/Vol. 40, No. 9 101 W hat is a process? A process defines something, generally involving a number of steps or operations." I want to emphasize that a process such that the results are repeat- able by any number of similarly trained individuals following the steps of the process

  20. The Daemon Kernel of the Sun

    E-Print Network [OSTI]

    E. M. Drobyshevski

    2002-05-21T23:59:59.000Z

    The daemon-stimulated proton decay is capable of providing an appreciable part of the Sun luminosity as well as nonelectron flavor component in the solar neutrino flux. This follows (1) from our experiments on detection of negative daemons in Earth-crossing orbits, which give ~1 microsec for the decay time of a daemon-containing proton, and (2) from an estimate of the total number of daemons which could be captured by the Sun from the Galactic disk (up to \\~2.4E30). Because of their huge mass (~3E-5 g), the captured daemons form in the Sun's center a kernel a few cm in size. The protons diffuse into the kernel to decay there with a release of energy. Physically sound estimates of the parameters of the kernel can be obtained if it consists mainly of negative daemons. Proton decay maintains a high temperature of the daemon gas (up to \\~1E11-1E12 K), which makes it physically collisionless and prevents kernel collapse into a black hole.

  1. Choosing a Kernel for Cross-Validation

    E-Print Network [OSTI]

    Savchuk, Olga

    2010-01-14T23:59:59.000Z

    methods of bandwidth selection termed: Indirect cross-validation and Robust one-sided cross- validation. The kernels used in the Indirect cross-validation method yield an improvement in the relative bandwidth rate to n^1=4, which is substantially better...

  2. Nonextensive Entropic Kernels Andre F. T. Martins

    E-Print Network [OSTI]

    Aguiar, Pedro M. Q.

    . Some of these kernels are related to classic infor- mation theoretic quantities, such as mutual information and the Jensen-Shannon diver- gence. Meanwhile, driven by recent advances in Tsallis statistics on Machine Learning, Helsinki, Finland, 2008. Copy- right 2008 by the author(s)/owner(s). approaches that map

  3. Measurements of the Thermal Neutron Scattering Kernel

    E-Print Network [OSTI]

    Danon, Yaron

    Measurements of the Thermal Neutron Scattering Kernel Li (Emily) Liu, Yaron Danon, Bjorn Becker and discussions Problems and Future study Questions #12;3 M. Mattes and J. Keinert, Thermal Neutron Scattering experimental data used was from 1973-1974! M. Mattes and J. Keinert, Thermal Neutron Scattering Data

  4. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  5. The Addictions Program was developed by Medicine Hat College and the University of Lethbridge to prepare graduates who will be skilled in counselling persons who are

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    progress. Please remember that this is only a guide. It should be used in conjunction with the Medicine HatThe Addictions Program was developed by Medicine Hat College and the University of Lethbridge behaviour. The first two years of this four-year program will be offered at Medicine Hat College

  6. New classes of spin chains from $(S\\hat{O}_{(q)}(N)$, $S\\hat{p}_{(q)}(N))$ Temperley-Lieb algebras: Data transmission and (q, N) parametrized entanglement entropies

    E-Print Network [OSTI]

    Amitabha Chakrabarti; Anirban Chakraborti; Esteban Guevara Hidalgo

    2012-04-21T23:59:59.000Z

    A Temperley-Lieb algebra is extracted from the operator structure of a new class of $N^{2}\\times N^{2}$ braid matrices presented and studied in previous papers and designated as $S\\hat{O}_{(q)}(N)$, $S\\hat{p}%_{(q)}(N)$ for the q-deformed orthogonal and symplectic cases respectively. Spin chain Hamiltonians are derived from such braid matrices and the corresponding chains are studied. Time evolutions of the chains and the possibility of transition of data encoded in the parameters of mixed states from one end to the other are analyzed. The entanglement entropies $% S(q,N)$ of eigenstates of the crucial operator, namely the q-dependent $% N^{2}\\times N^{2}$ projector $P_{0}$ appearing in the corresponding Hamiltonian are obtained. Study of entanglements generated under the actions of \\ $S\\hat{O}(N)$, $S\\hat{p}(N)$ braid operators, unitarized with imaginary rapidities is presented as a perspective.

  7. TopHat2: accurate alignment of transcriptomes in the presence of insertions, deletions and gene fusions

    E-Print Network [OSTI]

    Kim, Daehwan; Pertea, Geo; Trapnell, Cole; Pimentel, Harold; Kelley, Ryan; Salzberg, Steven L

    2013-01-01T23:59:59.000Z

    gapped-read alignment with Bowtie 2. Nat Methods 2012, 9:TopHat2 can use either Bowtie [17] or Bowtie2 [15] as itswhen used with the original Bowtie program (a non- Table 1

  8. On admissible memory kernels for random unitary qubit evolution

    E-Print Network [OSTI]

    Filip A. Wudarski; Pawe? Nale?yty; Gniewomir Sarbicki; Dariusz Chru?ci?ski

    2015-04-12T23:59:59.000Z

    We analyze random unitary evolution of the qubit within memory kernel approach. We provide su?cient conditions which guarantee that the corresponding memory kernel generates physically legitimate quantum evolution. Interestingly, we are able to recover several well known examples and generate new classes of nontrivial qubit evolution. Surprisingly, it turns out that quantum evolution with memory kernel generated by our approach gives rise to vanishing non-Markovianity measure based on the distinguishability of quantum states.

  9. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send...

    Broader source: Energy.gov (indexed) [DOE]

    Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM:...

  10. U-175: Linux Kernel KVM Memory Slot Management Flaw

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

  11. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  12. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  13. Nonlinear Multiple Kernel Learning via Mixture of Probabilistic Kernel Discriminant Analysis

    E-Print Network [OSTI]

    Liu, Huan

    .ye@asu.edu Computer Science & Engineering Arizona State University Shipeng Yu shipeng.yu@siemens.com CAD and Knowledge Solutions Siemens Medical Solutions USA, Inc. Huan Liu huan.liu@asu.edu Computer Science & Engineering, and in the transformed space, instances can be better separated. A kernel can be constructed in the transformed space

  14. Extended Kalman Filter Using a Kernel Recursive Least Squares Observer

    E-Print Network [OSTI]

    Slatton, Clint

    Extended Kalman Filter Using a Kernel Recursive Least Squares Observer Pingping Zhu, Badong Chen estimation problem combining the extended Kalman filter (EKF) with a kernel recursive least squares (KRLS Kalman filter, EKF and KRLS algorithms. Results demonstrate that the performance of the EKF

  15. Kernel Density Based Linear Regression Estimate and Zhibiao Zhao

    E-Print Network [OSTI]

    Zhao, Zhibiao

    Kernel Density Based Linear Regression Estimate Weixin Yao and Zhibiao Zhao Abstract For linear regression models with non-normally distributed errors, the least squares estimate (LSE) will lose some words: EM algorithm, Kernel density estimate, Least squares estimate, Linear regression, Maximum

  16. The Kernel Recursive Least Squares Algorithm Yaakov Engel

    E-Print Network [OSTI]

    Meir, Ron

    prediction and channel equalization. Keywords: on-line learning, kernel methods, non-linear regression Experiments 21 5.1 Non-Linear Regression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5 the permission of the authors. #12;Abstract We present a non-linear kernel-based version of the Recursive Least

  17. Customized Kernel Execution on Reconfigurable Hardware for Embedded Applications

    E-Print Network [OSTI]

    Ziavras, Sotirios G.

    is required. This can be facilitated through dynamic adaptation of the silicon resources in reconfigurable reconfiguration overheads can be estimated. Therefore, if the scheduling of time- consuming kernels considers also kernels. Experiments involving EEMBC (EDN Embedded Microprocessor Benchmarking Consortium) and Mi

  18. CDF and Survival Function Estimation with Infinite-Order Kernels

    E-Print Network [OSTI]

    Politis, Dimitris N.

    ) and the survival function is proposed using infinite-order kernels. Fourier transform theory on generalizedCDF and Survival Function Estimation with Infinite-Order Kernels Arthur Berg and Dimitris N sample sizes these estimators can significantly improve the estimation of the CDF and survival function

  19. Scientific Computing Kernels on the Cell Processor

    SciTech Connect (OSTI)

    Williams, Samuel W.; Shalf, John; Oliker, Leonid; Kamil, Shoaib; Husbands, Parry; Yelick, Katherine

    2007-04-04T23:59:59.000Z

    The slowing pace of commodity microprocessor performance improvements combined with ever-increasing chip power demands has become of utmost concern to computational scientists. As a result, the high performance computing community is examining alternative architectures that address the limitations of modern cache-based designs. In this work, we examine the potential of using the recently-released STI Cell processor as a building block for future high-end computing systems. Our work contains several novel contributions. First, we introduce a performance model for Cell and apply it to several key scientific computing kernels: dense matrix multiply, sparse matrix vector multiply, stencil computations, and 1D/2D FFTs. The difficulty of programming Cell, which requires assembly level intrinsics for the best performance, makes this model useful as an initial step in algorithm design and evaluation. Next, we validate the accuracy of our model by comparing results against published hardware results, as well as our own implementations on a 3.2GHz Cell blade. Additionally, we compare Cell performance to benchmarks run on leading superscalar (AMD Opteron), VLIW (Intel Itanium2), and vector (Cray X1E) architectures. Our work also explores several different mappings of the kernels and demonstrates a simple and effective programming model for Cell's unique architecture. Finally, we propose modest microarchitectural modifications that could significantly increase the efficiency of double-precision calculations. Overall results demonstrate the tremendous potential of the Cell architecture for scientific computations in terms of both raw performance and power efficiency.

  20. Chos-Dbyings Rdo-Rje, The Tenth Black Hat Karmapa

    E-Print Network [OSTI]

    Richardson, Hugh Edward

    1987-01-01T23:59:59.000Z

    , in alliance with the Rin-spungs princes, was the most influential figure in Tibet after the eclipse of Phag-mo-gru about 1492; and the Tenth Black Hat, Chos­ dbyings rdorje, in whose time the power of the Karmapa was supplanted by that of the Gelugpa... out on a mountain he quen­ ched it .. by laying on his hands. At the age of eleven he went to Dbus. At Pha-bong Zhabs-chen two of his foot-prints appeared. At the invitation of Tsher-Iung Drung-chen and the Gar-dbang he went to Zur:-mang, he pro­ c...

  1. V-233: Red Hat update for JBoss Fuse | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |Attacks | Department of Energy3: Red Hat

  2. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1: Red Hat

  3. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  4. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  5. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  6. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  7. HATS-3b: AN INFLATED HOT JUPITER TRANSITING AN F-TYPE STAR

    SciTech Connect (OSTI)

    Bayliss, D.; Zhou, G.; Schmidt, B. [Research School of Astronomy and Astrophysics, Australian National University, Canberra, ACT 2611 (Australia); Penev, K.; Bakos, G. Á.; Hartman, J. D.; Csubry, Z. [Department of Astrophysical Sciences, Princeton University, NJ 08544 (United States); Jordán, A.; Suc, V.; Rabus, M.; Brahm, R.; Espinoza, N. [Departamento de Astronomía y Astrofísica, Pontificia Universidad Católica de Chile, Av. Vicuńa Mackenna 4860, 7820436 Macul, Santiago (Chile); Mancini, L.; Mohler-Fischer, M.; Henning, T.; Nikolov, N.; Csák, B. [Max Planck Institute for Astronomy, Heidelberg (Germany); Béky, B.; Noyes, R. W. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA (United States); Buchhave, L., E-mail: daniel@mso.anu.edu.au [Niels Bohr Institute, Copenhagen University (Denmark); and others

    2013-11-01T23:59:59.000Z

    We report the discovery by the HATSouth survey of HATS-3b, a transiting extrasolar planet orbiting a V = 12.4 F dwarf star. HATS-3b has a period of P = 3.5479 days, mass of M{sub p} = 1.07 M {sub J}, and radius of R{sub p} = 1.38 R {sub J}. Given the radius of the planet, the brightness of the host star, and the stellar rotational velocity (vsin i = 9.0 km s{sup –1}), this system will make an interesting target for future observations to measure the Rossiter-McLaughlin effect and determine its spin-orbit alignment. We detail the low-/medium-resolution reconnaissance spectroscopy that we are now using to deal with large numbers of transiting planet candidates produced by the HATSouth survey. We show that this important step in discovering planets produces log g and T {sub eff} parameters at a precision suitable for efficient candidate vetting, as well as efficiently identifying stellar mass eclipsing binaries with radial velocity semi-amplitudes as low as 1 km s{sup –1}.

  8. Radiologic characterization of the Mexican Hat, Utah, uranium mill tailings remedial action site: Appendix D, Addenda D1--D7

    SciTech Connect (OSTI)

    Ludlam, J.R.

    1985-01-01T23:59:59.000Z

    This radiologic characterization of the inactive uranium millsite at Mexican Hat, Utah, was conducted by Bendix Field Engineering Corporation foe the US Department of Energy (DOE), Grand Junction Project Office, in response to and in accord with a Statement of Work prepared by the DOE Uranium Mill tailings Remedial Action Project (UMTRAP) Technical Assistance Contractor, Jacobs Engineering Group, Inc. the objective of this project was to determine the horizontal and vertical extent of contamination that exceeds the US Environmental Protection Agency (EPA) standards at the Mexican Hat site. The data presented in this report are required for characterization of the areas adjacent to the Mexican Hat tailings piles and for the subsequent design of cleanup activities. Some on-pile sampling was required to determine the depth of the 15-pCi/g Ra-226 interface in an area where wind and water erosion has taken place.

  9. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  13. Final audit report of remedial action construction at the UMTRA Project Mexican Hat, Utah -- Monument Valley, Arizona, sites

    SciTech Connect (OSTI)

    NONE

    1995-10-01T23:59:59.000Z

    The final audit report for remedial action at the Mexican Hat, Utah, Monument Valley, Arizona, Uranium Mill Tailings Remedial Action (UMTRA) Project sites consists of a summary of the radiological surveillances/audits, quality assurance (QA) in-process surveillances, and QA remedial action close-out inspections performed by the US Department of Energy (DOE) and the Technical Assistance Contractor (TAC); on-site construction reviews (OSCR) performed by the US Nuclear Regulatory Commission (NRC); and a surveillance performed by the Navajo Nation. This report refers to remedial action activities performed at the Mexican Hat, Utah--Monument Valley, Arizona, Uranium Mill Tailings Remedial Action (UMTRA) Project sites.

  14. Classification using Intersection Kernel Support Vector Machines is Efficient Subhransu Maji

    E-Print Network [OSTI]

    O'Brien, James F.

    Classification using Intersection Kernel Support Vector Machines is Efficient Subhransu Maji EECS classification using kernelized SVMs re- quires evaluating the kernel for a test vector and each of the support vectors. For a class of kernels we show that one can do this much more efficiently. In particular we show

  15. HIGHER WILD KERNELS AND DIVISIBILITY IN THE K-THEORY OF NUMBER FIELDS

    E-Print Network [OSTI]

    Weibel, Charles

    HIGHER WILD KERNELS AND DIVISIBILITY IN THE K, 2004 Abstract. The higher wild kernels are finite subgroups of the even K-group* *s of a number field F, generalizing Tate's wild kernel for K2. Each wild kernel contains* * the subgroup

  16. HIGHER WILD KERNELS AND DIVISIBILITY IN THE K-THEORY OF NUMBER FIELDS

    E-Print Network [OSTI]

    HIGHER WILD KERNELS AND DIVISIBILITY IN THE K-THEORY OF NUMBER FIELDS C. Weibel July 15, 2004 Abstract. The higher wild kernels are #12;nite subgroups of the even K-groups of a number #12;eld F , generalizing Tate's wild kernel for K2 . Each wild kernel contains the subgroup of divisible elements

  17. Future Trends in Secure Chip Data Management Nicolas Anciaux, Luc Bouganim and Philippe Pucheral

    E-Print Network [OSTI]

    of scaling down database techniques for the smart card and proposed the design of a DBMS kernel called PicoDBMS. This paper summarizes the learning obtained during an extensive performance analysis of PicoDBMS. Then it studies to which extent secure chips hardware evolution should impact the design of embedded data

  18. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  19. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  20. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  1. MA699: Stochastic Taylor expansions and heat kernel asymptotics

    E-Print Network [OSTI]

    2011-01-17T23:59:59.000Z

    Jan 17, 2011 ... where p : (0,+?) × Rn × Rn ? R is a smooth function that is called the heat kernel ... Theorem 2.1 Let us assume that b and ? are smooth, and that their ..... [

  2. KALMAN FILTERING IN REPRODUCING KERNEL HILBERT SPACES PINGPING ZHU

    E-Print Network [OSTI]

    Slatton, Clint

    KALMAN FILTERING IN REPRODUCING KERNEL HILBERT SPACES By PINGPING ZHU A DISSERTATION PRESENTED.1.1 Bayesian Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.1.2 Kalman Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.1.3 Nonlinear Kalman Filter . . . . . . . . . . . . . . . . . . . . . . . . 19 2.1.3.1 Extended

  3. Green's kernels for transmission problems in bodies with small inclusions

    E-Print Network [OSTI]

    Vladimir Maz'ya; Alexander Movchan; Michael Nieves

    2010-05-24T23:59:59.000Z

    The uniform asymptotic approximation of Green's kernel for the transmission problem of antiplane shear is obtained for domains with small inclusions. The remainder estimates are provided. Numerical simulations are presented to illustrate the effectiveness of the approach.

  4. Highly Sparse Reductions to Kernel Spectral Raghvendra Mall1

    E-Print Network [OSTI]

    the traditional k-means techniques. A new spectral clus- tering algorithm based on weighted kernel principal in comparison to the data between clusters. Spectral clustering methods [1,2,3] are generally better than

  5. Kernels for Feedback Arc Set In Tournaments Stephane Bessy

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Kernels for Feedback Arc Set In Tournaments St´ephane Bessy Fedor V. Fomin Serge Gaspers Christophe´e de Montpellier 2, CNRS, 161 rue Ada, 34392 Montpellier, France. {bessy

  6. complexity of the classical kernel functions of potential theory

    E-Print Network [OSTI]

    1998-08-27T23:59:59.000Z

    1991 Mathematics Subject Classification. ...... It is a simple exercise using the argument principle that the ... off the following facts (keep in mind that wk is close to An ? ?n). ...... excellent strategy for computing the Poisson kernel efficiently.

  7. Hereditary kernel identification method of nonlinear polymeric viscoelastic materials

    E-Print Network [OSTI]

    Olodo Emmanuel; Villevo Adanhounme; Mahouton Norbert Hounkonnou

    2012-12-26T23:59:59.000Z

    This paper deals with a polymeric matrix composite material. The matrix behaviour is described by the modified Rabotnov's nonlinear viscoelastic model assuming the material is nonlinear viscoelastic. The parameters of creep and stress-relaxation kernels of the model are determined. From the experimental data related to kernels approximated by spline functions and by means of the method of weighted residual, the formulas for the determination of viscoelastic parameters are derived.

  8. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  9. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  12. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  13. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  14. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  15. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  16. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  18. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  19. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  20. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  2. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  3. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  4. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  5. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  6. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  7. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  9. TCX Project: High Assurance for Secure Embedded Systems Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    : 1) high assurance life cycle framework and 2) high assurance rapid development environment (HARDE security safeguards are part of the high assurance life cycle framework. #12;The TCX development for use in simple embedded systems. To guide the kernel development, we have created a reusable high

  10. Kernel density estimation of a multidimensional efficiency profile

    E-Print Network [OSTI]

    Anton Poluektov

    2014-11-20T23:59:59.000Z

    Kernel density estimation is a convenient way to estimate the probability density of a distribution given the sample of data points. However, it has certain drawbacks: proper description of the density using narrow kernels needs large data samples, whereas if the kernel width is large, boundaries and narrow structures tend to be smeared. Here, an approach to correct for such effects, is proposed that uses an approximate density to describe narrow structures and boundaries. The approach is shown to be well suited for the description of the efficiency shape over a multidimensional phase space in a typical particle physics analysis. An example is given for the five-dimensional phase space of the $\\Lambda_b^0\\to D^0p\\pi$ decay.

  11. U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability PLATFORM: Linux Kernel 3.2.x ABSTRACT: The Linux kernel is prone to a remote denial-of-service vulnerability. reference LINKS: Secunia Advisory SA50081 Bugtraq ID:...

  12. The Robust Classification of Hyperspectral Images Using Adaptive Wavelet Kernel Support Vector Data Description

    E-Print Network [OSTI]

    Kollegala, Revathi

    2012-07-16T23:59:59.000Z

    of wavelet functions as kernels with Support Vector Data Description for target detection in hyperspectral images. Specifically, it proposes the Adaptive Wavelet Kernel Support Vector Data Description (AWK-SVDD) that learns the optimal wavelet function...

  13. Spherical Top-Hat Collapse of Viscous Modified Chaplygin Gas in Einstein's Gravity and Loop Quantum Cosmology

    E-Print Network [OSTI]

    Ujjal Debnath; Mubasher Jamil

    2015-01-03T23:59:59.000Z

    In this work, we focus on the collapse of a spherically symmetric perturbation, with a classical top-hat profile, to study the nonlinear evolution of only viscous modified Chaplygin gas (VMCG) perturbations in Einstein's gravity as well as in loop quantum Cosmology (LQC). In the perturbed region, we have investigated the natures of equation of state parameter, square speed of sound and another perturbed quantities. The results have been analyzed by numerical and graphical investigations.

  14. Representations of the LL BFKL Kernel and the Bootstrap

    E-Print Network [OSTI]

    G. P. Vacca

    2005-09-20T23:59:59.000Z

    Different forms of the BFKL kernel both in coordinate and momentum representations may appear as a result of different gauge choices and/or inner scalar products of the color singlet states. We study a spectral representation of the BFKL kernel not defined on the Moebius space of functions but on a deformation of it, which provides the usual bootstrap property due to gluon reggeization. In this space the corresponding symmetry is made explicit introducing a deformed realization of the sl(2,C) algebra.

  15. Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Appendix E. Final report

    SciTech Connect (OSTI)

    NONE

    1988-07-01T23:59:59.000Z

    This document provides Appendix E of the Remedial Action Plan (RAP) presented in 1988 for the stabilization of the inactive uranium mill tailings at the Mexican Hat, Utah site. The RAP was developed to serve a two- fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley, Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by the DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. The RAP has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action.

  16. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  17. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  18. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  19. A Kalman-Particle Kernel Filter and its Application to Terrain Navigation

    E-Print Network [OSTI]

    Del Moral , Pierre

    A Kalman-Particle Kernel Filter and its Application to Terrain Navigation Dinh-Tuan Pham.musso@onera.fr Abstract ­ A new nonlinear filter, the Kalman- Particle Kernel Filter (KPKF) is proposed. Compared. Keywords: Kalman filter, kernel density estimator, regularized particle filter, Inertial navigation System

  20. Feature Preserving Point Set Surfaces based on Non-Linear Kernel Regression

    E-Print Network [OSTI]

    Kazhdan, Michael

    Feature Preserving Point Set Surfaces based on Non-Linear Kernel Regression A. C. Öztireli, G IMLS in terms of Local Kernel Regression (LKR) · Borrowing ideas from robust statistics · Advantages to Implement · Competitive performance #12;Local Kernel Regression · Taylor expansion around the evaluation

  1. Sparse Kernel Orthonormalized PLS for feature extraction in large data sets

    E-Print Network [OSTI]

    Sparse Kernel Orthonormalized PLS for feature extraction in large data sets Anonymous Author a novel multivariate analysis method for large scale problems. Our scheme is based on a novel kernel strong expressive power even with rather few features, is clearly outperforming the ordinary kernel PLS

  2. Kernel k-means, Spectral Clustering and Normalized Cuts Inderjit S. Dhillon

    E-Print Network [OSTI]

    Ghosh, Joydeep

    Kernel k-means, Spectral Clustering and Normalized Cuts Inderjit S. Dhillon Dept. of Computer. of Computer Sciences University of Texas at Austin Austin, TX 78712 kulis@cs.utexas.edu ABSTRACT Kernel k-means an ex- plicit theoretical connection between them. We show the generality of the weighted kernel k-means

  3. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  4. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  5. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  6. Improving the Energy Efficiency of the MANTIS Kernel

    E-Print Network [OSTI]

    Sreenan, Cormac J.

    Improving the Energy Efficiency of the MANTIS Kernel Cormac Duffy1 , Utz Roedig2 , John Herbert1. The event-based TinyOS is more energy efficient than the multi-threaded MANTIS system. However, MANTIS, timeliness can be traded for energy efficiency by choosing the appropriate operating system. In this paper we

  7. A Kernel Method for Market Clearing Sebastien Lahaie

    E-Print Network [OSTI]

    Sandholm, Tuomas W.

    linear prices do not suffice. We first present a procedure that, given a sample of values and costs nonlinear clearing prices with much less than full revelation of values and costs. When the kernel function that, given a sample of values and costs for a set of bundles, computes nonlinear clearing prices using

  8. FAST SPEAKER ADAPTION VIA MAXIMUM PENALIZED LIKELIHOOD KERNEL REGRESSION

    E-Print Network [OSTI]

    Tsang Wai Hung "Ivor"

    of MLLR using non- linear regression. Specifically, kernel regression is applied with appropriate of Science and Technology Clear Water Bay, Hong Kong ABSTRACT Maximum likelihood linear regression (MLLR) has], and transformation-based methods, most notably, maximum likelihood linear regression (MLLR) adap- tation [3]. However

  9. Optical transformation from chirplet to fractional Fourier transformation kernel

    E-Print Network [OSTI]

    Hong-yi Fan; Li-yun Hu

    2009-02-11T23:59:59.000Z

    We find a new integration transformation which can convert a chirplet function to fractional Fourier transformation kernel, this new transformation is invertible and obeys Parseval theorem. Under this transformation a new relationship between a phase space function and its Weyl-Wigner quantum correspondence operator is revealed.

  10. Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid

    E-Print Network [OSTI]

    Qiu, Robert Caiming

    Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid Zhe Chen and Robert C. Qiu@ieee.org, rqiu@tntech.edu Abstract--State estimation plays an important role in the smart grid. Conventionally, noisy measurements are directly used for state estimation. Today, in the context of the smart grid

  11. Wavelet Kernel Learning F. Yger and A. Rakotomamonjy1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Wavelet Kernel Learning F. Yger and A. Rakotomamonjy1 Universit´e de Rouen, LITIS EA 4108, 76800 from a wavelet representation. Our work aims at building features by selecting wavelet coefficients resulting from signal or image decomposition on a adapted wavelet basis. For this purpose, we jointly learn

  12. Kernel spectral clustering for predicting maintenance of industrial machines

    E-Print Network [OSTI]

    to deal with sensory faults have been used [1],[2],[3]: corrective maintenance, preventive maintenance the machine fails, it is expensive and safety and environment issues arise. Preventive maintenance is basedKernel spectral clustering for predicting maintenance of industrial machines Rocco Langone1, Carlos

  13. Kernel Methods for Melanoma Recognition Elisabetta LA TORREa,1

    E-Print Network [OSTI]

    Caputo, Barbara

    Kernel Methods for Melanoma Recognition Elisabetta LA TORREa,1 , Tatiana TOMMASIa , Barbara CAPUTOb for computer assisted diagnosis of melanomas. The first is the support vector machines algorithm, a state a sophisticated segmentation technique and a set of features especially designed for melanoma recognition. To our

  14. Melanoma Recognition Using Representative and Discriminative Kernel Classifiers

    E-Print Network [OSTI]

    Caputo, Barbara

    Melanoma Recognition Using Representative and Discriminative Kernel Classifiers Tatiana Tommasi1 caputo@nada.kth.se Abstract. Malignant melanoma is the most deadly form of skin lesion. Early diagnosis these algorithms against the (to our knowledge) state-of-the-art method on melanoma recognition, exploring how

  15. PERI - Auto-tuning Memory Intensive Kernels for Multicore

    SciTech Connect (OSTI)

    Bailey, David H; Williams, Samuel; Datta, Kaushik; Carter, Jonathan; Oliker, Leonid; Shalf, John; Yelick, Katherine; Bailey, David H

    2008-06-24T23:59:59.000Z

    We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of search-based performance optimizations, popular in linear algebra and FFT libraries, to application-specific computational kernels. Our work applies this strategy to Sparse Matrix Vector Multiplication (SpMV), the explicit heat equation PDE on a regular grid (Stencil), and a lattice Boltzmann application (LBMHD). We explore one of the broadest sets of multicore architectures in the HPC literature, including the Intel Xeon Clovertown, AMD Opteron Barcelona, Sun Victoria Falls, and the Sony-Toshiba-IBM (STI) Cell. Rather than hand-tuning each kernel for each system, we develop a code generator for each kernel that allows us to identify a highly optimized version for each platform, while amortizing the human programming effort. Results show that our auto-tuned kernel applications often achieve a better than 4X improvement compared with the original code. Additionally, we analyze a Roofline performance model for each platform to reveal hardware bottlenecks and software challenges for future multicore systems and applications.

  16. Analysis with Kernel Density Estimation University of Michigan / HERMES Collaboration

    E-Print Network [OSTI]

    Analysis with Kernel Density Estimation S. Gliske University of Michigan / HERMES Collaboration Transverse Parton Structure of the Hadron Yerevan, Armenia 25 June, 2009 Gliske (HERMES / Michigan) Analysis/Smearing Effects SIDIS cos(n) Conclusion Gliske (HERMES / Michigan) Analysis with KDEs TPSH `09 2 / 24 #12

  17. ASYMPTOTIC PROPERTIES OF THE HEAT KERNEL ON CONIC MANIFOLDS

    E-Print Network [OSTI]

    Loya, Paul

    ASYMPTOTIC PROPERTIES OF THE HEAT KERNEL ON CONIC MANIFOLDS PAUL LOYA Abstract. We derive Foundation Fellowship. 1 #12; 2 PAUL LOYA Trace expansions of cone operators has a long history stemming from on conic manifolds; see for instance, Callias [5], Cheeger [7], Chou [9], BrË?uning--Seeley [3], Br

  18. Reproducing kernel element method Part III: Generalized enrichment and applications

    E-Print Network [OSTI]

    Li, Shaofan

    Reproducing kernel element method Part III: Generalized enrichment and applications Hongsheng Lu enrichment is proposed to construct the global partition polynomials or to enrich global partition polynomial. This is accomplished by either multiplying enrichment functions with the original global partition poly- nomials

  19. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  20. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  1. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  2. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  3. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  4. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  5. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  6. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  7. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  8. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  9. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  10. Positive curvature property for some hypoelliptic heat kernels

    E-Print Network [OSTI]

    Qian, Bin

    2010-01-01T23:59:59.000Z

    In this note, we look at some hypoelliptic operators arising from nilpotent rank 2 Lie algebras. In particular, we concentrate on the diffusion generated by three Brownian motions and their three L\\'evy areas, which is the simplest extension of the Laplacian on the Heisenberg group $\\mathbb{H}$. In order to study contraction properties of the heat kernel, we show that, as in the case of the Heisenberg group, the restriction of the sub-Laplace operator acting on radial functions (which are defined in some precise way in the core of the paper) satisfies a non negative Ricci curvature condition (more precisely a $CD(0, \\infty)$ inequality), whereas the operator itself does not satisfy any $CD(r,\\infty)$ inequality. From this we may deduce some useful, sharp gradient bounds for the associated heat kernel.

  11. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft Security Bulletin Advance NotificationFlaw

  12. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  13. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  14. Reserves determination using type-curve matching and EMB methods in the Medicine Hat shallow gas field

    SciTech Connect (OSTI)

    West, S.L. [Imperial Oil Resources Ltd., Calgary, Alberta (Canada); Cochrane, P.J.R. [Imperial Oil Resources Ltd., Cold Lake, Alberta (Canada)

    1995-05-01T23:59:59.000Z

    Tight, shallow gas reservoirs in the Western Canada basin present a number of unique challenges in determining reserves accurately. Traditional methods such as decline analysis and material balance are inaccurate owing to the formation`s low permeabilities and poor pressure data. The low permeabilities cause long transient periods that are not separated easily from production decline with conventional decline analysis, resulting in lower confidence in selecting the appropriate decline characteristics (exponential or harmonic), which effects recovery factors and remaining reserves significantly. Limited, poor-quality pressure data and commingled production from the three producing zones results in nonrepresentative pressure data and hence inaccurate material-balance analysis. This paper presents two new methods of reserve evaluation that address the problems described above for tight, shallow gas in the Medicine Hat field. The first method applies type-curve matching, which combines the analytical pressure solutions of the diffusivity equation (transient) with the empirical decline equation. The second method is an extended material balance (EMB), which incorporates the gas deliverability theory to allow selection of appropriate p/z derivatives without relying on pressure data. Excellent results were obtained when these two methods were applied to 10 properties that gather gas from 2,300 wells. The two independent techniques resulted in similar production forecasts and reserves, confirming their validity. They proved to be valuable, practical tools in overcoming the various challenges of tight, shallow gas and in improving the accuracy in gas-reserves determination in the Medicine Hat field.

  15. ANALYSIS OF SPIN-ORBIT ALIGNMENT IN THE WASP-32, WASP-38, AND HAT-P-27/WASP-40 SYSTEMS

    SciTech Connect (OSTI)

    Brown, D. J. A.; Collier Cameron, A.; Enoch, B.; Miller, G. R. M. [SUPA, School of Physics and Astronomy, University of St Andrews, North Haugh, St Andrews, Fife KY16 9SS (United Kingdom); Diaz, R. F. [LAM (Laboratoire d'Astrophysique de Marseille), Aix Marseille Universite, CNRS, UMR 7326, F-13388 Marseille (France); Doyle, A. P.; Smalley, B.; Anderson, D. R.; Hellier, C.; Maxted, P. F. L. [Astrophysics Group, School of Physical and Geographical Sciences, Lennard-Jones Building, Keele University, Staffordshire ST5 5BG (United Kingdom); Gillon, M. [Institut d'Astrophysique et de Geophysique, Universite de Liege, Allee du 6 Aout, 17 (Bat. B5C) Sart Tilman, B-4000 Liege (Belgium); Lendl, M.; Triaud, A. H. M. J.; Queloz, D. [Observatoire Astronomique de l'Universite de Geneve, 51 Chemin des Maillettes, CH-1290 Sauverny (Switzerland); Pollacco, D. [Astrophysics Research Centre, School of Mathematics and Physics, Queen's University, University Road, Belfast BT7 1NN (United Kingdom); Boisse, I. [Centro de Astrofisica, Universidade do Porto, Rua das Estrelas, 4150-762 Porto (Portugal); Hebrard, G., E-mail: djab@st-andrews.ac.uk [Institut dAstrophysique de Paris, UMR7095 CNRS, Universite Pierre and Marie Curie, 98bis boulevard Arago, F-75014 Paris (France)

    2012-12-01T23:59:59.000Z

    We present measurements of the spin-orbit alignment angle, {lambda}, for the hot Jupiter systems WASP-32, WASP-38, and HAT-P-27/WASP-40, based on data obtained using the HARPS spectrograph. We analyze the Rossiter-McLaughlin effect for all three systems and also carry out Doppler tomography for WASP-32 and WASP-38. We find that WASP-32 (T {sub eff} = 6140{sup +90} {sub -100} K) is aligned, with an alignment angle of {lambda} = 10.{sup 0}5{sup +6.4} {sub -6.5} obtained through tomography, and that WASP-38 (T {sub eff} = 6180{sup +40} {sub -60} K) is also aligned, with tomographic analysis yielding {lambda} = 7.{sup 0}5{sup +4.7} {sub -6.1}. The latter result provides an order-of-magnitude improvement in the uncertainty in {lambda} compared to the previous analysis of Simpson et al. We are only able to loosely constrain the angle for HAT-P-27/WASP-40 (T{sub eff} = 5190{sup +160} {sub -170} K) to {lambda} = 24.{sup 0}2{sup +76.0}{sub -44.5}, owing to the poor signal-to-noise ratio of our data. We consider this result a non-detection under a slightly updated version of the alignment test of Brown et al. We place our results in the context of the full sample of spin-orbit alignment measurements, finding that they provide further support for previously established trends.

  16. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  17. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  18. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  19. Kernel-Correlated Levy Field Driven Forward Rate and Application to Derivative Pricing

    SciTech Connect (OSTI)

    Bo Lijun [Xidian University, Department of Mathematics (China); Wang Yongjin [Nankai University, School of Business (China); Yang Xuewei, E-mail: xwyangnk@yahoo.com.cn [Nanjing University, School of Management and Engineering (China)

    2013-08-01T23:59:59.000Z

    We propose a term structure of forward rates driven by a kernel-correlated Levy random field under the HJM framework. The kernel-correlated Levy random field is composed of a kernel-correlated Gaussian random field and a centered Poisson random measure. We shall give a criterion to preclude arbitrage under the risk-neutral pricing measure. As applications, an interest rate derivative with general payoff functional is priced under this pricing measure.

  20. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  1. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  2. Reuse and Refactoring of GPU Kernels to Design Complex Applications Santonu Sarkar, Sayantan Mitra, Ashok Srinivasan

    E-Print Network [OSTI]

    Srinivasan, Ashok

    Reuse and Refactoring of GPU Kernels to Design Complex Applications Santonu Sarkar, Sayantan Mitra, Ashok Srinivasan Infosys Labs, Infosys Ltd. Bangalore 560100, India Email: {santonu sarkar01,sayantan

  3. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  4. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  5. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  6. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  7. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  8. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  9. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  10. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  11. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  12. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  13. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  14. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  15. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  16. Kernel-based distance metric learning for microarray data classification

    E-Print Network [OSTI]

    Xiong, Huilin; Chen, Xue-wen

    2006-06-01T23:59:59.000Z

    the test data. We only consider Gaussian kernel function in the proposed and SVM algorithms. 1. ALL-AML Leukemia Data: This data set, taken from the website [17], contains 72 samples of human acute leuke- mia. 47 samples belong to acute lymphoblastic... lymphoblastic leukemia (ALL), 20 of them to mixed line- age leukemia (MLL), a subset of human acute leukemia with a chromosomal translocation, and 28 of the samples are acute myelogenous leukemia (AML). Each sample gives the expression levels of 12582 genes...

  17. Functional inverse regression and reproducing kernel Hilbert space 

    E-Print Network [OSTI]

    Ren, Haobo

    2006-10-30T23:59:59.000Z

    and Reproducing Kernel Hilbert Space. (August 2005) Haobo Ren, B.S., Peking University; M.S., Peking University Chair of Advisory Committee: Dr. Tailen Hsing The basic philosophy of Functional Data Analysis (FDA) is to think of the observed data functions... component analysis of ? . Duan and Li (1991) and Li (1997) presented more delicate results for analyzing single- index regression by SIR, Hsing and Carroll (1992) and Zhu and Ng (1995) derived the large sample properties of SIR based on ?-delta, Chen and Li...

  18. Operation of Faddeev-Kernel in Configuration Space

    E-Print Network [OSTI]

    S. Ishikawa

    2007-01-16T23:59:59.000Z

    We present a practical method to solve Faddeev three-body equations at energies above three-body breakup threshold as integral equations in coordinate space. This is an extension of previously used method for bound states and scattering states below three-body breakup threshold energy. We show that breakup components in three-body reactions produce long-range effects on Faddeev integral kernels in coordinate space, and propose numerical procedures to treat these effects. Using these techniques, we solve Faddeev equations for neutron-deuteron scattering to compare with benchmark solutions.

  19. Functional inverse regression and reproducing kernel Hilbert space

    E-Print Network [OSTI]

    Ren, Haobo

    2006-10-30T23:59:59.000Z

    , such that the denominator in (3.2) is not zero. Property III.9. Let T be finite, and let the matrix determined by kernel K is nonsingu- lar. Then universalf, g element H(K, T): bardblfbardbl2K = summation t,selementT f(t) f(s)K-1(t, s), angbracketleft f, gangbracketright... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.3 RKHS with Applications in Probability and Statistics . . . . . . 13 III A FUNCTIONAL MULTIPLE-INDEX MODEL . . . . . . . . . . 15 3.1 A Second Order Multiple-Index Model . . . . . . . . . . . . . 15 3.2 Some Facts of RKHS...

  20. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  1. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  2. On ascertaining inductively the dimension of the joint kernel of certain commuting linear operators

    E-Print Network [OSTI]

    Shen, Zuowei

    On ascertaining inductively the dimension of the joint kernel of certain commuting linear operators), and a collection f`xgx2X of commuting linear maps on some linear space, the family of linear operators whose joint DMS-9000053, DMS-9102857. i #12;proposed running head: dimension of joint kernels Proofs should

  3. JKernelMachines: A Simple Framework for Kernel Machines David Picard PICARD@ENSEA.FR

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . Description of the Library The backbone of the library is the definition of data types and kernels. In order to use any type of input space, the library makes heavy use o, France Editor: Abstract JKernelMachines is a Java library for learning with kernels. It is primarily

  4. Parameter-insensitive kernel in extreme learning for non-linear support vector regression

    E-Print Network [OSTI]

    Verleysen, Michel

    Parameter-insensitive kernel in extreme learning for non-linear support vector regression Beno for regression which uses the e-sensitive loss and produces sparse models. However, non-linear SVRs are difficult.g. [2­4]). Used in conjunction with kernels, SVRs are powerful non-linear models for regression which

  5. Kernel Regression with Order Preferences Xiaojin Zhu and Andrew B. Goldberg

    E-Print Network [OSTI]

    Zhu, Xiaojin "Jerry"

    such knowledge as positive correlation can be difficult in non-linear kernel regression, because of the non-linear, but the exact re- lation is highly non-linear and unknown. We can, however, easily create order preferencesKernel Regression with Order Preferences Xiaojin Zhu and Andrew B. Goldberg Department of Computer

  6. ccsd-00085858,version1-16Jul2006 SUPERCONNECTION AND FAMILY BERGMAN KERNELS

    E-Print Network [OSTI]

    Boyer, Edmond

    ccsd-00085858,version1-16Jul2006 SUPERCONNECTION AND FAMILY BERGMAN KERNELS XIAONAN MA AND WEIPING is to use the superconnection as in the local family index theorem. Superconnexion et noyaux de Bergman en;SUPERCONNECTION AND FAMILY BERGMAN KERNELS 3 Let T 2 (T RW) TRX be the tensor defined in the following way

  7. Random Features for Large-Scale Kernel Machines Intel Research Seattle

    E-Print Network [OSTI]

    Kim, Tae-Kyun

    Random Features for Large-Scale Kernel Machines Ali Rahimi Intel Research Seattle Seattle, WA 98105 products of the transformed data are approximately equal to those in the feature space of a user specified on their ability to approximate various radial basis kernels, and show that in large-scale classification

  8. Hash-SVM: Scalable Kernel Machines for Large-Scale Visual Classification , Shih-Fu Chang

    E-Print Network [OSTI]

    Chang, Shih-Fu

    Hash-SVM: Scalable Kernel Machines for Large-Scale Visual Classification Yadong Mu , Gang Hua , Wei the efficiency of non-linear kernel SVM in very large scale visual classification prob- lems. Our key idea be transformed into solving a linear SVM over the hash bits. The proposed Hash-SVM enjoys dramatic storage cost

  9. An improved ECG-Derived Respiration Method using Kernel Principal Component Analysis

    E-Print Network [OSTI]

    ) of heart beats generates well-performing ECG- derived respiratory signals (EDR). This study aims at im- proving the performance of EDR signals using kernel PCA (kPCA). Kernel PCA is a generalization of PCA and kPCA is eval- uated by comparing the EDR signals to the reference res- piratory signal. Correlation

  10. Application of Kernel Principal Component Analysis for Single Lead ECG-Derived Respiration

    E-Print Network [OSTI]

    signal from ECGs. In this study, an improved ECG-derived respiration (EDR) algorithm based on kernel PCA function (RBF) kernel performs the best when deriving EDR signals. Further improvement is carried outPCA is assessed by comparing the EDR signals to a reference respiratory signal, using the correlation

  11. HW Componentizing Kernel: A New Approach to address the Mega Complexity of Future Automotive CPS

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    HW Componentizing Kernel: A New Approach to address the Mega Complexity of Future Automotive CPS of CPS (Cyber Physical System). However, current software development process in the automotive industry automotive software devel- opment process in the perspective of CPS and proposes a new kernel-based approach

  12. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  13. TORCH Computational Reference Kernels - A Testbed for Computer Science Research

    SciTech Connect (OSTI)

    Kaiser, Alex; Williams, Samuel Webb; Madduri, Kamesh; Ibrahim, Khaled; Bailey, David H.; Demmel, James W.; Strohmaier, Erich

    2010-12-02T23:59:59.000Z

    For decades, computer scientists have sought guidance on how to evolve architectures, languages, and programming models in order to improve application performance, efficiency, and productivity. Unfortunately, without overarching advice about future directions in these areas, individual guidance is inferred from the existing software/hardware ecosystem, and each discipline often conducts their research independently assuming all other technologies remain fixed. In today's rapidly evolving world of on-chip parallelism, isolated and iterative improvements to performance may miss superior solutions in the same way gradient descent optimization techniques may get stuck in local minima. To combat this, we present TORCH: A Testbed for Optimization ResearCH. These computational reference kernels define the core problems of interest in scientific computing without mandating a specific language, algorithm, programming model, or implementation. To compliment the kernel (problem) definitions, we provide a set of algorithmically-expressed verification tests that can be used to verify a hardware/software co-designed solution produces an acceptable answer. Finally, to provide some illumination as to how researchers have implemented solutions to these problems in the past, we provide a set of reference implementations in C and MATLAB.

  14. Towards Optimal and Expressive Kernelization for d-Hitting Set

    E-Print Network [OSTI]

    van Bevern, René

    2011-01-01T23:59:59.000Z

    A sunflower in a hypergraph is a set of hyperedges pairwise intersecting in exactly the same vertex set. Sunflowers are a useful tool in polynomial-time data reduction for problems formalizable as d-Hitting Set, the problem of covering all hyperedges (of cardinality at most d) of a hypergraph by at most k vertices. Additionally, in fault diagnosis, sunflowers yield concise explanations for "highly defective structures". We provide a linear-time algorithm that, by finding sunflowers, transforms an instance of d-Hitting Set into an equivalent instance comprising at most O(k^d) hyperedges and vertices. In terms of parameterized complexity theory, we show a problem kernel with asymptotically optimal size (unless coNP in NP/poly). We show that the number of vertices can be reduced to O(k^(d-1)) with additional processing in O(k^(1.5d)) time---nontrivially combining the sunflower technique with a known problem kernel that uses crown reductions.

  15. Jitk: A Trustworthy In-Kernel Interpreter Infrastructure Xi Wang, David Lazar, Nickolai Zeldovich, Adam Chlipala, Zachary Tatlock

    E-Print Network [OSTI]

    Chlipala, Adam

    ]. Interpreters are also used outside of kernels, such as in Bitcoin's transaction scripting [2]. As an example

  16. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  17. A Unified View of Kernel k-means, Spectral Clustering and Graph Inderjit Dhillon, Yuqiang Guan and Brian Kulis

    E-Print Network [OSTI]

    A Unified View of Kernel k-means, Spectral Clustering and Graph Cuts Inderjit Dhillon, Yuqiang Guan proposed to handle data that is not linearly separable. Spectral clustering and kernel k-means are two such methods that are seemingly quite different. In this paper, we show that a general weighted kernel k-means

  18. Unsupervised Change Detection by Kernel Clustering Michele Volpia, Devis Tuia a,b, Gustavo Camps-Vallsb and Mikhail Kanevskia

    E-Print Network [OSTI]

    Camps-Valls, Gustavo

    boundaries to the change detection problem by exploiting a kernel-based clustering algorithm. The kernel k-means imagery prove the consistency of the proposed approach. Keywords: Unsupervised change detection, Kernel k-means An example is the algorithmic comparison of the scale invariant Mahalanobis distance between the pixels

  19. Figure 1. Block diagram of the turbo decoder. A Memory-Reduced Log-MAP Kernel for Turbo Decoder

    E-Print Network [OSTI]

    Hung, Shih-Hao

    Figure 1. Block diagram of the turbo decoder. A Memory-Reduced Log-MAP Kernel for Turbo Decoder--Generally, the Log-MAP kernel of the turbo decoding consume large memories in hardware implement- tation of the turbo decoder is implemented to verify the proposed memory-reduced Log- MAP kernel in 3.04Ă?3.04mm2 core

  20. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  1. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  2. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  3. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  4. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  5. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  6. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  7. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  8. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  9. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  10. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  11. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  12. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  13. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  14. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  15. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  16. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  17. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  18. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  19. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  20. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  1. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  2. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  3. Deformed Spectral Representation of the BFKL Kernel and the Bootstrap for Gluon Reggeization

    E-Print Network [OSTI]

    J. bartels; L. N. Lipatov; M. Salvadore; G. P. Vacca

    2005-06-23T23:59:59.000Z

    We investigate the space of functions in which the BFKL kernel acts. For the amplitudes which describe the scattering of colorless projectiles it is convenient to define, in transverse coordinates, the Moebius space in which the solutions to the BFKL equation vanish as the coordinates of the two reggeized gluons coincide. However, in order to fulfill the bootstrap relation for the BFKL kernel it is necessary to modify the space of functions. We define and investigate a new space of functions and show explicitly that the bootstrap relation is valid for the corresponding spectral form of the kernel. We calculate the generators of the resulting deformed representation of the sl(2,C) algebra.

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  5. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  6. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  7. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  9. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  10. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  11. A computational method for solving stochastic Itô–Volterra integral equations based on stochastic operational matrix for generalized hat basis functions

    SciTech Connect (OSTI)

    Heydari, M.H., E-mail: heydari@stu.yazd.ac.ir [Faculty of Mathematics, Yazd University, Yazd (Iran, Islamic Republic of); The Laboratory of Quantum Information Processing, Yazd University, Yazd (Iran, Islamic Republic of); Hooshmandasl, M.R., E-mail: hooshmandasl@yazd.ac.ir [Faculty of Mathematics, Yazd University, Yazd (Iran, Islamic Republic of); The Laboratory of Quantum Information Processing, Yazd University, Yazd (Iran, Islamic Republic of); Maalek Ghaini, F.M., E-mail: maalek@yazd.ac.ir [Faculty of Mathematics, Yazd University, Yazd (Iran, Islamic Republic of); The Laboratory of Quantum Information Processing, Yazd University, Yazd (Iran, Islamic Republic of); Cattani, C., E-mail: ccattani@unisa.it [Department of Mathematics, University of Salerno, Fisciano (Italy)

    2014-08-01T23:59:59.000Z

    In this paper, a new computational method based on the generalized hat basis functions is proposed for solving stochastic Itô–Volterra integral equations. In this way, a new stochastic operational matrix for generalized hat functions on the finite interval [0,T] is obtained. By using these basis functions and their stochastic operational matrix, such problems can be transformed into linear lower triangular systems of algebraic equations which can be directly solved by forward substitution. Also, the rate of convergence of the proposed method is considered and it has been shown that it is O(1/(n{sup 2}) ). Further, in order to show the accuracy and reliability of the proposed method, the new approach is compared with the block pulse functions method by some examples. The obtained results reveal that the proposed method is more accurate and efficient in comparison with the block pule functions method.

  12. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  13. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  14. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  15. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  16. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  17. Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Appendix D. Final report

    SciTech Connect (OSTI)

    NONE

    1988-07-01T23:59:59.000Z

    This appendix is an assessment of the present conditions of the inactive uranium mill site near Mexican Hat, Utah. It consolidates available engineering, radiological, geotechnical, hydrological, meteorological, and other information pertinent to the design of the Remedial Action Plan. Plan is to characterize the conditions at the mill and tailings site so that the Remedial Action Contractor may complete final designs of the remedial action.

  18. Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Text, Appendices A--C. Final report

    SciTech Connect (OSTI)

    NONE

    1988-07-01T23:59:59.000Z

    This Remedial Action Plan (RAP) has been developed to serve a two- fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. This document has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action. Pertinent information and data are included with reference given to the supporting documents. Appendices A,B, and C are provided as part of this document. Appendix A presents regulatory compliance issues, Appendix B provides details of the engineering design, and Appendix C presents the radiological support plan.

  19. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  20. Scalable SMT-Based Verification of GPU Kernel Functions School of Computing, University of Utah

    E-Print Network [OSTI]

    Capecchi, Mario R.

    Scalable SMT-Based Verification of GPU Kernel Functions Guodong Li School of Computing, University Satisfiability Modulo Theo- ries (SMT) tools, detecting bugs such as data races, in- correctly synchronized Satisfiabil- ity Modulo Theories (SMT [2

  1. Risk Bounds for Regularized Least-squares Algorithm with Operator-valued kernels

    E-Print Network [OSTI]

    Vito, Ernesto De

    2005-05-16T23:59:59.000Z

    We show that recent results in [3] on risk bounds for regularized least-squares on reproducing kernel Hilbert spaces can be straightforwardly extended to the vector-valued regression setting. We first briefly introduce ...

  2. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  3. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  4. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  5. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  6. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  7. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  8. System Response Kernel Calculation for List-mode Reconstruction in Strip PET Detector

    E-Print Network [OSTI]

    Bia?as, P; Strzelecki, A; Bednarski, T; Czerwi?ski, E; Kap?on, ?; Kochanowski, A; Korcyl, G; Kowalski, P; Kozik, T; Krzemie?, W; Molenda, M; Moskal, P; Nied?wiecki, Sz; Pa?ka, M; Pawlik, M; Raczy?ski, L; Rudy, Z; Salabura, P; Sharma, N G; Silarski, M; S?omski, A; Smyrski, J; Wi?licki, W; Zieli?ski, M

    2013-01-01T23:59:59.000Z

    Reconstruction of the image in Positron Emission Tomographs (PET) requires the knowledge of the system response kernel which describes the contribution of each pixel (voxel) to each tube of response (TOR). This is especially important in list-mode reconstruction systems, where an efficient analytical approximation of such function is required. In this contribution, we present a derivation of the system response kernel for a novel 2D strip PET.

  9. The architecture of a plug-and-play kernel for oilfield software applications

    SciTech Connect (OSTI)

    Ward, V.L.; Seaton, C.P. [Schlumberger Dowell, Tulsa, OK (United States)

    1996-12-01T23:59:59.000Z

    It is now common practice for engineers to use PC software to design and evaluate oilfield services. Rapidly changing technology in PC software has made it necessary for organizations to release new applications quickly to remain competitive. The authors designed a plug-and-play kernel for the computer aided design and evaluation (CADE) applications to reduce development time and time to market. The paper discusses the kernel used in the CADE software in detail.

  10. The effect of stress cracked and broken corn kernels on alkaline processing losses

    E-Print Network [OSTI]

    Jackson, David Scott

    1986-01-01T23:59:59.000Z

    (~. 70, P&. 06). There were significant differences in COD and DML (KRATIO= 100) between highly damaged corn and the less damaged counterpart of the same hybrid. Stress cracked corn, however, only slightly increased COD and DML. The ease of pericarp... Sigruficance of Com and Cooking Parameters . . . LIST OF FIGURES Page Stress Crack, Pericarp, and Broken Kernel Damage of Corn . . Flow Chart of Procedutes and Differences Between Cook Methods I and H 21 24 Correlation between Thousand Kernel Weight...

  11. Grid polygons from permutations and their enumeration by the kernel method

    E-Print Network [OSTI]

    Toufik Mansour; Simone Severini

    2006-03-09T23:59:59.000Z

    A grid polygon is a polygon whose vertices are points of a grid. We define an injective map between permutations of length n and a subset of grid polygons on n vertices, which we call consecutive-minima polygons. By the kernel method, we enumerate sets of permutations whose consecutive-minima polygons satisfy specific geometric conditions. We deal with 2-variate and 3-variate generating functions involving derivatives, cases which are not routinely solved by the kernel method.

  12. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  13. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  14. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  15. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  16. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  18. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  20. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  1. SPAN-4. A Point-Kernel Shield Evaluation Code

    SciTech Connect (OSTI)

    Wallace, O.J. [Bettis Atomic Power Lab., West Mifflin, PA, (United States)

    1992-03-16T23:59:59.000Z

    SPAN4 calculates the fast neutron dose rate, thermal neutron flux, gamma-ray flux, dose rate, and energy-absorption rate in rectangular, cylindrical, and spherical geometries by integrating appropriate exponential kernels over a source distribution. The shield configuration is flexible, a first-level shield mesh, using any one of the three geometries, is specified. Regions of this same geometry or of other geometries, having their own (finer) meshes, may then be embedded between the first-level mesh lines, defining second-level shield meshes. This process is telescopic, third-level shield meshes may be embedded between second-level meshlines in turn. All meshes may have variable spacing. Sources and detectors may be located arbitrarily with respect to any shield mesh. The source is defined by the function: s=s0+s1(a)*s2(b)*s3(c)+s4(a,b)*s3(c)+s5(a,c)*s2(b)+s6(b,c) *s1(a)+s7(a,b,c), where a, b, and c represent coordinates. If any factor is missing, the corresponding terms are zero.

  2. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  3. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  4. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  5. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  6. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  7. Kernel Spectral Clustering for dynamic data using Multiple Kernel D. Peluffo-Ordo~nez S. Garcia-Vega R. Langone J. A. K. Suykens G. Castellanos-Dominguez

    E-Print Network [OSTI]

    purposes, some conventional spectral clustering techniques are also considered, namely, kernel k- means and min-cuts. Also, standard k-means. The normalized mutual information and adjusted random index metrics Mellon University, as well as to a synthetic example, namely three moving Gaussian clouds. For comparison

  8. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  9. Physics Experiments and Abstract Harmonic Analysis: A Generalized Peano Kernel Theorem for Estimating Errors in Laser Interferometry

    SciTech Connect (OSTI)

    Luttman, A.

    2012-10-08T23:59:59.000Z

    This slide-show discusses the use of the Local Polynomial Approximation (LPA) to smooth signals from photonic Doppler velocimetry (PDV) applying a generalized Peano kernel theorem.

  10. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  11. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  12. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  13. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  14. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  15. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  16. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  17. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  18. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  19. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  20. The Census Taker's Hat

    E-Print Network [OSTI]

    Leonard Susskind

    2007-10-05T23:59:59.000Z

    If the observable universe really is a hologram, then of what sort? Is it rich enough to keep track of an eternally inflating multiverse? What physical and mathematical principles underlie it? Is the hologram a lower dimensional quantum field theory, and if so, how many dimensions are explicit, and how many "emerge?" Does the Holographic description provide clues for defining a probability measure on the Landscape? The purpose of this lecture is first, to briefly review a proposal for a holographic cosmology by Freivogel, Sekino, Susskind, and Yeh (FSSY), and then to develop a physical interpretation in terms of a "Cosmic Census Taker:" an idea introduced in reference [1]. The mathematical structure--a hybrid of the Wheeler DeWitt formalism and holography--is a boundary "Liouville" field theory, whose UV/IR duality is closely related to the time evolution of the Census Taker's observations. That time evolution is represented by the renormalization-group flow of the Liouville theory. Although quite general, the Census Taker idea was originally introduced in \\cite{shenker}, for the purpose of counting bubbles that collide with the Census Taker's bubble. The "Persistence of Memory" phenomenon discovered by Garriga, Guth, and Vilenkin, has a natural RG interpretation, as does slow roll inflation. The RG flow and the related C-theorem are closely connected with generalized entropy bounds.

  1. Korean Army Hat

    E-Print Network [OSTI]

    Hacker, Randi

    2013-08-14T23:59:59.000Z

    lightly. Psy ended up doing his military service twice because he apparently neglected his duties. The Gangnam Style rocker was clearly a little too at ease. #SouthKorea #Hacker #CEAS...

  2. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  3. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  4. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  5. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  6. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  7. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  8. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  9. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  10. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  11. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  12. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  13. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  14. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  15. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  16. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  17. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  18. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  19. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  20. Carbothermic Synthesis of 820 m UN Kernels: Literature Review, Thermodynamics, Analysis, and Related Experiments

    SciTech Connect (OSTI)

    Lindemer, Terrence [Harbach Engineering and Solutions] [Harbach Engineering and Solutions; Voit, Stewart L [ORNL] [ORNL; Silva, Chinthaka M [ORNL] [ORNL; Besmann, Theodore M [ORNL] [ORNL; Hunt, Rodney Dale [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    The U.S. Department of Energy is considering a new nuclear fuel that would be less susceptible to ruptures during a loss-of-coolant accident. The fuel would consist of tristructural isotropic coated particles with large, dense uranium nitride (UN) kernels. This effort explores many factors involved in using gel-derived uranium oxide-carbon microspheres to make large UN kernels. Analysis of recent studies with sufficient experimental details is provided. Extensive thermodynamic calculations are used to predict carbon monoxide and other pressures for several different reactions that may be involved in conversion of uranium oxides and carbides to UN. Experimentally, the method for making the gel-derived microspheres is described. These were used in a microbalance with an attached mass spectrometer to determine details of carbothermic conversion in argon, nitrogen, or vacuum. A quantitative model is derived from experiments for vacuum conversion to an uranium oxide-carbide kernel.

  1. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  2. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  3. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  4. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  5. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  6. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  7. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  8. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  9. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  10. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  11. The congruence kernel of an arithmetic lattice in a rank one algebraic group over a local field

    E-Print Network [OSTI]

    Zalesskii, Pavel

    is finite. Otherwise the CSP has an essentially negative answer. The principal result in [S1] is that-called congruence subgroup problem or CSP, has attracted a great deal of attention since the 19th century-)congruence kernel of G. In his terminology [S1] the CSP for this group has an affirmative answer if this kernel

  12. Code Compaction of an Operating System Kernel Haifeng He, John Trimble, Somu Perianayagam, Saumya Debray, Gregory Andrews

    E-Print Network [OSTI]

    Debray, Saumya

    -purpose operating systems on embedded platforms. The problem is complicated by the fact that kernel code tends imple- mentation of our ideas on an Intel x86 platform, applied to a Linux kernel that has been will typically not have a mouse interface); at the software end, they usually support a fixed set of applications

  13. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  14. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  15. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  16. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  17. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  18. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  19. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  20. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  1. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  2. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  3. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  5. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  6. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  7. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  10. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  11. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  12. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  13. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  14. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  15. Abstract--Kernel k-means is an extension of the standard k-means clustering algorithm that identifies nonlinearly separa-

    E-Print Network [OSTI]

    Likas, Aristidis

    Abstract-- Kernel k-means is an extension of the standard k- means clustering algorithm associated with this method, in this work we propose the global kernel k-means algorithm, a deterministic a global search proce- dure consisting of several executions of kernel k-means from suitable

  16. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. X, NO. X, XXXX 200X 1 Optimized data fusion for kernel k-means

    E-Print Network [OSTI]

    Optimized data fusion for kernel k-means clustering Shi Yu, L´eon-Charles Tranchevent, Xinhai Liu, Wolfgang Abstract--This paper presents a novel optimized kernel k-means algo- rithm (OKKC) to combine multiple data squares support vector machine 1 INTRODUCTION We present a novel optimized kernel k-means clustering (OKKC

  17. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  18. IEEE TRANSACTIONS ON NEURAL NETWORKS 1 Online Kernel-based Learning

    E-Print Network [OSTI]

    an application in task-space tracking control of redundant robots possible. The model parametrization furtherIEEE TRANSACTIONS ON NEURAL NETWORKS 1 Online Kernel-based Learning for Task-Space Tracking Robot Control Duy Nguyen-Tuong, Jan Peters Abstract--Task-space control of redundant robot systems based

  19. ret2dir: Rethinking Kernel Isolation Vasileios P. Kemerlis Michalis Polychronakis Angelos D. Keromytis

    E-Print Network [OSTI]

    Yang, Junfeng

    page frame sharing can be leveraged for the complete circumven- tion of software and hardware kernel, and kGuard. We also discuss techniques for constructing reliable ret2dir exploits against x86, x86-level software has become much harder, as recent versions of popular OSes come with nu- merous protections

  20. Path Integral Control by Reproducing Kernel Hilbert Space Embedding Konrad Rawlik

    E-Print Network [OSTI]

    Vijayakumar, Sethu

    of stochastic optimal control problems, of the so called path integral form, into reproducing kernel Hilbert efficiency, are provided. 1 Introduction While solving general non-linear stochastic optimal con- trol (SOC new sam- ples [Theodorou et al., 2010; 2009]. Additionally, the ap- proach remains model

  1. SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems

    E-Print Network [OSTI]

    He, Xubin "Ben"

    SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems Ming Zhang Cookeville, TN 38505, USA hexb@tntech.edu Abstract In this paper we introduce SPEK (Storage Performance storage systems at block level. It can be used for both DAS (Direct Attached Storage) and block level

  2. Selection and Properties of Alternative Forming Fluids for TRISO Fuel Kernel Production

    SciTech Connect (OSTI)

    Doug Marshall; M. Baker; J. King; B. Gorman

    2013-01-01T23:59:59.000Z

    Current Very High Temperature Reactor (VHTR) designs incorporate TRi-structural ISOtropic (TRISO) fuel, which consists of a spherical fissile fuel kernel surrounded by layers of pyrolytic carbon and silicon carbide. An internal sol-gel process forms the fuel kernel using wet chemistry to produce uranium oxyhydroxide gel spheres by dropping a cold precursor solution into a hot column of trichloroethylene (TCE). Over time, gelation byproducts inhibit complete gelation, and the TCE must be purified or discarded. The resulting TCE waste stream contains both radioactive and hazardous materials and is thus considered a mixed hazardous waste. Changing the forming fluid to a non-hazardous alternative could greatly improve the economics of TRISO fuel kernel production. Selection criteria for a replacement forming fluid narrowed a list of ~10,800 chemicals to yield ten potential replacement forming fluids: 1-bromododecane, 1- bromotetradecane, 1-bromoundecane, 1-chlorooctadecane, 1-chlorotetradecane, 1-iododecane, 1-iodododecane, 1-iodohexadecane, 1-iodooctadecane, and squalane. The density, viscosity, and surface tension for each potential replacement forming fluid were measured as a function of temperature between 25 °C and 80 °C. Calculated settling velocities and heat transfer rates give an overall column height approximation. 1-bromotetradecane, 1-chlorooctadecane, and 1-iodododecane show the greatest promise as replacements, and future tests will verify their ability to form satisfactory fuel kernels.

  3. Viability Kernel for Ecosystem Management Models Eladio Oca~na Anaya

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Viability Kernel for Ecosystem Management Models Eladio Oca~na Anaya Michel De Lara Ricardo task in general. We study the viability of nonlinear generic ecosystem models under preservation in the Peruvian upwelling ecosystem. Key words: control theory; state constraints; viability; predator

  4. COMBINING FREE ENERGY SCORE SPACES WITH INFORMATION THEORETIC KERNELS: APPLICATION TO SCENE CLASSIFICATION

    E-Print Network [OSTI]

    Aguiar, Pedro M. Q.

    COMBINING FREE ENERGY SCORE SPACES WITH INFORMATION THEORETIC KERNELS: APPLICATION TO SCENE recent and top performing tools in each of the steps: (i) the free energy score space; (ii) non embeddings can be found in [1, 2, 13]. A very recent approach, termed free energy score space (FESS) [13, 14

  5. IEEE SIGNAL PROCESSING MAGAZINE 2013 1 Kernel Multivariate Analysis Framework for

    E-Print Network [OSTI]

    Camps-Valls, Gustavo

    IEEE SIGNAL PROCESSING MAGAZINE 2013 1 Kernel Multivariate Analysis Framework for Supervised in the literature collectively grouped under the field of Multivariate Analysis (MVA). This paper provides a uniform Correlation Analysis (CCA) and Orthonormalized PLS (OPLS), as well as their non- linear extensions derived

  6. Least Squares Support Vector Machines for Kernel CCA in Nonlinear State-Space Identification

    E-Print Network [OSTI]

    with multivariable input and output signals. It is of practical interest to be able to determine a state-space for linear time-invariant systems well-established state-space identification methods are available (Ljung to estimate the state-space representation. In this paper we use kernel canonical correlation analysis (KCCA

  7. Global Heat Kernel Estimate for Relativistic Stable Processes in Exterior Open Sets

    E-Print Network [OSTI]

    Chen, Zhen-Qing

    ,1 exterior open sets as well as for half-space-like open sets. The ideas of [8] have been adaptedGlobal Heat Kernel Estimate for Relativistic Stable Processes in Exterior Open Sets Zhen-Qing Chen for the transition densities of relativistic -stable processes with mass m (0, 1] in C1,1 exterior open sets

  8. Definition RX Evaluate Kernels K-2d K-1d Change By definition undefined

    E-Print Network [OSTI]

    Theiler, James

    Definition RX Evaluate Kernels K-2d K-1d Change By def·i·ni·tion undefined Adventures in anomaly Alamos National Laboratory Research supported by the United States Department of Energy through the Los Alamos Laboratory Directed Research and Development (LDRD) Program. #12;Theiler LA-UR-14-24429 Definition

  9. Gene Feature Extraction Using T-Test Statistics and Kernel Partial Least Squares

    E-Print Network [OSTI]

    Kwok, James Tin-Yau

    Gene Feature Extraction Using T-Test Statistics and Kernel Partial Least Squares Shutao Li1 , Chen Clear Water Bay, Hong Kong shutao li@yahoo.com.cn, lc337199@sina.com, jamesk@cs.ust.hk Abstract. In this paper, we propose a gene extraction method by us- ing two standard feature extraction methods, namely

  10. IEEE SIGNAL PROCESSING LETTER, VOL. , NO. , 2008 1 Image interpolation by blending kernels

    E-Print Network [OSTI]

    interpolation kernel function cannot yield high quality high resolution(HR for short) images in practice, since before being used to interpolate the low resolution(LR for short) image. The main problem is that if we of values at control points to a spline function. This method is also used in practice currently

  11. Unified Convolutional/Turbo Decoder Architecture Design Based on Triple-Mode MAP/VA Kernel

    E-Print Network [OSTI]

    Hung, Shih-Hao

    Unified Convolutional/Turbo Decoder Architecture Design Based on Triple-Mode MAP/VA Kernel Fan convolutional/ turbo decoder design. According to the triple-mode MAP/VA timing chart and by merging some similar modules in both the Viterbi decoder and the log-MAP turbo code decoder, we build one unified

  12. Polar Cloud Detection using Satellite Data with Analysis and Application of Kernel Learning Algorithms

    E-Print Network [OSTI]

    Shi, Tao

    Abstract Polar Cloud Detection using Satellite Data with Analysis and Application of Kernel Professor Bin Yu, Chair Clouds play a major role in Earth's climate and cloud detection is a crucial step climate model studies. Cloud detection is particularly difficult in the snow- and ice-covered polar

  13. Predictable Interrupt Management for Real Time Kernels over conventional PC Hardware1

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    which this integrated model improves the traditional model. The design of a flexible and portable kernel-CONACyT 42151-Y, and CONACYT 42449-Y Mexico. Abstract In this paper we analyze the traditional model on real-time systems. As a result of this analysis, we propose a model that integrates interrupts

  14. EXTENSIONS OF LINKING SYSTEMS WITH p-GROUP KERNEL BOB OLIVER AND JOANA VENTURA

    E-Print Network [OSTI]

    Ventura, Joana

    EXTENSIONS OF LINKING SYSTEMS WITH p-GROUP KERNEL BOB OLIVER AND JOANA VENTURA Abstract. We study. Oliver is partially supported by UMR 7539 of the CNRS. J. Ventura is partially supported by FCT. #12;2 BOB OLIVER AND JOANA VENTURA enother prolem is tht in generlD when ev is linking system nd A g

  15. EXTENSIONS OF LINKING SYSTEMS WITH p-GROUP KERNEL BOB OLIVER AND JOANA VENTURA

    E-Print Network [OSTI]

    Oliver, Bob

    AND JOANA VENTURA Abstract. We study extensions of p-local finite groups where the kernel i* *s of the CNRS. J. Ventura is partially supported by FCT/POCTI/FEDER and grant PDCT/MAT/58497* */2004. Both;2 BOB OLIVER AND JOANA VENTURA Another problem is that in general, when eLis a linking system and A C e

  16. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  17. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  18. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  19. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  20. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  1. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  2. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  3. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  4. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  5. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  6. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  7. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  8. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  9. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  10. Verkndungsblatt der Gottfried Wilhelm Leibniz Universitt Hannover vom 07.09.2009 12/2009 Die Philosophische Fakultt der Gottfried Wilhelm Leibniz Universitt Hannover hat am 17.07.2009 die nachstehende

    E-Print Network [OSTI]

    Vollmer, Heribert

    Präsidium hat die �nderung am 05.08.2009 gemä� § 37 Abs. 1 Nr. 5. b) NHG genehmigt. Sie tritt nach ihrer: § 27 Inkrafttreten Diese Prüfungsordnung tritt nach Genehmigung durch das Präsidium nach ihrer

  11. Modification to the Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Volume 1, Text, Attachments 1--6. Final report

    SciTech Connect (OSTI)

    NONE

    1989-01-01T23:59:59.000Z

    This document provides the modifications to the 1988 Remedial Action Plan (RAP) of the contaminated materials at the Monument Valley, Arizona, and Mexican Hat, Utah. The text detailing the modifications and attachments 1 through 6 are provided with this document. The RAP was developed to serve a two-fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley, Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. This document has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action. Pertinent information and data are included with reference given to the supporting documents.

  12. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  13. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  14. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  15. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  17. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  18. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  19. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  20. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  1. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  2. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  3. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  4. PROPERTIES OF A SOLAR FLARE KERNEL OBSERVED BY HINODE AND SDO

    SciTech Connect (OSTI)

    Young, P. R. [College of Science, George Mason University, 4400 University Drive, Fairfax, VA 22030 (United States)] [College of Science, George Mason University, 4400 University Drive, Fairfax, VA 22030 (United States); Doschek, G. A.; Warren, H. P. [Naval Research Laboratory, 4555 Overlook Avenue SW, Washington, DC 20375 (United States)] [Naval Research Laboratory, 4555 Overlook Avenue SW, Washington, DC 20375 (United States); Hara, H. [National Astronomical Observatory of Japan/NINS, 2-21-1 Osawa, Mitaka, Tokyo 181-8588 (Japan)] [National Astronomical Observatory of Japan/NINS, 2-21-1 Osawa, Mitaka, Tokyo 181-8588 (Japan)

    2013-04-01T23:59:59.000Z

    Flare kernels are compact features located in the solar chromosphere that are the sites of rapid heating and plasma upflow during the rise phase of flares. An example is presented from a M1.1 class flare in active region AR 11158 observed on 2011 February 16 07:44 UT for which the location of the upflow region seen by EUV Imaging Spectrometer (EIS) can be precisely aligned to high spatial resolution images obtained by the Atmospheric Imaging Assembly (AIA) and Helioseismic and Magnetic Imager (HMI) on board the Solar Dynamics Observatory (SDO). A string of bright flare kernels is found to be aligned with a ridge of strong magnetic field, and one kernel site is highlighted for which an upflow speed of Almost-Equal-To 400 km s{sup -1} is measured in lines formed at 10-30 MK. The line-of-sight magnetic field strength at this location is Almost-Equal-To 1000 G. Emission over a continuous range of temperatures down to the chromosphere is found, and the kernels have a similar morphology at all temperatures and are spatially coincident with sizes at the resolution limit of the AIA instrument ({approx}<400 km). For temperatures of 0.3-3.0 MK the EIS emission lines show multiple velocity components, with the dominant component becoming more blueshifted with temperature from a redshift of 35 km s{sup -1} at 0.3 MK to a blueshift of 60 km s{sup -1} at 3.0 MK. Emission lines from 1.5-3.0 MK show a weak redshifted component at around 60-70 km s{sup -1} implying multi-directional flows at the kernel site. Significant non-thermal broadening corresponding to velocities of Almost-Equal-To 120 km s{sup -1} is found at 10-30 MK, and the electron density in the kernel, measured at 2 MK, is 3.4 Multiplication-Sign 10{sup 10} cm{sup -3}. Finally, the Fe XXIV {lambda}192.03/{lambda}255.11 ratio suggests that the EIS calibration has changed since launch, with the long wavelength channel less sensitive than the short wavelength channel by around a factor two.

  5. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  6. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  7. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  8. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  9. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  10. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  11. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  12. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  13. IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, VOL. 14, NO. 4, JULY 2006 1267 Embedded Kernel Eigenvoice Speaker Adaptation

    E-Print Network [OSTI]

    Kwok, James Tin-Yau

    -Wing Mak, Member, IEEE, Roger Wend-Huu Hsiao, Student Member, IEEE, Simon Ka-Lung Ho, and James T. Kwok using kernel principal component analysis. A new speaker model is then constructed as a linear

  14. Kernel for a Semantic Learning Platform with adapted suggestions Ioan SZILAGYI, Radu BALOG-CRIAN, Ioan ROXIN, Ana ROXIN

    E-Print Network [OSTI]

    Boyer, Edmond

    Kernel for a Semantic Learning Platform with adapted suggestions Ioan SZILAGYI, Radu BALOG {ioan.szilagyi; radu.balog-crisan; ioan.roxin}@univ-fcomte.fr Abstract -- In the context of personalized

  15. Annual Security Report October 1, 2013

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2013 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................4 MESSAGE FROM THE EINSTEIN SECURITY DEPARTMENT

  16. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  17. A Survey on Cloud Provider Security

    E-Print Network [OSTI]

    A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

  18. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  19. Annual Security Report October 1, 2012

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2012 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................3 MESSAGE FROM THE SECURITY DEPARTMENT

  20. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  1. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  2. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  3. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  4. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  5. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  6. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  8. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  9. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  10. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07T23:59:59.000Z

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  11. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  12. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  13. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  14. Effect of Pre and Post-Harvest Treatments on Characteristics of ‘Pawnee’ Pecan Kernels

    E-Print Network [OSTI]

    Mansur, Zainab J

    2014-04-17T23:59:59.000Z

    (Venkatachalam, 2004). Pecans are considered a healthy food because of the high monounsaturated fatty acid content (Villarreal-Lozoya et al., 2007) and high concentrations of phenolics, flavonoids, and proanthocyanidins, which are phytochemicals with strong...., 2004). Pecan kernels have a wide range of possible uses. They can be sold in shell or shelled, and used as a main ingredient for confectionery, dairy and bakery products. Other uses include: incorporation into snack bars in raw form, sweetening...

  15. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Energy Savers [EERE]

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  16. Harold Washington Social Security Administration (SSA) Center...

    Office of Environmental Management (EM)

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  17. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  18. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  19. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  20. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  1. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  2. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  3. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  4. Quantum Enabled Security (QES) for Optical Communications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled...

  5. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

  6. Safety and Security Enforcement Process Overview

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

  7. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  8. Independent Oversight Activity Report, Nevada National Security...

    Office of Environmental Management (EM)

    Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

  9. Independent Activity Report, Nevada National Security Site -...

    Energy Savers [EERE]

    Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR NNSS-2012-12-03 This Independent Activity Report documents an...

  10. Fission product release and survivability of UN-kernel LWR TRISO fuel

    SciTech Connect (OSTI)

    T. M. Besmann; M. K. Ferber; H.-T. Lin; B. P. Collin

    2014-05-01T23:59:59.000Z

    A thermomechanical assessment of the LWR application of TRISO fuel with UN kernels was performed. Fission product release under operational and transient temperature conditions was determined by extrapolation from fission product recoil calculations and limited data from irradiated UN pellets. Both fission recoil and diffusive release were considered and internal particle pressures computed for both 650 and 800 um diameter kernels as a function of buffer layer thickness. These pressures were used in conjunction with a finite element program to compute the radial and tangential stresses generated within a TRISO particle undergoing burnup. Creep and swelling of the inner and outer pyrolytic carbon layers were included in the analyses. A measure of reliability of the TRISO particle was obtained by computing the probability of survival of the SiC barrier layer and the maximum tensile stress generated in the pyrolytic carbon layers from internal pressure and thermomechanics of the layers. These reliability estimates were obtained as functions of the kernel diameter, buffer layer thickness, and pyrolytic carbon layer thickness. The value of the probability of survival at the end of irradiation was inversely proportional to the maximum pressure.

  11. Phenomenological memory-kernel master equations and time-dependent Markovian processes

    E-Print Network [OSTI]

    L. Mazzola; E. -M. Laine; H. -P. Breuer; S. Maniscalco; J. Piilo

    2011-03-03T23:59:59.000Z

    Do phenomenological master equations with memory kernel always describe a non-Markovian quantum dynamics characterized by reverse flow of information? Is the integration over the past states of the system an unmistakable signature of non-Markovianity? We show by a counterexample that this is not always the case. We consider two commonly used phenomenological integro-differential master equations describing the dynamics of a spin 1/2 in a thermal bath. By using a recently introduced measure to quantify non-Markovianity [H.-P. Breuer, E.-M. Laine, and J. Piilo, Phys. Rev. Lett. 103, 210401 (2009)] we demonstrate that as far as the equations retain their physical sense, the key feature of non-Markovian behavior does not appear in the considered memory kernel master equations. Namely, there is no reverse flow of information from the environment to the open system. Therefore, the assumption that the integration over a memory kernel always leads to a non-Markovian dynamics turns out to be vulnerable to phenomenological approximations. Instead, the considered phenomenological equations are able to describe time-dependent and uni-directional information flow from the system to the reservoir associated to time-dependent Markovian processes.

  12. CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS

    E-Print Network [OSTI]

    Olsen, Stephen L.

    Security service is currently handled through a private security guard service contract, which provides

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  14. Multipartite secure state distribution

    SciTech Connect (OSTI)

    Duer, W.; Briegel, H.-J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria); Institut fuer Quantenoptik und Quanteninformation der Oesterreichischen, Akademie der Wissenschaften, Innsbruck (Austria); Calsamiglia, J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria)

    2005-04-01T23:59:59.000Z

    We introduce the distribution of a secret multipartite entangled state in a real-world scenario as a quantum primitive. We show that in the presence of noisy quantum channels (and noisy control operations), any state chosen from the set of two-colorable graph states (Calderbank-Shor-Steane codewords) can be created with high fidelity while it remains unknown to all parties. This is accomplished by either blind multipartite entanglement purification, which we introduce in this paper, or by multipartite entanglement purification of enlarged states, which offers advantages over an alternative scheme based on standard channel purification and teleportation. The parties are thus provided with a secret resource of their choice for distributed secure applications.

  15. McMASTER SECURITY SERVICES ANNUAL REPORT 2007

    E-Print Network [OSTI]

    Thompson, Michael

    McMASTER SECURITY SERVICES ANNUAL REPORT 2007 #12;#12;Table of Contents MCMASTER SECURITY SERVICES .................................................................................................................................6 MCMASTER SECURITY SERVICES ­ WHO WE .......................................................................................................................29 #12;#12;5 MCMASTER SECURITY SERVICES MISSION STATEMENT Developing a safe and secure environment

  16. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  17. WEP SecurityWEP Security David ArmstrongDavid Armstrong

    E-Print Network [OSTI]

    ""inin house.house."" 802.11802.11 nn 802.11a802.11a ­­ no securityno security nn 802.11b802.11b ­­ WEP

  18. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  19. The Secure Hash Payment System

    E-Print Network [OSTI]

    Thompson, Timothy J

    2001-01-01T23:59:59.000Z

    OF FIGURES FIGURE Page 1 SET overview 32 2 SET messages 34 3 SET and SSL overview 36 4 Overview of SHPS 48 5 An example E C M L document 56 6 An example E C C document 57 7 An example CurrencyUpdate document 65 8 An example PurchaseRequest document... information. Netscape's Secure Socket Layer (SSL) provides the secure link between the consumer and merchant. While this approach has been successful due to the availability of SSL in most web browsers, the approach does not provide the level of security...

  20. Entropic security in Quantum Cryptography

    E-Print Network [OSTI]

    Simon Pierre Desrosiers

    2007-11-16T23:59:59.000Z

    We present two new definitions of security for quantum ciphers which are inspired by the definition of entropic security and entropic indistinguishability defined by Dodis and Smith. We prove the equivalence of these two new definitions. We also propose a generalization of a cipher described by Dodis and Smith and show that it can actually encrypt n qubits using less than n bits of key under reasonable conditions and yet be secure in an information theoretic setting. This cipher also totally closes the gap between the key requirement of quantum ciphers and classical ciphers.

  1. Computer Sciences @ Wisconsin OS Qualifier: Fall 2011 Instructions: Answer all six questions.

    E-Print Network [OSTI]

    Liblit, Ben

    to improve the security of a system, as in the VAX VMM security kernel. a) Both VMware and the VAX security kernel use ring compression to implement

  2. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group The principles · The eight principles are: 1. Economy of mechanism 2. FailIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group Objectives

  3. Decision Support for Choice of Security

    E-Print Network [OSTI]

    Langseth, Helge

    Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

  4. Security Event and Log Management Service

    E-Print Network [OSTI]

    Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management IBM Global Technology Services December 2007 #12;Executive Summary The economics of network security have changed. The high cost and complexity inherent in the use

  5. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act of 2002 3 Security Management and Assistance Group (SMA) 4 FISMA Implementation Project 4 Publications

  6. McMaster Security 2012 Annual Report

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services 2012 Annual Report #12;McMaster Security Services ­ Annual Report 2012 2 Mission Statement Developing a safe and secure environment in this academic institution within the McMaster community is assigned to the Security Services Department. Methods and approaches

  7. Server Security Policy 1.0 Purpose

    E-Print Network [OSTI]

    Demirel, Melik C.

    Server Security Policy COE­SSP­01 1.0 Purpose The purpose of this policy is to establish standards configurations must be in accordance with approved College guidelines to ensure a significant level of security Wrappers or other security mechanisms. · The most recent security patches must be installed on the system

  8. Feb 4, 2005 --Lecture 8 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    Feb 4, 2005 -- Lecture 8 22C:169 Computer Security Douglas W. Jones Department of Computer Science Program Security #12;Is this program secure? A simple question only if program has no input or output in program Failure Manifestation of fault in behavior Relative to spec assumed correct! #12;Security

  9. April 8, 2005 --Lecture 30 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    April 8, 2005 -- Lecture 30 22C:169 Computer Security Douglas W. Jones Department of Computer Science Administrative Issues #12;Warning Security is a system property An emergent property of the whole of system Security rarely emerges by accident Adding a security module to a system rarely achieves much! #12

  10. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  11. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  12. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  13. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  14. Grid Security: Expecting the Mingchao Ma

    E-Print Network [OSTI]

    University College London

    of a communications line; Power failure; Internet connection failure; Mis-configuration; · Security incidents ­ SystemGrid Security: Expecting the Unexpected Mingchao Ma STFC ­ Rutherford Appleton Laboratory, UK #12;Slide 2 Overview · Security Service Challenges (SSC) Review · Grid Security Incident ­ What had happened

  15. EXTENDED DESCRIPTION TECHNIQUES FOR SECURITY ENGINEERING

    E-Print Network [OSTI]

    of security critical systems. Based on general security evaluation criteria, we show how to extend the system applications that communi- cate over open networks like the Internet--security is an extremely important issue this problem, on the one hand there are highly sophisticated col- lections of evaluation criteria that security

  16. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  17. Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?

    E-Print Network [OSTI]

    Qin, Xiao

    Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

  18. Utility Security & Resiliency: Working Together

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

  19. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  20. Master Safeguards and Security Agreements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03T23:59:59.000Z

    To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

  1. Meeting Federal Energy Security Requirements

    Broader source: Energy.gov [DOE]

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  2. Energy and Global Security - Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Team Helps Lead Charge to Revolutionize Energy Storage Gizmodo UK: Fast-Acting Nuclear Reactor Will Power through Piles of Plutonium Daily Herald: Fagel Book Named Security Book of...

  3. NSC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home content Social Media NSC NSC What does NNSA's new National Security Campus in Kansas City, MO look...

  4. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02T23:59:59.000Z

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  5. Security Area Vouching and Piggybacking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-05T23:59:59.000Z

    Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

  6. Cognitive Security for Personal Devices

    E-Print Network [OSTI]

    Greenstadt, Rachel

    2008-03-17T23:59:59.000Z

    Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

  7. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30T23:59:59.000Z

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  8. Secure Biometric Recognition Abhishek Nagar

    E-Print Network [OSTI]

    Template Security 20 3.1 Biometric Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.6 Evaluation of Template Protection Techniques . . . . . . . . . . . . . . . . . 41 4 of the major threats hovering the wired society. According to Javelin Strategy and Research Survey, there were

  9. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  10. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  11. Homeland Security Issues for Facilities

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01T23:59:59.000Z

    more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure...

  12. Securities trading of concepts (STOC)

    E-Print Network [OSTI]

    Dahan, Ely

    Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

  13. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division National Institute of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M

  14. Security of counterfactual quantum cryptography

    SciTech Connect (OSTI)

    Yin Zhenqiang; Li Hongwei; Chen Wei; Han Zhengfu; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2010-10-15T23:59:59.000Z

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  15. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  16. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  17. Office of Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  18. Critical Infrastructure and Cyber Security

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01T23:59:59.000Z

    that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

  19. U-070:Redhat krb5 Critical Security Update | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise Linux WS (v. 4) ABSTRACT: Vulnerability can be exploited by malicious people to compromise a vulnerable system. REFERENCE LINKS: RHSA-2011:1851-2...

  20. Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA